Identity Management and Mirobase: user case

A large insurance company, with a network of geographically distributed offices, faced a number of difficulties in the process of creating a security perimeter.

The main problem is the formation of stable links between information and physical security. Most often, such systems exist separately from each other and are not connected in any way.
In the process of investigating an information incident, the company must use a network of video cameras to identify the violator’s personality. Only a photo and video recording of the actions of a certain employee can guarantee to confirm or deny the fact of violation.

The introduction of video surveillance systems is associated with a number of difficulties. Firstly, you need to buy and install expensive equipment. And this is a significant cost of material and human resources. Secondly, it is necessary to allocate an employee who would be able to monitor the work of surveillance cameras during the working day. And, thirdly, in any emergency, you will need to study the recordings from the cameras retrospectively. This process significantly complicates and slows down the investigation.

In addition, in the case of geographically distributed teams, the system will have to be established in each specific region. Despite the fact that the study of video recordings can be carried out from the central office, the algorithm for placing cameras with the maximum coverage area, connection, and configuration will have to be performed for each office individually.

The problem was solved by the introduction of the Mirobase Software with a face recognition system from a webcam.

The technology is based on an already trained neural network and artificial intelligence. The main advantage is that the system does not need access to the Internet. All processes are carried out inside the network, without connecting to third-party servers. This not only reduces the risks, but also allows you to use the complex inside a closed perimeter.

In addition to identifying the employee at the entrance, the system records the presence of the employee at the workplace, determines the fact that someone else is using the computer and reports this to the security service. The biometric authorization function is available on any computer equipped with a webcam.

Thanks to the introduction of Mirobase the insurance company was able to change the logic of the investigation of incidents, increase the efficiency and speed of the process.

In the event of an emergency, the security service representative records the time of the incident and examines its details. Further, the face recognition system determines which employees violated the rules of corporate ethics and data protection. There are cases when unauthorized copying or access to the database is carried out not by the legitimate “owner” of the working PC, but by his colleague, using someone else’s username and password. Mirobase will record and prevent an emergency, and the report “Face Recognition” will establish who exactly performed the dangerous action.

It is enough for the security service representative to print out or save the reports of the complex in a document, attaching to them the data of the “Face Recognition” system that recorded the violator’s face and identified his personality.

Having received actual confirmation that a particular employee performed a potentially dangerous operation, having assessed the motives and level of risk, the chief needs just decide what further actions and sanctions could be. In the case of malicious intent on the part of an employee, for example, when trying to sell data to competitors or develop their business at the expense of the employer’s resources, business owners can use the reports of the complex as a justification for dismissal and evidence in the event of a lawsuit.

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published.