SlideShare a Scribd company logo
1 of 16
Using Biometric Palm Vein Technology
     To Strengthen Compliance
                                        Hosts:
 Bill Geary – Sales Manager, Retail & Education, Fujitsu Frontech North America
 John Trader – Communications Specialist, M2SYS Technology


          If tweeting during the presentation, please use hashtag #palmsecure
Agenda
• Company Overviews
• The Cost of Non-Compliance
    • PCI Compliance
       • How Can Palm Vein Biometrics Help?
    • Workforce Management Compliance
       • How Can Palm Vein Biometrics Help?
• Why Fujitsu Palm Vein Biometrics Technology?
• Why M2SYS?
• Contact Information
Fujitsu Overview
                  PalmSecure™ Biometric Solution
Company
           Leading Provider of Customer – Focused Information Technology and Communication Solutions
           Founded in 1935 – 76 years in existence
           Annual Revenue – $53 Billion
           Over 160,000 Employees
           100+ Offices Worldwide

Products, Services and Support
           Delivering Computers, Software, Telecommunications, Microelectronics, Electronic Devices
            –     34,000 Patents
           Providing Consulting, Systems Integration, IT Infrastructure, Solutions
            –     Third Largest IT Services Provider in the World
           Worldwide Support

Partners
           Partnerships with Leading Distributors, Resellers, ISV’s and Software Companies

Customers
           Most Global Fortune 500 Companies
M2SYS Overview
   We Simplify the Adoption of Biometric Technology
• Winner of 2007 Frost & Sullivan Biometrics Technology
  Innovation of the Year Award
• Winner of 2011 Frost & Sullivan North American Biometrics
  Industry New Product Innovation Award
• Primary Markets Served: Public Safety – Law Enforcement,
  Electoral, Healthcare, Banking, Education, POS, Childcare,
  Transportation, Workforce Management, Membership
  Management, Application Security
• Over 500 enterprise software integrators
• Tens of Thousands of End User Deployments in 90 Countries
• Unique Hybrid Biometric Platform™ solutions for rapid
  biometric adoption and deployment
• Headquarters in Atlanta, GA with Satellite Office in Asia
Components of PCI
    Compliance:

                             Software
                                                      Merchants and
Manufacturers               Developers
                                                       Processors
  PCI/PTS                PCI-PA-DSS                       PCI DSS
 PIN transaction
                               Payment
     security                                            Data Security
                              Application
                                                           Standard
                               Vendors




       Ecosystem of payment devices, apps, infrastructure and users
The Cost of PCI
              Non-Compliance:
• Effective security strategies lower the
 cost of non-compliance

• Absence of enabling technologies
 raises the reactive costs of non-
 compliance

• Consequential costs can include
 business disruption, productivity
 loss, revenue loss and fines/penalties
The Cost of Non-Compliance:
The Cost of Non-Compliance:
How Can Biometrics Help?
  Palm Vein Biometrics to Strengthen PCI Compliance
Benefits:

 • Passwords/Network Security
      • Stronger validation – eliminates sophisticated POS
        passwords
      • Avoid costly security breaches – stops
        unauthorized access using borrowed or stolen
        passwords
 • Record Storage
      • Strengthens access control to areas containing
        sensitive data
 • Cost savings
      • Reduce help desk calls
      • Tactic to help lower largest contributor to shrink –
        employee theft
Components of Workforce
Management Compliance:
       Time and Labor Management
           Employee Scheduling
    Employee and Manager Self-Service

     Absence and Leave Management
           Workforce Analytics

  Union Requirements & Gov’t Regulations
The Cost of Non-Compliance:
  Workforce Management
 • Wal-Mart pays $172 million in 2005

 • A&P pays $3.1 million in 2004

 • Lawyer fees and court costs

 • Productivity losses

 • Irreparable damage to reputation and

  consumer loyalty
The Cost Of Compliance:
  Workforce Management
According to the U.S. Department of Justice, an employer can be ordered to
pay liquidated damages and back-pay as well as any criminal fine or penalty
that is imposed in court. Criminal penalties under the Fair Labor Standards
Act (FLSA) impose a fine of up to $10,000 on the first conviction and a fine of
up to $10,000, a term of imprisonment of up to 6 months, or both, on all
convictions after the first conviction.
How Can Biometrics Help?
 Palm Vein Biometrics to Strengthen WFM Compliance
Benefits:


 • Stops time theft and buddy punching
 • Strengthens employee accountability
 • Improves productivity – no PINS or passwords
 • Concrete audit trail that provides irrefutable
   proof
 • Eliminates identity fraud
 • Reduces payroll inflation and payroll errors
 • Solidifies value of punch restriction
Palm Vein Biometric ID
                                     Key Advantages
High Authentication Accuracy
  •   FAR: 0.00008%
  •   FRR: 0.01%

