Coesys Border Management



Similar documents
Coesys Border Management

End-to-end security with advanced biometrics technology

End-to-end security with advanced biometrics technology

SECURE IDENTITY MANAGEMENT. Globally recognised identity management expertise

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee

THE LEADING EDGE OF BORDER SECURITY

International Civil Aviation Organization ASSEMBLY 38TH SESSION EXECUTIVE COMMITTEE

The Leading Provider of Identity Solutions and Services in the U.S.

PRIME IDENTITY MANAGEMENT CORE

Complete. security. begins with 3M

Preservation for a Safer World

How can Identity and Access Management help me to improve compliance and drive business performance?

Security management solutions White paper. Extend business reach with a robust security infrastructure.

Command and Control Integrated Solutions. Transforming security needs into unique custom-made solutions. Building Technologies

Provide access control with innovative solutions from IBM.

Analance Data Integration Technical Whitepaper

Preemptive security solutions for healthcare

IBM Tivoli Asset Management for IT

Strengthen security with intelligent identity and access management

Analance Data Integration Technical Whitepaper

emind Webydo Moves to the Google Cloud Platform (GCP) with Emind For a Scalable Cloud Customers Stories by Overview About Webydo

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption

Webydo Moves to the Google Cloud Platform (GCP) with Emind For a Scalable Cloud

Injazat s Managed Services Portfolio

The CIO s Guide to HIPAA Compliant Text Messaging

The Power of BMC Remedy, the Simplicity of SaaS WHITE PAPER

V1.4. Spambrella Continuity SaaS. August 2

CA Clarity Integration

DEPARTMENT OF HOMELAND SECURITY

Business Startups - Advantages of Using Automation

Managed Security Services for Data

Company Overview. Enterprise Cloud Solutions

Department of Homeland Security

Successfully managing geographically distributed development

Implement security solutions that help protect your IT systems and facilitate your On Demand Business initiatives.

White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA

"Secure insight, anytime, anywhere."

How To Use Ibm Tivoli Monitoring Software

Firewall Administration and Management

Border control using biometrics in Japan. September 2008 NEC Corporation/Daon

The SMB IT Decision Maker s Guide: Choosing a SaaS Service Management Solution

Total Protection for Compliance: Unified IT Policy Auditing

Reasons Enterprises. Prefer Juniper Wireless

Troux Hosting Options

Addressing BYOD Challenges with ForeScout and Motorola Solutions

IDENTITY-AS-A-SERVICE IN A MOBILE WORLD. Cloud Management of Multi-Modal Biometrics

Collaboration solutions for midsized businesses Buyer s guide

White paper December IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview

Symantec Mobile Management 7.2

Defending the Internet of Things

Key Security Questions to Ask a Financial Data Aggregation Provider Is the data aggregation partner you re considering following the best practices

Securing Enterprise Mobility for Greater Competitive Advantage

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

SIX STEPS TO SSL CERTIFICATE LIFECYCLE MANAGEMENT

Resolving the Top Three Patch Management Challenges

Transaction Security. Advisory Services

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

Cloud Contact Center. Security White Paper

IBM QRadar Security Intelligence Platform appliances

Skynax. Mobility Management System. System Manual

WHITEPAPER. Addressing Them with Adaptive Network Security. Executive Summary... An Evolving Network Environment Adaptive Network Security...

Application of Biometric Technology Solutions to Enhance Security

MORPHO CRIMINAL JUSTICE SUITE

BIOMETRICAL IDENTITY MULTI-MODAL SOLUTIONS

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

Microsoft Dynamics CRM Solutions for Retail Banking

Cloud Contact Center. Security White Paper

Data Center Solutions

IBM QRadar Security Intelligence April 2013

AT&T. ip vpn portfolio. integrated. IP VPN solutions. for the enterprise. Communication Systems International Incorporated

ROUTES TO VALUE. Business Service Management: How fast can you get there?

