You are here:  

Small Medium Companies

Print PDF

SME

argaiv1026

In the world of cut throat competition, having a affordable security solution is no more an option.

Small and Medium Enterprise (SMEs) securing their assets is a fundamental requirement for the company to survive.

SMEs face network security as well as physical security concerns such as specific entry points (i.e. doorways, computer rooms, etc.) as well as essential security necessities.

Matrix work with you to hand in hand to provide better security and better facilities management in the various facets of your daily activities, which could include,

  • Biometrics Access to Secure Areas
  • Remote Network Access processing using Biometrics Recognition.
  • Biometrics Identification to safeguard in finance and cash handling departments.
  • Time and Attendance Verification

Illustration-web

 

biometric_dooraccessBiometric Access to Secure Areas

Matcess identification can be a secure, convenient, and cost-effective alternative to passwords, badges, swipe cards and PINs. The biometric reader mounts on a wall near your secure door. These biometric scanners offer various levels of authorization for an individual. This authorization includes a scheduling mechanism for allowing access for individuals based on the time of day.

Unlike systems that require proprietary networking, X-Access uses your existing local area network

  • A truly secure method of securing electronic transactions - Biometric authorization takes place at the host web-site's secure environment - not at the local machine where password and PINS can be entered by anyone.
  • Easy to install for end users - By installing a small Internet Explorer plug-in and the software driver for the biometric reader, an end user is now ready to go. An existing web cam or a biometric reader plugs into an available USB Port on the end user's computer.
  • Fosters goodwill by providing your customers and employees with the electronic security and "peace of mind" because you show the utmost importance for their secure transactions.
  • Computer and network security is an important aspect in the corporate world, as data is a crucial factor of business. Security Passwords, PINs, security codes, user names are usually the first line of defense against cyber attacks in the real world, but Biometric Security is the ultimate.

Consider the following to see if your company is secure enough.

  • "I have 20 passwords, of which, 3 of them change on a monthly basis. How do I remember them? Well, I simply put them on this sticky note under my computer." This is a security manager's nightmare.
  • it's not convenient to have to log back in to a system each time one leaves their desk. Again, this makes it easy to sabotage.
  • "We use these portable password tokens - but I forgot mine today. I have to call the help desk." Between employee time loss and help desk costs, the company has just spent $150.

Remote Network Access for Internet/Intranets using Biometric Recognition.biometric_networking

d'face enables companies to have a secure Internet and Intranet operations, all at no cost if you are using face recognition as most of the computer users use web-cam as standard equipment.

  • Access data based on biometrics, by department, branch etc.
  • Will ensure that the person, who is accessing the data from your server, is your employee, vendor, customer who is authorized by you.
  • Better Intranet transactions among the employees, and hence have better communications at a faster pace.
  • Better ROI with secured environment.

d'face will secure identities before data is transferred to and from an Intranet, Internet or other type of remote location. Because security is weakest at the remote computer, X-Faces work with a web browser at the server level. d'face captures the user's face/fingerprint on a lightweight face/fingerprint reader at the local machine and then translates and encrypts the biometric data to be sent to the server for authentication. The authentication takes place at the web-site's host environment versus the local machine - behind appropriate security and firewall technology. No record of PINs, passwords, or biometric data resides in cache memory on the local computer.

 

biometric_vaultaccessBiometric Identification to safeguard in finance and cash handling departments

Matcess, bio-metrically manages who can unlock latched enclosures according to a specific schedule and a specific authorization level, thus increasing companies security by utilizing biometrics for controlling access to specific latched enclosures.

  • Decrease the opportunity for theft by utilizing a face/fingerprint for access versus a key which can be lost or stolen.
  • Audit logs can be immediately generated for speedy reports including who accessed which enclosures at what times.
  • Responsibility for an enclosure(s) can be assigned to a face/fingerprint from a single individual, to a fingerprint from any one of a group of individuals, or to two or more fingerprints - one from each individual, providing dual-access.
  • Save time and money because there is no need to re-key enclosures in the event of an employee dismissal or a lost key. “Face is the Key”
  • Easy for employees to use, just need one time training.

Time and Attendance Verificationbiometric_timeattendance

Payroll, one of the first business applications for computer technology, is often only half automated, leaving companies vulnerable to employee time theft. Experts estimate that long lunches, “buddy punching”, late arrivals and other abuses cost phenomenal figures to the company.

Our Biometric recognition is the secure, convenient and accurate alternative to time clocks and card-based systems. It can help employers avoid time theft losses and enjoy the enhanced productivity and savings of an automated time/attendance solution that integrates directly with accounting and payroll processing software

  • Avoid common mistakes that are related with the manual entry of time and attendance data.
  • Clock hours are shown in accumulated and daily basis; administrator can set shifts, holiday list, employee type etc., on the fly.
  • Concurrently handle various companies or departments.
  • Diminish pay errors with automatic computation and monitoring of overtime.

Manufacturing plants have many of the same issues that any facilities management group faces but with a few twists. A typical manufacturer has a number of hourly employees who have access only to specific areas of the plant at specific times. These employees need to have access to areas, physical files, networks and computers and be controlled by time, schedule, and job function. Typically, magnetic cards, proximity cards, access tokens, punch card time and attendance systems, and passwords/PINs are the default methods of control. Unfortunately, anyone can use these portable devices and punch card systems to defraud the company, and the current systems deployed do not authenticate the person using the portable device is really who they claim to be.

Biometrics can eliminate the vulnerability of lost, stolen or mismanaged access methods. A face/fingerprint can't be lost or stolen whereas portable devices and "buddy punching" for time and attendance can be used as fraudulent tools. By using a centralized profile management system, facilities management personnel can control the addition, deletion, and modification of access profiles for all employees without the cost of issuing new portable devices or the cost of lost time and productivity waiting for the changes to take place.