Skip to content

訊連科技FaceMe® AI臉部辨識引擎獲日本Bitkey公司採用 打造「Bitkey Platform」之零接觸刷臉門禁解決方案

AI臉部辨識技術領導廠商訊連科技(5203.TW)宣布,旗下FaceMe® AI臉部辨識引擎獲日本Bitkey公司(ビットキー社)採用,整合至Bitkey打造的「Bitkey platform」刷臉門禁解決決方案,可提供身分辨識、認證及特定區域進出管理等多樣化應用。該方案可應用於智慧住宅、智慧門禁等多種場域。

訊連科技FaceMe® AI臉部辨識引擎獲日本Bitkey公司採用 打造「Bitkey Platform」之零接觸刷臉門禁解決方案

Bitkey為2018年成立之日本新創公司,提供多樣化之智慧門鎖解決方案,可建置於智慧居家、智慧住宅、智慧門禁等多樣化場景。全新的「Bitkey platform」係針對智慧建築設計之解決方案,可透過非接觸性的臉部辨識進行身分認證及門禁。首個安裝案例為位於東京江東區的住宅大樓之智慧門鎖,居民可透過臉部辨識進行開鎖,省卻使用門禁卡、鑰匙的不便。

「於新一代的智慧住宅中,採用物聯網技術的門禁及保全系統是不可或缺的一環,而其中臉部辨識是此類建置最廣為應用的技術。」訊連科技黃肇雄執行長表示:「透過FaceMe®的臉部辨識技術,Bitkey開發的Bitkey platform可大幅提升智慧門禁的便利性及安全性。」

「Bitkey platform」的臉部辨識技術係採用訊連科技開發之FaceMe® AI臉部辨識引擎。FaceMe®可支援多種IoT/AIoT物聯網技術及平台,包含多種處理器(如:支援OpenVino™之Intel®處理器、ARM處理器)、AI視覺運算晶片(如: Intel® Moviduis)及IoT平台(如: nvidia Jetson™)。此外,FaceMe®可支援Windows/Linux/Android/iOS等多種作業系統。以IoT/AIoT物聯網應用來說,FaceMe®可運行於輕量化、低功耗之物聯網平台,可協助開發者快速於現行解決方案中導入臉部辨識功能。

About Version 2

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

關於CyberLink
訊連科技創立於1996年,擁有頂尖視訊與音訊技術的影音軟體公司,專精於數位影音軟體及多媒體串流應用解決方案產品研發,並以「抓準技術板塊,擴大全球行銷布局」的策略,深根台灣、佈局全球,展現亮麗的成績。訊連科技以先進的技術提供完美的高解析影音播放效果、以尖端的科技提供完整的高解析度擷取、編輯、製片及燒錄功能且完整支援各種高解析度影片及音訊格式。產品包括:「威力導演」、「PowerDVD」、「威力製片」、「威力酷燒」等。

GREYCORTEX MENDEL 3.6.1 NOW AVAILABLE

GREYCORTEX has released the latest version of its MENDEL network traffic analysis solution. Version 3.6.1 brings important  improvements and bug fixes.

ENHANCEMENTS

Improved Incident management

  • Added incident label management (custom labels)
  • Excluded false positive incidents by default
  • Possibility to add watchers from incident page form
  • Ability to change incident state
  • Changed PDF report title
  • Added time range into PDF report title page
  • Added new items into incident overview header in PDF report

Faster representation of event queries in the lightbox
Removed user information from managerial/security reports and emails
Reworked firewall plugins compatibility with PaloAlto
Added ability for no-reinstall recovery after motherboard replacement on DELL server

FIXED ISSUES

In general, our development team focused on improving user experience and reporting, as well as more improvements to user experience, system stability, and performance.

OFFICIAL MENDEL PRODUCT SUPPORT

Full-service support is provided for the versions 3.6.x and 3.5.x. Limited service support is provided for previous version 3.4.x. Versions 3.3.x and older are no longer supported, end-users with valid support and maintenance or active SW subscription can upgrade to the supported version(s).

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About GREYCORTEX
GREYCORTEX uses advanced artificial intelligence, machine learning, and data mining methods to help organizations make their IT operations secure and reliable.

MENDEL, GREYCORTEX’s network traffic analysis solution, helps corporations, governments, and the critical infrastructure sector protect their futures by detecting cyber threats to sensitive data, networks, trade secrets, and reputations, which other network security products miss.

