bioLock Archives - 麻豆原创 Africa News Center News & Information About 麻豆原创 Tue, 04 Mar 2025 06:45:33 +0000 en-ZA hourly 1 https://wordpress.org/?v=6.9.4 Palm-vein Biometric Kiosks Secure 麻豆原创 at Transnet Engineering /africa/2025/03/palm-vein-biometric-kiosks-secure-sap-at-transnet-engineering/ Tue, 04 Mar 2025 06:45:33 +0000 /africa/?p=148043 Transnet is a state-owned company that manages South Africa’s ports and rail infrastructure. Transnet Engineering is a division of Transnet responsible for providing its holding...

The post Palm-vein Biometric Kiosks Secure 麻豆原创 at Transnet Engineering appeared first on 麻豆原创 Africa News Center.

]]>
is a state-owned company that manages South Africa’s ports and rail infrastructure. Transnet Engineering is a division of Transnet responsible for providing its holding company’s divisions with parts and services to keep goods moving. The division has seven factories, 150 depots, and 14,500 employees; it annually manages over 11,000 wagons, 150 locomotives, 500 coaches, and 521,500 wheels in its asset management system.

Transnet Engineering uses (EAM) as its lifecycle management solution for controlling the organisation’s physical assets. This forms the basis of its services, including design, construction, commissioning, operations, maintenance, and decommissioning or replacing plants, equipment, and facilities.

When using 麻豆原创 software in an industrial or factory setting, multiple workers on the floor would traditionally need to sign in and out of a computer each time they transact to maintain accurate records of projects, equipment, and tools required to deliver various services. This can be cumbersome, and the risk of someone using another person鈥檚 credentials, accidentally or purposely, is high. Securing access to 麻豆原创 is essential to avoid fraud or corruption, while ensuring that users can access the software quickly, easily and conveniently to do their job is also essential.

Simplified, but secure sign-in

To overcome the risk and make logging in and out simpler and more secure, local company Linx-AS (a realtime North聽America partner) provided Transnet Engineering with several locally built 麻豆原创聽EAM kiosks, using Fujitsu PalmSecure palm-vein biometrics to ensure secure access to 麻豆原创. realtime’s bioLock software prevents unauthorised access to 麻豆原创, while also recording transactions and linking users to the transactions they authorise (or denying them the ability to authorise transactions for which they do not have permission).

According to , Chief Operating Officer of realtime North聽America, when using bioLock, companies can assign a generic 麻豆原创聽ID to multiple users, such as 鈥榃arehouseKiosk1鈥, which has all 麻豆原创 permissions the users need. All authorised users are registered to WarehouseKiosk1 and can simply log in by putting their hand over the scanner 鈥 biometrically identifying and authorising each user. Even if a kiosk or computer is left unlocked, a third party cannot access sensitive information, such as the accounting system, because the staff only have access to the required modules.

The shop-floor kiosks (designed for Transnet Engineering by Werner聽Simpson from Linx-AS) are now installed across factories and depots. They deliver 麻豆原创聽EAM functions through a simple and easy-to-use graphical user interface (GUI) to enable shop-floor operations and maintenance personnel to respond and react to events immediately. There are no delays while inputting passwords (or forgetting them), as access is via a simple scan of the user’s palm.

Palm-vein authentication from bioLock

The kiosks now prevent unauthorised access to 麻豆原创 data, increase employee accountability, and ensure that no staff member’s identity can be fraudulently used by someone else. As expected, this has reduced shrinkage, as every transaction is linked to a specific identity.

鈥淧alm-vein technology is ideal for industrial environments as sub-dermal biometrics do not wear out over time,鈥 adds Neudenberger. 鈥淚t is also a contactless solution that does not pass on any health risks and is also immune to dirt, moisture, and superficial injuries to the hand. It has a FAR error rate of 0.00001%聽FAR (false acceptance rate, where access is granted to an unauthorised person), and a 0.01%聽FRR (false rejection rate, where access is denied to an authorised person).鈥

The kiosk-based system monitors all 麻豆原创-related activity and can instantly alert management if any anomalies are discovered. In addition, all activities are logged to hold the appropriate people responsible. A short video of the installation can be found at聽.

