Farpointe Data Inc The #1 Independent Reader & Credential Manufacturer!

Slides:



Advertisements
Similar presentations
Installation & User Guide
Advertisements

RFID Access Control System March, 2003 Softrónica.
WELCOME Keyscans Access Control KIMA SECURITY INC.
1 Pongee Industries Co., Ltd. Complete Solutions for Security ESD ACS system Total Solution For Access Control / Time & Attendance In Pongee.
1 Security in Wireless Protocols Bluetooth, , ZigBee.
Technical Tips. Getting Started with emPower™ Learn-in your new Z-Wave-enabled Alarm.com module following the same process as before: – Perform a Module.
Motorcycle product sheets
Director of Product Line Management HID Proprietary & Confidential
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
HID Global Corporate Overview Natacha Jaramillo Regional Sales Manager (Latin America) September 2014 Presentation Title Slide.
Access Control Line Up Samsung Techwin Europe Ltd.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
1 Applications of Computers Lecture-3 2 E-Commerce 4 Almost all major companies have their homes on the web, mainly for advertising 4 Companies were.
Copyright © 2013 FingerTec Worldwide Sdn.Bhd. All rights reserved.
Confidential Document 1 EverAccess Product Overview By Julian Garcia.
THE TRANSFORMATION OF PAYMENTS. NFC Hosted Payments EMV in the US End-to-End Encryption Mobile POS.
WSK-24 Wireless Occupancy Solution New Product Introduction Customer Sales Presentation June 2009.
Lenel OnGuard and Bioscrypt V-Smart
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Common Proximity Card.
Windows Vista: Volume Activation 2.0
By: Piyumi Peiris 11 EDO. Swipe cards are a common type of security device used by many people. They are usually a business-card-sized plastic card with.
WELCOME TO THE SEMINAR ON Money Pad, The Future Wallet
Profile Series v.S1 Intelligent Power over Ethernet Access Control Solution With the power of iCLASS.
Chapter 1-3 The Ethernet LAN. Ethernet The networking protocol used in most modern computer networks is Ethernet. Ethernet is a CSMA/CD LAN protocol.
Secure Electronic Transaction (SET)
Speaker Notes for employee discussions on how Canada Post is getting greener – August 2008 The Issues Canada Post needs to upgrade its current printer.
The SMARTair Story 1 This is not a presentation about what SMARTair is… 2 What is SMARTair???
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
ERP. What is ERP?  ERP stands for: Enterprise Resource Planning systems  This is what it does: attempts to integrate all data and processes of an organization.
System Overview The Perfect Solution For Small ‘Entry Level’ Access Control Applications August 2014.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Smart Media Innovations & HID Corporation MOBILE SECURITY.
Lecture 13 Page 1 Advanced Network Security Authentication and Authorization in Local Networks Advanced Network Security Peter Reiher August, 2014.
Crystal And Elliott Edward M. Kwang President. Objective A brief demo of Crystal Report to entice you –People spend thousand of dollars to attend Crystal.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
PearsonAccess April 14, PearsonAccess – Agenda Order Tracking Additional Orders Student Data Upload (SDU) files New Student Wizard Online Testing.
Security Management Press Conference, April 14 th 2003 Russ Artzt, Executive Vice President, Computer Associates International, Inc. Joe Grillo, President.
An ASSA ABLOY Group Company ASSA ABLOY ABLOY SECURITY, INC. The Maximum Solution for Gaming Key Control ABLOY SECURITY, INC. presents Click each slide.
AT1000 Asset Tracker Product Overview January 23,
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Only for Loneworkers. People who work alone (day- or nightshifts, or self- employment) are initially on their own in the case of an emergency. That is.
Facial Recognition for Access Control
1 NexSentry 4100 Series Controllers Secure, reliable, fast control with 32-bit technology.
Stone Lock ® Pro Facial Recognition for Access Control TM.
Fall 2006CS 395: Computer Security1 Key Management.
Confidential Document 1 EverAccess Product Overview By Rodney Guinto.
Microsoft Customer Care -Knowledge -Customer Experience -Channel Growth -Unified Service Desk -Platform -Case Management -Product Synergy -Scalability.
I’m back ! Had a nice Holiday? I’m back ! Had a nice Holiday? Today we are talking PROXIMITY TECHNOLOGY Today we are talking PROXIMITY TECHNOLOGY.
1/2015 SE LP10 multiCLASS SE ® Integrated Wiegand Access Control Solution Sold through :Installed by:
SUBMITTED BY EDGEFX TEAM PORTABLE CODED WIRELESS MESSAGE COMMUNICATION BETWEEN TWO PARTIES SECRETLY WITH LCD DISPLAY.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
Today, we’ll discuss Mifare and iCLASS Technologies… Are you ready ?
1 Terminal Management System Usage Overview Document Version 1.1.
Blue Access Technologies
COSEC ARC IP based Access Control Panel.
PowerDsine 5524 Available now
Chapter One: Mastering the Basics of Security
Data Virtualization Demoette… Flat-File Data Sources
2N® Access Unit Bluetooth
Merging Security and Convenience with Seos® Credential Technology
VERSATILE NETWORK ATTACHED DOOR ACCESS CONTROL SYSTEMS
WELCOME!.
2N® Access Unit RFID (125kHz or 13.56MHz).
Stephen “Shep” Sheppard
MAX Warranty Tracking Vince Stefanetti, Exact MAX Americas Trainer.
2N® Access Unit Bluetooth
NEW PRODUCT INTRODUCTION CONEKT™ Mobile Smartphone Access Control Identification Solution June 2018.
2N Access Unit 2.0 Multi-technology access control readers.
2N® Access Unit Bluetooth
Presentation transcript:

