Biometric Access Control Retail Applications Benefits of e-data Access Control with Fingerprint Key biometric reader

Similar documents
AX.S Series Access Control and I.AM Series Identity Access Management

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee

ACCESS CONTROL MANY FUNCTIONS. ONE SYSTEM. ONE CARD.

Access Control in Commercial Applications. Is the future of commercial building security built in, or bolted on? A discussion paper

SECURITY SOLUTIONS BANKING AND FINANCE

L-1 Fingerprint Reader Solutions. V-Flex 4G

Galaxy Flex SECURITY THAT FITS WITH YOUR BUSINESS AND LIFESTYLE. Protect your property

Security, Access Management and Key Control Policy and Procedures

WIN-PAK Integrated Security POWERFUL SECURITY INTEGRATION. Integrated Access Control, Video and Intrusion Platform

bright blue Intelligent Access Management

Bringing open IP benefits to physical access control AXIS A1001 Network Door Controller

Edge Metrics Data Center User Manual

Introducing... The Word's Most Advance. Biometric Time Attendance Door Access Security System

EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Verint Nextiva Review and Control Center Clients

Product Guide. Product Guide 2014 EMKA, Inc. Page 1 of 12

1 Introduction 3. 2 Foundation of AEOS 3. 3 Investment areas 4

PROPOSED SOLUTION FOR BIOMETRIC FINGERPRINT TIME AND ATTENDANCE MANAGEMENT SYSTEM

Electronic Security. For Financial Institutions

WIN-PAK SE/PE with Galaxy Integration INTEGRATED SECURITY, VIDEO AND ACCESS CONTROL SOLUTIONS. A Winning Combination

Complete Security One Powerful Solution. GV4 Series integrated security, fire and access control panels D7212GV4, D7412GV4, D9412GV4

Business Owner s. Security Buyers. Guide. Everything you need to know before purchasing a security system. Safer. Smarter. Tyco.

Electronic Access Control Solutions

The Modular Alarm Platform 5000 A security system can be this flexible today and in the future

Biometrics in Physical Access Control Issues, Status and Trends White Paper

ELM Security System Electronic Locking & Monitoring

Access Control Manager

Complete solutions for commercial security. Verex delivers leading intrusion, access and video products to protect today s companies

Unsurpassed Integrated Access & Video Security Performance

BIOMETRIC SOLUTIONS 2013 ISSUE

About RecoveryPlanner.com Business Continuity Management

SYMMETRY PRODUCT OVERVIEW

AxTraxNG Access Control Management Software

a l A a l l i e v r l o r t a l l i e v r G e t a r a l g r u d i V e v i s s a l a u t r i V s s c c d i V e v i t c A l a u t r i V

SYMMETRY. DATASHEET ACCESS CONTROL Product Overview

Business Phone Systems. Managed IT Services

RSA SecurID Two-factor Authentication

AXS Biometric Security System

CYBER SECURITY POLICY For Managers of Drinking Water Systems

WEBs-AX Enterprise Security

The Benefits of an Industry Standard Platform for Enterprise Sign-On

Milestone Federated Architecture TM

HyperQ DR Replication White Paper. The Easy Way to Protect Your Data

Integrated Identity Management Whitepaper

7 Reasons Why Your Business Should Adopt ACT365

Biometrics: Advantages for Employee Attendance Verification. InfoTronics, Inc. Farmington Hills, MI

Provide access control with innovative solutions from IBM.

Tailored integration to suit you

Next Generation Web-Based Time & Attendance

Copyright and Trademark Statement

XProtect Product Overview

GMS GRAPHICAL MANAGEMENT SYSTEM

Security Center Unified Security Platform

Secure communications via IdentaDefense

Commercial Security Made Simple with Cloud Video Surveillance

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

G DATA TechPaper #0275. G DATA Network Monitoring

Integration of Visitor Management with Access Control Systems

Simplify SSL Certificate Management Across the Enterprise

Connect C CURE 9000 with dozens of applications for a holistic business-empowering, all inclusive solution

P2000 SECURITY management SYSTEM. More control means more freedom

A Unified View of Network Monitoring. One Cohesive Network Monitoring View and How You Can Achieve It with NMSaaS

The Elephant in the Room

HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics

Integrated Building Management and Security System. Building Automation & Security.

Welcome to Bell Aliant NextGen Home Security

Solution Overview. Smarter Video Surveillance with NETGEAR

The evolution of data connectivity

The Convergence of IT Security and Physical Access Control

The Convergence of IT Security and Physical Access Control

Leostream Corporation leostream.com Share this Whitepaper!

Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB

Retail Solutions. Why Tyco Security Products for Retail?

Malls of all sizes Multi-store retail facilities Professional office buildings Commercial suites

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System

P2000 AND P2000LE SECURITY MANAGEMENT SYSTEM. Interactive, real time security management

Access CONTROL. MANAGEMENT Software

Reliable Security Solutions

Moving Service Management to SaaS Key Challenges and How Nimsoft Service Desk Helps Address Them

WEBs AX Security. Integrated Security With Simple, Web-Based Management

Enterprise Solution for Remote Desktop Services System Administration Server Management Server Management (Continued)...

AD-Series. Selection Guide

Cyber Security Response to Physical Security Breaches

Guide to Evaluating Multi-Factor Authentication Solutions

12 Security Camera System Best Practices - Cyber Safe

IP Video Door Stations

Strong Authentication for Secure VPN Access

FREEDOM ACCESS CONTROL

OCR LEVEL 3 CAMBRIDGE TECHNICAL

IP Video Surveillance

Alternative authentication what does it really provide?

GUIDE GETTING STARTED IMPORTANT SUPPORT RESOURCES

Hospitality Solutions

GET THE ALARM.COM ADVANTAGE.

Video conferencing for anyone, anywhere, on any device-that s the Connected Experience.

ADVANCE AUTHENTICATION TECHNIQUES

Get More Out Of Your Life

Surveillance and Security for Casinos. Cost-Effective Solutions for Any Size Facility

Transcription:

e-data.com 866.807.3549 Biometric Retail Applications Benefits of e-data with Fingerprint Key biometric reader The proper access control equipment can be the most cost effective measure to deter theft at any retail store. With the increasing affordability of fingerprint biometrics, access control systems now offer a greater level of ease and security by eliminating keys and cards. Yet despite an industry wide trend toward greater sophistication, nearly all access control systems still rely on legacy platforms that require a dedicated computer or server in each store. Based on a software embedded platform, e-data stands apart in developing next generation technology that eliminates the brass key without introducing the access card or fob. the host computer and make changes to the software application locally. In these systems the host server or computer must run constantly in order to support any and all actions, from changing access rights to verifying a proximity card for entry. Exhibit 1 Traditional Centralized Access Control With e-data, access control works with any IT infrastructure, or stands alone in the WAN. No longer requiring external servers or software, users can manage their stores access system from anywhere in the world with the internet. And with the Fingerprint Key, e-data has made biometrics as simple to install and use as a standard card reader while eliminating the hassle and security-risk of cards. The Fingerprint Key combined with e-data s access control system, creates an unmatched offering that should usher in widespread use of biometrics and internet-based access control. Traditional Retail Legacy access control platforms force users to use a dedicated server or computer to run a locally managed access control system. Users must install access control software to a computer or server and access the software locally to make access right modifications. For example, if a user wanted to give someone nighttime access, they would have to go to Local Host In other systems, access control is run on a distributed system, but e-data offers a new level of distribution that eclipses the distributed architecture. Access control systems that run on the distributed architecture rely on a local host for any access control change to the system. For example, if an administrator wants to change access rights for a particular room, he must access the computer that houses the application to change the criteria for access. The controller then houses the changes in access rights to be used the next time the person tries to gain entry. Access control information is distributed between the host computer and controller, and the controller carries out these access rights settings to open a door when appropriate (see Exhibit 2).

2 Exhibit 2 Traditional Distributed Access Control Exhibit 3 Traditional with Multiple Stores Store #1 Store #2 Store #3 Management Local Host Controller Limitation #1: Dedicated Server Required With traditional access control modeled in Exhibit 1 and Exhibit 2, users must allocate a dedicated computer or server to run the software. This creates complications installing and maintaining software and configuring a server to act as an access control host. With these systems, access control becomes another program that the IT department or store manager has to maintain along with other programs vying for time and hard drive space. Limitation #2: Local =Local Administration Because software is hosted on a local server and controllers and readers are connected directly to the host, administration of software must be managed locally. In order to make changes to the access control system, you must access the host and make changes to the installed software. Limitation #3: No Enterprise Solution Unlike e-data s products, traditional access control hardware is not designed as a network application. With dedicated hardware hosting software that is administered locally, traditional access control makes it difficult to manage multiple stores. In order to make these systems work, each store must download software to local computers or servers. Because these servers or computers were not designed to communicate as a network access control system, each store becomes isolated by the limitations of a dedicated server that cannot communicate without extensive software and hardware peripherals. Each store is an access control silo (see Exhibit 3) instead of a branch in an access control network (see Exhibit 4) Traditional Biometrics When you combine traditional biometrics with the current access control systems, the complexity is compounded, creating a complicated jumble of hardware and software that is difficult to install and almost impossible to manage. With traditional biometrics you encounter many of the same problems found in traditional access control systems. Limitation #1: Dedicated Server Required Just like access control, traditional biometrics readers require dedicated hardware to host biometrics software that stores templates. Limitation #2: Local =Local Administration With software hosted locally, users administer biometric templates through a local host. Limitation #3: No Enterprise Solution Because all software requires local hosting and administration, systems are constrained by the limitations of local hardware. If a user wants to register a fingerprint, he must register locally and store the template on local hardware. e-data Biometric e-data Biometrics eliminates many of the limitations that have plagued systems designed on legacy platforms. Its flexible design makes it ideal for various applications, particularly those involving a mobile or floating workf orce interacting over multiple sites.

