Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity NewswireTechnologies & SolutionsSecurity Enterprise ServicesAccess ManagementIdentity ManagementPhysical Security

The new workplace imperative: Authenticate anywhere, access everywhere

By Kimberly Biddings
biometrics-freepik1170x658v8502.jpg

Image by vectorup_studio via Freepik

December 9, 2022

The nature of our working lives has changed dramatically in recent years. Long gone are the days of limiting ourselves to office spaces and desktop computers. With technology advancing and the pandemic pushing businesses to find new solutions for making remote work seamless, the ability to facilitate access around the globe has become paramount. With employees now able to work literally everywhere, the onus is on businesses to be able to grant secure information access anywhere.


But this presents a problem. How do companies allow employees on completely different networks in completely different locations have convenient access? The challenge of securely identifying a person becomes much greater when work can be done anywhere around the world.


Travel Outside the Fence

The summer of 2022 saw four straight months of travel exceeding pre-pandemic levels, and with everyone moving around so much, the need for flexible authentication is clear. While many organizations have implemented multi-factor authentication (MFA) strategies that rely on second authentication layers like one-time passwords (OTPs) sent to a user’s phone, they also assume that the user can receive those texts all the time. When traveling, for example, many employees might take the time on a long flight to get a little work done; however, they can’t receive an OTP in the air.


Hardware tokens are another option; however, employees can’t really be expected to have hardware tokens on them 24/7 for fear of them being misplaced or stolen. Travel creates a diverse set of use cases that show the need for flexible, secure methods for verifying the identity of someone on the other side of the screen.


Like using a credit card, many businesses have methods for identifying unusual behavior in their network. To reduce the risk of an attack, tools like geofencing are used as one method for gauging whether an action like logging into the network is being done by a friend or a foe. While this makes the network more secure, it also can create obstacles for traveling and remote employees. An attempted login from China may be threat actors, it may also be Steve from marketing checking his email while visiting Shanghai with his family.


High Risk Means High Security

This is where adaptive authentication comes in. Many companies use systems that analyze the risk of a login attempt based on different factors. Is the login coming from a known device? Is it coming at a strange time? Where in the world is the login attempt originating from? By gauging the risk of a login attempt, the system can request more stringent security measures for situations with greater risk. In order to best understand the effectiveness of these measures, businesses can look at extreme cases to see if their system can provide secure access from anywhere.


Take Zoe Stephens, the woman who was stranded on Tongo during the pandemic. And for the sake of this example, her laptop was lost in transit by the airline. How can a company confirm her identity if she attempts to login into their network from a public library in Tongo? This scenario would set off red flags for any security system.


Something You Are

The key here is the necessity to accurately verify the identity of a person. While some MFA methods rely on things that you have, like a laptop or hardware token, and some rely on things that you know, like a simple password, the company, in this instance, needs to be confident that they are not only verifying a device or a piece of knowledge but the person themselves. Some things are immutably us — our face, our fingerprints, palm prints, and our voice, which cannot be stolen by hackers and aren’t dependent on the device we are using. These biometric measurements can prove that we are whom we say we are in situations where everything else about the login process is abnormal.


With a centralized biometric system, it is possible to say with a higher degree of certainty that a user is whom they claim to be from anywhere in the world. By storing a biometric measurement centrally, the company can compare the thing that makes a person uniquely them to a template, like a lock and key. This can be used to prove that person’s identity across any device, from anywhere in the world.


Anticipating the Unknown

Companies must embrace the idea that work can be done from anywhere and that unusual use cases will occur. Just ask any of the people on the 116,000 flights which have already been canceled in 2022. There need to be ways to authenticate users in those risky cases with confidence. Centralized biometric systems provide a method for identity verification that is free from device dependency and secure even in high-risk login situations. Whether on the ground or in the air biometrics rely on the only thing that matters — the measurements that make you, you.


As post-pandemic business and personal travel ramps back up and hybrid and remote work remain the norm, now is a good time to take a hard look at how companies facilitate access for their users wherever they may be.


This article originally ran in Security, a twice-monthly security-focused eNewsletter for security end users, brought to you by Security magazine. Subscribe here.

KEYWORDS: biometric security biometrics identity (ID) management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Kimberly Biddings has more than 10 years of cybersecurity and identity and access management (IAM) market knowledge and experience, gained across multiple authentication and cybersecurity firms. As VP of Product at Bio-key International, Biddings is focused on driving growth. Biddings is a thought leader and advocate for evolving the way organizations and people approach cybersecurity.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • biometrics-freepik1170x658.jpg

    What makes an identity? 

    See More
  • Customer Service: The New Security Officer Imperative

    See More
  • Employer sitting with employee

    Preventing Workplace Violence: A Strategic Imperative for Today’s Organizations

    See More

Related Products

See More Products
  • Physical Security and Safety: A Field Guide for the Practitioner

  • The Complete Guide to Physical Security

  • The Database Hacker's Handboo

See More Products

Events

View AllSubmit An Event
  • February 20, 2025

    Ideological Tensions in the Workplace: Understanding and Mitigating Risks of Violence

    ON DEMAND: Organizations face evolving threats, including workplace violence stemming from ideological tensions, political polarization, economic disparities, and other factors.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing