You are on page 1of 10

ACCESS MANAGEMENT

Day passs issue (ppl losing their cards and denying they have not return lose a lot of
unessary money cos of this)
Card is useless
Aim: barrier is free unless the person cant enter
Things to be done:
o The future
Technology
Contacts in SG or overseas
How others are doing it
Effective methods of access
Understand system of doing it
o Main issue convienience
For e.g our own building wise we have to wait for every floor to go down
and all.
Smth like capitagreen, asia square tower 1 system will be good, wher they
will group all the same floors tgt

Comparison criteria
o Speed
o Flow (workflow)
o Convenience

Identity access mangenment

Access security control management governance

Need external firewall:

Secure way that ppl accessing stuffs are getting stuffs the right way
Bad things arent coming in

Fundamentals

Multifactor authentication (must know who they are when someone logs on beyong username and pw)
User friendly
Adaptive
o turn on and off when required
Must be in the form-factors users will use
o Ppl wants it on their cell phone

Web access management

Flexible SSO (single sign on)


Secure remote access can get to what they want without htting and rocks
Adaptive, risk-based security

Privileged account management

Password vaulting *not shared, and access*


Session audit
Delegation (day to day work need to do their jobs)

All these done go to governance

Provisioning
Attestation
o I know whow works for me and all
Workflow
o Get to where they are easily and smooth

IAM wat bad guys what to do

Steal credentials (multi-factor) difficult to hack even if they have password


o They wanna steal data and all.
Elevate to priviledged access
Compromise contractor or partner access
Brute force against web portal

ONE IDENTIY privileged access suite for Unix (https://www.oneidentity.com/products/privileged-


access-suite-for-unix/)

HID system:

Usage of mobile app

https://www.hidglobal.com/sites/default/files/resource_files/hid-mobile-access-solutions-ds-en.pdf
questions: what if one lose his/her phone. Will the app be misused?

Cons: what if visitor battery died? And cant exit?

Imply system:

http://www.imply.com/us/noticias/ler/4344/imply_develops_innovative_building_access_control_man
agement_system_for_caff_-_administrative_center_fernando_ferrari_in_porto_alegre

Face ++

KONE Singpaore highrise minispace

http://www.kone.sg/elevators-lifts/solutions/highrise-minispace/

Lift type Speed (m/s) Max travel (m) Max load (kg) Max no. of Max no. of
person elevators in
group
Minispace 4.0 210 1600 21 8
Highrise 10.0 400 2000 26 8
minispace

Questions when scanned and gained access into the building directed to a lift allocated which
grouped people going to the same floor level tgt.

Lets say on that mornig, instead of going to ur default floor.can set outside the lift

Pros:

Smoother
Save time

Cons:

brochures

http://cdn.kone.com/www.kone.sg/Images/brochure-kone-elevator-minispace.pdf?v=2

Sailpoint
https://kintronics.com/multimodal-biometric-door-
control-readers/#6
kintronis - facial
TVIP700ID Fingerprint and Facial Recognition

Provides multimode Facial recognition and


Fingerprint IP Reader, with RFID and pin number options

This multi-biometric reader can Identify or verify users by their face, fingerprint, proximity card or
PIN/Password. or any combination, all conveniently from a single device. Built-in Infrared light
source enables operation in dimly lit rooms.The MB700-ID works without a computer. Complete
setup and programming can be done via keypads and embedded firmware.
Stunning 3 inch color TFT touch screen provides ease of use and rich user experience with intuitive
and user friendly GUI. Includes both voice and visual prompts which indicate the acceptance or
rejection of fingerprint,
Can store up to 1500 faces, 2000 fingerprints, 10000 card holders and 100,000 transactions. The
data can be backed up to a USB flash drive and can also be transferred to another reader in the
absence of computer connectivity. Relay Outputs for electric lock visitor bell and alarm. Inputs for
door status sensor and exit switch.
Supports multiple timezones and personnel groups for programming valid entry zones. The Alarm
will be triggered when the tamper switch is activated. Internal Proximity Card or Mifare Card reader
allows triple factor authentication for access control.

