13 Nov 2022
Cyber Security logo

Cyber Security

Cyber Security

Data of public and private enterprises and individuals should be protected against risks on virtual environment. Secure access to these data should be provided a with a sustainable structure. STC provides extensive solutions
in a wide range in the area of cyber security, such as access control, identity control, attack detection, threat analysis, log management and correlation, detection of security threats and cyber intelligence.

Cyber Security Solutions

firewall
NETWORK AND INFRASTRUCTURE SECURITY
smartphone
APPLICATION SECURITY
server
DATA SECURITY
web-security
WEB SECURITY
route
END POINT SECURITY
message
SECURE MESSAGING and COMMUNICATION
verified
IDENTITY AND ACCESS MANAGEMENT
security
MOBILE SECURITY
cloud-computing
CLOUD SECURITY
 Cyber Security risk
INFORMATION SECURITY and RISK MANAGEMENT
data-processing
FRAUD AND PROCESS SECURITY
internet-of-things
IoT IoT means that the objects are connected to the Internet or a network and thanks to this connection, they stop being a simple object and share information about their own state, receive commands and direct their behavior and thus become smarter; thus, it aims to provide a world where devices become more autonomous.
blockchain Cyber Security
BLOCKCHAIN
hacker
CYBER ATTACK INTELLIGENCE SYSTEM

Services

  • THE FLEXIBILITY OF OPEN SOURCE AND THE POWER OF COMMERCIAL SOFTWARE
  • CYBER-SECURITY SERVICES
  • CYBER-SECURITY OPERATION CENTER (CSOC)
  • CYBER INTELLIGENCE SERVICE
  • MAINTENANCE AND SUPPORT SYSTEM
  • RED TEAM SERVICE AND CONSULTING PACKAGE
  • PenTest
  • TEST SERVICES
    • Vulnerability scanning services
    • Penetration testing services
    • External network penetration test
    • Internal network penetration test
    • Wireless network test
    • Website security audit
    • DDOS Test
    • Application Load and Stress Test
    • Inspection of Specially Written Applications
    • Social Engineering
    • GDPR Compliance
    • Awareness Trainings

CONSULTANCY

  • CYBER-SECURITY FRAMEWORK CONSULTANCY
  • SECURITY INSPECTIONS AND LEAKAGE TESTS
  • SECURE CODE DEVELOPMENT CONSULTANCY
  • INFORMATION SECURITY MANAGEMENT SYSTEM CONSULTANCY
  • SAFE PROCESS MANAGEMENT CONSULTANCY
  • COMPLIANCE CONSULTANCY WITH THE LAW ON PROTECTION OF PERSONAL DATA
  • EKS / SCADA SECURITY CONSULTANCY

Training

  • ARTIFICIAL INTELLIGENCE USAGE IN CYBER SECURITY
  • IDENTITY MANAGEMENT and ACCESS CONTROL SYSTEMS TRAINING
  • EDGE SECURITY TRAINING
  • CYBER-SECURITY PROGRAM
  • FORENSIC ANALYSIS
  • PENETRATION TEST
  • CYBER THREAT INTELLIGENCE ANALYSIS
  • IT AWARENESS TRAINING
  • LINUX OPERATING SYSTEMS SECURITY TRAININGS
  • BASIC CYBER DEFENSE TRAINING
  • WEB APPLICATION SECURITY TRAINING
  • SECURE SOFTWARE DEVELOPMENT
19 Oct 2021
logo_remourban

the smart URBAN transformation

Star Technology represent the smart URBAN transformation

About

A sustainable urban regeneration model leveraging the convergence of energy, mobility and ICT to transform European cities into Smart Cities
REMOURBAN main concept REMOURBAN

the smart URBAN transformation

Energy, transport and information and communication technologies (ICT) are key to achieve economical and societal benefits and improve citizens’ quality of life. They also represent most of the interrelations between people and technology. A big challenge to offer new interdisciplinary opportunities to make cities smarter is already open in the common area where energy production, distribution and use, mobility and transport, ICT work together and are intimately linked. REMOURBAN will implement large scale interventions and intense dissemination initiatives to demonstrate the potential of the urban regeneration model in the energy, mobility and ICT sectors. rbanRegenerationModel The project is fully aligned with the Smart Cities European strategy and involves three lighthouse cities and two follower cities.

