Webinar : physical credentials
Webinar to understand how to secure your physical credentials: identifying needs and risks, technology selection, encoding, and compliance
Webinar : the role of Certifications in Modern Security
Webinar provided by SPAC Alliance and Genetec concerning Certification under NIS 2 & CER directives and the Cyber Resilience Act
IBM Cost of a Data Breach 2025 Report
The IBM Cost of a Data Breach 2025 report shows that about 9% of breaches stem from physical failures on average since 2020.
Biometric authentication for gyms
SSCP simplifies and secures gym access through biometric member authentication respecting GDPR and protecting revenue
Connected payment on a beer dispenser with SSCP
SSCP and DESFire help secure and simplify payments on a beer dispenser, ensuring user-friendliness and profitability
Access Management in Offline Solutions
SSCP enables offline access management through the updating of encoded badges on standalone locks using the standard OSS format
Scalable Access Management Based on Time Schedules
SSCP V2 enables simple access management based on time schedules (identification and biometric authentication)
Securing Badge Printing and Encoding
SSCP Protocol secures the printing and encoding of physical badges, ensuring data protection from the very start of the security chain.
Autonomous Visitor Management with Biometric Enrollment
SSCP allows for autonomous enrollment, including biometric data collection, by visitors, while ensuring compliance with GDPR.
Security through Badge Migration with DESFire and SSCP
How to migrate from 125 kHz physical badges to DESFire using SSCP without interrupting your access control solution?
Securing visitor access in prisons with SSCP
The SSCP protocol secures visitors access in prisons, including at the exit, and neutralizes the risks associated with the loss or theft of badges.
Emergency evacuation with SSCP – Use Case
Thanks to the SSCP protocol, access management in emergencies is transformed. By combining speed, reliability, and adaptability, this solution offers optimal security and intuitive flow management, essential in critical environments
ENISA THREAT LANDSCAPE 2024
Download the ENISA guide concerning Cybethreat landscape for the last year. It xill gives you informations concerning ISO 27001
Biometric Data Injection Attack
This white paper helps to understand the threats and solutions concerning biometric recognition systems (deepfakes, images, or even custom-made masks)
Over 8 % of cyberattacks caused by physical failures
Since 2020, an average of 8.3% of data breaches have been caused by physical security failures. (IBM Cost of a Data Breach Report)
PUBLICATIONS