SlideShare a Scribd company logo
Security Investors Conference 
FST Biometrics Overview 
Yaron Zussman | December, 2014
2 
Identity Timeline 
15th Century ~1970 ~2010 2015
Data Logging/ 
Data Search 
QR Code 
Face Recognition 
Behavior Analysis 
Voice Biometrics NFC/BLE 
3 
Analytical Fusion of Multiple Credentials
x 
x 
* Identification of device/ card, not the holder 
4 
IMID Competitive Positioning 
Security level 
Seamlessness 
(Impact on pace) 
Intrusiveness 
RFID Card* 
IRIS 
Bluetooth & NFC * 
Fingerprints 
Fusion of FR and BB (IMID) 
a 
a 
a 
x 
a 
a 
x 
a 
a 
x 
a 
x 
a
5 
Numbers Talk 
427,852 106 
Times IMID system 
have identified 
users within the 
last four weeks 
Sites are 
controlled by 
IMID system 
6 
Patents are 
protecting our 
intellectual 
property 
0.0003 
False 
accept 
rate
6 
Global Trends: The Business landscape 
Urbanization Outcome Integrated Mobility 
Cloud SW – 
Enables globalization 
Smarter Cities
The Future of Identity Solutions – In Motion IDentification (IMID) 
7 
Airports & 
Transportation 
Education 
Smart City 
Services 
Residential 
Corporate Financial 
Institutions 
Retail Government 
& Military
Security Magazine 
Best New Product In 
Biometrics 2014 
8 
Market Acknowledgment | Awards 
Award 
Winning 
Products 
Best New Product In 
Access Control 2014 
Most Innovative 
US Security Project 2013
9 
Executive 
Bio 
Aharon Zeevi Farkash, 
Founder and CEO 
Led the Directorate of Military 
Intelligence (AMAN) and was 
responsible for providing critical 
national intelligence to the Israeli 
leadership 
Headed the prestigious Israel 
SIGINT National Unit (8200) 
Shahar Belkin, 
CTO 
Has over two decades of 
experience in developing new 
technologies and algorithms in 
the field of security 
Developed the first PC-based 
digital video recorders (DVR) 
Ofir Friedman, 
VP R&D 
Has 15 years of R&D 
experience in developing 
and managing software 
and hardware products 
Served in the IDF 
Technology Intelligence 
Corps 
General Info
• We address an increasing need for In Motion Identification that keeps a normal 
pace of life 
• FST’s SW solution is already field proven in variety of verticals and use cases 
• We are looking for technology and business partners 
10 
Summary 
a 
a 
a
THANK YOU 
yarons@fstbm.com 
www.fstbm.com 
11

More Related Content

What's hot

FIDO UAF Adoption in Hong Kong
FIDO UAF Adoption in Hong KongFIDO UAF Adoption in Hong Kong
FIDO UAF Adoption in Hong Kong
FIDO Alliance
 
Deployment Case Study: Login.gov & FIDO2
Deployment Case Study: Login.gov & FIDO2Deployment Case Study: Login.gov & FIDO2
Deployment Case Study: Login.gov & FIDO2
FIDO Alliance
 
Going Passwordless with Microsoft
Going Passwordless with MicrosoftGoing Passwordless with Microsoft
Going Passwordless with Microsoft
FIDO Alliance
 
Banking the Unbanked
Banking the UnbankedBanking the Unbanked
Banking the Unbanked
Veridium
 
FIDO and the Future of User Authentication
FIDO and the Future of User AuthenticationFIDO and the Future of User Authentication
FIDO and the Future of User Authentication
FIDO Alliance
 
Beyond Touch ID: Mobile Fingerprinting & Advances in Biometrics
Beyond Touch ID: Mobile Fingerprinting & Advances in BiometricsBeyond Touch ID: Mobile Fingerprinting & Advances in Biometrics
Beyond Touch ID: Mobile Fingerprinting & Advances in Biometrics
Veridium
 
Secure Mobile Banking
Secure Mobile BankingSecure Mobile Banking
Secure Mobile Banking
Veridium
 
A First Step to a World without Passwords
A First Step to a World without PasswordsA First Step to a World without Passwords
A First Step to a World without Passwords
FIDO Alliance
 