Farpointe Data Inc The #1 Independent Reader & Credential Manufacturer!

Farpointe Who? We are growing 50% every year and within 4 years we were selling more cards & readers than Indala was after 13 years, when it was sold to Motorola! The Farpointe team includes Ted Geiszler, founder of Indala, Scott Lindley former director of Sales Indala, Kirk Bierach, Director of Engineering Motorola Indala & Scott Pearson, EMEA Sales Manager Motorola Indala. We are the original Indala, we have been manufacturing high quality readers & cards for over 25 years.

The Importance of Proximity The life of a security system is typically 12 years or more. Cards & Readers represent 10% of a networked door value at installation Approx 10% credentials will need replacing every year For each system installed, around 70-80% of systems will be expanded during the 10 year life of the system

The Importance of Proximity After a system is sold and installed, the majority of contact end users will have with you will be periodic contact about new credentials and replacements At the end of the 12 years, when it comes to a system upgrade, 60% of end users request the re-use of existing cards/readers to minimise the upgrade costs

The Importance of Proximity 95% of the users of your access control solution think the Readers and Cards ARE the access control system!! –C–Customers google HID, Indala and Farpointe to ask for access control all the time.

125khz proximity is difficult to copy and hard to crack. You need readers, valid cards( multiple cards), an understanding of data formats and encryption, and programming technology. This all costs a lot of money and time. Wouldn’t it be easier to put a brick through the window? Or Tailgate someone into the building Proximity is not the weakest link in your security system. It is a combination of Security & Ease of use. –If you are worried about stolen or lost cards gaining access, we have a P640 pin pad reader that adds dual authentication and eliminates security risk A lost/stolen mifare/ Iclass card can still get access to a building until you remove its access rights – the same as a proximity card

Farpointe’s Design Brief Give the customer control over the supply of cards/ readers through their own channel for at least the 12 years the customer needs supply for. Make hardware that lasted at least 12 years in the field, in the widest range of conditions Give the customer a wide choice of proximity technologies, (Mifare, Pyramid, HID, AWID etc) Maximise read range where ever possible – proximity not “almost contact”

Pyramid Series 125 Khz P-300 P-500 P-530 P-640 P-700

9 Pyramid Series 125 Khz 9 P-400 P-600 MCR-403

Pyramid Advantages

11 Multi-Technology 11 Pyramid AWID HID Pyramid

12 MaxSecure 12 Readers and Cards are Electronic Locks and Keys When you give a customer a proxcard or a smartcard, you are giving them their front door key! The customer expects that theirs is the only “key” that will open their front door.

“If you’re not on the list, you’re not getting in……” –M–MAXsecure. is an “electronic doorman” that is built into your Pyramid Series readers and can be activated at no extra cost! –M–Maxsecure effectively creates the “list” of authorized credentials it then checks every credential to make sure that they are “on the list” before allowing them to access your security system! Smartcard security with proximity read range!