LIGHTHOUSE CITIES

The first phase will consist in a large scale demonstration of the potential that offers the proposed model for urban regeneration to deploy integral actions in the areas where energy, mobility and ICT sectors are intimately linked.
In particular, the retrofitting of an existing district for reducing energy demand to very low values, improving the generation facilities and the supply of energy for a better use of the local resources (use of renewable) and higher efficiency (use of district scale system), in order to achieve low energy districts (renewable district heating and cooling, PV,CHP,… ), substitute a high number of conventional vehicles by clean vehicles, improving in parallel the associated infrastructures and the management (for instance electrical vehicles and charging infrastructure) and finally improving through ICT solutions the management of some of the city infrastructures, as the smart grids or the traffic management systems. A financial and feasibility plan has been developed in order to guarantee the investment and the return of them. The cities that are committing an intervention are Valladolid, Nottingham and Tepebasi/Eskisehir. These lighthouse cities also commit the deployment of a powerful monitoring system, in order to gather the necessary variables for the evaluation procedure that will be designed in a previous stage. Further that the technical actions, these interventions will include a relevant citizen engagement activity for maximizing the impact and achieve a wider validation. The large scale demonstrations are a part of very ambitious urban plans.
11 Oct 2021
Multimodal Biometrics

اجهزة حضور وانصراف

اجهزة حضور وانصراف

اجهزة بصمة وجه

 

مع هذة الاجهزه اصبحت عملية اداراة وتنظيم اوقات العمل سهلة للغاية بل يمكن ايضا حساب الاجور والمرتبات عن طريقها بكل دقة 

و تعد اجهزة البصمة من اهم ادوات المدير الناجح و اصحاب المشاريع للتحكم الكامل فى عملية الحضور و الانصراف الخاصة بالموظفين وتتوافر فى اجهزة الحضور و الانصراف امكانية عمل كلمة سر لمسؤل جهاز الحضور و الانصراف حتى لا يتم الدخول الى الجهاز من خلال اى شخص غير مفوض و التعديل فى عمليات الحضور و الانصراف للموظفين و امكانية اضافة اكثر من بصمة للموظف الواحد فى اى حال او اى ظرف طارق مثل اصابة الموظف وامكانية اضافة اكثر من 10000  موظف على نفس الجهاز حتى تناسب الشركات والهيئات الكبرى وايضا مساحة شاسعة لتسجيل عدد هائل من العمليات وتتميز بوجود شاشة الوان لاظهار بيانات الموظفين ومواعيد الدخول والخروج وحتى انها ايضا تنطق باللغة العربية والانجليزية لتوضيح عملية الدخول والخروج ويمكن من خلالها اضافة مواعيد استثنائية لعدد معين من الموظفين  وتحديد ايضا اوقات الماموريات وتنظيم الشيفتات وتحديد الاجر الاضافى  ولا داعى للقلق فهى تعمل اثناء انقطاع التيار الكهربائى لانها تحتوى على انظمة بطاريات مما يسمح لها بالعمل لمدة 6 ساعات فى حالة انقطاع التيار الكهربائى ويمكن من خلالها ربط اكثر من فرع فى نفس الوقت ويمكن ربطها بالشبكة الدخلية واستخراج التقارير وعمليات الدخول والخروج من خلال مخرج الشبكة او مخرج  usb , وتتميز بانها يمكنها اصدار اكثر من 10 انواع من التقارير وللمثال وليس الحصر ( تقرير مفصل لكل موظف – تقرير اجمالى لكل الموظفين – تقرير بالاجر الاضافى ) 

 ويتوافر لدينا احدث اجهزه للحضور والانصراف بالبصمه و بالعين و بالكارت ويوجد اجهزة بصمه العين والتي تعد من افضل اجهزه البصمه للتاكد من الهويه الشخصيه كما يتم التدريب على هذة الاجهزة وتركيبها من خلال مهندسين متخصصين

ويمكن التحكم فى االبصمة من خلال:-

ubio-x faceVisionPass

ويمكن دمج كل الطرق او بعضها فى الجهاز الواحد

يتوافر لدينا احدث اجهزة الحضور والانصراف بالبصمة والعين والكارت بأرخص سعر فى مصر

المميزات :                                                   

1_تستطيع ضبط مواعيد الموظفين

2_ تسهيل اجراءت تسجيل الحضور دون تلاعب او تاخير اواى تعطل

3_ايضا برامج الحضور الانصراف عربى وانجليزى بواجهة سهلة الاستخدام

4_تقليل الوقت فى العملية تمكين عشرة اشخاص واكثر بتسجيل بصمتهم فى دقيقة

5_تقسيم الشركة الى اقسام او ادارات واضافة الورديات ومواعيدها وحساب التاخيرات والانصراف المبكر

6_التوريد والتركيب على استخدام جهاز البصمة

7- تقديم الخدمة ما بعد البيع والدعم الفنى طوال فترة الضمان

8- توفير في جهاز حضور وانصراف امكانيه عمل كلمه سرلكل موظف

9-يمكن من خلالها ربط اكثر من فرع فى نفس الوقت ويمكن ربطها بالشبكه الداخليه واستخراج التقارير وعمليات الدخول والخروج

تقرير الدخول و الخروج اليومي 

لإظهار الدخول و الخروج والتأخير والغياب اليومى.

