Police forces, first responders and national defense organizations are at the heart of a safe and productive society. These dedicated civil servants ensure the safety of citizens, enforce established laws and respond to emergency situations where they are continually putting their lives on the line for the benefit of those they serve. This is not for the faint of heart and requires an enormous amount of physical and mental strength. While in the field, when the stress levels can be at their highest, it is essential for these dedicated professionals to have the information they need to be able to do their job efficiently and safely. One of the key aspects of preforming their job, especially in emergency situations, is the ability to quickly connect to information resources without compromising the security of the network.
Protiva Defender Suite is designed to meet the rigorous requirements of these essential organizations. With a full portfolio of authentication technology, Protiva Defender Suite provides for all essential identity verification needs. This includes secure visual identity, controlled building access, and the ability to securely login to centralized computing networks. This solution has been proven in some of the most demanding security organizations in the world including the U.S. Department of Defense, UK Ministry of Defense, and multiple police forces around the world.
Access control is critical in law enforcement and in defending one's nation. Being able to control who gets access to what (data and systems) and where (physical buildings and security controlled areas) are essential functions. But at the heart of delivering this control is the ability to prove the rights of the person attempting to gain access. Legacy access control systems have required officers and military personnel to have either multiple devices for gaining access (i.e., proximity cards for building access) or remember complex username and password combinations.
Protiva Defender Suite provides a solution for addressing remote authentication and the need for building multiple functions based upon a single secure credential. For remote access, field officers can use a simple one-time password device to authenticate gaining secure access to the central network. When the need goes beyond simple remote access, Protiva Defender Suite combines functionality to provide a secure visual identity printed with the same security features used in many passports globally, the ability to embed leading physical access control technology (i.e., PROX, MIFARE®, NFC, etc), and incorporate a secure microcontroller with a cryptographic engine for secure logical access in a single identity platform. This ensures that no matter what needs to be accessed, whether buildings, data, or to secure networks, you can be assured only authorized users are being granted entry.
In the same way that Protiva Defender Suite secures access to buildings and data networks, it also provides protection for the identity of the user. This identity protection can be implemented in all three aspects of identity: the visual identification credential, used in conjunction with physical access systems and for logical access to data network. For visual identity, one of the main concerns is the fraudulent reproduction of a credential. Using the most sophisticated printing technology in the world, Protiva Defender Suite has the ability to deliver a secure credential, produced in one of 17 certified high security manufacturing facilities around the globe.
For physical and logical access, the security credential would be paired with the user's PIN to provide two- factor authentication. This step is not always required with physical access, as many systems simply rely on the presence of a provisioned credential, but for logical security this is absolutely essential. Protiva Defender Suite is integrated with leading network infrastructures (e.g., Microsoft) providers to allow for quick and easy implementation of logical security controls on data networks. By enabling this functionality, your users are assured only they are able to access the network using their credential. Combining something they have, a secure identity credential, with something they know, their PIN, provides strong or two-factor authentication into the network. For an added layer of protection, a biometric detail like a fingerprint could be added to or in place of the user's PIN.
As more aspects of our record keeping become dematerialized, there is a need to verify if a digital form is authentic and has not been tampered with. This is especially true in law enforcement and defense organizations where their reports often have significant consequences associated with written testimony. For this reason, it is essential that online identity be verified, especially when endorsing an online form or report. Leveraging the secure identity credential and the certificate stored in the device's hardened microcontroller, the credential holder can use their device with a PIN or biometric to digitally sign the report. This form of online identity verification is being accepted with the same level of credibility as a wet signature and will stand up to non-repudiation.