Countering evolving security threats is now easy
Security threats continue to evolve. Technology has also matured and counters this increased risk. Yet most organizations continue to use legacy access control credentialing technologies. This presents increased vulnerabilities and the threat requires modern technology solutions that meets this dynamic threat now and in the future. Existing credentials, readers and controllers must be integrated, since replacing everything is logistics and cost prohibitive.
How do you transition Casi-Rusco, AWID or HID prox to a modern secure reading technology? You need a supplier that has the know-how and expertise to analyze your existing access control credentialing system and create solutions to manage the required transition.
Move your access control system to the next Era, choose deister to help you create and manage the transition to an optimally secure credentialing system.
What would you like to do?
Next Generation Access Control Credentialing Systems
Easy and secure Management of your Access Control System
With deister engage futureproof security; best-in-class product quality made in Germany; and fully integrated management of your system and its security. We adhere to best practices for secure encryption, to widely reviewed open standards and data protection, and provide a new level of user convenience to employees and administrators. See benefits on the right side.
Our system design is a unique layered security approach using stringent best practices for data protection. deister uses only the current best open global standard technologies to offer the highest level of data and privacy protection such as Mifare DESFire EV1/2 (embodying AES) credentials and compliant readers; and OSDP2 as the protocol between reader and controller. Different options including smartframe, deBus and/or transparent reader mode offer additional security.
- Secure Key Management of your system’s encryption keys, giving you complete control over the system while enabling easy management of readers and credentials
- Mutual Authentification between the reader and the credential, providing best-in-class message integrity protection
- Open global standards that are regularly reviewed, checked and verified by official authorities (including NIST) to offer you the most effective level of security possible
- Proper implementation of technology and encryption embodied in a cohesive process design to avoid security breaches in the operation and management of your access control system
Smartframe® is a cryptographically protected data model for the secure storage of your user ID and further identity data. It is a portable ID that can be programmed on any credential, from ID cards, fobs or mobile credentials on your smartphone.
Transparent Reader Mode
Readers are, by necessity, placed in unsecure areas and offer an opportunity to break into the system. Take out all sensitive information and data from the reader; embed those functions into another device which is connected via an encrypted channel to the reader but located in a secure area, that is the cipher box®. The reader then works in transparent mode, it only channels through the credential’s encrypted data to the cipher box®, which decrypts the credential data and forwards the plain data to the controller. The reader no longer creates a vulnerability.
With deister you have the flexibility to select communication protocols and present a consistent interface to the access control reader. deBus is similar but a more secure option to OSDP and also works on a RS485 interface.
Your own Cipher Card, uniquely yours
The Cipher Card™ is a unique security concept that makes management of your Access Control System easy while maintaining the highest level of security. A simple card, the Cipher Card™, replaces unstable passwords or other cumbersome security measures.
The Cipher Card™ holds your system’s unique security data and enables authorization of readers and creation of identification media or smartcards. With your very own unique Cipher Card™ you remain independent of any supplier – even from us (what other technology supplier
provides you the means of establishing independence?) – and management and installation of your system becomes easy, fast, and totally protected from exposure of your critical encryption key(s). You possess full control over your system.
The choice is yours
Your Cipher Card™ will be individually created for you, and you have the following options.
You receive and manage your own Cipher Card™ yourself to enjoy maximum independence and control over your system.
Managed by deister
deister securely keeps your Cipher Card™ for you and conveniently manages the production of ID cards and the provisioning of readers..
Project Management and Consulting
We can support you and simplify your next step in a project like defining an employee card, choosing the best secure technology, do a technical review (Hardware, Software) or evaluate new business cases and opportunities.
deister’s long-standing expertise lowers your project risks significantly, no matter if you are a system operator, system supplier or enduser of a system.
Migrate and Integrate your existing system
The Legacy Connect Service by deister
Your Credential technology should ensure that your cards and readers are not the weakest link in the security chain. Unfortunately, decades-old credential technology is still in use in many organizations. But, contrary to popular opinion the transition to a modern technology does not have to be difficult nor impose a huge cost. We are true experts in RFID, having invented or co-invented many of today’s popular RFID standards and protocols such as Mifare, OSDP, Casi-Rusco, OSS and many more. That helps us to help you migrate from old technologies to a modern secure and cost-effective technology.
With our Legacy Connect Service we help you find the best cost-effective way to upgrade your access control system from where it is now to where you want it to be:
We consult with you to choose the best secure credential technology for your security profile and show you how to implement the processes of credential management and credential production properly to avoid security breaches.
Our Triple Technology™ readers support a seamless transition to a new credential technology where old credentials can either be updated on the go through our readers or exchanged during normal operation of your organization while old credentials are still being used in parallel.
The future is now. Integrate Mobile phones and use our trusted cloud services to make your access control system future proof. All our current reader and wireless readers offer Bluetooth connectivity and we offer retrofit adapters to enable existing readers to communicate via Bluetooth as well.
Our Infinity Readers™ are Triple Technology™ readers which can read up to 3 different reading technologies. Thus both card credentials and mobile credentials can be used with the same reader. Also Triple Technology™ supports the seamless transition from old to new technology without interrupting your daily operation. Infinity Readers™ may be the last readers you’ll ever need.