Features
Elegant ergonomic German-designed enclosure
3 TFT color touch-screen display
Supports 50 time zones, 99 groups and 10 unlock combinations for access control
Contact relays for door locks, exit button, alarms, bell, etc
Stores 2000 fingerprints and 400 faces and matches with superior accuracy
Infrared light source enables face detection and matching in dimly lit environments
Contactless 1-second employee recognition
Built-in TCP/IP, Serial and USB interfaces
Operates stand-alone or can be interfaced with third party access control panel using
Wiegand Interface
A voice & visual indication for acceptance & rejection of valid & invalid fingerprints/faces
Multi-language support
SDK available for OEM customers and software developers
Also available with HID or Mifare card modules

TVIP700ID Product specification

Visitor Access and Management

The FST access control system includes a full visitor management system that allows you to grant
access to people who are not registered in the system. The system takes advantage of smart phone
technology using the QR-code display as the control credential.
The IMID Visit Access software module creates and sends a virtual personal and encrypted key
called V-Key directly to the visitors qr-code examplesmartphone. The V-Key is a special qr-
code that can be created from your standard calendar or from an app on your smartphone. You
simply create a meeting invite, set the security access level from a list of options, and email it to your
visitor. When your visitor arrives, they need to display the V-Key on their smartphone to the
camera. The system will detect the V-Key, identify the guest, and only then access is allowed
based on the security level you set. The host will be notified that the visitor has arrived; and the visit
will be logged into the system, including host information and a picture of the visitors face from the
actual entry time.

Pros and Cons of Door


Control Readers
What is the best multimodal door access control reader? This buyers guide will help you select the
right door reader.

Multimode door access control readers provide multiple ways of controlling entry. This can include
RFID readers and pin numbers, or multiple biometrics. Security can be increased by using multiple
modes together. In other words a person can place their fingerprint on the readers as well as using
their RFID credential. This adds additional security. Alternatively if you dont need the enhanced
security, you can use one of the modes instead of another. For example, if a persons fingerprint
doesnt work, they can use their credential instead.

You can select a number of different types of multimode readers available. You can select the
standard biometric door readers or the professional series of door readers that provide a higher level
of reliability.

IP RFID Proximity Readers with Pin Numbers:


These IP readers use proximity credentials
such as cards, or keyfobs. The cards can use 125KHz or 13.56 MHz frequencies (smart cards). Or
you can enter a pin number on the keypad.

Pro: These are the lowest cost readers. They are reliable and can be used indoors or outdoors. It
is the easiest type door reader to install.

Con: Using a pin number is not very secure, especially if everyone has the same number. Its hard
to control when people have left the organization. RFID cards are more secure, but again the card
can be lost or given to another person.

Select the card reader

Fingerprint and RFID Multimode readers:


Fingerprint readers are much more secure than RFID Prox card
readers. Multimode readers also include RFID readers and sometimes pin numbers.

Pro: These IP readers provide increased security. There are models that can be used indoors or
outdoors. The additional RFID reader mode can be used to increase security, or used instead of the
fingerprint depending on the level of security required.

Con: Some fingerprints can be difficult to read, especially those that are worn out or damaged. It is
possible to spoof some readers, by using copied fingerprints

Select the Standard Reader | Select the Professional Fingerprint Reader

Facial and RFID Multimode Readers


Facial readers add an additional level of
security. They sometimes include RFID and pin number access as well.

Pro: These IP readers provide increased security. The additional RFID reader mode can be used
to increase security, or used instead of the facial recognition depending on the level of security
required.

Con: Most readers work in controlled lighting situations, so are usually used indoors. Wearing
glasses or hats can sometimes reduce the reliability.

Select the Standard Model | Select the Professional Facial Recognition Reader

Multimodal Biometric Readers

Readers that use multiple type of physiologic


characteristics provide the highest level of security and flexibility. If one mode doesnt work you can
use another mode, or you can use all the modes together to increase security. You can select door
readers with both fingerprint and vein sensors, or another with a combination of fingerprint reader
and facial recognition.
Pro: These multimodal IP readers provide the highest level of security. The additional
biometric modes can be used to increase security, or one at a time to increase reliability.

Con: They are a little more expensive, than a reader that just reads fingerprints, but worth the
added cost.

Select the Standard Model | Select the Professional Readers

Isuue : isit possible to link to a lift system?

Facekey

http://www.facekey.com/PDF%20Files/Catalog%202016.pdf

all in one too biometrics system.

ID cube:

The best one!

file:///D:/Users/shannonleerh/Downloads/IDCUBE_Brochure_Elevate_v1_8-feb.pdf

saferise

Small scale biometrics (facial recognition)

FTS21

You might also like