التقرير الشهري الإجمالى

لإظهار اجمالي ايام الشهر وايام الحضور و التأخير و الغياب والأجازات.

تقرير تفصيلي للموظف

لإظهار معلومات عن حاله الموظف من الدخول و الخروج و ساعات العمل و التأخير والغياب و الأجازات ويتم تصميم هذا التقرير حسب الطلب في شاشه تصميم التقارير.

تقرير الخلاصة اليومية لإظهار معلومات عن حاله الموظفين  و اظهار اجمالي عدد ( الموظفين و الدخول و الخروج و الغياب و المتأخرين و المجازين .. الخ ) مع نسبه الدخول على مستوي كل قسم ،ويتم تصميمه في شاشه تصميم التقارير.

وضع لوائح الدوام الخاصه بالعميل من خلال تحديد فترات وايام الأجازات الرسمية

يدعم النظام إمكانية إدخال عدد لا محدود من الفترات المقررة على الموظفين

مع طريقه تحديد الدخول و الخروج للموظف.

تهيئه النماذج المعتمدة لدى العميل

من خلال شاشة تصميم التقارير يمكن ترحيل الأجمالي الشهري لساعات

( الغياب – التأخير – الإضافي ) إلي نظام المرتبات  و الأجور

يمكن للمستخدم تحديد بدايه زمن بداية ونهاية زمن الدخول و الخروج خلال 24 ساعه

“يسعدنا اهتمامكم بمنتجات الشركة الاساسية ولكى نتمكن من التواصل معكم بشكل اسرع نرجو الاتصال على ارقام قسم المبيعات 01148009052 – 01149044332 – 01142954520 – 01150007381

ليه تجيب موظف يسجل الحضور والآنصراف وستار تكنولوجى تقدر توفرلك جهاز البصمه تخليك واثق ان التقارير بتطلع بدون اى غلط او لخبطه والدعم الفنى مجاانا ده غير مميزات تانيه كتير اتصل وانت اكيد الكسبان. 

ومن خدمتنا ايضا:-

 كاميرات مراقبة – اجهزة انذار الحريق  – انتركم – شبكات – بوابات امنية

وتقدر تتابعنا على الفيسبوك او تويتر او انستجرام وتابع كل ما هوجديد من فيديوهات من خلال قنوات التواصل الاجتماعى اللى موجودة على شمال الصفحة ومنها هتعرف كل العروض الجديدة 

مع ستار تكنولوجى خطوة بخطوة نحو التميز

07 Apr 2021
Open Supervised Device Protocol (OSDP)

Open Supervised Device Protocol (OSDP)

What is Open Supervised Device Protocol (OSDP)?

Open Supervised Device Protocol (OSDP) is a standard that has been developed by the Security Industry Association (SIA) in order to offer more secure access control communications. This protocol works across various types of readers, controllers (RBH), and software, and has been developed as a way to improve on issues of security that are often faced with other legacy systems.

In other words, the development of this protocol aimed to help implement, monitor and maintain a more stable and secure system of access control devices, which includes the use of advanced smart card technology applications and biometrics.

In addition to improved security, it improves interoperability between access control and security devices, through bi-directional communication. To retain its focus on security, it is constantly refined, with OSDP v2.1.7 currently gaining recognition as a standard by the American National Standards Institute (ANSI).

Manufacturers, like HID Global, Mercury and Cypress, are already using OSDP and it is recommended for use in government and other high-security settings, since the protocol meets all federal access control requirements, such as Public Key Infrastructure (PKI) for Federal Identity, Credential and Access Management (FICAM).

OSDP security standard to replace Wiegand for access control communication  - SecureIDNews

What is the wiring diagram for OSDP?

If you’re interested in having a more in-depth look at how it works, take a look at this OSDP protocol example diagram, which gives an insight into how to use it with existing Wiegand devices.

This includes how to connect both a Peripheral Device (PD) or Access Control Unit (ACU), or both. This OSDP wiring diagram pdf download also provides more information on Pin Designations, DIP Switch Settings, OSDP Default Parameters, Status LED Behavior, and Bench Testing.

Implementing OSDP

What is the OSDP Protocol?

