Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Do You Recognize That Face, or Finger?

March 1, 2008


In 2008, biometric technology will continue its influx into the mainstream as airports, financial institutions, corporations, healthcare organizations and governments continue to adopt them for access control. Biometric technology is becoming increasingly popular because it enhances security without complicating the access control process. A user simply presents his face or fingerprint in order to confirm he is who he claims to be. Biometric solutions are growing in popularity as they can easily combine with other authentication methods, such as smart cards, for multi-factor authentication.

Opportunities for Fingerprint Technology

Fingerprint technology, the most widely deployed and mature biometric technology, will continue to dominate in 2008. The wide-scale deployment of equipment with fingerprint sensors, such as access control readers and laptops, has driven down the cost of this fast and user-friendly technology. Fingerprint readers are also taking advantage of existing access control infrastructure and are starting to be used in conjunction with personal identification number (PIN) protocols, proximity cards, smart cards and tokens.

Fingerprint authentication is becoming an ideal option for network access control and again can be combined with other authentication credentials for multi-factor authentication. This is important as organizations continue to meet compliance regulations such as Sarbanes-Oxley, the Gramm-Leach-Bliley Act, the Health Insurance Portability and Accountability Act and the Payment Card Industry Standard. Common to all of these regulations is the need for strong authentication and access control, which fingerprint authentication can provide.

Fingerprint readers are also finding the way onto smaller mobile devices, such as smart phones and PDAs. As these devices continue to add functionality, a security risk arises since such devices are a gateway to confidential information. It’s becoming vital to secure them.

Increased Adoption of Face Recognition

The second most widely deployed biometric technology after fingerprint is face recognition technology, according to International Biometrics Group (IBG). IBG predicts the face recognition market will grow to over $1 billion in revenue by 2012. 3D face recognition technology will advance the commercial adoption of face verification and make headway in 2008.

3D face recognition technology will continue to gain traction for access control and is already being used by organizations with a high traffic volume to quickly, easily and securely authenticate users.

2D face recognition is used primarily by law enforcement officials to identify someone by comparing his or her 2D image against a large database of pictures. 3D face recognition, on the other hand, is designed primarily for verification – to confirm that someone is who he/she says he/she is. 3D face readers can also be used with PINs, access control cards and tokens for multi-factor authentication.

3D face recognition is as fast and accurate as fingerprint technology and is ideal in situations where workers’ hands are full or dirty, or where employees wear gloves.

2008 promises to be a big year for the biometric industry. With so much progress already, this will be the year when fingerprint readers and face recognition technologies become more visible and more widely adopted by mainstream users.  

About the Source
Security Magazine thanks Matthew Bogart, vice president of marketing at Bioscrypt Inc. Primary responsibilities include evaluating strategic partnerships, assessing possible mergers and acquisitions, conducting market research, and overseeing corporate governance, investor relations, industry analyst relations and public relations. E-mail him at matthew.bogart@bioscrypt.com

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Small businesses don't think cyberattacks are a threat

    Top targets for cybercriminals do not recognize they are at risk

    See More
  • SEC0619-Product9-slide_900px

    Identifies Faces that are Difficult to Recognize

    See More
  • PUBLISHER'S LETTER: Do Your Plans Face Political Risk?

    See More

Related Products

See More Products
  • 150 things.jpg

    Physical Security: 150 Things You Should Know 2nd Edition

  • CPTED.jpg

    CPTED and Traditional Security Countermeasures: 150 Things You Should Know

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing