EAT

Physical and Logical Access With Wearable and Mobile Credentials

Getting in and Logging on With Mobile Access

There’s an app for just about everything these days — including access control. While many organizations stick with tried-and-true smart cards, others are branching out into the flexible, high tech and high security world of mobile access, verifying trusted identities with credentials like smart phones and wearables.

hands typing on smartphone with code image overlay

Preventing Bank Fraud Through Biometrics

ATM Security Beyond PINs and Cards

Where there is money, there are motives and opportunities for theft. Automated Teller Machines (ATMs) are particularly vulnerable targets — found all over and usually unattended in evening hours. Pin codes are often the only form of protection for ATMs, but they can be easily stolen or forcibly obtained.

using finger to unlock data

Improved Patient Care With Advanced Biometrics

Fast, Efficient and Compliant Verification for Healthcare

Biometric authentication is already widely used as a secure, compliant and simple way to authenticate medical staff and clinicians. Still, many medical facilities rely on bar code ID bracelets to identify patients, which are inexpensive but can be easily swapped or duplicated. With an increased need to combat identity theft fueled by rising costs and insurance fraud, hospital administrators are seeking more comprehensive and secure solutions.

Preventing Retail Shrink With Biometrics

Fraud and Theft Prevention With the Touch of a Finger

Employee theft accounts for the highest percentage of retail shrink in North America — more than the percentage of theft from traditional shoplifters or outside organized retail criminals. A widely under-addressed vulnerability to theft is the point-of-sale (POS). Traditional security methods used to log in — passwords, PINs, swipe cards and keys —can be easily shared. Because of this, it is difficult to determine who is accessing the POS system and responsible for specific transactions.

Maximize Security & Cut Costs With Secure Print

Printer Security — A Dangerous Oversight

Most of the focus on preventing major data and privacy breaches is placed on IT and digital systems, and the role of paper records can be easily overlooked. However, 13% of data breaches involve paper records1 and 70% of organizations have suffered a print-related data breach.2

person using secure print with phone

HID® EikonTouch® TC510 Fingerprint Reader

HID® EikonTouch® TC510 Fingerprint Reader

The EikonTouch TC510 USB capacitive silicon fingerprint reader features enhanced usability and durability that is ideally suited for high traffic environments such as point-of-sale and multi-user applications. The new compact design has improved finger guide ergonomics for ease of use offering LED feedback above the finger placement area for intuitive fingerprint enrollment, capture and verification.

HID® EikonTouch® TC710 Fingerprint Reader

HID® EikonTouch® TC710 Fingerprint Reader

The EikonTouch TC710 USB capacitive silicon fingerprint reader has a compact design with improved finger guide ergonomics for ease of use. The new design offers LED feedback above the finger placement area for intuitive fingerprint enrollment, capture and verification. The reader’s small form factor and weighted base allows for stability on even the smallest surfaces and is ideally suited for government, healthcare and other logical access control applications.

How to Secure and Simplify Time & Attendance

The Trouble With Time & Attendance

Buddy punching, the practice of clocking in for a coworker who is not actually working, is one of the most pervasive types of fraud — and a costly issue for manufacturers and other organizations. According to Nucleus Research, up to 2% of a company’s payroll is lost to buddy punching.

touch screen time card on computer monitor

Single Sign-on (SSO) for Desktops and Devices

Fast and Frictionless Sign-On for Employees on the Go

The way we work has changed. It’s become less common to have one employee assigned to one desk or office, all the time. Many job functions require employees to access information at different locations, on different devices or stored in different software systems. It’s a hassle to be forced to log into multiple places, multiple times in the same day.

Customer Success Stories: National Information Centre — Staff Member Identification

Pages

Subscribe