Non-Traceable and Non-Shareable Authentication Method
  •   Delivering unmatched security and privacy that is virtually impossible to forge

Non-Intrusive Interface
  •   Contactless solution that leaves no biometric footprints following authentication
  •   High level of user acceptance

Applicable to All Users with Virtual No Enrollment Failure
  •   Works regardless of ethnicity, age, and other demographical statistics
  •   Highly applicable to all users due to minimal impact from external factors (abrasions, dry
      skin, chemical damage, wearing skin lotion, etc.)
Why M2SYS?
 Key Advantages

         • Instantly interfaces with any third-party
           WFM or POS application
         • Custom versions already built for
           Kronos, ADP, Qqest, Zoll Data
           Systems, Empower, Fujitsu GlobalStore
           and others
         • Can facilitate offline punch capture and
           discreet “typeless” schedule
           enforcement (Kronos and ADP)
         • Easily scale to share templates across
           terminals or stores
         • Seamless interface to end users
Contact Information

Bill Geary                          John Trader
Sales Manager, Retail & Education   Communications Specialist
Biometric Solutions                 M2SYS Technology
Fujitsu Frontech North America      1050 Crown Pointe Pkwy.
25902 Towne Centre Dr               Suite 470
Foothill Ranch, CA 92610            Atlanta, GA 30338
bill.geary@us.fujitsu.com           john@m2sys.com
+1-813-855 8452 office              +1-770-393-0986 x34
+1-813-380 9423 cell                www.m2sys.com
www.fujitsu.com/us/services/
biometrics/palm-vein/               Twitter: twitter.com/m2sys
                                    Facebook: facebook.com/m2sys
                                    LinkedIn: linkedin.com/company/
                                               m2sys-technology

More Related Content

What's hot

Control Issues and Mobile Devices
Control Issues and Mobile DevicesControl Issues and Mobile Devices
Control Issues and Mobile Devicessunnay
 
5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will failIBM Security
 
Secure Identity: The Future is Now
Secure Identity: The Future is NowSecure Identity: The Future is Now
Secure Identity: The Future is NowLane Billings
 
Decision-Zone Introduction
Decision-Zone IntroductionDecision-Zone Introduction
Decision-Zone IntroductionRocco Magnotta
 
Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012
Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012
Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012Ahmed Al Enizi
 
Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Aujas
 
Security White Paper
Security White PaperSecurity White Paper
Security White PaperMobiWee
 
MaaS360 - Mobile Expense Management
MaaS360 - Mobile Expense ManagementMaaS360 - Mobile Expense Management
MaaS360 - Mobile Expense ManagementDarryl Miles
 
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...Ahmed Al Enizi
 
What's New with Ivanti’s Enterprise Licensing Agreement?
What's New with Ivanti’s Enterprise Licensing Agreement?What's New with Ivanti’s Enterprise Licensing Agreement?
What's New with Ivanti’s Enterprise Licensing Agreement?Ivanti
 
Remote Guarding Vendor Tool
Remote Guarding Vendor ToolRemote Guarding Vendor Tool
Remote Guarding Vendor ToolElite ISI
 
최근 비즈니스에서 활용되는 보안 기술 및 성숙된 보안 관리를 위한 ibm 전략 소개
최근 비즈니스에서 활용되는 보안 기술 및 성숙된 보안 관리를 위한 ibm 전략 소개최근 비즈니스에서 활용되는 보안 기술 및 성숙된 보안 관리를 위한 ibm 전략 소개
최근 비즈니스에서 활용되는 보안 기술 및 성숙된 보안 관리를 위한 ibm 전략 소개ArumIm
 
3 Tips for Managing Risky User Activity in 2015
3 Tips for Managing Risky User Activity in 20153 Tips for Managing Risky User Activity in 2015
3 Tips for Managing Risky User Activity in 2015ObserveIT
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Veritis Group, Inc
 

What's hot (19)

Control Issues and Mobile Devices
Control Issues and Mobile DevicesControl Issues and Mobile Devices
Control Issues and Mobile Devices
 
Introduction to Identity Management
Introduction to Identity ManagementIntroduction to Identity Management
Introduction to Identity Management
 
IT Position of Trust Designation
IT Position of Trust DesignationIT Position of Trust Designation
IT Position of Trust Designation
 
5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will fail
 
Secure Identity: The Future is Now
Secure Identity: The Future is NowSecure Identity: The Future is Now
Secure Identity: The Future is Now
 
Decision-Zone Introduction
Decision-Zone IntroductionDecision-Zone Introduction
Decision-Zone Introduction
 
Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012
Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012
Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012
 
Identity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. MookheyIdentity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. Mookhey
 
Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016
 
Security White Paper
Security White PaperSecurity White Paper
Security White Paper
 
MaaS360 - Mobile Expense Management
MaaS360 - Mobile Expense ManagementMaaS360 - Mobile Expense Management
MaaS360 - Mobile Expense Management
 
Tuebora Self Driven IAM
Tuebora Self Driven IAMTuebora Self Driven IAM
Tuebora Self Driven IAM
 
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
 
What's New with Ivanti’s Enterprise Licensing Agreement?
What's New with Ivanti’s Enterprise Licensing Agreement?What's New with Ivanti’s Enterprise Licensing Agreement?
What's New with Ivanti’s Enterprise Licensing Agreement?
 
Remote Guarding Vendor Tool
Remote Guarding Vendor ToolRemote Guarding Vendor Tool
Remote Guarding Vendor Tool
 
최근 비즈니스에서 활용되는 보안 기술 및 성숙된 보안 관리를 위한 ibm 전략 소개
최근 비즈니스에서 활용되는 보안 기술 및 성숙된 보안 관리를 위한 ibm 전략 소개최근 비즈니스에서 활용되는 보안 기술 및 성숙된 보안 관리를 위한 ibm 전략 소개
최근 비즈니스에서 활용되는 보안 기술 및 성숙된 보안 관리를 위한 ibm 전략 소개
 
3 Tips for Managing Risky User Activity in 2015
3 Tips for Managing Risky User Activity in 20153 Tips for Managing Risky User Activity in 2015
3 Tips for Managing Risky User Activity in 2015
 
Protecting Data on Laptops
Protecting Data on LaptopsProtecting Data on Laptops
Protecting Data on Laptops
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices 
 

Viewers also liked

презентация Bio smart 4 2016
презентация Bio smart 4 2016презентация Bio smart 4 2016
презентация Bio smart 4 2016dremin_alex
 
Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology bhoovi1239
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein TechnologyAshwani Kumar
 
Plam vein technology
Plam vein technologyPlam vein technology
Plam vein technologyDinesh Ediga
 
Medical Identity Theft, Palm Vein Authentication: The Manager's Perspective
Medical Identity Theft, Palm Vein Authentication: The Manager's PerspectiveMedical Identity Theft, Palm Vein Authentication: The Manager's Perspective
Medical Identity Theft, Palm Vein Authentication: The Manager's PerspectiveCRUZ CERDA
 
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmalAkmal Hussain
 
Bio-IT for Core Facility Managers
Bio-IT for Core Facility ManagersBio-IT for Core Facility Managers
Bio-IT for Core Facility ManagersChris Dagdigian
 
I Rmag Guide Sept09
I Rmag Guide Sept09I Rmag Guide Sept09
I Rmag Guide Sept09Eric Hill
 
Palmvein Technology
Palmvein TechnologyPalmvein Technology
Palmvein TechnologySai Divya
 
PALM VEIN TECHNOLOGY
PALM VEIN TECHNOLOGYPALM VEIN TECHNOLOGY
PALM VEIN TECHNOLOGYSagar Pudi
 
1.palm vein technology(final)
1.palm vein technology(final)1.palm vein technology(final)
1.palm vein technology(final)Ojal Katiyar
 
How Sweco creates operationally high performance buildings and reduce client...
How Sweco creates  operationally high performance buildings and reduce client...How Sweco creates  operationally high performance buildings and reduce client...
How Sweco creates operationally high performance buildings and reduce client...Carita Kottila
 
The Expansive Hospital Game
The Expansive Hospital GameThe Expansive Hospital Game
The Expansive Hospital GameUTFPR
 
Presentation to BIM Lancashire Conference 2013 @uclan
Presentation to BIM Lancashire Conference 2013 @uclanPresentation to BIM Lancashire Conference 2013 @uclan
Presentation to BIM Lancashire Conference 2013 @uclanWhitbags
 

Viewers also liked (20)

BioSmart
BioSmartBioSmart
BioSmart
 
презентация Bio smart 4 2016
презентация Bio smart 4 2016презентация Bio smart 4 2016
презентация Bio smart 4 2016
 
Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Plam vein technology
Plam vein technologyPlam vein technology
Plam vein technology
 
Medical Identity Theft, Palm Vein Authentication: The Manager's Perspective
Medical Identity Theft, Palm Vein Authentication: The Manager's PerspectiveMedical Identity Theft, Palm Vein Authentication: The Manager's Perspective
Medical Identity Theft, Palm Vein Authentication: The Manager's Perspective
 