The Open Supervised Device Protocol (OSDP) is a way of linking together access control devices and smart cards in a way that guarantees optimum security. Other legacy systems, while popular and easier to use, unfortunately, do not always offer the same level of security, and are vulnerable to tampering.

Using AES-128 encryption, and by constantly monitoring wiring, this protocol keeps an eye on all points within the system, to make sure that it protects against all threats. Other advanced functionality features include advanced user interfaces, with welcome messages and text prompts, and the use of 2 wires instead of 12+. The use of two wires, in this case, allows for multi-drop installation, supervised connections and scalability.

Implementing this is, therefore, crucial in ensuring that your access control system is up to date with all of the latest security system requirements.

What is the OSDP Protocol?

How Does OSDP Protocol Work?

The OSDP Protocol works through an audio-visual system, which integrates a user feedback mechanism to ensure an access control environment that is built for, and benefits, the user. Since encryption and authentication processes are already predefined, there is no need for guesswork, which takes a lot of stress and labor costs out of the equation. This also means that this protocol costs less to implement on devices already embedded in the system.

The main benefit of it is that it works across a range of devices and security solutions, regardless of the equipment manufacturer. This includes peripheral devices (PD’s), which include card readers, as well as other devices like secured access doors/gates and control panels (CP’s).

Internet Protocol (IP) environments can also use OSDP and it is recommended when Transmission Control Protocol/Internet Protocol TCP/IP, USB or other protocols are not available. OSDP over IP is currently in development and will be launched soon. This will ensure that the interoperability of this protocol extends even further.

Advantages over Wiegand

It has a number of advantages over Wiegand, such as:

  • It supports two-way communication between a reader and a controller. This means that a controller, a computer or an interface unit can connect with a reader and identify a malfunctioning device, manage LED indication or check a PIN-code that was entered.
  • Its connection is encrypted (OSDP supports high-end AES-128 encryption) and makes it much more secure than Wiegand and other common protocols.
  • OSDP is cheaper to install because it requires less cable. Also, this interface enables a reader to function even if it’s located 1200m away from the controller. In case with Wiegand, the distance between a reader and a controller rarely exceeds 152m.
  • It has a user-friendly interface and is easy to implement.
Open Supervised Device Protocol and Added Security - SPG Controls
08 Feb 2021
Idemia biometric devices

اجهزة بصمة وجه فرنسى

IDEMIA’s Top 4 Trends in Biometrics for 2020

IDEMIA’s Top 4 Trends in Biometrics for 2020

As the world leader in biometric solutions, Idemia Biometric devices explore the top four biometric

The full potential of biometrics is yet to unfold. The public and private sectors drive its growing usage. In our increasingly connected world, biometrics is set as one of the key enablers of its digital transformation. Today, the biometric industry’s central focus is to protect our identity and improve security for all of us.

1) Use of multi-biometric identification adds a further level of security

As the only form of Idemia Biometric devices that leaves a visible trace, our fingerprints were the first biometrics widely used for identity verification. Today, other biometrics such as face, iris, and DNA are commonly used as well. 2020 will see more and more solutions that offer multi-biometric identification. The combination of multiple types of biometrics enhances security and adds granularity. Depending on the nature of transaction or interaction, different levels of security might be needed. We can already unlock our smartphone with either our fingerprint or face, as this is a comparably less sensitive action. In contrast, mobile biometric devices using fingerprints and faces have, for example, been developed for law enforcement agencies, enabling officers to verify the identities of individuals while patrolling the streets. Another example is the national eID card in Nepal. Nepalese citizens can use their ID cards to interact with their bank, which is why both fingerprint and iris data are embedded into the card for maximum security. 2020 will see this trend growing.

2) Increased exposure of biometrics calls for top-notch technology to secure data