2019 FIDO Seoul Seminar - Moving Beyond Passwords
2019 FIDO Seoul Seminar - Moving Beyond Passwords2019 FIDO Seoul Seminar - Moving Beyond Passwords
2019 FIDO Seoul Seminar - Moving Beyond Passwords
FIDO Alliance
 
IIPRD - IP-Patent - Creation, Protection, and Commercialization
IIPRD - IP-Patent - Creation, Protection, and CommercializationIIPRD - IP-Patent - Creation, Protection, and Commercialization
IIPRD - IP-Patent - Creation, Protection, and Commercialization
guest3efddb
 
Technical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO Authentication
FIDO Alliance
 
Introduction to FIDO's Identity Verification & Binding Initiative
Introduction to FIDO's Identity Verification & Binding Initiative Introduction to FIDO's Identity Verification & Binding Initiative
Introduction to FIDO's Identity Verification & Binding Initiative
FIDO Alliance
 
FIDO UAF and PKI in Asia: A Case Study and Recommendations
FIDO UAF and PKI in Asia: A Case Study and RecommendationsFIDO UAF and PKI in Asia: A Case Study and Recommendations
FIDO UAF and PKI in Asia: A Case Study and Recommendations
FIDO Alliance
 
Expected Use Cases of FIDO Authentication in Social Apps
Expected Use Cases of FIDO Authentication in Social AppsExpected Use Cases of FIDO Authentication in Social Apps
Expected Use Cases of FIDO Authentication in Social Apps
FIDO Alliance
 
Blockchain, Biometrics, and the Future of Financial Services
Blockchain, Biometrics, and the Future of Financial ServicesBlockchain, Biometrics, and the Future of Financial Services
Blockchain, Biometrics, and the Future of Financial Services
Veridium
 
Technical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO Authentication
FIDO Alliance
 
FIDO Authentication Technical Overview
FIDO Authentication Technical OverviewFIDO Authentication Technical Overview
FIDO Authentication Technical Overview
FIDO Alliance
 
Implementing Trusted Endpoints in the Mobile World
Implementing Trusted Endpoints in the Mobile WorldImplementing Trusted Endpoints in the Mobile World
Implementing Trusted Endpoints in the Mobile World
LINE Corporation
 
Technical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO Authentication
FIDO Alliance
 
Global Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationGlobal Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong Authentication
FIDO Alliance
 

What's hot (20)

FIDO UAF Adoption in Hong Kong
FIDO UAF Adoption in Hong KongFIDO UAF Adoption in Hong Kong
FIDO UAF Adoption in Hong Kong
 
Deployment Case Study: Login.gov & FIDO2
Deployment Case Study: Login.gov & FIDO2Deployment Case Study: Login.gov & FIDO2
Deployment Case Study: Login.gov & FIDO2
 
Going Passwordless with Microsoft
Going Passwordless with MicrosoftGoing Passwordless with Microsoft
Going Passwordless with Microsoft
 
Banking the Unbanked
Banking the UnbankedBanking the Unbanked
Banking the Unbanked
 
FIDO and the Future of User Authentication
FIDO and the Future of User AuthenticationFIDO and the Future of User Authentication
FIDO and the Future of User Authentication
 
Beyond Touch ID: Mobile Fingerprinting & Advances in Biometrics
Beyond Touch ID: Mobile Fingerprinting & Advances in BiometricsBeyond Touch ID: Mobile Fingerprinting & Advances in Biometrics
Beyond Touch ID: Mobile Fingerprinting & Advances in Biometrics
 
Secure Mobile Banking
Secure Mobile BankingSecure Mobile Banking
Secure Mobile Banking
 
A First Step to a World without Passwords
A First Step to a World without PasswordsA First Step to a World without Passwords
A First Step to a World without Passwords
 
2019 FIDO Seoul Seminar - Moving Beyond Passwords
2019 FIDO Seoul Seminar - Moving Beyond Passwords2019 FIDO Seoul Seminar - Moving Beyond Passwords
2019 FIDO Seoul Seminar - Moving Beyond Passwords
 
IIPRD - IP-Patent - Creation, Protection, and Commercialization
IIPRD - IP-Patent - Creation, Protection, and CommercializationIIPRD - IP-Patent - Creation, Protection, and Commercialization
IIPRD - IP-Patent - Creation, Protection, and Commercialization
 