MENDEL is based on 10 years of extensive academic research and is designed using the same technology which was successful in four US-based NIST Challenges.

Why It’s Important to Control What’s on Your Wireless Network at All Times


There is no doubt that your wireless network is a critical component of business operations. Strong wireless connectivity enhances productivity and flexibility, especially for organizations that have a Bring Your Own Device (BYOD) policy, IoT infrastructure components, contractors, guest users, and so forth. A wireless network is also inherently scalable, making it ideal for companies undergoing rapid growth. There are a number of daily usage scenarios, however, that can put your wireless network at risk.

Scenario 1: Rogue Devices
It’s inevitable…employees will bring their personal devices (smartphones, wearable watches, etc.) to the office, and a percentage of those will attempt to connect to your wireless network (some automatically). While they may only be connected briefly, they are nonetheless connected. If you can’t see them on the wireless network, you can’t control them – and that’s an unnecessary and avoidable risk to take.

Scenario 2: Guests
Occasionally, an employee might bring their kids to work. Kids being kids these days, they will likely want internet access to play a game or watch YouTube videos on their smartphones or tablets. If you’re lucky, they’ll simply rely on their cellular network to load this content, but if not…guess what? They will try to connect to the corporate wireless network. In this scenario, let’s hope you’ve set up some sort of accessible, internet-only, wireless network, designed to remain separate from the professional corporate network.

Scenario 3: Contractors
Many businesses hire contractors or consultancies to tackle specific projects. These individuals and groups will need network access for extended periods of time and will need to be granted access to company resources and sensitive, proprietary data. In this instance, you should be employing NAC across your wireless network in order to dictate and enforce the level of access these types of individuals receive based on internal policies.

How to Protect Your Wireless Network
Of course, these scenarios will mostly be harmless. Mostly. They could, however, serve as an additional attack surface against your network or a base-station from which to launch a wider DDOS attack. In the past few years, there have been several DDOS attacks on corporate networks via hacked IoT devices that were used as a springboard to dive into networks, such as the 2016 Dyn cyber-attack.

Considering all of these potential risks to your enterprise network, here are a few security focus points to keep your operations safe:

100% coverage and awareness of all access scenarios to your wireless network (via simplified 802.1x based authentication and authorization services). This way you will have full awareness of all connecting devices on your networks at all times.
Auto-segmentation – automatically push unmanaged/unwanted devices from your wireless network to a different network (e.g. internet-only). You should be able to automatically classify and place every device connecting to your network in its correct segment based on your own classification. The right technology affords micro-segmentation by diving deeper and fine-tuning the segmentation options in your internal network and offers automated actions to enforce it.
Immediate disconnect options – you should be able to remove devices from your wireless network, both automatically and manually, no matter where the devices are connecting from.
WiFi provides fast and reliable connectivity for employees and visitors and enhances productivity but if you do not know (or have technology that keeps track) of devices as they attempt to connect to your network, there is not much that you can do to stop it, or to make sure that they are connecting to a harmless section of it. Awareness combined with automated protective actions will allow you to effectively navigate all scenarios while at the same time handling a large number of wireless devices in the enterprise.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

訊連科技與利凌策略合作 打造採用FaceMe®的非接觸性智慧安防解決方案

20200728日,台北訊】 全球頂尖AI臉部辨識領導廠商訊連科技 (5203.TW) 與智慧安防解決方案領導廠商利凌企業合作,於利凌之NAV人臉辨識主機中導入FaceMe® AI臉部辨識引擎,打造集智慧安防、數據分析及即時示警之非接觸性智慧安控解決方案。

利凌(LILIN)為全球頂尖的IP 安全監控錄影產品製造商,提供IP網路攝影機、錄影主機及相關安防應用服務。透過與訊連的合作,利凌於旗下NAV人臉辨識主機中導入訊連開發的FaceMe® AI臉部辨識引擎,提供用戶各式非接觸的智慧安防解決方案。於辦公室、工廠、住宅等場景中,即時確認進出人員身分及管控進出人員權限。而於零售、服務業,則可透過分析來客於特定活動、場域之即時情緒反應,進行資料分析及優化消費體驗。

