Hitachi Security business group is a leading provider of Biometric and Identity management solutions. Using Hitachi proprietary finger vein technology VeinID, we can identify an individual from there vein pattern with in their finger. More secure and accurate than finger print scanners. With the introduction is 2020 of VeinID Five we can now also use a laptop camera to scan Vein patterns, no need for infrared and confirm the identity of who is using the laptop or web based application. This will be extended to mobile devices in 2021.
Biometric Security
Finger Vein is a unique method of identifying a person, used by banks, retail, telecom and access control solutions. Our readers use infrared light to highlight the users Vein patterns. The pattern is not stored as an image and is fully encrypted and is highly secure. Via our readers you can Identify a person from millions of templates stored. We can also now use a standard laptop or webcam to confirm a persons identity. With our new solution VeinID Five. No need for expensieve infrared cameras, fast and simple to use, windows or application login and integration with all of the main SSO and identity vendors via OpenID.
Cybersecurity Consulting
We provide consultancy services, to provide guidance and support to customers and ensuring that they are really using a persons identity in the correct way and that that information is fully protected.
Identity & Access Management
We integrate with all of the main identity providers to provide a seamless user experience, providing true identity management. We identify that the users is really the person accessing the computer or service, by confirming their identity from their biometrics and not from something they know that can be shared, lent or stolen.
Identity & Access Security
We provide a highly secure method of capturing biometric data but done ever store images or anything that is simple to reverse engineer. Everything is encrypted and every enrolment is unique and protect with AES 256 encryption.
Social Engineering
As users no longer use passwords or tokens, they are do not easily fall for Phishing attacks and password stealing.