Technical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO Authentication
 
Introduction to FIDO's Identity Verification & Binding Initiative
Introduction to FIDO's Identity Verification & Binding Initiative Introduction to FIDO's Identity Verification & Binding Initiative
Introduction to FIDO's Identity Verification & Binding Initiative
 
FIDO UAF and PKI in Asia: A Case Study and Recommendations
FIDO UAF and PKI in Asia: A Case Study and RecommendationsFIDO UAF and PKI in Asia: A Case Study and Recommendations
FIDO UAF and PKI in Asia: A Case Study and Recommendations
 
Expected Use Cases of FIDO Authentication in Social Apps
Expected Use Cases of FIDO Authentication in Social AppsExpected Use Cases of FIDO Authentication in Social Apps
Expected Use Cases of FIDO Authentication in Social Apps
 
Blockchain, Biometrics, and the Future of Financial Services
Blockchain, Biometrics, and the Future of Financial ServicesBlockchain, Biometrics, and the Future of Financial Services
Blockchain, Biometrics, and the Future of Financial Services
 
Technical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO Authentication
 
FIDO Authentication Technical Overview
FIDO Authentication Technical OverviewFIDO Authentication Technical Overview
FIDO Authentication Technical Overview
 
Implementing Trusted Endpoints in the Mobile World
Implementing Trusted Endpoints in the Mobile WorldImplementing Trusted Endpoints in the Mobile World
Implementing Trusted Endpoints in the Mobile World
 
Technical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO Authentication
 
Global Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationGlobal Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong Authentication
 

Viewers also liked

It's the wild west out there infographic
It's the wild west out there   infographicIt's the wild west out there   infographic
It's the wild west out there infographic
Yanivt
 
Epoint agro ppt
Epoint agro pptEpoint agro ppt
Epoint agro ppt
Yanivt
 
Cyber attacks september 2014
Cyber attacks september 2014Cyber attacks september 2014
Cyber attacks september 2014
Yanivt
 
JustAd
JustAdJustAd
JustAd
Yanivt
 
Fraudsters
FraudstersFraudsters
Fraudsters
Yanivt
 
Bio catch
Bio catchBio catch
Bio catch
Yanivt
 
5 Critical Steps to Handling a Security Breach
5 Critical Steps to Handling a Security Breach5 Critical Steps to Handling a Security Breach
5 Critical Steps to Handling a Security Breach
Seculert
 
Vlvj corp ppt
Vlvj corp pptVlvj corp ppt
Vlvj corp ppt
YanivTaieb
 
ECI Telecom: NPT for PTN
ECI Telecom: NPT for PTNECI Telecom: NPT for PTN
ECI Telecom: NPT for PTN
Yanivt
 

Viewers also liked (9)

It's the wild west out there infographic
It's the wild west out there   infographicIt's the wild west out there   infographic
It's the wild west out there infographic
 
Epoint agro ppt
Epoint agro pptEpoint agro ppt
Epoint agro ppt
 
Cyber attacks september 2014
Cyber attacks september 2014Cyber attacks september 2014
Cyber attacks september 2014
 
JustAd
JustAdJustAd
JustAd
 
Fraudsters
FraudstersFraudsters
Fraudsters
 
Bio catch
Bio catchBio catch
Bio catch
 
5 Critical Steps to Handling a Security Breach
5 Critical Steps to Handling a Security Breach5 Critical Steps to Handling a Security Breach
5 Critical Steps to Handling a Security Breach
 
Vlvj corp ppt
Vlvj corp pptVlvj corp ppt
Vlvj corp ppt
 
ECI Telecom: NPT for PTN
ECI Telecom: NPT for PTNECI Telecom: NPT for PTN
ECI Telecom: NPT for PTN
 

Similar to FST Biometrics Corporate Presentation

Biometrics - The Key for Effective, Secure & Smart Identification
Biometrics - The Key for Effective, Secure & Smart IdentificationBiometrics - The Key for Effective, Secure & Smart Identification
Biometrics - The Key for Effective, Secure & Smart Identification
IDEX ASA
 
Internet of Everything: Retail’s Future
Internet of Everything: Retail’s FutureInternet of Everything: Retail’s Future
Internet of Everything: Retail’s Future
Cisco Services
 
Asset management solution - IT asset management system 2023
Asset management solution - IT asset management system 2023Asset management solution - IT asset management system 2023
Asset management solution - IT asset management system 2023
RSFirst By Ruddersoft
 
SmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication marketSmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication market
OKsystem
 
SmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologySmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technology
OKsystem
 
Dolphin RFID Pvt. Ltd. Profile
Dolphin RFID Pvt. Ltd. ProfileDolphin RFID Pvt. Ltd. Profile
Dolphin RFID Pvt. Ltd. Profile
nileshirathod
 
Cyber Six: Managing Security in Internet
Cyber Six: Managing Security in InternetCyber Six: Managing Security in Internet
Cyber Six: Managing Security in Internet
Richardus Indrajit
 
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CloudIDSummit
 
BRIEFING ON THE UAE NATIONAL ID CARD PROJECT
BRIEFING ON THE UAE NATIONAL ID CARD PROJECTBRIEFING ON THE UAE NATIONAL ID CARD PROJECT
BRIEFING ON THE UAE NATIONAL ID CARD PROJECT
Arab Federation for Digital Economy
 
Sxsw ppt voice-1
Sxsw ppt voice-1Sxsw ppt voice-1
Sxsw ppt voice-1
Dan Miller
 
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
Andris Soroka
 
IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014
Bessie Wang
 
Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021
Amrit Chhetri
 
FIDO® for Government & Enterprise - Presentation
FIDO® for Government & Enterprise - PresentationFIDO® for Government & Enterprise - Presentation
FIDO® for Government & Enterprise - Presentation
FIDO Alliance
 
Mobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantMobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistant
Vladimir Jirasek
 
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...FIDO Webinar – A New Model for Online Authentication: Implications for Policy...
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...
FIDO Alliance
 
White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarket
Finite Moments
 
An Identity Crisis at the Center of Every IoT Product
An Identity Crisis at the Center of Every IoT ProductAn Identity Crisis at the Center of Every IoT Product
An Identity Crisis at the Center of Every IoT Product
Salesforce Developers
 
IDC, the third platform and a security perspective Latam, Cisco Live 2014
IDC, the third platform and a security perspective Latam, Cisco Live 2014IDC, the third platform and a security perspective Latam, Cisco Live 2014
IDC, the third platform and a security perspective Latam, Cisco Live 2014
Felipe Lamus
 
The Future is Flying Cars and Digital Driver's Licenses on Our Phones - Scott...
The Future is Flying Cars and Digital Driver's Licenses on Our Phones - Scott...The Future is Flying Cars and Digital Driver's Licenses on Our Phones - Scott...
The Future is Flying Cars and Digital Driver's Licenses on Our Phones - Scott...
IdentityNorthEvents
 

Similar to FST Biometrics Corporate Presentation (20)

Biometrics - The Key for Effective, Secure & Smart Identification
Biometrics - The Key for Effective, Secure & Smart IdentificationBiometrics - The Key for Effective, Secure & Smart Identification
Biometrics - The Key for Effective, Secure & Smart Identification
 
Internet of Everything: Retail’s Future
Internet of Everything: Retail’s FutureInternet of Everything: Retail’s Future
Internet of Everything: Retail’s Future
 
Asset management solution - IT asset management system 2023
Asset management solution - IT asset management system 2023Asset management solution - IT asset management system 2023
Asset management solution - IT asset management system 2023
 
SmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication marketSmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication market
 
SmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologySmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technology
 
Dolphin RFID Pvt. Ltd. Profile
Dolphin RFID Pvt. Ltd. ProfileDolphin RFID Pvt. Ltd. Profile
Dolphin RFID Pvt. Ltd. Profile
 
Cyber Six: Managing Security in Internet
Cyber Six: Managing Security in InternetCyber Six: Managing Security in Internet
Cyber Six: Managing Security in Internet
 
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
 
BRIEFING ON THE UAE NATIONAL ID CARD PROJECT
BRIEFING ON THE UAE NATIONAL ID CARD PROJECTBRIEFING ON THE UAE NATIONAL ID CARD PROJECT
BRIEFING ON THE UAE NATIONAL ID CARD PROJECT
 
Sxsw ppt voice-1
Sxsw ppt voice-1Sxsw ppt voice-1
Sxsw ppt voice-1
 
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
 
IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014
 
Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021
 
FIDO® for Government & Enterprise - Presentation
FIDO® for Government & Enterprise - PresentationFIDO® for Government & Enterprise - Presentation
FIDO® for Government & Enterprise - Presentation
 
Mobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantMobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistant
 
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...FIDO Webinar – A New Model for Online Authentication: Implications for Policy...
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...
 
