What we are all about.

Identity Management Consulting provides Subject Matter Expertise in support of acquisitions biometric solutions. Our services help customers prepare a strategy for the acquisition of biometric solutions. Our services also include:
  1. Evaluation of existing systems and create GAP analysis to justify the requests funding for system upgrades
  2. Preparing procurement packages including technical and functional requirements
  3. Supporting evaluation of proposals
  4. Help oversee development and implementation activities
  5. Evaluate and oversee the transition from legacy system to new system
  6. Manage all stages of System Testing through Acceptance Testing
  7. Plan and support Configuration Management and Quality Assurance activities

Today’s rapidly evolving technological environment make it much more imperative to have a trusted advisor to provides relevant insights and delivers a combination of strategic vision, proven expertise and practical experience to empower you to you achieve your mission and to enhance the value of your business with technology.

Identity Management Consulting is created to help business and technology leaders design and implement advanced solutions in Identity Management and Biometric technology, with emphasis on governance, security, data management and data conversion, applications, compliance and integration.

By choosing Identity Management Consulting as a trusted advisor and a consultant, you ensure that your organization’s interest is protected and the implementation of your integrated systems is completed with at the level of excellence and distinction you expect. Identity Management Consulting work closely with you and your team, every step of the way empower your tem to perform with focus and excellence. We will work with you to address a multitude of biometric and Identity Management issues and the deployment of advanced and customized applications. Our goal is not to simply solve problems, but add significant value to your business.

The right experience:

  • Extensive and proven knowledge in complex multi-modal biometric technologies
  • Vast industry experience in working with existing and deploying new Identity Management solutions
  • Deep information security and management experience to address customer-specific privacy concerns
  • Extensive knowledge of biometric capture technology including various sensor technologies, image quality assessment, spoof detection, feature extraction, database enrollment, fusion and matching

Our consulting services cover the essential areas to help you leverage technology to address your business priorities:

Subject Matter Expertise
  • Offer end-to-end execution of Identity Management solutions
  • Offer clients insight into the latest technology advances in the biometric industry
  • Work with clients to identify the level of technology advancements that is best suited for the client’s environment to address their current wants and needs
  • Coach clients on the course of requirements development process
  • Compile requirements for the Automated Biometric Identification System to including existing functionality and interfaces, as well as expanded and enhanced features that should be required with the new system
  • Collect, Analyze and validate requirements to including existing and new functionalities, expanded and enhanced features, and interfaces, performance, accuracy, Security Requirements and interface requirements
  • Assessment and evaluating of costs and benefits
  • Optimizing business processes
  • Architecture and Design Services
  • Protecting investments of legacy technology
  • Program Management for successful implementation, with emphasis on:
    • Schedule Management
    • Risk Management
    • Resources Management
    • Cost Management
  • Facilitation of open communication between customers, suppliers, and partners.
  • Ensure compliance with corporate policy and regulation.
  • Ensuring protection of security threats
Strategic Planning:
  • Provide Management and Business Development Services
  • Develop Strategic business planning
  • Develop Product strategy and execute go-to-market plans
GAP Analysis

Business Needs and Gap Analysis service are intended to refine the customer’s business requirements and documents to achieve optimum configurations and enhancements to the business process. Throughout the GAP Analysis processes, it’s critical to work closely with the customer and with the technology partners/providers to identify the right mix of technologies, products, tools and devices that may provide the best overall solution to the business environment, thus moving the customer from the present state to the optimized, improved and enhanced target state. In the process of completing GAP analysis between the existing (Legacy) system and the new System, critical requirements in the legacy system that can be categorized as “Must Keep” are clearly identified. The GAP analysis process will yield sufficient documentation on the Legacy System requirements to determine the status of each requirement. Legacy System requirements are categorized as follows:

  • Requirements are still needed
  • Requirements that need to be changed or improved, impact on requirements change to external interfaces must be identified
  • Requirements that need to be removed
Identity Management services Offering a suite of consulting and technical services makes Identity Management Consulting a unique choice to provide enterprise-wide identity management support. Our Consulting and Technical services include:
  • Business development and Management Services
  • Develop strategic business Planning
  • Design of technology concepts
  • Conduct Product Evaluation
  • Develop Product strategy and execute go-to-market plans
  • Develop technical requirements and comprehensive Request for Proposals for Automated Biometric solutions
Based on our deep understanding of identity-related technologies, we are well positioned to offer specialized services and expert consulting to our clients. Identity Management Consulting provides support, guidance and direction to businesses and organizations requiring assistance in implementing identity management and credentialing initiatives. Identity Management Applications
    • Biometric System Testing: Testing devices and systems for performance metrics, throughput, durability, and compliance to biometric standards

