Coesys Border Management

Similar documents
Coesys Border Management

End-to-end security with advanced biometrics technology

End-to-end security with advanced biometrics technology

SECURE IDENTITY MANAGEMENT. Globally recognised identity management expertise

The Leading Provider of Identity Solutions and Services in the U.S.

PRIME IDENTITY MANAGEMENT CORE

How can Identity and Access Management help me to improve compliance and drive business performance?

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee

International Civil Aviation Organization ASSEMBLY 38TH SESSION EXECUTIVE COMMITTEE

THE LEADING EDGE OF BORDER SECURITY

Strengthen security with intelligent identity and access management

Complete. security. begins with 3M

Security management solutions White paper. Extend business reach with a robust security infrastructure.

Provide access control with innovative solutions from IBM.

Preemptive security solutions for healthcare

Analance Data Integration Technical Whitepaper

V1.4. Spambrella Continuity SaaS. August 2

Securing Enterprise Mobility for Greater Competitive Advantage

The SMB IT Decision Maker s Guide: Choosing a SaaS Service Management Solution

Analance Data Integration Technical Whitepaper

Collaboration solutions for midsized businesses Buyer s guide

Command and Control Integrated Solutions. Transforming security needs into unique custom-made solutions. Building Technologies

The Power of BMC Remedy, the Simplicity of SaaS WHITE PAPER

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

Injazat s Managed Services Portfolio

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

TECHNOLOGY PARTNER CERTIFICATION BENEFITS AND PROCESS

The Impact of HIPAA and HITECH

Software-as-a-Service: Changing How You Share Information in Today s Changing Business World. Part II

How To Use Ibm Tivoli Monitoring Software

CA Clarity Integration

IBM Tivoli Asset Management for IT

Symantec Mobile Management 7.2

BIOMETRICAL IDENTITY MULTI-MODAL SOLUTIONS

Implement security solutions that help protect your IT systems and facilitate your On Demand Business initiatives.

Managed Security Services for Data

Company Overview. Enterprise Cloud Solutions

emind Webydo Moves to the Google Cloud Platform (GCP) with Emind For a Scalable Cloud Customers Stories by Overview About Webydo

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

EMC PERSPECTIVE. The Private Cloud for Healthcare Enables Coordinated Patient Care

SANS Top 20 Critical Controls for Effective Cyber Defense

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

SIX STEPS TO SSL CERTIFICATE LIFECYCLE MANAGEMENT

Transaction Security. Advisory Services

QPR WorkFlow. Minimize Process Time, Maximize Process Outcome. QPR WorkFlow 1

when it comes. Benjamin Disraeli to be ready for opportunity The secret of success is What is CRM? Why CRM? About Agiline CRM

CA Service Desk Manager

Mitel MiContact Center Enterprise & Business

WHITE PAPER. iet ITSM Enables Enhanced Service Management

How Our Cloud Backup Solution Protects Your Network

WHITEPAPER. Addressing Them with Adaptive Network Security. Executive Summary... An Evolving Network Environment Adaptive Network Security...

Microsoft Dynamics CRM Solutions for Retail Banking

White paper December IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview

POSITION PAPER. The Application of Biometrics at Airports PUBLISHED BY ACI WORLD HEADQUARTERS GENEVA SWITZERLAND

ForeScout MDM Enterprise

IBM QRadar Security Intelligence Platform appliances

Department of Homeland Security

Total Protection for Compliance: Unified IT Policy Auditing

ROUTES TO VALUE. Business Service Management: How fast can you get there?

API Management: Powered by SOA Software Dedicated Cloud

How To Use Windows Small Business Server 2011 Essentials

Incode Financial and Personnel Management. Transforming the way the public sector does business

IBM QRadar Security Intelligence April 2013

Vistara Lifecycle Management

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

Firewall Administration and Management

IBM Customer Experience Suite and Electronic Forms

Successfully managing geographically distributed development

Resolving the Top Three Patch Management Challenges

SOLUTION WHITE PAPER. 6 Advantages of a Cloud-Based IT Service Desk By Jeff Moloughney, Principal Solution Marketing Manager, BMC Software

See all, manage all is the new mantra at the corporate workplace today.