The Impact of HIPAA and HITECH

Woodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview

Network Systems Integration

Vistara Lifecycle Management

FoundationIP. Your scalable, seamless, state-of-the-art solution

Enterprise Mobility For Federal Civilian Agencies. Communications Incident Management Asset Management

IDaaS: Managed Credentials for Local & State Emergency Responders

SURVEILLANCE ENHANCED FACE RECOGNITION

Virtualization Beyond the Data Center: Increase Network Infrastructure Utilization and Efficiency to Reduce Operational Costs

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

GoodData Corporation Security White Paper

Five Keys to Ironclad Security in Your M&A Transactions

A ROAD MAP FOR GEOSPATIAL INFORMATION SYSTEM APPLICATIONS ON VBLOCK INFRASTRUCTURE PLATFORMS

Only 8% of corporate laptop data is actually backed up to corporate servers. Pixius Advantage Outsourcing Managed Services

Very large scale systems

VIRGINIA DEPARTMENT OF MOTOR VEHICLES SECURITY ARCHITECTURE POLICY. 03/27/09 Version

How To Run A Windows Server 2008 With Hyperv On A Poweredge Poweredge Server On A Mini Computer (Dell)

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

Why Should Companies Take a Closer Look at Business Continuity Planning?

Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police

SANS Top 20 Critical Controls for Effective Cyber Defense

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Microsoft SQL Server on Stratus ftserver Systems

Payment Card Industry Data Security Standard

POSITION PAPER. The Application of Biometrics at Airports PUBLISHED BY ACI WORLD HEADQUARTERS GENEVA SWITZERLAND

Software-as-a-Service: Changing How You Share Information in Today s Changing Business World. Part II

Enterprise Single Sign-On SOS. The Critical Questions Every Company Needs to Ask

See all, manage all is the new mantra at the corporate workplace today.

Transcription:

Coesys Border Management Offering convenience for secure border crossing Improving border intelligence for detection and prevention Supporting your immigration organization Combating cross-border crime, terrorism and illegal crossings requires tremendous efforts to identify and prevent threats challenging land, maritime and air borders. To maximize these efforts and ensure the safety of citizens, police and immigration enforcement can now rely on a unified border management system for full operational control.

From border control to border management With steadily growing numbers of travelers, states need to address the challenge of striking the right balance between open yet fully secure, controlled borders. Coesys Border Management provides a full range of applications to implement best-practice immigration processes and state-of-the-art technologies at border management headquarters (HQ) and border control points (BCPs). The solution enables border control agencies to process both arriving and departing travelers in wide-ranging situations at air, land and sea points of entry- at both manned immigration desks and Automatic Border Control (ABC) gates. > 11 billion Air traffic expected to double and reach to reach 11 billion passengers in 2030 (source ACI) > 40 million Lost & stolen travel documents in Interpol database in February 2014 Main objectives of our customers today > Build a unified and secure border management system public services and administrations can count on at all times > Lay the foundation of an integrated system to merge and streamline layers of disparate processes into a complete, cohesive and secure system > Implement a future-proof, mission critical system flexible and scalable enough to keep up with the demands of changing immigration policy and technological standards while guaranteeing uninterrupted operation, due to online/offline availability > Harness the latest technologies to confirm identity using document verification, biometrics in combination with control list checks and risk assessment across all BCPs > Reduce costs by automating and optimizing processes while leveraging technologies to strengthen security and provide convenience for passengers > 500 million Over 500 million epassports in circulation in 2013 (source ICAO 2013)