  • Identity Product Design: Assisting in engineering and design considerations for form factor, accessibility, ruggedization, and performance of biometric capture devices

  • Biometric Expertise: Providing biometric subject matter expertise to product manufacturer’s to enhance their identity-enabled product line and assure that the appropriate security, privacy, convenience, and societal considerations have been made

  • Integration Support: Providing biometric identity technology integration support to enhance the security, accuracy, and integrity of various systems and processes

Secure Documents Identity Management Consulting provides services to public and private entities to analyze the present situation and develop plans for the acquisition or upgrades ID Secure documents. We work closely with the customer from budgetary preparation, through development of business and technical requirements and procurement guidance and assistance. We help guide the customer through the various stages of the procurement process, which includes:
  • GAP Analysis and Business Process Improvement Services
  • Technical tender specifications
  • Tendering Management
  • Proposals evaluation process
  • Assistance with contract negotiation
  • Supporting project implementation
Identity Management Consulting offers Technical and Program Management to support the growing need for public and private sectors in the area of secure documents, biometrics and smart cards. Our services include: Program Management
  • Program implementation planning with emphasis on technical architecture design, costing and delivery
  • Contingency and capacity planning
  • Ensure full integration of all technical deliverables based on the specified architecture
  • Ensure full compliance of all deliverables to industry standards
Program Delivery
  • Design of a secure document
  • Determination & recommendation of suitable security features
  • Oversee security and privacy provisions incorporated into enrolment application
  • Specifying format of data stream to central card production facility
  • Oversee testing, piloting and rollout of completed system
  • Oversea transitioning from old to new solution
Business Strategy and Growth Planning
  • Technology Assessment
  • Product Management and Product Road map planning
  • Corporate Organizational Planning
  • Resource Planning
Create a road map for growth Assisting organizations with business strategy development including risk analysis, Return on Investment (ROI), and business use-cases. We help customers create a road map to guide them and reduce their risk as they grow their enterprise. The road map can help them find more growth opportunities and avoid common mistakes. We offer our biometric customers industry-proven Management and Business Development Services to help them better understand, plan, execute and grow their Business. We guide our customers through the process to clearly identify their own path to success through the following important basics:
  • Developing a clear picture of your organization’s current strengths, weaknesses and opportunities
  • Creating a vision for where the organization wants to be in the next three to five years
  • Developing an action plan to achieve the organization’s vision with clear direction as who will do what and by when
  • Developing practical strategic growth plan, to include everything from a mission statement to scenario planning and financial forecasts.

