Ohio Sheriff’s Office Uses Biometrics-Based Identity/Access Management System

BIO-key International Inc. and its partner Sig-Tec recently announced the successful deployment of a fingerprint biometrics-based identity and access management system at the Mahoning County (Ohio) Sheriff's Office.

The Mahoning agency is one of the first in the nation to use fingerprint biometrics instead of passwords to secure computer workstations and the software applications and databases that reside on them.

With Sig-Tec's identity and access management (IdAM) software solution for strong authentication and password management integrated with BIO-key's Vector Segment Technology (VST) toolset, for fingerprint biometrics capture and verification, authorized staff can now access the Mahoning County Sheriff's office network and applications quickly and securely with the touch of their finger.

Administrators faced with the challenge of reducing IT costs are using the partnership's biometric solution to reduce help desk workload, eliminating the need to handle forgotten passwords and password resets. Additionally, the solution is more secure than conventional passwords and is preferred by users since it is more convenient than managing a multitude of complex passwords that require constant change in order to satisfy IT security requirements.

Biometric authentication also removes the possibility of passwords being inappropriately shared, forgotten or stolen.

In the first deployment phase, the enhanced authentication process will be used within Mahoning County's correctional facilities, where secure access to systems and data is especially critical. More than 300 enrolled correctional officers and civilian staff now use fingerprint-based log on to access any workstation within the complex that encompasses thirteen buildings.

"The solution was amazingly quick to install and configure," said Charles Van Dyke, deputy officer in the department. "Sig-Tec's project management and support team led by Paul Kobs, together with my staff, completed the job remotely within about eight hours."

Sig-Tec's Single Private Desktop and AppStarter software products secure the workstation and allow for biometric authentication for network and application access. The biometric credentials are captured at enrollment with BIO-key's patented VST identification software. Because VST stores each user's fingerprint as a mathematical template, the user's fingerprint image isn't stored on any computer or in any database -- further protecting security as well as privacy. The end-user simply puts their finger on the KSI keyboard with an integrated UPEK biometric fingerprint reader for access into both the network and authorized applications at any workstation throughout the facility.

"In addition to increased security and improved workflow, another benefit of this solution is that it will reduce password management and password reset support calls by more than 90 percent," said Sig-Tec's national sales manager, John McGuire.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Protecting Data is Critical

    To say that the Internet of Things (IoT) has become a part of everyday life would be a dramatic understatement. At this point, you would be hard-pressed to find an electronic device that is not connected to the internet. Read Now

  • Mobile Access Adoption

    Smartphones and other mobile devices have had a profound impact on how the world securely accesses the workplace and its services. The growing adoption of mobile wallets and the new generation of users is compounding this effect. Read Now

  • Changing Mindsets

    We have come a long way from the early days of fuzzy analog CCTV systems. During that time, we have had to migrate from analog to digital signals. When IP-based network cameras arrived, they opened a new world of quality and connectivity but also introduced plenty of challenges. Thankfully, network devices today have become smart enough to discover themselves and even self-configure to some degree. While some IT expertise is certainly required, things are much smoother these days. The biggest change is in how fast security cameras and supporting infrastructure are evolving. Read Now

Featured Cybersecurity

Webinars

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3