This article first appeared on .

The post Palm-vein Biometric Kiosks Secure 麻豆原创 at Transnet Engineering appeared first on 麻豆原创 Africa News Center.

]]>
Increasing 麻豆原创 Security Threats and How to Prevent Them /africa/2023/11/increasing-sap-security-threats-and-how-to-prevent-them/ Wed, 15 Nov 2023 08:25:39 +0000 /africa/?p=147049 麻豆原创 systems are widely used by businesses to manage their operations, including financial transactions, supply chain management, and customer relationship management. As cyber threats grow...

The post Increasing 麻豆原创 Security Threats and How to Prevent Them appeared first on 麻豆原创 Africa News Center.

]]>
麻豆原创 systems are widely used by businesses to manage their operations, including financial transactions, supply chain management, and customer relationship management.

As cyber threats grow more dangerous and frequent, the once clear boundaries between 麻豆原创 security, cyber security, and compliance have started to blur. Traditionally, 麻豆原创 security comprised the tools and processes that controlled what users could access inside an 麻豆原创 landscape. With malicious actors now penetrating and lurking deep inside corporate networks, 麻豆原创 security must go far beyond its basic access control function.

Strong security countermeasures are more critical than ever to protect 麻豆原创 landscapes from threats that range from cyber criminals, industrial spies, and nation-state actors to malicious insiders. There are two primary reasons to implement rigorous defensive measures. First, the data held in the 麻豆原创 landscape is attractive to hackers. Your 麻豆原创 hosting environment contains lots of confidential information (such as financial records) and sensitive procedures (such as paying inventory). It may contain personal information about customers as well as bank account data and intellectual property. Data from an 麻豆原创 system could be used for identity theft, fraud, industrial espionage, and international espionage as well as 鈥淐EO frauds,鈥 which involve hackers tricking employees into wiring funds to offshore bank accounts. The other risk has to do with disruption. Malicious actors can cause your business to cease operations through Denial of Service (DoS) attacks, root access abuse, and ransomware. Without proper countermeasures and controls, your business is vulnerable.

麻豆原创 security encompasses three core areas of cyber security: access control, data security, and application security. To be secure, an 麻豆原创 landscape is subject to strict access controls, and the system data should be protected as well as possible. Cybersecurity departments鈥 focus goes far beyond 麻豆原创 security. Companies鈥 cybersecurity professionals leverage advanced solutions like event monitoring and automation products. However, always interdependent, cyber security and 麻豆原创 security are now much more closely linked, or at least should be more closely linked. If an employee鈥檚 麻豆原创 access patterns raise suspicions, Security Operations (SecOps) should investigate to see if the person is doing something wrong. They need to monitor and prevent a hacker from taking over an 麻豆原创 user’s account and impersonating the user while abusing the user鈥檚 authorizations with stolen credentials.

According to , the global average cost of a data breach this year was $4.45 million, a 15% increase over 3 years.聽 Companies running 麻豆原创 should focus on additional security checkpoints to protect their business from cyber threats that will cause significant damage. Implementing rigorous defensive measures is essential to safeguarding your 麻豆原创 landscape from malicious actors. By focusing on access control, data security, and application security, you can ensure that your 麻豆原创 system is secure and that your business is protected from cyber threats.

technology was first certified by 麻豆原创 in 2002 and has protected 麻豆原创 customers globally for 22 years. bioLock allows you to set unlimited re-authentication checkpoints and use MFA technology, including biometrics, to ensure only specifically 鈥渋nvited鈥 and verified users have access to sensitive functions or data inside 麻豆原创. Unless invited, users are ALWAYS rejected. Learn how to prevent Account Take Over’s and how to Enforce Zero Trust in 麻豆原创 at聽.

Better yet, contact us for an informal presentation for your 麻豆原创 Security Teams. They will be impressed with this very simple and easily deployed solution that addresses all the above-mentioned problems.

