SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Downloaden Sie, um offline zu lesen
Solutions for
Enterprise & Commercial
B a n k i n g
TECHNOLOGIES AVAILABLE TODAY ON THE FACTORS
OF AUTHENTICATION.
WHAT YOU KNOW - PASSWORD
WHAT YOU HAVE - TOKEN/SMART CARD
WHAT YOU ARE - BIOMETRICS
The solution is to strengthen access with more factors of authentication and not depend on passwords
alone. Biometric as a factor of authentication is the best method to protect the organizations sensitive data
by ensuring only the authorized person gets access tothe resources. The problems of password sharing,
impersonation, identity theft etc., are eliminated
The inherent advantage of biometric over the other technologies is that, while the first two can be known or
had by others,’what you are’cannot be taken by others. Biometric authentication in combination with other
technologies provides a very robust and secure environment against identity misuse based frauds.
BIOMETRICS - ONE TOUCH SECURITY SOLUTION
ENTERPRISE SINGLE SIGN ON (ESSO)
- ONE TOUCH ACCESS TO ALL
Enterprise Single Sign On is a biometric based application that provides
access to enterprise wide applications based on the user’s biometric
credentials. This ensures application access security while keeping
tasks simple for users and administrators.
BIONIX
OurproductBioNIX,asaServerAccessManagementSolution,hasbeendesignedtoprovideconfidence
in Access management by eliminating identity theft using biometric technology.The primary advantage
of using biometric authentication method over other methods of user authentication is that they really
do what they should, i.e., they do authenticate the user.
SOLUTIONS FROM PRECISION
SECURITY FOR SERVER ACCESS USING BIOMETRIC
Organizations today, big or small, are facing hard challenges in protecting the core of their business
“Data Centers”from threats internal and external.
COMPATIBLE FACTORS OF 2FA
•	 Integrates with business applications like ERP , CBS etc
•	 Compiled on different platforms like HP, UX, IBM AIX, SUN SOLARIS,
RHEL & Windows
Precision’s biometric based 2FA solution has been successfully integrated
to the CBS and kiosk banking of some leading public sector banks, Patient
management systems for hospitals and health insurance companies.
Precision’s ESSO simplifies password management
including generation of strong random passwords,
password changes on behalf of employees and
adherence to password policies. It also protects
information with strong authentication, and helps
secure kiosks and shared workstations.The solution
transparently logs and records all user login activity
at a central location to make it easier to comply
with privacy and security allegations.
ESSO supports all applications, including legacy,
client/server, Java and web/browser based.
TWO FACTOR AUTHENTICATION
Password (what you know) + Biometric (what you are)
With increasing market competition, the requirements of organizations in relation to their business
processing systems are no longer limited to their ability to handle operations or keep accurate business
records.Organizations today depend on the business critical data for everyday transactions. This data is
protected using conventional password system which is unreliable, outdated and inconvenient.
Hence, to enhance data protection, dual factor authentication becomes essential for users. The 2FA solutions
is available as an application or as a SDK that can be tightly integrated to the existing business application
FEATURES OF BIONIX
•	 Ease of administration
•	 Non repudiation and audit trail
•	 Standards and compliance - ISO 27001 HIPPA
•	 0% impact on existing service
