Fides integrates Suprema

Access & Identity Management Handbook 2017 Editor's Choice, Access Control & Identity Management, Security Services & Risk Management

Fides recently announced the integration of Suprema’s BioMini Slim fingerprint authentication scanner into its biometric solutions. These solutions can be used to manage authentication, user logins, customer identification as well as time and attendance. For organisations that rely on historical data – like employers, banks, insurers, credit lenders and hospitals – biometrics serves to protect against identity fraud.

Suprema’s BioMini Slim is packed with features that make it perfect for providing a high level of security. This ergonomic fingerprint scanner with FBI PIV and Mobile ID FAP20 certification has an IP65 rated form factor, making it resistant to dust and water. Its large platen size provides for easy and reliable fingerprint capturing, which includes Live Finger Detection, using Suprema’s latest 500 dpi slim optical sensor.

Fides is a technology company focused on delivering cloud-based identity solutions. Fides aims to prove, either through background screening checks, authentication measures and or biometrics that the person you are in contact with is in fact the correct individual. Fides aggregates a number of identity verification and identity management services to provide a single trusted identity service, always accessible and fully audited.

Fides’ offering includes identity checks, the majority of these being in realtime with the aim of stopping identity theft and reducing incorrect capturing of demographic information. Examples include IDV real-time checks, real-time bank account verification, credit checks, demographic checks and criminal checks. (See more at http://www.securitysa.com/6707r).

These checks are available through Fides’ front-end or can be integrated into existing systems via web service calls.

Fides also provides an electronic safety deposit box, the Trusted Vault, for all information related to an individual. This is where all the biometrics, identity checks, documents and photos are stored. Vaults can be viewed individually or administered from Fides’ web portal for company management. User access is determined by user privileges.

The web portal allows for visibility at every level, including access to customer and/or employee vaults and a look at what checks have been performed on these individuals. The Trusted Vault is PoPI compliant and all activity performed by users is recorded in a secure audit log and each function has a unique tracking ID.

The next release of this integration, scheduled for November 2016, will feature the integration of Suprema’s RealScan series, offering more options and state-of-the-art livescan equipment, ideal for government civil, criminal and AFIS compliant implementations.

Using biometric identity data from the Trusted Vault will be directly integrated into Suprema’s BioStar 2 access control and time attendance solution. With this, a single and secure identity used throughout HR, from point of vetting, identity checks, secure document storage through to providing employee access control, closing the loop introduced by segregated identities.

“At Fides we are all about trusted identities and we are proud to now offer our clients access to the renowned Suprema range,” says Fides Cloud MD, Hedley Hurwitz. “We are also glad to offer Suprema’s trusted partners access to our offering and are looking forward to the new opportunities that this will generate.”

“Synergistic and integrated offerings is what Suprema prides itself on,” says Walter Rautenbach, MD of neaMetrics, authorised distributor of Suprema in Africa. “It is a pleasure working with dynamic experts in the field of biometrics and we love it when solutions solve real problems for our partners.”

For more information contact:

neaMetrics, 0861 632 638, info@neametrics.com, www.neametrics.com.

Suprema, +27 (0)11 784 3952, enquiry@suprema.co.za, www.suprema.co.za.



Credit(s)





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Toxic combinations
Editor's Choice
According to Panaseer’s latest research, 70% of major breaches are caused by toxic combinations: overlapping risks that compound and amplify each other, forming a critical vulnerability to be exploited.

Read more...
A year of integration, intelligence, and innovation
Suprema neaMetrics Products & Solutions
From the cloud-native CLUe platform and CoreStation 20 controller to the global debut of BioStar X, Suprema has redefined what connected, AI-driven security means for enterprises.

Read more...
Syndicates exploit insider vulnerabilities in SA
Information Security Security Services & Risk Management
Today’s cyber criminals do not just exploit vulnerabilities in your systems; they exploit your people, turning trusted team members into unwitting accomplices or deliberate collaborators in their schemes.

Read more...
Is your entrance security secure?
SMART Security Solutions Centurion Systems Technews Publishing News & Events Access Control & Identity Management Smart Home Automation
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security.

Read more...
Continuum launches centralised access and identity management
Editor's Choice Access Control & Identity Management Integrated Solutions Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...
SABRIC Annual Crime Statistics 2024
News & Events Security Services & Risk Management Residential Estate (Industry)
SABRIC has released its Annual Crime Statistics for 2024, reflecting a significant decline in financial crime losses, but also warning of the growing threat posed by artificial intelligence (AI) in fraud schemes.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.