Proximity Readers are like Light Bulbs that have been left on 24/7 Energy costs are rising at an alarming rate & “Eco-Friendly” is pushing its way high on the agenda of many companies and corporations. Every Proximity reader outputs a field and burns energy whether it is reading a card or not. Its like leaving the lights on. If you battery back up a security door, proximity readers can reduce the battery life to a matter of hours!!

With a simple control card, Pyramid readers can be put into “FleaPower” mode and reduce the energy consumption by up-to 90%!!! –(–(As little as 5mA vs 100mA!!) Be the only vendor who can say to his customer that their Proximity Readers actually pay for themselves out of the energy savings they give!!!!!

16 Pro-X Extended Read Range Brand Ex 16 3”

17 Pro-X Extended Read Range P-300 Pyramid reader with Pro-X –same size but up to double the read range 17 6”

18 Robust Design Vandal Resistant Only IP-67 readers Biggest temp range (- 40 to +65 Deg C) Bullet proof available Built to last a lifetime lifetime warranty! “AAM have 0 failures after 3 Years!” 18

19 Customer Recognition 19

20 Delta Series 13.56Mhz Smartcard series 20 Delta 3 Delta 5 Delta 5.3 Delta 6.4

Farpointe Delta Delta is Farpointe Data’s new Mifare technology It includes Farpointe’s CAT 6 technology (Credential Adaptive Technology) that will enable it to read 6 credential types in one unit –1–13.56Mhz FIPS 201 cards –1–13.56Mhz Mifare Sector –1–13.56Mhz Mifare Card Serial Number –1–125Khz – Pyramid technology –1–125Khz – HID technolgy –1–125Khz – AWID technology

22 Farpointe Delta Mifare has –16 * 1K data folders (sectors) –The first sector #0 is used as an reference to keep track of what is stored in the other 15 folders This is called a MAD- Multi Application Directory To read that data or write the data in each sector, you need a read key & a write key. 22

23 Farpointe Delta You can store different applications in different sectors. To access a sector, you must know the Read Key for the sector This means the cards and readers are customized so only you and your customers can read the security data MAD

24 Farpointe Delta For example - AAM Systems uses 36 bit weigand format. They want to use sector 5 with their own keys MAD

25 Farpointe Delta MAD AAM Systems read key A0A1A2A3A4A5 write key B0B1B2B3B4B5 36 bit weigand details = FC= 1208 ID = AAM

26 Farpointe Delta Now the card is customized to AAM. To read it you will need a Delta reader programmed to read sector 5 with AAM’s read key MAD AAM

27 Farpointe Delta MAD AAM Biometrics

28 Farpointe Delta MAD 1 Biometrics 3 4 AAM Cashless Vending

29 Farpointe Delta All Mifare cards also have a electronic serial number built in that does not require read keys to be read Farpointe can take this Card Serial Number and convert it into a non- sequential wiegand number that can be enrolled into your access system MAD 1 Biometrics 3 4 AAM 6 7 Cashless Vending

30 Is Mifare secure? In March 2008, Mifare Classic security was cracked by a University in Holland. The crack meant that you could copy the contents of a sector to another card Many Mifare projects were put on “hold” whilst NXP develops improved security. However - Farpointe has developed its own solution

31 Valid ID - Enhanced Mifare Security Detects copied (counterfeit) cards Detects tampered cards Delta Reader Rejects non-authorised credentials. 31

Delta Advantages Farpointe makes Mifare Classic exceed the security needs of your customer! We make smartcards as easy as proximity to order and manage Our Delta readers is a Mifare + Pyramid + HID or AWID reader in one!! Delta enables you to reutilise existing credentials at a project that is upgrading to smart cards Sector keys + Valid ID ensures customers credentials are unique and secure.

Introducing Ranger!

Ranger is an active technology based around 433Mhz technology Rangers consists of a 2 channel receiver and a 4 button transmitter that can send secure Wiegand data over 149 feet! Read Range is tuneable down to 2 feet Data transmitted cannot be “sniffed”, replayed or duplicated due to rolling code transmission and 128 security encryption.

35 Future Vision 35 Farpointe does not rest on its success - in fact Farpointe has delivered new products every year since 2003!! Coming Soon Enhanced vandal resistant readers. Display/ Pinpad reader

36 Future Vision 36 Coming Soon New long range reader - P-900 capable of 70+cm New single piece IP-67 P-710 midrange reader capable of 40cm read range

Any Questions?