White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarket
 
An Identity Crisis at the Center of Every IoT Product
An Identity Crisis at the Center of Every IoT ProductAn Identity Crisis at the Center of Every IoT Product
An Identity Crisis at the Center of Every IoT Product
 
IDC, the third platform and a security perspective Latam, Cisco Live 2014
IDC, the third platform and a security perspective Latam, Cisco Live 2014IDC, the third platform and a security perspective Latam, Cisco Live 2014
IDC, the third platform and a security perspective Latam, Cisco Live 2014
 
The Future is Flying Cars and Digital Driver's Licenses on Our Phones - Scott...
The Future is Flying Cars and Digital Driver's Licenses on Our Phones - Scott...The Future is Flying Cars and Digital Driver's Licenses on Our Phones - Scott...
The Future is Flying Cars and Digital Driver's Licenses on Our Phones - Scott...
 

Recently uploaded

Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
NYGGS Automation Suite
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
Boni García
 
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
kalichargn70th171
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
Rakesh Kumar R
 
socradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdfsocradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdf
SOCRadar
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
mz5nrf0n
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Łukasz Chruściel
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptxLORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
lorraineandreiamcidl
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
Adele Miller
 
DDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systemsDDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systems
Gerardo Pardo-Castellote
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
Green Software Development
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
Remote DBA Services
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
Neo4j
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
TheSMSPoint
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
Sven Peters
 
E-commerce Application Development Company.pdf
E-commerce Application Development Company.pdfE-commerce Application Development Company.pdf
E-commerce Application Development Company.pdf
Hornet Dynamics
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
lorraineandreiamcidl
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
timtebeek1
 

Recently uploaded (20)

Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
 
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
 
socradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdfsocradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdf
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptxLORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
 
DDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systemsDDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systems
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
 
E-commerce Application Development Company.pdf
E-commerce Application Development Company.pdfE-commerce Application Development Company.pdf
E-commerce Application Development Company.pdf
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
 

FST Biometrics Corporate Presentation

  • 1. Security Investors Conference FST Biometrics Overview Yaron Zussman | December, 2014
  • 2. 2 Identity Timeline 15th Century ~1970 ~2010 2015
  • 3. Data Logging/ Data Search QR Code Face Recognition Behavior Analysis Voice Biometrics NFC/BLE 3 Analytical Fusion of Multiple Credentials
  • 4. x x * Identification of device/ card, not the holder 4 IMID Competitive Positioning Security level Seamlessness (Impact on pace) Intrusiveness RFID Card* IRIS Bluetooth & NFC * Fingerprints Fusion of FR and BB (IMID) a a a x a a x a a x a x a
  • 5. 5 Numbers Talk 427,852 106 Times IMID system have identified users within the last four weeks Sites are controlled by IMID system 6 Patents are protecting our intellectual property 0.0003 False accept rate
  • 6. 6 Global Trends: The Business landscape Urbanization Outcome Integrated Mobility Cloud SW – Enables globalization Smarter Cities
  • 7. The Future of Identity Solutions – In Motion IDentification (IMID) 7 Airports & Transportation Education Smart City Services Residential Corporate Financial Institutions Retail Government & Military
  • 8. Security Magazine Best New Product In Biometrics 2014 8 Market Acknowledgment | Awards Award Winning Products Best New Product In Access Control 2014 Most Innovative US Security Project 2013
  • 9. 9 Executive Bio Aharon Zeevi Farkash, Founder and CEO Led the Directorate of Military Intelligence (AMAN) and was responsible for providing critical national intelligence to the Israeli leadership Headed the prestigious Israel SIGINT National Unit (8200) Shahar Belkin, CTO Has over two decades of experience in developing new technologies and algorithms in the field of security Developed the first PC-based digital video recorders (DVR) Ofir Friedman, VP R&D Has 15 years of R&D experience in developing and managing software and hardware products Served in the IDF Technology Intelligence Corps General Info
  • 10. • We address an increasing need for In Motion Identification that keeps a normal pace of life • FST’s SW solution is already field proven in variety of verticals and use cases • We are looking for technology and business partners 10 Summary a a a
  • 11. THANK YOU yarons@fstbm.com www.fstbm.com 11