3 e-data is entirely web based. All hardware is IP configurable, so each intelligent piece belongs to a network. This connectivity makes the entire system expandable. So if you want to manage a single store or multiple stores around the world, you can, with an integrated network managed over the web. e-data offers many advantages over the traditional access control system. The advantages combine to create an unparalleled product for retail installations. Advantage #1: Embedded e-data s access control products come with software embedded directly on the hardware. With embedded software, you will never have to install or maintain access control software again. The access control software sits outside of IT systems and is open source and Linux based. Advantage #4: Reduces Total Cost of Ownership Clients run and update any operating system without worrying about reinstalling access control software or about the interoperability of the new operating system with the access control software. The only time users need to update their access control software is when they want to download the latest features and version. Unlike other access control systems, they are not forced into cost extensive updates caused by changes in server databases and operating systems. Exhibit 4 e-data with Multiple Stores Internet Management Advantage #2: Internet Based=Global Administration With embedded software and web connectivity, all e- DATA products can be managed over the internet from any location in the world. Instead of managing software from a single location, users can modify the access control software from anywhere. Store #1 Router Store #2 The embedded, internet based application is not a feature that requires extra hardware peripherals but is standard on the e-data. With no modifications, e-data products can be accessed over the internet from anywhere in the world with any browser-enabled device. Advantage #3: Infinite Enterprise Solution e-data is scalable to meet the needs of any size solution. In order to increase the size of an access control system, users simply add additional s. These s then support local door controllers and readers. The s are easily managed at the local site or at any site in the world. This flexible framework allows for simple and quick expansion. If you need to manage more stores or more areas within a store just add another branch to the tree with a or Door (see Exhibit 4). This eliminates the silos of traditional access control systems and allows management to maintain and grow its access control network without dedicated local computers and without installing any software. The Fingerprint Key Biometrics Unlike traditional biometrics, The Fingerprint Key is as easy to install and manage as any card reader. Your finger is the only key you ll need, and it can t be lost, stolen or borrowed. The Fingerprint Key requires no additional hardware or software to manage templates. Like traditional card readers, The Fingerprint Key can be added to any Door (, door controller) in e-data. The Fingerprint Key achieves simplicity of installation and use by being built on the same softwareembedded platform as the access control system. Like the and Door, The Fingerprint Key comes with software embedded on the hardware. This design brings the ease of e-data to biometrics.

4 Advantage #1: Embedded Like the e-data, The Fingerprint Key s embedded software eliminates the need for extra hardware or external servers or host computers. Templates are managed in The Fingerprint Key allowing the entire access control process with biometrics to occur without the need for any additional hardware or software. Advantage #2: Manage and Transfer Fingerprints Globally Another key feature that distinguishes The Fingerprint Key from other biometric readers is the ability to transfer fingerprint templates anywhere in a network. This allows administrators to register employees only once and then transfer templates to any other Fingerprint Key readers on the network. For example, a pharmacist originally registered at a store in Chicago needs to cover a weekend shift in Evanston. Instead of having to register at the location in Evanston, the access control administrator can send the individual s fingerprint template to The Fingerprint Keys in Evanston by logging on to the e-data application over the internet (see Exhibit 5). The administrator changes the pharmacist s access rights for the Evanston store for that day and when the pharmacist arrives on the property in Evanston, she will have all the access rights she needs to enter the store and open secure areas and cabinets. The propagation of the pharmacist s template to the Evanston location occurred with the click of a button over the internet when the administrator granted the pharmacist access rights for the day. This same scenario can be duplicated an unlimited number of times at locations across the country all over the internet in a matter of seconds. The Fingerprint Key eliminates the need to register at multiple facilities, simply register once and propagate when needed. Exhibit 5 Fingerprint Propagation: Register Once, Send Anywhere ENROLLMENT Advantage #3: Infinite Fingerprint Keys on Network With the e-data, each Fingerprint Key can be addressed over the Web. This allows administrators to manage individual readers from anywhere in the world over the internet. Each Fingerprint Key acts as a part within a larger access control network. This system allows for the management of specific readers regardless of the network s size. So whether you are managing one reader or a thousand readers you can make changes to any individual reader on the network. This allows for intelligent expansion to potentially infinite scale. Exhibit 6 The Fingerprint Key Network Store #1 Internet Management Router TEMPLATE DISTRIBUTION Store #2