Key benefits of Gemalto Border Management Consistent control at all border control points Gemalto solutions support all border control types (border gates, egates, suitcases, handhelds, etc.) for air, land and sea borders and mobile checkpoints. Our customers can implement a consistent framework to secure borders by enabling the same checks and functionality for all border control stations. In addition, mission critical data such as alerts and control list are available in real time within the system with Gemalto s automated synchronization of information between inspection clients, local and HQ servers. Immigration officer's decisions are supported by information immediately available across all border points no matter where it was first captured. This kind of cohesive and homogeneous approach prevents the vulnerability of any single point in the system. Flexibility and scalability to meet changing needs > To meet the issuing authority s current and future needs, the suite provides a high degree of flexibility for the customization of workflows and access control. > New border control points of any type can be added progressively,at the customer s discretion and according to needs and priorities. Full operational control for border authorities Border authorities can adjust the level and type of checks, criteria for alerts and quality requirements, as well as the specific available services and its underlying workflows using a single, centrally available administration application. This eliminates the need for costly development or customization, safeguarding confidential information. It also empowers border control authorities to adapt quickly to new requirements and threats, without necessarily involving the vendor. Decision support and intelligence sharing Data mined at the various border control points are compiled into a single entry/exit system (EES) crucial to enhancing border control and intelligence sharing and forecasting border transit flow. Statistics and reports provide invaluable decision support to drive tourism and prioritize national investment efforts. Facilitated information sharing with the Visa Information System and other national and international systems such as that of Interpol substantially mitigates risk stemming from granting unauthorized access to the country. Built-in Security - privacy and protection Information security is built-in at all levels of our border management system, ensuring the protection and privacy of all sensitive information during data acquisition, data handling, data communication, data storage (at BCPs, HQ, back-up and DR sites) and data deletion. Uninterrupted service for mission-critical systems Homeland security solutions are mission-critical systems that must be fully operational at all times, even in the event of interrupted connection. That is why data are securely stored temporarily, in local AES 256 encrypted containers, to make relevant data and control lists available locally for offline verification. All data are synchronized and updated automatically as soon as the systems come back online. The high-availability back-end system features clustered application server and database as well as automated failover to backup and disaster recovery sites. This guarantees the security of the entire system, with up-todate information at all times and no impact whatsoever on border control operations. Hardware agnostic All solutions are built hardware-agnostic to ensure independence from past or future suppliers. Especially, our solution will protect our customers from vendor lock in in the field of biometrics and travel document scanners.

What Coesys Border Management delivers Border Management Operations Reporting and monitoring User rights and access management Watch List / Risk Aggregation, EES travel registry Document Template Administration Automatic Passport Verification Biometric Verification Visa Verification Risk Assessment Form Capture Convenience for travelers and authorities alike with faster, more secure border operations > Automated travel document identification and verification against a centrally administered document repository > Biometric data capture with quality assurance > Biometric traveler verification (1:1) and identification (1:N) > Integration with the national Visa Information System (N-VIS) for Visa status check and verification of Visa Document and biometric Identity confirmation(1:1) > Automated comparison of identity against text-based and biometric control/alert lists > Entry Exit System (EES) with visa overstayer and advanced transit alarm logic > Automated entry/exit card recognition > Automated Border Control (ABC) gates, deployed with or without Registered Traveler Program (RTP) authorities and other government agencies, such as customs, airport authorities and visitor bureaus > Better Adoption: Central management of the level of alert and types of checks from HQ, with logic and alerts pushed to all BCPs to cascade a consistent approach to developing threats throughout the organization Coesys Border Management supports your immigration organization > Granular identity and access management for operators through central user, role, workstation, site, service, workflow management with defined access rules and strong identification mechanisms > Monitoring of border resources such as fixed workstations and mobile units for load balancing and optimized allocation Coesys Border Management improves border intelligence for detection and prevention > Better Information Sharing: Consolidation of data collected at BCPs in a central EES and/or unique traveler database > Better intelligence: Use of Advanced Passenger Information (API) for risk assessment and automation of external system queries and national and international control lists via i.e. through, for instance, Interpol s I-24/7 global police communications and MIND/FIND integrated search solutions > Better Exchange: Real-time Information sharing with all connected BCPs and Production of customizable reports and business intelligence data for border TOP 3 benefits our customers most appreciate > Consistent control at all border points at all times > Compilation of a traveler database fully compliant with privacy requirements to strengthen risk assessment > Ability in the long-term to take ownership of a solution fully suited to their needs and offering customizable security, verification actions and checks with a wide choice of hardware (document and biometric scanner), middleware and infrastructure platforms