AT&T. ip vpn portfolio. integrated. IP VPN solutions. for the enterprise. Communication Systems International Incorporated

Payment Card Industry Data Security Standard

IDaaS: Managed Credentials for Local & State Emergency Responders

Contact Center Solutions

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

IDENTITY SOLUTIONS END-TO-END SYSTEMS SOLUTIONS TO PROTECT IDENTITIES AND SECURE ACCESS FOR A MOBILITY WORLD

The CIO s Guide to HIPAA Compliant Text Messaging

The National Number and the Automation of the Civil Records Project Ministry of Interior Administration of Civil Records

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

Laserfiche for Federal Government MEET YOUR AGENCY S MISSION

DEPARTMENT OF HOMELAND SECURITY

Q1 Labs Corporate Overview

Asset. Unicenter Management r11

Athena Mobile Device Management from Symantec

Streamlining the drug development lifecycle with Adobe LiveCycle enterprise solutions

Skynax. Mobility Management System. System Manual

IDENTITY-AS-A-SERVICE IN A MOBILE WORLD. Cloud Management of Multi-Modal Biometrics

Data Center Solutions

Transcription:

Coesys Border Management Offering convenience for secure border crossing Improving border intelligence for detection and prevention Supporting your immigration organization Combating cross-border crime, terrorism and illegal crossings requires tremendous efforts to identify and prevent threats challenging land, maritime and air borders. To maximize these efforts and ensure the safety of citizens, police and immigration enforcement can now rely on a unified border management system for full operational control.

From border control to border management With steadily growing numbers of travelers, states need to address the challenge of striking the right balance between open yet fully secure, controlled borders. Coesys Border Management provides a full range of applications to implement best-practice immigration processes and state-of-the-art technologies at border management headquarters (HQ) and border control points (BCPs). The solution enables border control agencies to process both arriving and departing travelers in wide-ranging situations at air, land and sea points of entry- at both manned immigration desks and Automatic Border Control (ABC) gates. > 11 billion Air traffic expected to double and reach to reach 11 billion passengers in 2030 (source ACI) > 54 million Lost & stolen travel documents in Interpol database in February 2016 Main objectives of our customers today > Build a unified and secure border management system public services and administrations can count on at all times > Lay the foundation of an integrated system to merge and streamline layers of disparate processes into a complete, cohesive and secure system > Implement a future-proof, mission critical system flexible and scalable enough to keep up with the demands of changing immigration policy and technological standards while guaranteeing uninterrupted operation, due to online/offline availability > Harness the latest technologies to confirm identity using document verification, biometrics in combination with control list checks and risk assessment across all BCPs > Reduce costs by automating and optimizing processes while leveraging technologies to strengthen security and provide convenience for passengers > 650 million Over 650 million epassports in circulation in 2015 (source ICAO 2015)

Key benefits of Gemalto Border Management Consistent control at all border control points Gemalto solutions support all border control types (border gates, egates, suitcases, handhelds, etc.) for air, land and sea borders and mobile checkpoints. Our customers can implement a consistent framework to secure borders by enabling the same checks and functionality for all border control stations. In addition, mission critical data such as alerts and control list are available in real time within the system with Gemalto s automated synchronization of information between inspection clients, local and HQ servers. Immigration officer's decisions are supported by information immediately available across all border points no matter where it was first captured. This kind of cohesive and homogeneous approach prevents the vulnerability of any single point in the system. Flexibility and scalability to meet changing needs > To meet the issuing authority s current and future needs, the suite provides a high degree of flexibility for the customization of workflows and access control. > New border control points of any type can be added progressively,at the customer s discretion and according to needs and priorities. Full operational control for border authorities Border authorities can adjust the level and type of checks, criteria for alerts and quality requirements, as well as the specific available services and its underlying workflows using a single, centrally available administration application. This eliminates the need for costly development or customization, safeguarding confidential information. It also empowers border control authorities to adapt quickly to new requirements and threats, without necessarily involving the vendor. Decision support and intelligence sharing Data mined at the various border control points are compiled into a single entry/exit system (EES) crucial to enhancing border control and intelligence sharing and forecasting border transit flow. Statistics and reports provide invaluable decision support to drive tourism and prioritize national investment efforts. Facilitated information sharing with the Visa Information System and other national and international systems such as that of Interpol substantially mitigates risk stemming from granting unauthorized access to the country. Built-in Security - privacy and protection Information security is built-in at all levels of our border management system, ensuring the protection and privacy of all sensitive information during data acquisition, data handling, data communication, data storage (at BCPs, HQ, back-up and DR sites) and data deletion. Uninterrupted service for mission-critical systems Homeland security solutions are mission-critical systems that must be fully operational at all times, even in the event of interrupted connection. That is why data are securely stored temporarily, in local AES 256 encrypted containers, to make relevant data and control lists available locally for offline verification. All data are synchronized and updated automatically as soon as the systems come back online. The high-availability back-end system features clustered application server and database as well as automated failover to backup and disaster recovery sites. This guarantees the security of the entire system, with up-todate information at all times and no impact whatsoever on border control operations. Hardware agnostic All solutions are built hardware-agnostic to ensure independence from past or future suppliers. Especially, our solution will protect our customers from vendor lock in in the field of biometrics and travel document scanners.