White Paper

Biometric Solution Implementation The Planning and execution of Identity Management and biometric systems are critical elements to their successful implementation. Utilizing proven methodology to delivering complex systems requires close coordination with the customer and technology partners across all phases of project implementation. Our Implementation Services include:
  • Definition
    • Business Needs
    • Deliverables
    • Project Boundaries
    • Success Criteria
  • Proposal
    • Scope
    • Milestones
    • Budget
    • Risks
    • Team
  • Detailed Planning
    • Implementation Plan
    • Training Plan
    • Integrating Plan
    • System Configuration Plan
    • Testing Plan
    • Budget
    • Critical Path
  • Execution
    • Software and Hardware Installation
    • Administrator Training
    • User and Supervisor Training
    • Testing of all Interfaces
    • Functionality Testing
    • Performance Testing
    • Accuracy Testing
    • Monitoring System Performance (Burn-in period)
    • Making Adjustment
    • Post Implementation Review
  • Close-out
    • Go Live
    • Turnover to Operation and Management
Validation of Requirements System Testing
  • Dedicated and independent testing of all critical system components
  • Creating Test Cases, scenarios and Test Procedures for testing the following:
    • Applications
    • Functions
    • Systems Performance
    • Load, Stress tests
    • Failover
    • Data backup
  • Verify that the delivered system components (Hardware and Software) are fully compliant with the approved Bill of Materials (BOM).
  • Accuracy Testing and calculation of False Acceptance Rate (FAR) and False Rejection Rate (FRR)
  • Writing Testing Plan documents
Security requirements
  1. Biometric and Identity Management Systems must be highly secured from both internal and external threats with different levels of security and privileges. Our services include the validation of security requirements to ensure that internal users are given the appropriate level of security according to their role and function. Also, system security will be validated against external threats to ensure total system security. The security validation will include:
    1. Identifying all security features for all system components, including:
      1. Security Specifications
      2. Security Classifications and Security Standards
      3. Security Architecture
      4. System Security Plan
  2. Risk assessment to identify potential system vulnerability and identify a mitigation plan to offer the required level of protection.
Performance requirements
  1. Response Time:
    1. Testing to ensure that all inquiries submitted transactions to the system are completed within the specified time.
    2. Testing to ensure that all enrollment transactions submitted to the system are completed within the specified time.
    3. Ensure that Performance Test take into account whether filtering is allowed. Test cases must ensure that system sizing and system resources are configured to address the system performance requirements.
    4. Ensure that the system is sized for the specified Peak Performance
    5. Ensure that the system is sized for the specified business hours. System sizing is configured differently for different business (operational hours in the day).
    6. Performance testing will take into account the size of the database specified in the RFP
    7. Different Types of Transactions (TOT) may have different Response Time requirements. Testing will ensure addressing specified requirements for all types of transactions (TOT).
  2. Performance Testing will take into account response time under less than optimum requirements. For example, the system may have one or more of the search engine CPU’s down. Our testing approach takes into account system performance under these conditions.
  3. Performance testing for fingerprint-capture workstations to ensure that a set of fingerprints is completed under a specified time.
  4. Performance testing for editing tenprints or latents under a specified time.
  5. Performance testing for the scanning of Tenprints or Latents under the specified time.
Application Testing
  1. Testing complex applications in an enterprise environment includes:
    1. AFIS applications
    2. AFIS performance and accuracy tests
    3. Stress load tests, functionality test
    4. Integration tests
Acceptance testing
    1. Requirements Analysis
    2. Test Plan Creation
    3. Creating Test Cases
    4. Defect Tracking
    5. Using a standard application lifecycle management tool.
    6. System Integration Testing
    7. Performance (Stress and Load) testing
    8. AFIS architecture and systems
    9. Security and Intrusion Testing
    10. Network Testing
    11. Middleware Application Testing
    12. Client Application Testing
    13. Device integration and data verification
    14. Performing Data Retrieval and Verification
    15. Tracking Testing Metrics
    16. Writing Testing Result Reports and recommendations
  1. Coordinating all System Acceptance Testing with the Client, vendors and suppliers
  2. Review of System Acceptance Test Plan(s). System Acceptance Test Plan(s) must include:
    1. Master Software Test Plan(s).
    2. Test Cases and Test Scripts.
    3. Performance Testing Scenarios.
    4. Accuracy Testing Plan(s).
    5. System load and balance Test Plan(s).
    6. AFIS searches and matching Testing Scenarios.
    7. System Integration Testing Scenarios.
    8. Middleware Testing Scenarios.
    9. Failover Testing Scenarios.
    10. Client Application Testing Scenarios.
  3. Review of All supporting documentation, including
    1. System Requirement Specification(s)
    2. System Acceptance Test Plan(s)
  4. Coordinating all System Acceptance Testing with the Client, vendors and suppliers

  5. Review of System Acceptance Test Plan(s). System Acceptance Test Plan(s) must include:

    1. Master Software Test Plan(s).

    2. Test Cases and Test Scripts.

    3. Performance Testing Scenarios.

    4. Accuracy Testing Plan(s).

    5. System load and balance Test Plan(s).

    6. AFIS searches and matching Testing Scenarios.

    7. System Integration Testing Scenarios.

    8. Middleware Testing Scenarios.

    9. Failover Testing Scenarios.

    10. Client Application Testing Scenarios.

  6. Review of All supporting documentation, including

    1. System Requirement Specification(s)

    2. System Acceptance Test Plan(s)