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal
 
Palm vein Technology
Palm vein TechnologyPalm vein Technology
Palm vein Technology
 
Bio-IT for Core Facility Managers
Bio-IT for Core Facility ManagersBio-IT for Core Facility Managers
Bio-IT for Core Facility Managers
 
I Rmag Guide Sept09
I Rmag Guide Sept09I Rmag Guide Sept09
I Rmag Guide Sept09
 
Palmvein Technology
Palmvein TechnologyPalmvein Technology
Palmvein Technology
 
PALM VEIN TECHNOLOGY
PALM VEIN TECHNOLOGYPALM VEIN TECHNOLOGY
PALM VEIN TECHNOLOGY
 
1.palm vein technology(final)
1.palm vein technology(final)1.palm vein technology(final)
1.palm vein technology(final)
 
How Sweco creates operationally high performance buildings and reduce client...
How Sweco creates  operationally high performance buildings and reduce client...How Sweco creates  operationally high performance buildings and reduce client...
How Sweco creates operationally high performance buildings and reduce client...
 
The Expansive Hospital Game
The Expansive Hospital GameThe Expansive Hospital Game
The Expansive Hospital Game
 
Presentation to BIM Lancashire Conference 2013 @uclan
Presentation to BIM Lancashire Conference 2013 @uclanPresentation to BIM Lancashire Conference 2013 @uclan
Presentation to BIM Lancashire Conference 2013 @uclan
 
8. eBook #8 time theft
8. eBook #8 time theft8. eBook #8 time theft
8. eBook #8 time theft
 
Palm vein Technology
Palm vein TechnologyPalm vein Technology
Palm vein Technology
 
Abdullah Mukhtar ppt
Abdullah Mukhtar pptAbdullah Mukhtar ppt
Abdullah Mukhtar ppt
 

Similar to Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Workforce Management Compliance

Fujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss PreventionFujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss PreventionM2SYS Technology
 
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...Core Security
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic ChallengesJorge Sebastiao
 
Blue Bricks Business Collateral
Blue Bricks Business CollateralBlue Bricks Business Collateral
Blue Bricks Business CollateralVikram Sareen
 
WfMC Global Awards for Excellence in BPM 2015
WfMC Global Awards for Excellence in BPM 2015WfMC Global Awards for Excellence in BPM 2015
WfMC Global Awards for Excellence in BPM 2015Future Strategies Inc.
 
Charles Taylor InsureTech - InsurTech Innovation Award 2022
Charles Taylor InsureTech - InsurTech Innovation Award 2022Charles Taylor InsureTech - InsurTech Innovation Award 2022
Charles Taylor InsureTech - InsurTech Innovation Award 2022The Digital Insurer
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security modelMicro Focus
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSonny Hashmi
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb esSonny Hashmi
 
Nexsign Biometric Authentication
Nexsign Biometric AuthenticationNexsign Biometric Authentication
Nexsign Biometric AuthenticationSamsung SDS America
 
Biometric - Solutions for Enterprises & Commercial banking
Biometric - Solutions for Enterprises & Commercial bankingBiometric - Solutions for Enterprises & Commercial banking
Biometric - Solutions for Enterprises & Commercial bankingSuresh Babu
 
Webinar: Drive Financial Services Innovation Through IT Automation
Webinar: Drive Financial Services Innovation Through IT AutomationWebinar: Drive Financial Services Innovation Through IT Automation
Webinar: Drive Financial Services Innovation Through IT AutomationCFEngine
 
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT StrategyWhite Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT StrategyGigya
 
Tripwire PCI Customer Success Stories
Tripwire PCI Customer Success StoriesTripwire PCI Customer Success Stories
Tripwire PCI Customer Success StoriesLOGON Software
 
M2SYS Partnership Program 2010
M2SYS Partnership Program 2010M2SYS Partnership Program 2010
M2SYS Partnership Program 2010Nazmul
 
PCI Certification and remediation services
PCI Certification and remediation servicesPCI Certification and remediation services
PCI Certification and remediation servicesTariq Juneja
 
Identity Live Sydney 2017 - Tim Sheedy
Identity Live Sydney 2017 - Tim SheedyIdentity Live Sydney 2017 - Tim Sheedy
Identity Live Sydney 2017 - Tim SheedyForgeRock
 

Similar to Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Workforce Management Compliance (20)

Fujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss PreventionFujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss Prevention
 
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic Challenges
 
Blue Bricks Business Collateral
Blue Bricks Business CollateralBlue Bricks Business Collateral
Blue Bricks Business Collateral
 
Cognitive Insurance
Cognitive InsuranceCognitive Insurance
Cognitive Insurance
 
WfMC Global Awards for Excellence in BPM 2015
WfMC Global Awards for Excellence in BPM 2015WfMC Global Awards for Excellence in BPM 2015
WfMC Global Awards for Excellence in BPM 2015
 
Charles Taylor InsureTech - InsurTech Innovation Award 2022
Charles Taylor InsureTech - InsurTech Innovation Award 2022Charles Taylor InsureTech - InsurTech Innovation Award 2022
Charles Taylor InsureTech - InsurTech Innovation Award 2022
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
Nexsign Biometric Authentication
Nexsign Biometric AuthenticationNexsign Biometric Authentication
Nexsign Biometric Authentication
 
Biometric - Solutions for Enterprises & Commercial banking
Biometric - Solutions for Enterprises & Commercial bankingBiometric - Solutions for Enterprises & Commercial banking
Biometric - Solutions for Enterprises & Commercial banking
 
Securing the Digital Enterprise
Securing the Digital EnterpriseSecuring the Digital Enterprise
Securing the Digital Enterprise
 
Webinar: Drive Financial Services Innovation Through IT Automation
Webinar: Drive Financial Services Innovation Through IT AutomationWebinar: Drive Financial Services Innovation Through IT Automation
Webinar: Drive Financial Services Innovation Through IT Automation
 
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT StrategyWhite Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
 
Tripwire PCI Customer Success Stories
Tripwire PCI Customer Success StoriesTripwire PCI Customer Success Stories
Tripwire PCI Customer Success Stories
 
Aggregation Platforms-White Paper
Aggregation Platforms-White PaperAggregation Platforms-White Paper
Aggregation Platforms-White Paper
 
M2SYS Partnership Program 2010
M2SYS Partnership Program 2010M2SYS Partnership Program 2010
M2SYS Partnership Program 2010
 
PCI Certification and remediation services
PCI Certification and remediation servicesPCI Certification and remediation services
PCI Certification and remediation services
 
Identity Live Sydney 2017 - Tim Sheedy
Identity Live Sydney 2017 - Tim SheedyIdentity Live Sydney 2017 - Tim Sheedy
Identity Live Sydney 2017 - Tim Sheedy
 

More from M2SYS Technology

The Benefits of Using a Biometric Timeclock in Workforce Management
The Benefits of Using a Biometric Timeclock in Workforce ManagementThe Benefits of Using a Biometric Timeclock in Workforce Management
The Benefits of Using a Biometric Timeclock in Workforce ManagementM2SYS Technology
 
The Benefits of Using Biometrics in Banking
The Benefits of Using Biometrics in BankingThe Benefits of Using Biometrics in Banking
The Benefits of Using Biometrics in BankingM2SYS Technology
 
4 Reasons to Implement Biometrics for Increasing Employee Productivity
4 Reasons to Implement Biometrics for Increasing Employee Productivity4 Reasons to Implement Biometrics for Increasing Employee Productivity
4 Reasons to Implement Biometrics for Increasing Employee ProductivityM2SYS Technology
 
TrueVoter™ Biometric Voter Registration Solution
TrueVoter™ Biometric Voter Registration SolutionTrueVoter™ Biometric Voter Registration Solution
TrueVoter™ Biometric Voter Registration SolutionM2SYS Technology
 
Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™M2SYS Technology
 
National Association for Trusted Identities in Cyberspace - Establishing Trus...
National Association for Trusted Identities in Cyberspace - Establishing Trus...National Association for Trusted Identities in Cyberspace - Establishing Trus...
National Association for Trusted Identities in Cyberspace - Establishing Trus...M2SYS Technology
 
Big Data in Healthcare -- What Does it Mean?
Big Data in Healthcare -- What Does it Mean?Big Data in Healthcare -- What Does it Mean?
Big Data in Healthcare -- What Does it Mean?M2SYS Technology
 
The Convergence of Public and Private Biometric Solutions
The Convergence of Public and Private Biometric SolutionsThe Convergence of Public and Private Biometric Solutions
The Convergence of Public and Private Biometric SolutionsM2SYS Technology
 
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...M2SYS Technology
 
Patient Engagement in Healthcare Improves Health and Reduces Costs
Patient Engagement in Healthcare Improves Health and Reduces CostsPatient Engagement in Healthcare Improves Health and Reduces Costs
Patient Engagement in Healthcare Improves Health and Reduces CostsM2SYS Technology
 
The Impact of Duplicate Medical Records and Overlays in Healthcare
The Impact of Duplicate Medical Records and Overlays in HealthcareThe Impact of Duplicate Medical Records and Overlays in Healthcare
The Impact of Duplicate Medical Records and Overlays in HealthcareM2SYS Technology
 
Podcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIOPodcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIOM2SYS Technology
 
Biometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringBiometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringM2SYS Technology
 
Healthcare Data Integrity and Interoperability Standards Podcast Summary
Healthcare Data Integrity and Interoperability Standards Podcast SummaryHealthcare Data Integrity and Interoperability Standards Podcast Summary
Healthcare Data Integrity and Interoperability Standards Podcast SummaryM2SYS Technology
 
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...M2SYS Technology
 
Creating a Social Media Policy for Your Business
Creating a Social Media Policy for Your Business Creating a Social Media Policy for Your Business
Creating a Social Media Policy for Your Business M2SYS Technology
 

More from M2SYS Technology (16)

The Benefits of Using a Biometric Timeclock in Workforce Management
The Benefits of Using a Biometric Timeclock in Workforce ManagementThe Benefits of Using a Biometric Timeclock in Workforce Management
The Benefits of Using a Biometric Timeclock in Workforce Management
 
The Benefits of Using Biometrics in Banking
The Benefits of Using Biometrics in BankingThe Benefits of Using Biometrics in Banking
The Benefits of Using Biometrics in Banking
 
4 Reasons to Implement Biometrics for Increasing Employee Productivity
4 Reasons to Implement Biometrics for Increasing Employee Productivity4 Reasons to Implement Biometrics for Increasing Employee Productivity
4 Reasons to Implement Biometrics for Increasing Employee Productivity
 
TrueVoter™ Biometric Voter Registration Solution
TrueVoter™ Biometric Voter Registration SolutionTrueVoter™ Biometric Voter Registration Solution
TrueVoter™ Biometric Voter Registration Solution
 
Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™
 
National Association for Trusted Identities in Cyberspace - Establishing Trus...
National Association for Trusted Identities in Cyberspace - Establishing Trus...National Association for Trusted Identities in Cyberspace - Establishing Trus...
National Association for Trusted Identities in Cyberspace - Establishing Trus...
 
Big Data in Healthcare -- What Does it Mean?
Big Data in Healthcare -- What Does it Mean?Big Data in Healthcare -- What Does it Mean?
Big Data in Healthcare -- What Does it Mean?
 
The Convergence of Public and Private Biometric Solutions
The Convergence of Public and Private Biometric SolutionsThe Convergence of Public and Private Biometric Solutions
The Convergence of Public and Private Biometric Solutions
 
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
 
Patient Engagement in Healthcare Improves Health and Reduces Costs
Patient Engagement in Healthcare Improves Health and Reduces CostsPatient Engagement in Healthcare Improves Health and Reduces Costs
Patient Engagement in Healthcare Improves Health and Reduces Costs
 
The Impact of Duplicate Medical Records and Overlays in Healthcare
The Impact of Duplicate Medical Records and Overlays in HealthcareThe Impact of Duplicate Medical Records and Overlays in Healthcare
The Impact of Duplicate Medical Records and Overlays in Healthcare
 
Podcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIOPodcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIO
 
Biometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringBiometric Technology and Human Factor Engineering
Biometric Technology and Human Factor Engineering
 
Healthcare Data Integrity and Interoperability Standards Podcast Summary
Healthcare Data Integrity and Interoperability Standards Podcast SummaryHealthcare Data Integrity and Interoperability Standards Podcast Summary
Healthcare Data Integrity and Interoperability Standards Podcast Summary
 
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
 
Creating a Social Media Policy for Your Business
Creating a Social Media Policy for Your Business Creating a Social Media Policy for Your Business
Creating a Social Media Policy for Your Business
 

Recently uploaded

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Recently uploaded (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Workforce Management Compliance