Experience and services for an end-to-end solution Mobilize our experienced service teams to support you. Our expertise and best practices derived from our involvement in more than 80 national government programs will be key assets for the success of your project. Gemalto professional services to benefit from: > Experience-based solution design > Rigorous project management > Fast and seamless system integration > Efficient deployment > Complete knowledge transfer > Operation support > Operated services Ghana In 2013, Ghana entrusted Gemalto with its eimmigration system, central to the eghana project an ambitious plan to create a modern IT infrastructure that can support sustainable development in the years to come. Together as one In April 2013, Gemalto joined forces with Avalon Biometrics, consolidating the group s position in border management, visa management and document verification. Each company brings unique expertise to the travel market segment. Gemalto s strength lies in secure document expertise and its solid international footprint, while Avalon Biometrics core competencies span software and platforms for border management, visa management and document verification. The two companies have been working together for many years. As one entity under the Gemalto name, they have now set out long-range plans and objectives. Croatia At the end of 2010, Gemalto was chosen to upgrade Croatia s border control system with Coesys Document Verification and a full mobile version of Coesys Border Management system to run in biometric handheld devices. Morocco This turnkey project entails the design, development, customization and Integration of an entirely new border control system for the Kingdom of Morocco. It will completely replace the existing mainframe system and implement state-of-the art operational control covering passenger processing, exception handling, document verification and biometrics checks, back-office units, centralized administration, control list management, self-attended border control units (egates) for automated passenger processing, control list management system, API, visa and passport PKI/PKD, transit data and reporting tools. Avalon Biometrics, now a Gemalto company, is acting as a subcontractor of the Marubeni-Gemadec consortium. South Africa South Africa s Department of Home Affairs turned to Gemalto to implement its Refugee and National Deportation system, which was implemented in two phases and completed in 2008.

Expertise under a single roof With the acquisition in 2005 of Setec formerly Finland s National Printing House Gemalto has a background in secure government printing dating back to 1886. Our printing expertise includes banknotes, stamps and identity documents. Gemalto has produced millions of conventional and electronic identity cards, passports, driver s licenses and healthcare cards, working closely with law enforcement and border authorities to develop security features and document design. As the leading provider of electronic documents worldwide over 25 epassport programs and over 25 eid initiatives to date Gemalto is uniquely positioned to offer you the most suitable border control solution, for all travel document types. In addition, Gemalto actively contributes to the work of standardization bodies and organizations such as the International Organization for Standardization (ISO), American Association of Motor Vehicle Administrators (AAMVA) and International Civil Aviation Organization (ICAO).Gemalto actively supports the ICAO TRaveler Identification Program (TRIP). We believe the comprehensive approach to security promoted by TRIP is essential to develop a more secure framework for documents and identification-related systems. In April 2013, Gemalto joined forces with Avalon Biometrics, consolidating the group s position in document verification. Government programs very often requires partners with industrial strength and skills. Gemalto s global presence is key to the way we serve governments and authorities, with 17 manufacturing sites and 31 personalization facilities and expertise centers strategically spread across every continent. Beyond this, it s our 10,000+ employees of some 106 nationalities who make the difference. About Gemalto Gemalto is the world leader in digital security with 2013 revenues of 2.38 billion. In the public sector, Gemalto provides secure documents, robust identity solutions and services for governments, national printers and integrators in the service of citizens. Its products and solutions are deployed in more than 80 government programs worldwide. Gemalto contributes to more than 25 epassport programs with specialized expertise in border and visa management projects. The company contributes to major ehealthcare programs and numerous edriver license and vehicle registration projects. Gemalto also collaborates with its clients to report and share best practices from around the world. GEMALTO.COM Expertise in biometrics Biometric technology has quickly gained ground as the fastest, most reliable way to identify individuals through authentication by means of unique biological characteristics. Today many travel document and immigrant visa programs incorporate biometrics. Gemalto has developed these technologies in many countries, primarily for applications such as those designed to capture and manage travelers digital fingerprints and photograph. Gemalto's hardwareagnostic solutions offer true independence and choice. Gemalto 2014. All rights reserved. Gemalto, the Gemalto logo, are trademarks and service marks of Gemalto and are registered in certain countries. February 2014 - Credit photos: Thinkstock - Design: Jubemo