What we are all about.
Identity Management Consulting provides Subject Matter Expertise in support of acquisitions biometric solutions. Our services help customers prepare a strategy for the acquisition of biometric solutions. Our services also include:- Evaluation of existing systems and create GAP analysis to justify the requests funding for system upgrades
- Preparing procurement packages including technical and functional requirements
- Supporting evaluation of proposals
- Help oversee development and implementation activities
- Evaluate and oversee the transition from legacy system to new system
- Manage all stages of System Testing through Acceptance Testing
- Plan and support Configuration Management and Quality Assurance activities
Today’s rapidly evolving technological environment make it much more imperative to have a trusted advisor to provides relevant insights and delivers a combination of strategic vision, proven expertise and practical experience to empower you to you achieve your mission and to enhance the value of your business with technology.
Identity Management Consulting is created to help business and technology leaders design and implement advanced solutions in Identity Management and Biometric technology, with emphasis on governance, security, data management and data conversion, applications, compliance and integration.
By choosing Identity Management Consulting as a trusted advisor and a consultant, you ensure that your organization’s interest is protected and the implementation of your integrated systems is completed with at the level of excellence and distinction you expect. Identity Management Consulting work closely with you and your team, every step of the way empower your tem to perform with focus and excellence. We will work with you to address a multitude of biometric and Identity Management issues and the deployment of advanced and customized applications. Our goal is not to simply solve problems, but add significant value to your business.
The right experience:
- Extensive and proven knowledge in complex multi-modal biometric technologies
- Vast industry experience in working with existing and deploying new Identity Management solutions
- Deep information security and management experience to address customer-specific privacy concerns
- Extensive knowledge of biometric capture technology including various sensor technologies, image quality assessment, spoof detection, feature extraction, database enrollment, fusion and matching
Our consulting services cover the essential areas to help you leverage technology to address your business priorities:
Subject Matter Expertise- Offer end-to-end execution of Identity Management solutions
- Offer clients insight into the latest technology advances in the biometric industry
- Work with clients to identify the level of technology advancements that is best suited for the client’s environment to address their current wants and needs
- Coach clients on the course of requirements development process
- Compile requirements for the Automated Biometric Identification System to including existing functionality and interfaces, as well as expanded and enhanced features that should be required with the new system
- Collect, Analyze and validate requirements to including existing and new functionalities, expanded and enhanced features, and interfaces, performance, accuracy, Security Requirements and interface requirements
- Assessment and evaluating of costs and benefits
- Optimizing business processes
- Architecture and Design Services
- Protecting investments of legacy technology
- Program Management for successful implementation, with emphasis on:
- Schedule Management
- Risk Management
- Resources Management
- Cost Management
- Facilitation of open communication between customers, suppliers, and partners.
- Ensure compliance with corporate policy and regulation.
- Ensuring protection of security threats
- Provide Management and Business Development Services
- Develop Strategic business planning
- Develop Product strategy and execute go-to-market plans
Business Needs and Gap Analysis service are intended to refine the customer’s business requirements and documents to achieve optimum configurations and enhancements to the business process. Throughout the GAP Analysis processes, it’s critical to work closely with the customer and with the technology partners/providers to identify the right mix of technologies, products, tools and devices that may provide the best overall solution to the business environment, thus moving the customer from the present state to the optimized, improved and enhanced target state. In the process of completing GAP analysis between the existing (Legacy) system and the new System, critical requirements in the legacy system that can be categorized as “Must Keep” are clearly identified. The GAP analysis process will yield sufficient documentation on the Legacy System requirements to determine the status of each requirement. Legacy System requirements are categorized as follows:
- Requirements are still needed
- Requirements that need to be changed or improved, impact on requirements change to external interfaces must be identified
- Requirements that need to be removed
- Business development and Management Services
- Develop strategic business Planning
- Design of technology concepts
- Conduct Product Evaluation
- Develop Product strategy and execute go-to-market plans
- Develop technical requirements and comprehensive Request for Proposals for Automated Biometric solutions
-
-
Biometric System Testing: Testing devices and systems for performance metrics, throughput, durability, and compliance to biometric standards
-
-
Identity Product Design: Assisting in engineering and design considerations for form factor, accessibility, ruggedization, and performance of biometric capture devices
-
Biometric Expertise: Providing biometric subject matter expertise to product manufacturer’s to enhance their identity-enabled product line and assure that the appropriate security, privacy, convenience, and societal considerations have been made
-
Integration Support: Providing biometric identity technology integration support to enhance the security, accuracy, and integrity of various systems and processes
- GAP Analysis and Business Process Improvement Services
- Technical tender specifications
- Tendering Management
- Proposals evaluation process
- Assistance with contract negotiation
- Supporting project implementation
- Program implementation planning with emphasis on technical architecture design, costing and delivery
- Contingency and capacity planning
- Ensure full integration of all technical deliverables based on the specified architecture
- Ensure full compliance of all deliverables to industry standards
- Design of a secure document
- Determination & recommendation of suitable security features
- Oversee security and privacy provisions incorporated into enrolment application
- Specifying format of data stream to central card production facility
- Oversee testing, piloting and rollout of completed system
- Oversea transitioning from old to new solution
- Technology Assessment
- Product Management and Product Road map planning
- Corporate Organizational Planning
- Resource Planning
- Developing a clear picture of your organization’s current strengths, weaknesses and opportunities
- Creating a vision for where the organization wants to be in the next three to five years
- Developing an action plan to achieve the organization’s vision with clear direction as who will do what and by when
- Developing practical strategic growth plan, to include everything from a mission statement to scenario planning and financial forecasts.