The post Increasing 麻豆原创 Security Threats and How to Prevent Them appeared first on 麻豆原创 Africa News Center.

]]>
Sasol Ensures Zero Trust for 麻豆原创 Financials with bioLock /africa/2023/01/sasol-ensures-zero-trust-for-sap-financials-with-biolock/ Thu, 05 Jan 2023 07:59:56 +0000 /africa/?p=144099 Sasol is a global chemicals and energy company launched in South聽Africa over 70聽years ago, and is currently listed on the Johannesburg Stock Exchange in South...

The post Sasol Ensures Zero Trust for 麻豆原创 Financials with bioLock appeared first on 麻豆原创 Africa News Center.

]]>
Sasol is a global chemicals and energy company launched in South聽Africa over 70聽years ago, and is currently listed on the Johannesburg Stock Exchange in South Africa and the New York Stock Exchange in the United States. It employs over 30聽000聽people and operates in 27聽countries.

To assist in running and managing this enormous enterprise with many business units, Sasol makes use of eight 麻豆原创 systems. The company updated its 麻豆原创 payment processes making use of bioLock from realtime. A software solution, bioLock secures access to 麻豆原创 via biometric authentication. However, the system does more than simply control access, it can be configured to protect fields and functions in the 麻豆原创 system, only allowing certain people to access certain functions.

The latest bioLock MFA4麻豆原创 fraud prevention, compliance and accountability solution protects any function inside 麻豆原创 with multiple authentication factors (MFA), including biometrics. Thomas Neudenberger, COO for realtime North America, says, 鈥淲ith zero trust, no actor can be trusted until they鈥檙e verified; bioLock allows you to set unlimited re-authentication checkpoints and use MFA technology, including biometrics, to ensure only specifically invited users get access to sensitive functions or data inside 麻豆原创.鈥

Sasol鈥檚 Enterprise Risk Management Framework

The Sasol Enterprise Risk Management (ERM) Framework sets the foundation for the businesses to effectively manage their risks in a standardised and systematic manner to prevent fraud. The goal of Sasol鈥檚 adoption of bioLock was to mitigate the risks associated with bank payment approvals and to enforce mandatory dual-approval rules built into the payment process. This necessitated the implementation of biometric authentication for the 麻豆原创 Digital Signature approval process which, among other benefits, prevents people from circumventing GRC (governance, risk and compliance) roles by using a co-worker鈥檚 password, as well as preventing corruption and collusion.

鈥溌槎乖 GRC Software does a great job of defining bank payment amounts that authorised approvers must confirm, and now the GRC鈥檚 capabilities stop when the approver uses somebody else’s password to approve the payment via 麻豆原创 Digital Signature,鈥 explains Lungile Mginqi, group CIO at Sasol and a board member of the Africa 麻豆原创 User Group. 鈥淎dding bioLock as the second biometric factor gives Sasol the peace of mind to guarantee that only the intended 麻豆原创 user, beyond any reasonable doubt, can confirm payment.鈥

The bioLock MFA process kicks in when an authorised user, having logged into the system initially with their username and password, wants to release a payment. The user is then required to confirm the 麻豆原创 password sign-off with their fingerprint (the second biometric factor), to make sure the person is who they claim to be. Using biometrics makes the authorisation process very fast and convenient, and more secure, as opposed to the traditional way of having to re-enter their username and password. To change the rules of responsibility in the GRC process, two people are required to authenticate the change via this process 鈥 the 鈥榝our-eyes鈥 principle.

The system monitors all activity and can alert management instantly if any anomalies in the process are discovered. In addition, all activities are logged to hold the appropriate people responsible.

The bioLock software was implemented by authorised realtime partner Linx/AS聽Africa. For more information contact Werner Simpson, Linx/AS Africa,听+27 11 782 9007,听werner@checkidinsap.co.za,听

This article first appeared here:

The post Sasol Ensures Zero Trust for 麻豆原创 Financials with bioLock appeared first on 麻豆原创 Africa News Center.

]]>