  • 1. Using Biometric Palm Vein Technology To Strengthen Compliance Hosts: Bill Geary – Sales Manager, Retail & Education, Fujitsu Frontech North America John Trader – Communications Specialist, M2SYS Technology If tweeting during the presentation, please use hashtag #palmsecure
  • 2. Agenda • Company Overviews • The Cost of Non-Compliance • PCI Compliance • How Can Palm Vein Biometrics Help? • Workforce Management Compliance • How Can Palm Vein Biometrics Help? • Why Fujitsu Palm Vein Biometrics Technology? • Why M2SYS? • Contact Information
  • 3. Fujitsu Overview PalmSecure™ Biometric Solution Company  Leading Provider of Customer – Focused Information Technology and Communication Solutions  Founded in 1935 – 76 years in existence  Annual Revenue – $53 Billion  Over 160,000 Employees  100+ Offices Worldwide Products, Services and Support  Delivering Computers, Software, Telecommunications, Microelectronics, Electronic Devices – 34,000 Patents  Providing Consulting, Systems Integration, IT Infrastructure, Solutions – Third Largest IT Services Provider in the World  Worldwide Support Partners  Partnerships with Leading Distributors, Resellers, ISV’s and Software Companies Customers  Most Global Fortune 500 Companies
  • 4. M2SYS Overview We Simplify the Adoption of Biometric Technology • Winner of 2007 Frost & Sullivan Biometrics Technology Innovation of the Year Award • Winner of 2011 Frost & Sullivan North American Biometrics Industry New Product Innovation Award • Primary Markets Served: Public Safety – Law Enforcement, Electoral, Healthcare, Banking, Education, POS, Childcare, Transportation, Workforce Management, Membership Management, Application Security • Over 500 enterprise software integrators • Tens of Thousands of End User Deployments in 90 Countries • Unique Hybrid Biometric Platform™ solutions for rapid biometric adoption and deployment • Headquarters in Atlanta, GA with Satellite Office in Asia
  • 5. Components of PCI Compliance: Software Merchants and Manufacturers Developers Processors PCI/PTS PCI-PA-DSS PCI DSS PIN transaction Payment security Data Security Application Standard Vendors Ecosystem of payment devices, apps, infrastructure and users
  • 6. The Cost of PCI Non-Compliance: • Effective security strategies lower the cost of non-compliance • Absence of enabling technologies raises the reactive costs of non- compliance • Consequential costs can include business disruption, productivity loss, revenue loss and fines/penalties
  • 7. The Cost of Non-Compliance:
  • 8. The Cost of Non-Compliance:
  • 9. How Can Biometrics Help? Palm Vein Biometrics to Strengthen PCI Compliance Benefits: • Passwords/Network Security • Stronger validation – eliminates sophisticated POS passwords • Avoid costly security breaches – stops unauthorized access using borrowed or stolen passwords • Record Storage • Strengthens access control to areas containing sensitive data • Cost savings • Reduce help desk calls • Tactic to help lower largest contributor to shrink – employee theft
  • 10. Components of Workforce Management Compliance: Time and Labor Management Employee Scheduling Employee and Manager Self-Service Absence and Leave Management Workforce Analytics Union Requirements & Gov’t Regulations
  • 11. The Cost of Non-Compliance: Workforce Management • Wal-Mart pays $172 million in 2005 • A&P pays $3.1 million in 2004 • Lawyer fees and court costs • Productivity losses • Irreparable damage to reputation and consumer loyalty
  • 12. The Cost Of Compliance: Workforce Management According to the U.S. Department of Justice, an employer can be ordered to pay liquidated damages and back-pay as well as any criminal fine or penalty that is imposed in court. Criminal penalties under the Fair Labor Standards Act (FLSA) impose a fine of up to $10,000 on the first conviction and a fine of up to $10,000, a term of imprisonment of up to 6 months, or both, on all convictions after the first conviction.
  • 13. How Can Biometrics Help? Palm Vein Biometrics to Strengthen WFM Compliance Benefits: • Stops time theft and buddy punching • Strengthens employee accountability • Improves productivity – no PINS or passwords • Concrete audit trail that provides irrefutable proof • Eliminates identity fraud • Reduces payroll inflation and payroll errors • Solidifies value of punch restriction
  • 14. Palm Vein Biometric ID Key Advantages High Authentication Accuracy • FAR: 0.00008% • FRR: 0.01% Non-Traceable and Non-Shareable Authentication Method • Delivering unmatched security and privacy that is virtually impossible to forge Non-Intrusive Interface • Contactless solution that leaves no biometric footprints following authentication • High level of user acceptance Applicable to All Users with Virtual No Enrollment Failure • Works regardless of ethnicity, age, and other demographical statistics • Highly applicable to all users due to minimal impact from external factors (abrasions, dry skin, chemical damage, wearing skin lotion, etc.)
  • 15. Why M2SYS? Key Advantages • Instantly interfaces with any third-party WFM or POS application • Custom versions already built for Kronos, ADP, Qqest, Zoll Data Systems, Empower, Fujitsu GlobalStore and others • Can facilitate offline punch capture and discreet “typeless” schedule enforcement (Kronos and ADP) • Easily scale to share templates across terminals or stores • Seamless interface to end users
  • 16. Contact Information Bill Geary John Trader Sales Manager, Retail & Education Communications Specialist Biometric Solutions M2SYS Technology Fujitsu Frontech North America 1050 Crown Pointe Pkwy. 25902 Towne Centre Dr Suite 470 Foothill Ranch, CA 92610 Atlanta, GA 30338 bill.geary@us.fujitsu.com john@m2sys.com +1-813-855 8452 office +1-770-393-0986 x34 +1-813-380 9423 cell www.m2sys.com www.fujitsu.com/us/services/ biometrics/palm-vein/ Twitter: twitter.com/m2sys Facebook: facebook.com/m2sys LinkedIn: linkedin.com/company/ m2sys-technology