全球新冠肺炎疫情尚未趨緩,訊連科技與利凌共同打造之解決方案,具備臉部辨識非接觸辨識之優勢,可取代傳統磁卡及輸入密碼,降低病毒透過接觸物體表面傳播的風險。

「智慧安防是近年AIoT應用的重要領域,而臉部辨識已成為智慧安防產業不可或缺的創新技術。」訊連科技黃肇雄執行長表示:「利凌為全球AIoT智慧安防的領導廠商,而訊連是國際頂尖臉部辨識開發商。透過本次合作,我們可將安全、可靠、高效的臉部辨識應用導入至各式智慧安防應用場景。」

「利凌企業深耕智慧安防產業多年,根據市場需求提供不同解決方案。此次非常榮幸與訊連科技合作,將FaceMe®整合至利凌之臉部辨識系統,精準應用於智慧零售、醫院工廠及其他工業場域。」利凌企業董事長許正忠表示:「未來利凌企業也將持續精益求精,為全球客戶帶來最優質的智慧安防解決方案。」

訊連與利凌將於2020年8月13日14:00 – 15:00共同舉辦「Facial Recognition x Smart Security – Empowering Smart AIoT Applications 線上研討會,介紹雙方合作優勢,及如何於各式安防應用中使用臉部辨識。更多詳細資訊及活動報名請上活動官網 (本研討會以英文進行) : https://is.gd/SfXQ7l

About Version 2

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

關於CyberLink
訊連科技創立於1996年,擁有頂尖視訊與音訊技術的影音軟體公司,專精於數位影音軟體及多媒體串流應用解決方案產品研發,並以「抓準技術板塊,擴大全球行銷布局」的策略,深根台灣、佈局全球,展現亮麗的成績。訊連科技以先進的技術提供完美的高解析影音播放效果、以尖端的科技提供完整的高解析度擷取、編輯、製片及燒錄功能且完整支援各種高解析度影片及音訊格式。產品包括:「威力導演」、「PowerDVD」、「威力製片」、「威力酷燒」等。

ESET earns high scores across AV-Comparatives H1 Business Security Test 2020

BRATISLAVA – ESET, a global leader in cybersecurity, has earned high scores for its Endpoint Protection Advanced Cloud in the AV-Comparatives H1 Business Security Test 2020. AV-Comparatives, a leading independent testing organization, uses one of the largest collections of malware samples worldwide to create a real-world environment for highly accurate testing. In the report, a series of Real-World Protection, Malware Protection and Performance Tests were used to rate 19 vendors.

“If we weight and sum the positions achieved in all the particular tests, and take the resulting number as an indicator of the overall result, ESET performed the best by a large margin,” comments Jiří Kropáč, head of threat detection labs at ESET.

Real-World Protection Test
The AV-Comparatives Real-World Protection Test mimics online malware attacks that a typical business user might encounter when surfing the Internet. In its most recent edition, this test consisted of 767 test cases comprising URLs pointing directly to malware executables. The number of missed samples ranged from zero to 27, with six being the average number of misses, and the number of false alarms ranged from zero to 41. ESET Endpoint Protection Advanced Cloud & Cloud Administrator detected all but three cases and generated no false alarms.

Malware Protection Test
The Malware Protection Test considers the scenario in which the malware pre-exists on the disk or enters the test system via some other route rather than directly from the internet. In this test, ESET belonged to the group of four vendors with a 99.9% malware protection rate, the second-best score in the test, and again scored no false alarms.

Performance Test
The Performance Test ran under the recognized PC Mark benchmark, where the test machine, without any security software installed, was assigned a PC Mark score of 100 points. The scores in this test ranged between 98.9 and 92.5 points. ESET Endpoint Security was the second most lightweight security solution with a score of 98.7 points.

False Positives

ESET scored zero False Positives across all tests. As the report notes, false positives can cause as much trouble as a real infection, and avoiding them is a crucial element of any antivirus product. AV-Comparatives carried out extensive false-positive testing as part of the Malware Protection Test and the Real-World Protection Test.

Commenting on the results, Jiří Kropáč, head of threat detection labs at ESET, said: “ESET’s recognition from AV-Comparatives is testament to our dedication to our customers and our promise to always deliver the best in IT security solutions. We’re proud of achieving great results across the tests. We believe this is due to the careful design and balancing of all parameters in our technology, providing a lightweight solution that minimizes false positives while still weighted heavily in protection. We are happy to see the approach taken at ESET succeed not only in the wild, but also in testing.”

Read AV-Comparatives Business Security Test 2020 (March – June) for more information.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×