•	 Password management
•	 Implementation ease
•	 Multiple environments - Windows Unix and Linux
•	 Compliments multiple databases - Oracle, MSSQL, MYSQL, Sybase etc.,
ADVANTAGES OF BIONIX
•	 Robust solution
•	 Advanced radio frequency based fingerprint scanner.
•     Login control application strengthens the login security using biometrics instead of password.
•	 Easy installation with seamless operation
•	 The complete installation happens in the client environment and during rollouts across platforms bottle
neck situations were avoided.
•	 User/ Server admin/BioNIX admin need not know the password
•	 Existing password policies are protected
EMAIL IN-HOUSE
APPLICATION
ERP
ERP
CRM CLIENT/SERVER
APPLICATIONS
BIOMETRIC
FINGERPRINT
BENEFITS OF IMPLEMENTING CVS
•	 Prevents impersonation
•	 Recruitment decisions can be extremely reliable and flawless
•	 Saves times for the organisation / employer
•	 Customers data is more secured
CANDIDATE VERIFICATION SYSTEM
Precision Biometric has developed a very innovative solution using
fingerprint and voice biometrics to address impersonations in the
recruitment process. It is cloud based, quick to deploy and customizable
to meet your requirements. It can be tightly integrated into HR packages
like Taleo, Kenexa, PeopleSoft etc.
PROCEDURE
•	 Recruiters capture candidate’s biometric information (Fingerprint & Voiceprint) during
first level of recruitment process. The system verifies the biometric and reports if the
candidate has already appeared for any interview earlier in the organization.
•	 Recruiters can verify the candidate’s fingerprint / voiceprint at multiple stages of the hiring
process like preliminary exam, main exam, interview, offer roll-out and On-Boarding.
•	 The system verifies the fingerprint against the fraudster database and reports to the recruiters.
•	 Fingerprint verification with the Indian Governmen’sAadhaar biometric repository
•	 Hosted in an ISO 27001 certified environment with high uptime on Infrastructure and Connectivity.
•	 Stable, Scalable and Secured http Infrastructure with daily automated managed backup.
FEATURES
•	 Authenticates the employee
•	 Eliminates buddy punching
•	 Direct integration with HR and
payroll systems
•	 Generates attendance reports daily/
weekly/monthly basis
INDUSTRIES USING THE SOLUTION
•	 Corporates
•	 College universities and schools
•	 Airports
•	 Banks
•	 Hospitals
www.theprecisiongroup.in
Precision Group
22, Habibullah Road, T. Nagar, Chennai 600 017, India.
T +91 44 3301 5000 F +91 44 3301 5001 Service Desk +91 44 3377 5210
Email: info@precisionit.co.in I support@precisionit.co.in
BENEFITS-ATTENDANCE /
ACCESS CONTROL
SOLUTIONS
•	 Cost effective solution
•	 Time saving solution - faster and safest
method for tracking employee time and
attendance
•	 World class quality - Rugged products
•	 Easily customizable
•	 Eliminates impersonation and
fraudulent attendance
•	 Secured information and data
TIME AND ATTENDANCE SOLUTIONS FOR
LARGE ENTERPRISE
Today,therearevarioussystemsavailabletomeasuretime&attendance,frommanualtocompleteautomation.
Biometric based Time Attendance system provides the desired automation while ensuring authenticity and
eliminating impersonation.
BIOMETRIC ACCESS CONTROL SYSTEM
•   This system also provides Biometric time and attendance solutions along with authorized access for
people into the premises.
•   This combined feature provides secure access to the premises and reports can be generated to
understand the duration of time spent by an individual within the premises.
•    A combination of both fingerprint and card system or fingerprint only or card only can be used for
access control.