What Coesys Border Management delivers Border Management Operations Reporting and monitoring User rights and access management Watch List / Risk Aggregation, EES travel registry Document Template Administration Automatic Passport Verification Biometric Verification Visa Verification Risk Assessment Form Capture Convenience for travelers and authorities alike with faster, more secure border operations > Automated travel document identification and verification against a centrally administered document repository > Biometric data capture with quality assurance > Biometric traveler verification (1:1) and identification (1:N) > Integration with the national Visa Information System (N-VIS) for Visa status check and verification of Visa Document and biometric Identity confirmation(1:1) > Automated comparison of identity against text-based and biometric control/alert lists > Entry Exit System (EES) with visa overstayer and advanced transit alarm logic > Automated entry/exit card recognition > Automated Border Control (ABC) gates, deployed with or without Registered Traveler Program (RTP) authorities and other government agencies, such as customs, airport authorities and visitor bureaus > Better Adoption: Central management of the level of alert and types of checks from HQ, with logic and alerts pushed to all BCPs to cascade a consistent approach to developing threats throughout the organization Coesys Border Management supports your immigration organization > Granular identity and access management for operators through central user, role, workstation, site, service, workflow management with defined access rules and strong identification mechanisms > Monitoring of border resources such as fixed workstations and mobile units for load balancing and optimized allocation Coesys Border Management improves border intelligence for detection and prevention > Better Information Sharing: Consolidation of data collected at BCPs in a central EES and/or unique traveler database > Better intelligence: Use of Advanced Passenger Information (API) for risk assessment and automation of external system queries and national and international control lists via i.e. through, for instance, Interpol s I-24/7 global police communications and MIND/FIND integrated search solutions > Better Exchange: Real-time Information sharing with all connected BCPs and Production of customizable reports and business intelligence data for border TOP 3 benefits our customers most appreciate > Consistent control at all border points at all times > Compilation of a traveler database fully compliant with privacy requirements to strengthen risk assessment > Ability in the long-term to take ownership of a solution fully suited to their needs and offering customizable security, verification actions and checks with a wide choice of hardware (document and biometric scanner), middleware and infrastructure platforms

Experience and services for an end-to-end solution Mobilize our experienced service teams to support you. Our expertise and best practices derived from our involvement in more than 80 national government programs will be key assets for the success of your project. Gemalto professional services to benefit from: > Experience-based solution design > Rigorous project management > Fast and seamless system integration > Efficient deployment > Complete knowledge transfer > Operation support > Operated services Ghana In 2013, Ghana entrusted Gemalto with its eimmigration system, central to the eghana project an ambitious plan to create a modern IT infrastructure that can support sustainable development in the years to come. Together as one In April 2013, Gemalto joined forces with Avalon Biometrics, consolidating the group s position in border management, visa management and document verification. Each company brings unique expertise to the travel market segment. Gemalto s strength lies in secure document expertise and its solid international footprint, while Avalon Biometrics core competencies span software and platforms for border management, visa management and document verification. The two companies have been working together for many years. As one entity under the Gemalto name, they have now set out long-range plans and objectives. Croatia At the end of 2010, Gemalto was chosen to upgrade Croatia s border control system with Coesys Document Verification and a full mobile version of Coesys Border Management system to run in biometric handheld devices. Morocco This turnkey project entails the design, development, customization and Integration of an entirely new border control system for the Kingdom of Morocco. It will completely replace the existing mainframe system and implement state-of-the art operational control covering passenger processing, exception handling, document verification and biometrics checks, back-office units, centralized administration, control list management, self-attended border control units (egates) for automated passenger processing, control list management system, API, visa and passport PKI/PKD, transit data and reporting tools. Avalon Biometrics, now a Gemalto company, is acting as a subcontractor of the Marubeni-Gemadec consortium. South Africa South Africa s Department of Home Affairs turned to Gemalto to implement its Refugee and National Deportation system, which was implemented in two phases and completed in 2008.