Editor's Notes

  1. Here is a brief overview of the ecosystem of payment devices, applications, infrastructure and users.Starting on the right hand side with the green block, you have the PCI Data Security Standard (or DSS) which applies to all entities that store, process and/or transmit cardholder data. It covers technical and operational system components included in or connected to cardholder data. So if you are a merchant that accepts or processes payment cards, you must comply with the PCI DSS.The center red section covers is for software developers and integrators of payment applications that store, process or transmit cardholder data as part of authorization or settlement when these applications are sold, distributed or licensed to third parties. The left blue section is a set of security requirements focused on charactsristics and management of devices used in the protection of cardholder PINs and other payment processing related activities. The requirements are for manufacturers to follow in the design, manufacture and transport of a device to the entity that implements it.Biometric identification pertains to the green PCI DSS section to strengthen implementation of access control measures which applies to: restricting access to cardholder data by employees, assigning a unique ID to each person with computer access, and restricting physical access to cardholder data.
  2. The PonemonInstisute recently did a study of 36 multinational organizations and found out that the average cost of compliance for those organizations is $3.5 million and the average cost for these organizations for non-compliance is $9.4 million. They also discovered that in terms of external compliance, respondents indicated that the PCI-Data Security Standards were one of the most important and difficult requirments to comply with. It seems obvious to point this out but being proactive by providing technology mechanisms that increase security along the chain of PCI requirements, you will lower the reactive costs of non-compliance.I’ts interesting to note that business disruption and productivity losses are the most expensive consequences of non-compliance. Non-compliance can also negatively impact revenues and rack up significant amounts in fines and penalties levied. It’s interesting to note than in the Ponemon Study, they discovered that there is an inverse relationship between per capita non-compliance cost and the percentage of compliance spending in relation to the total IT budget. In other words, the more that an organization spent on the costs of non-compliance, the smaller the amount of the IT budget the organization had allocated to compliance costs.
  3. I included this graph from the Ponenmon Report that I mentioned earlier just to give you an idea of the percentage gaps between compliance and non-compliance costs by industry. As you can see, retail is #2 on the list followed by healthcare at #3.
  4. This graph reports the average number of compromised records over a 12 month period by industry classification. You will notice that although it isn’t a perfect match, there appears to be a close relationship between the average number of lost or stolen records and the percentage gap by industry shown in the previous graph.
  5. Here are a list of the components that are part of workforce management compliance. Employers must be aware of all these elements of their workforce management strategy which can be a complicated task. As this list clearly indicates, there are many facets of workforce management compliance that require attention and many different facets of compliance that are important to include.
  6. So let’s talk for a minute about the consequences of non-compliance. Does anyone remember the lawsuit that was brought against Wal Mart back in 2005? 116,000 current and former California Wal Mart employees claimed that they were illegally denied lunch breaks and Wal Mart was ordered to pay $57 million in general damages and $115 million in punitive damages for violating a state law that requires employers to give 30-minute unpaid lunch breaks to employees who work at least six hours.In 2004, a $3.1 million dollar settlement was levied against A&P by hourly employees that claimed they had not received proper compensation for all hours worked (off-the-clock) or overtime premium pay for all hours worked in excess of 40 in a work week in violation of the Fair Labor Standards Act.There are many costs associated with workforce management non-compliance including lawyer fees and court costs, losses in employee productivity, and perhaps one of the most damaging is a hit to a businesses reputation which can cause irreversible damage to consumer loyalty. In a day and age where social media shines the spotlight on these types of egregious violations of an employee’s rights and in an economy that is increasingly tighter, companies can’t afford to take a risk on their workforce management compliance policies.
  7. The costs of compliance can also go well beyond heavy monetary losses. There can also be criminal convictions requiring imprisonment.
  8. We designed our biometric identification software to instantly interface with any third party WFM or POS application. We have a version of our flagship Hybrid Biometric Platform software called Bio-SnapOn that will act as a biometric identification layer on top of other applications or we have several custom versions of our software that are custom built to interface with leading WFM and POS software providers.Our software can facilitate offline punch captures and typelessIn addition, with our Hybrid Biometric Platform software, if you are an organization with more than one site or with more than one store terminal, you can easily share employee templates across terminals and stores. Our software is built to seamlessly interface and be hassle free to our end users so you can concentrate on your core business and not have to be tied down to software glitches or support problems.