Weitere ähnliche Inhalte

Was ist angesagt?

Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview
Chris Genazzio
 
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - AtidanMicrosoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
David J Rosenthal
 
[null] Iso 27001 a business view by Sripathi
[null] Iso 27001   a business view by Sripathi[null] Iso 27001   a business view by Sripathi
[null] Iso 27001 a business view by Sripathi
Prajwal Panchmahalkar
 

Was ist angesagt? (20)

IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
 
5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will fail
 
Microsoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMSMicrosoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMS
 
IBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - Portfolio
 
Identity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. MookheyIdentity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. Mookhey
 
IBM Security Portfolio - 2015
IBM Security Portfolio - 2015IBM Security Portfolio - 2015
IBM Security Portfolio - 2015
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own Device
 
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
 
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
 
Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For Compliance
 
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
 
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
 
Microsoft Advanced Security & Compliance
Microsoft Advanced Security & ComplianceMicrosoft Advanced Security & Compliance
Microsoft Advanced Security & Compliance
 
Arx brochure - Intellect Design
Arx brochure - Intellect DesignArx brochure - Intellect Design
Arx brochure - Intellect Design
 
Privileged Access Manager Product Q&A
Privileged Access Manager Product Q&APrivileged Access Manager Product Q&A
Privileged Access Manager Product Q&A
 
Entrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Physical & Logical Access Solutions
Entrust Physical & Logical Access Solutions
 
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - AtidanMicrosoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
 
[null] Iso 27001 a business view by Sripathi
[null] Iso 27001   a business view by Sripathi[null] Iso 27001   a business view by Sripathi
[null] Iso 27001 a business view by Sripathi
 
Tuebora Self Driven IAM
Tuebora Self Driven IAMTuebora Self Driven IAM
Tuebora Self Driven IAM
 

Andere mochten auch

Presentatie paul van oorschot, tu
Presentatie paul van oorschot, tuPresentatie paul van oorschot, tu
Presentatie paul van oorschot, tu
#devdate
 
Presentatie tim drijvers, TASS technology solutions
Presentatie tim drijvers, TASS technology solutionsPresentatie tim drijvers, TASS technology solutions
Presentatie tim drijvers, TASS technology solutions
#devdate
 
Dreamschool
DreamschoolDreamschool
Dreamschool
N1ckT0dd
 
Presentatie peter vink back to the future, TASS technology solutions
Presentatie peter vink   back to the future, TASS technology solutionsPresentatie peter vink   back to the future, TASS technology solutions
Presentatie peter vink back to the future, TASS technology solutions
#devdate
 
Presentatie richard pasmans, stichting smart homes
Presentatie richard pasmans, stichting smart homesPresentatie richard pasmans, stichting smart homes
Presentatie richard pasmans, stichting smart homes
#devdate
 

Andere mochten auch (8)

Presentatie paul van oorschot, tu
Presentatie paul van oorschot, tuPresentatie paul van oorschot, tu
Presentatie paul van oorschot, tu
 
Ocd
OcdOcd
Ocd
 
Ocd
OcdOcd
Ocd
 
Presentatie tim drijvers, TASS technology solutions
Presentatie tim drijvers, TASS technology solutionsPresentatie tim drijvers, TASS technology solutions
Presentatie tim drijvers, TASS technology solutions
 
Dreamschool
DreamschoolDreamschool
Dreamschool
 
Presentatie peter vink back to the future, TASS technology solutions
Presentatie peter vink   back to the future, TASS technology solutionsPresentatie peter vink   back to the future, TASS technology solutions
Presentatie peter vink back to the future, TASS technology solutions
 
Presentatie richard pasmans, stichting smart homes
Presentatie richard pasmans, stichting smart homesPresentatie richard pasmans, stichting smart homes
Presentatie richard pasmans, stichting smart homes
 
2598 3387-1-pb
2598 3387-1-pb2598 3387-1-pb
2598 3387-1-pb
 

Ähnlich wie Biometric - Solutions for Enterprises & Commercial banking

Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013
Turvallisuus2013
 
Paradigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access ManagementParadigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access Management
Julie Beuselinck
 

Ähnlich wie Biometric - Solutions for Enterprises & Commercial banking (20)

Bio Lynx: A Double Layer Security Approach
Bio Lynx: A Double Layer Security ApproachBio Lynx: A Double Layer Security Approach
Bio Lynx: A Double Layer Security Approach
 
Primendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suite
 
Is Government Data as Safe as it Could Be?
Is Government Data as Safe as it Could Be?Is Government Data as Safe as it Could Be?
Is Government Data as Safe as it Could Be?
 