Today, public and private sectors alike face the challenge of achieving two aims simultaneously:
  1. Enhanced, convenient services in a digital world
  2. Prevention of identity theft when using these services
Biometrics is the safest way to verify one’s identity. With the assistance of advanced technologies, the verification of identities with biometrics is fast and easy. However, due to their increased usage, biometric data becomes ever more exposed. On top of this, the trend of storing data in the cloud increasingly includes even the most sensitive data. From startups to large multinationals, cloud computing has revolutionized the way many organizations store and interact with data. It facilitates easier data management, flow and sharing. Biometric data is arguably one of the most sensitive types of data that one can get hold of. 2020 will be all about developing ways to provide extremely tight cyber security to protect biometric data – in the cloud or wherever it might be stored, processed or shared. Three ways of securing data will ensure we can continue to benefit from convenient services and security at the same time, and feel confident in sharing our data:
  1. Secure multi-party computation. While securing data in rest and in transit is quite common, the trickiest part is to secure data that is being processed. Traditionally, the processing party had to be able to ‘see’ data to be able to work with it. The risk connected with this method is significantly reduced when the work of processing the data is shared between different parties. It means that there is not one central player processing all the open, vulnerable data, but several contributors. Only by breaching the data processed by each player would the data make sense to the malicious perpetrator. In 2020, we will see a much wider application of this methodology.
  2. Verifiable computing. For the security of biometric data, this is a very interesting trend in data processing, which will further develop in 2020. Verifiable computing means that one central entity can outsource the computing of data to another potentially unknown, not previously verified entity, while maintaining verifiable results. In the world of biometrics this could mean that we could do the matching of our own data to verify our identity, for example on our smartphone (i.e. the unknown, not verified entity), without anyone doubting the validity of the computing we have done. This would mean that we control our biometric data at all times and it would never leave our own device.
  3. Homomorphic encryption. Homomorphic encryption already protects data both at rest and in transit. However, the Holy Grail that we will see developing in 2020 is to apply this encryption technology also to data that is being processed. The goal is simple – to ensure the data processor cannot decipher or even understand the content that is being processed. It is a method of performing calculations on encrypted information, without decrypting it first. In 2020, we will see a movement towards standardizing homomorphic encryption on a worldwide level. The standard will give a boost towards the aim of using encrypted biometric data while computing. With this last step, end-to-end data privacy can be achieved, given that at no moment in time data is exposed without protection.

3) Wide-spread adoption of facial recognition technology

With high performance levels in terms of speed and accuracy, it is no wonder that we will see a wide adoption of facial recognition technology in 2020. Already over the last few years, many use cases have demonstrated how this technology brings convenience and security. It is one of the least intrusive biometric identification methods because it requires little behavioral adaptation. Today, facial recognition is already used to enable security and convenience. It is, for example, an important facilitator to manage the increasing number of travelers globally. In Europe, over 18 countries are using facial recognition, allowing 200 million passengers to cross borders using their face1. Banks have also started to deploy biometric-based systems, so users no longer need to visit branch offices when opening new bank accounts. They simply capture a picture of their ID and take a selfie. Liveness check functionalities permit the customer to prove who they are with a few movements of their head, ensuring a photo or video of them is not used to impersonate them2. As facial recognition continues to be widely implemented, what are some of the new use cases we should expect to see in 2020?
  1. Protection of public places with video analytics. Enhanced video analytics add intelligence to existing video surveillance. This technology will in 2020 play an increasingly important role in providing effective solutions to detect threats. Combined with efficient incident response platforms, video analytics enable the law enforcement community to react quickly when a person of interest is detected in a vulnerable area. The analytics provided can be compliant with the strictest data protection laws; detecting biometrics, i.e. face, is by far not their only capability. Next year, we expect to see this type of tool widely offered and therefore a sharp increase in its use.
  2. Facial recognition in new industries. While most use cases for facial recognition involve the public sector, many technically advanced industries are expected to implement facial recognition technology for security and convenience as well – like the automotive industry. In 2020, more and more proofs of concept will emerge enabling drivers to access their vehicles and start the engine by simply showing their face. Thanks to facial recognition, the vehicle will automatically adjust the temperature settings, move the seat precisely to fit physical characteristics and preferences and load personalized data, including music playlists and navigation settings into the infotainment system. Moreover, facial recognition replaces the need to look for physical keys (or mobile devices) to open a vehicle and drive away. This improves security by defeating “relay attacks”, where the signal from a car key is captured by the perpetrator within the vicinity of the car using a special device, and car hijacking attempts as the car can only be driven by recognized drivers.

4) Development of a regulatory and ethical framework for the use of facial recognition

Facial recognition technology offers significant problem-solving potential for both security- and convenience-related use cases. Yet as its use is based on monitoring people’s movements, this specific type of biometric data is particularly personal. Citizens have to keep control of their biometric data. They need to know how their data is used, how long it is saved and for what reason. To address unease, 2019 has already seen several attempts to develop regulatory and, arguably more importantly, ethical frameworks that define the way facial recognition technology should be used. IDEMIA expects this trend to grow in 2020, with national initiatives being escalated to a continental or even global level. As a leading provider in the industry, IDEMIA encourages the cooperation between governments, the private sector and providers of the technology to define a framework that allows all stakeholders and end-users to benefit from this technology while addressing the public’s concerns. Idemia Biometric devices اجهزة بصمة وجه فرنسى