White Paper
Biometric Solution Implementation The Planning and execution of Identity Management and biometric systems are critical elements to their successful implementation. Utilizing proven methodology to delivering complex systems requires close coordination with the customer and technology partners across all phases of project implementation. Our Implementation Services include:- Definition
- Business Needs
- Deliverables
- Project Boundaries
- Success Criteria
- Proposal
- Scope
- Milestones
- Budget
- Risks
- Team
- Detailed Planning
- Implementation Plan
- Training Plan
- Integrating Plan
- System Configuration Plan
- Testing Plan
- Budget
- Critical Path
- Execution
- Software and Hardware Installation
- Administrator Training
- User and Supervisor Training
- Testing of all Interfaces
- Functionality Testing
- Performance Testing
- Accuracy Testing
- Monitoring System Performance (Burn-in period)
- Making Adjustment
- Post Implementation Review
- Close-out
- Go Live
- Turnover to Operation and Management
- Dedicated and independent testing of all critical system components
- Creating Test Cases, scenarios and Test Procedures for testing the following:
-
- Applications
- Functions
- Systems Performance
- Load, Stress tests
- Failover
- Data backup
- Verify that the delivered system components (Hardware and Software) are fully compliant with the approved Bill of Materials (BOM).
- Accuracy Testing and calculation of False Acceptance Rate (FAR) and False Rejection Rate (FRR)
- Writing Testing Plan documents
- Biometric and Identity Management Systems must be highly secured
from both internal and external threats with different levels of
security and privileges. Our services include the validation of
security requirements to ensure that internal users are given the
appropriate level of security according to their role and function.
Also, system security will be validated against external threats to
ensure total system security. The security validation will include:
- Identifying all security features for all system
components, including:
- Security Specifications
- Security Classifications and Security Standards
- Security Architecture
- System Security Plan
- Identifying all security features for all system
components, including:
- Risk assessment to identify potential system vulnerability and identify a mitigation plan to offer the required level of protection.
- Response Time:
- Testing to ensure that all inquiries submitted transactions to the system are completed within the specified time.
- Testing to ensure that all enrollment transactions submitted to the system are completed within the specified time.
- Ensure that Performance Test take into account whether filtering is allowed. Test cases must ensure that system sizing and system resources are configured to address the system performance requirements.
- Ensure that the system is sized for the specified Peak Performance
- Ensure that the system is sized for the specified business hours. System sizing is configured differently for different business (operational hours in the day).
- Performance testing will take into account the size of the database specified in the RFP
- Different Types of Transactions (TOT) may have different Response Time requirements. Testing will ensure addressing specified requirements for all types of transactions (TOT).
- Performance Testing will take into account response time under less than optimum requirements. For example, the system may have one or more of the search engine CPU’s down. Our testing approach takes into account system performance under these conditions.
- Performance testing for fingerprint-capture workstations to ensure that a set of fingerprints is completed under a specified time.
- Performance testing for editing tenprints or latents under a specified time.
- Performance testing for the scanning of Tenprints or Latents under the specified time.
- Testing complex applications in an enterprise environment includes:
- AFIS applications
- AFIS performance and accuracy tests
- Stress load tests, functionality test
- Integration tests
-
- Requirements Analysis
- Test Plan Creation
- Creating Test Cases
- Defect Tracking
- Using a standard application lifecycle management tool.
- System Integration Testing
- Performance (Stress and Load) testing
- AFIS architecture and systems
- Security and Intrusion Testing
- Network Testing
- Middleware Application Testing
- Client Application Testing
- Device integration and data verification
- Performing Data Retrieval and Verification
- Tracking Testing Metrics
- Writing Testing Result Reports and recommendations
- Coordinating all System Acceptance Testing with the Client, vendors and suppliers
- Review of System Acceptance Test Plan(s). System Acceptance Test
Plan(s) must include:
- Master Software Test Plan(s).
- Test Cases and Test Scripts.
- Performance Testing Scenarios.
- Accuracy Testing Plan(s).
- System load and balance Test Plan(s).
- AFIS searches and matching Testing Scenarios.
- System Integration Testing Scenarios.
- Middleware Testing Scenarios.
- Failover Testing Scenarios.
- Client Application Testing Scenarios.
- Review of All supporting documentation, including
- System Requirement Specification(s)
- System Acceptance Test Plan(s)
-
Coordinating all System Acceptance Testing with the Client, vendors and suppliers
-
Review of System Acceptance Test Plan(s). System Acceptance Test Plan(s) must include:
-
Master Software Test Plan(s).
-
Test Cases and Test Scripts.
-
Performance Testing Scenarios.
-
Accuracy Testing Plan(s).
-
System load and balance Test Plan(s).
-
AFIS searches and matching Testing Scenarios.
-
System Integration Testing Scenarios.
-
Middleware Testing Scenarios.
-
Failover Testing Scenarios.
-
Client Application Testing Scenarios.
-
-
Review of All supporting documentation, including
-
System Requirement Specification(s)
-
System Acceptance Test Plan(s)
-