Access Control time attendence, Biometrics UAE
Access Control time attendence, Biometrics UAEAccess Control time attendence, Biometrics UAE
Access Control time attendence, Biometrics UAE
 
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
 
Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013
 
Blue Bricks Business Collateral
Blue Bricks Business CollateralBlue Bricks Business Collateral
Blue Bricks Business Collateral
 
Nexsign Biometric Authentication
Nexsign Biometric AuthenticationNexsign Biometric Authentication
Nexsign Biometric Authentication
 
M2SYS Biometric Technology Solutions Suite.pdf
M2SYS Biometric Technology Solutions Suite.pdfM2SYS Biometric Technology Solutions Suite.pdf
M2SYS Biometric Technology Solutions Suite.pdf
 
Virtualization security audit
Virtualization security auditVirtualization security audit
Virtualization security audit
 
M2SYS Partnership Program 2010
M2SYS Partnership Program 2010M2SYS Partnership Program 2010
M2SYS Partnership Program 2010
 
Boggs_W_2015-4-22
Boggs_W_2015-4-22Boggs_W_2015-4-22
Boggs_W_2015-4-22
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Paradigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access ManagementParadigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access Management
 
Tools4ever identity & access management product brochure
Tools4ever identity & access management product brochureTools4ever identity & access management product brochure
Tools4ever identity & access management product brochure
 
Sign On Express for BPO
Sign On Express for BPOSign On Express for BPO
Sign On Express for BPO
 
Beyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats SecurityBeyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats Security
 
User Management, Enablement, Directory
User Management, Enablement, DirectoryUser Management, Enablement, Directory
User Management, Enablement, Directory
 
Securing the New Digital Enterprise: Trackable, Controlled, and Authorized
Securing the New Digital Enterprise: Trackable, Controlled, and AuthorizedSecuring the New Digital Enterprise: Trackable, Controlled, and Authorized
Securing the New Digital Enterprise: Trackable, Controlled, and Authorized
 
Micro Focus Corporate Overview
Micro Focus Corporate OverviewMicro Focus Corporate Overview
Micro Focus Corporate Overview
 