5 Advantage #4: Eliminate Keys, Lock Changes and Cards All e-data products were created to support biometric credentials without any software or hardware. This allows retail store owners to eliminate the use of keys and cards, increasing the level of security and saving time and money related to card procurement, theft and turnover. Without keys, stores never have to worry about the cost of lost keys or the cost of changing locks. Employees cannot lose their fingerprint, ensuring that secure areas are truly secure. Along with the savings related to reduced shrinkage, biometrically secured access control eliminates the cost of purchasing and replacing cards and locks. And with biometrics, businesses are not substituting the expense of keys with the expense of cards; they are eliminating the problem at its source. By building systems built around biometric technology, e-data makes the most secure access control systems that happen to be the most economical. Advantage #5: Track Access Events Each time an employee gains access using The Fingerprint Key, the embedded access control software creates a time stamp of that event. This allows businesses to review reports if an incident occurs, easily track code compliance and have a more detailed record of all access related store activity. Advantage #6: 3-in-1 Solution A keypad comes standard on all Fingerprint Keys giving corporations the option and flexibility to use biometrics alone, biometrics plus keypad or keypad only. Also, e-data offers a model of The Fingerprint Key that comes with an embedded iclass reader providing the flexibility of three credentials (keypad, biometrics and smart card) in one unit. These credentials can be used in any combination or independently, giving users every reader option. Also, because e-data s readers can be managed through e-data s embedded access control software, businesses can utilize different credential types at different stores or different areas in a store with all various credentials interacting over the same network. Advantage #7: Eliminate False Alarms Authenticate the users of your intrusion system through e-data Biometric Alarm Interface Control: Eliminate PIN confusion that leads to false alarms and PIN recoding for new users/pin removal for old users -- without replacing your current alarm system. This is especially effective for after-hour/night vendors and deliveries. Alarm and access can also be tied to cameras and video monitoring. e-data s Alarm Interface allows users to merge e-data Biometric with standard burglary systems. By presenting their authenticated finger right at the Fingerprint Key, users can disarm and arm an alarm. Combining these systems fosters greater ease of use and eliminates false alarms. Only those who are authorized to turn on/off the alarm can enter a building. Conclusions With embedded software, a Web-based design, fingerprint propagation and alarm interface, e-data offers an unmatched suite of features for retail store access control. The robust offerings are combined with systems designed for quick and easy installation, dramatically cutting down the time for setup, whether at one store or thousands. And whether its for one door or 96 doors. WAREHOUSE/OFFICE Protect and manage products, files and money with biometric authentication Keep electronic audit of all access Tie access to cameras, video and alarm devices OFFICE PROCT COUNTER CHECKOUT COUNTER $ $ AUXILIARY ENTRANCE WAREHOUSE SHOPPING AREA (PORTION OF STORE) PUBLIC ENTRANCE RETAIL STORE ENTRANCES Control all interior and exterior doors Create varying access rights by employee (permanent or floating ) during worked hours Eliminate key management and lock changes during employee turnover Activate or deactivate alarm/lighting systems at biometric reader Solve management of after hour or unattended delivery personnel/vendors CABINETS/DRAWERS Eliminate internal fraud by preventing unauthorized personnel from opening cabinets/cash drawers Dual-custody option avail.

6 About e-data e-data is a leading manufacturer of Web-based appliances used for biometric access control and biometric time & attendance. Our offices are located in Coppell, Texas (Dallas), and Leonberg, Germany (Stuttgart). In 1999, e-data developed the first network-ready, Web-enabled data collection terminal using Java on a Linux OS. For more than 15 years, e-data has developed and deployed enterprise-level access control systems that are used by major banks, retailers and pharmacies. Building on that foundation, e-data has developed a full line of feature-rich access control and time & attendance products with the software application embedded in the hardware, eliminating the need for servers and software. The company was founded by Dietrich Titze more than 20 years ago near Stuttgart, Germany, under the name Titze Datentechnik GmbH. Today, e-data is led by Chairman George K. Broady and President John Carter. e-data.com 866.807.3549