Ten e-gates are in use at the Kotoka International Airport in Accra, the capital of Ghana, as part of its current redevelopment. The e- Gate automatically scans traveler s passports and allow them access as part of immigration processes at the airport. Gabon In 2016 Gabon's Department of Homeland Security DGDI selected Gemalto to supply and implement a fully integrated border and visa management system. The new scheme will strengthen national security, improve operational efficiency and enhance the traveling experience for people entering and leaving the Central African state. The visa management system simplifies and speeds the issuance of visas, e-visas and resident's permits. This suite of applications was used to create Gabon's e-visa portal service in July 2015 enabling visitors to use the Internet to apply for a visa to enter the country. Once the Electronic Travel Authorization (ETA) is delivered, the visa is issued at Libreville International Airport upon arrival. The solution is built around the centralized, back-office Coesys Visa and Border Management System. This supports automation of queries to databases - such as Interpol's - that alert authorities to potential threats and risks. In addition, the Automated Border Control kiosks now offer travelers rapid, 'self-service' passport checks at the country's main airport which handles around one million passengers annually. The Border Intelligence module uses the data mined at the border. It offers investigation tools for discovering new risk patterns, with a highly intuitive "clicking" process. Its reporting app also provides valuable information to drive tourism and prioritize national investment efforts. Self-service kiosks are now in use at Libreville International Airport

Expertise under a single roof With the acquisition in 2005 of Setec formerly Finland s National Printing House Gemalto has a background in secure government printing dating back to 1886. Our printing expertise includes banknotes, stamps and identity documents. Gemalto has produced millions of conventional and electronic identity cards, passports, driver s licenses and healthcare cards, working closely with law enforcement and border authorities to develop security features and document design. As the leading provider of electronic documents worldwide over 40 epassport programs and over 40 eid initiatives to date Gemalto is uniquely positioned to offer you the most suitable border control solution, for all travel document types. In addition, Gemalto actively contributes to the work of standardization bodies and organizations such as the International Organization for Standardization (ISO), American Association of Motor Vehicle Administrators (AAMVA) and International Civil Aviation Organization (ICAO).Gemalto actively supports the ICAO TRaveler Identification Program (TRIP). We believe the comprehensive approach to security promoted by TRIP is essential to develop a more secure framework for documents and identification-related systems. In April 2013, Gemalto joined forces with Avalon Biometrics, consolidating the group s position in document verification. Government programs very often requires partners with industrial strength and skills. Gemalto s global presence is key to the way we serve governments and authorities, with 17 manufacturing sites and 31 personalization facilities and expertise centers strategically spread across every continent. Beyond this, it s our 14,000+ employees of some 106 nationalities who make the difference. Expertise in biometrics Biometric technology has quickly gained ground as the fastest, most reliable way to identify individuals through authentication by means of unique biological characteristics. Today many travel document and immigrant visa programs incorporate biometrics. Gemalto has developed these technologies in many countries, primarily for applications such as those designed to capture and manage travelers digital fingerprints and photograph. Gemalto's hardwareagnostic solutions offer true independence and choice.

About Gemalto Gemalto is the world leader in digital security with 2014 revenues of 2.5 billion. In the public sector, Gemalto provides secure documents, robust identity solutions and services for governments, national printers and integrators in the service of citizens. Its products and solutions are deployed in more than 100 government programs worldwide. Gemalto contributes to more than 40 epassport programs with specialized expertise in border and visa management projects. The company contributes to major ehealthcare programs and numerous edriver license and vehicle registration projects. Gemalto also collaborates with its clients to report and share best practices from around the world. GEMALTO.COM Gemalto 2016. All rights reserved. Gemalto, the Gemalto logo, are trademarks and service marks of Gemalto and are registered in certain countries. February 2016 - Jubemo