Biometric - Solutions for Enterprises & Commercial banking

  • 1. Solutions for Enterprise & Commercial B a n k i n g TECHNOLOGIES AVAILABLE TODAY ON THE FACTORS OF AUTHENTICATION. WHAT YOU KNOW - PASSWORD WHAT YOU HAVE - TOKEN/SMART CARD WHAT YOU ARE - BIOMETRICS The solution is to strengthen access with more factors of authentication and not depend on passwords alone. Biometric as a factor of authentication is the best method to protect the organizations sensitive data by ensuring only the authorized person gets access tothe resources. The problems of password sharing, impersonation, identity theft etc., are eliminated The inherent advantage of biometric over the other technologies is that, while the first two can be known or had by others,’what you are’cannot be taken by others. Biometric authentication in combination with other technologies provides a very robust and secure environment against identity misuse based frauds. BIOMETRICS - ONE TOUCH SECURITY SOLUTION
  • 2. ENTERPRISE SINGLE SIGN ON (ESSO) - ONE TOUCH ACCESS TO ALL Enterprise Single Sign On is a biometric based application that provides access to enterprise wide applications based on the user’s biometric credentials. This ensures application access security while keeping tasks simple for users and administrators. BIONIX OurproductBioNIX,asaServerAccessManagementSolution,hasbeendesignedtoprovideconfidence in Access management by eliminating identity theft using biometric technology.The primary advantage of using biometric authentication method over other methods of user authentication is that they really do what they should, i.e., they do authenticate the user. SOLUTIONS FROM PRECISION SECURITY FOR SERVER ACCESS USING BIOMETRIC Organizations today, big or small, are facing hard challenges in protecting the core of their business “Data Centers”from threats internal and external. COMPATIBLE FACTORS OF 2FA • Integrates with business applications like ERP , CBS etc • Compiled on different platforms like HP, UX, IBM AIX, SUN SOLARIS, RHEL & Windows Precision’s biometric based 2FA solution has been successfully integrated to the CBS and kiosk banking of some leading public sector banks, Patient management systems for hospitals and health insurance companies. Precision’s ESSO simplifies password management including generation of strong random passwords, password changes on behalf of employees and adherence to password policies. It also protects information with strong authentication, and helps secure kiosks and shared workstations.The solution transparently logs and records all user login activity at a central location to make it easier to comply with privacy and security allegations. ESSO supports all applications, including legacy, client/server, Java and web/browser based. TWO FACTOR AUTHENTICATION Password (what you know) + Biometric (what you are) With increasing market competition, the requirements of organizations in relation to their business processing systems are no longer limited to their ability to handle operations or keep accurate business records.Organizations today depend on the business critical data for everyday transactions. This data is protected using conventional password system which is unreliable, outdated and inconvenient. Hence, to enhance data protection, dual factor authentication becomes essential for users. The 2FA solutions is available as an application or as a SDK that can be tightly integrated to the existing business application FEATURES OF BIONIX • Ease of administration • Non repudiation and audit trail • Standards and compliance - ISO 27001 HIPPA • 0% impact on existing service • Password management • Implementation ease • Multiple environments - Windows Unix and Linux • Compliments multiple databases - Oracle, MSSQL, MYSQL, Sybase etc., ADVANTAGES OF BIONIX • Robust solution • Advanced radio frequency based fingerprint scanner. • Login control application strengthens the login security using biometrics instead of password. • Easy installation with seamless operation • The complete installation happens in the client environment and during rollouts across platforms bottle neck situations were avoided. • User/ Server admin/BioNIX admin need not know the password • Existing password policies are protected EMAIL IN-HOUSE APPLICATION ERP ERP CRM CLIENT/SERVER APPLICATIONS BIOMETRIC FINGERPRINT BENEFITS OF IMPLEMENTING CVS • Prevents impersonation • Recruitment decisions can be extremely reliable and flawless • Saves times for the organisation / employer • Customers data is more secured CANDIDATE VERIFICATION SYSTEM Precision Biometric has developed a very innovative solution using fingerprint and voice biometrics to address impersonations in the recruitment process. It is cloud based, quick to deploy and customizable to meet your requirements. It can be tightly integrated into HR packages like Taleo, Kenexa, PeopleSoft etc. PROCEDURE • Recruiters capture candidate’s biometric information (Fingerprint & Voiceprint) during first level of recruitment process. The system verifies the biometric and reports if the candidate has already appeared for any interview earlier in the organization. • Recruiters can verify the candidate’s fingerprint / voiceprint at multiple stages of the hiring process like preliminary exam, main exam, interview, offer roll-out and On-Boarding. • The system verifies the fingerprint against the fraudster database and reports to the recruiters. • Fingerprint verification with the Indian Governmen’sAadhaar biometric repository • Hosted in an ISO 27001 certified environment with high uptime on Infrastructure and Connectivity. • Stable, Scalable and Secured http Infrastructure with daily automated managed backup.
  • 3. FEATURES • Authenticates the employee • Eliminates buddy punching • Direct integration with HR and payroll systems • Generates attendance reports daily/ weekly/monthly basis INDUSTRIES USING THE SOLUTION • Corporates • College universities and schools • Airports • Banks • Hospitals www.theprecisiongroup.in Precision Group 22, Habibullah Road, T. Nagar, Chennai 600 017, India. T +91 44 3301 5000 F +91 44 3301 5001 Service Desk +91 44 3377 5210 Email: info@precisionit.co.in I support@precisionit.co.in BENEFITS-ATTENDANCE / ACCESS CONTROL SOLUTIONS • Cost effective solution • Time saving solution - faster and safest method for tracking employee time and attendance • World class quality - Rugged products • Easily customizable • Eliminates impersonation and fraudulent attendance • Secured information and data TIME AND ATTENDANCE SOLUTIONS FOR LARGE ENTERPRISE Today,therearevarioussystemsavailabletomeasuretime&attendance,frommanualtocompleteautomation. Biometric based Time Attendance system provides the desired automation while ensuring authenticity and eliminating impersonation. BIOMETRIC ACCESS CONTROL SYSTEM • This system also provides Biometric time and attendance solutions along with authorized access for people into the premises. • This combined feature provides secure access to the premises and reports can be generated to understand the duration of time spent by an individual within the premises. • A combination of both fingerprint and card system or fingerprint only or card only can be used for access control.