The Princeton Identity IOM Access solution allows staff and residents with normal mental acuity to unlock exterior doors to exit the building by gazing into wall-mounted iris readers positioned near each exit, while restricting residents with dementia from opening the doors and leaving the building unsupervised.
While many biometric modalities have been tried at the ATM, fingerprint biometrics has become one of the most widely used, partly because of its long history, but more importantly for its ease of use, performance, interoperability, ability to thwart imposters and low cost.
Alaska Airlines just completed a test program that allowed passengers to use their fingerprints instead of government-issued IDs and boarding passes to drop off their bags, pass through the security checkpoint and board their planes.
Enterprises currently using proximity card readers, as well as those using smart card readers, can now add biometric authorization to their verification process without having to implement biometric readers.
Though biometric analytics have been around for a few years now, Apple and Samsung’s recent introduction of fingerprint readers to their newest mobile devices prove that biometric security systems are going to be more and more commonplace in the public sector. The research organization Goode Intelligence estimates that biometric authentication will be on most mobile devices by the end of 2015 and that by 2019, it will be used by 5.5 billion people worldwide. Familiarity with biometric analytics means ease of use for employees and consumers alike.
Single sign-on (SSO) is a biometric identification management system that allows end users the ability to provide their biometric credentials in place of a password, token, or personal identification number (PIN) as a secure method of system or database access.
Every month, the payment of pension checks to public retirees, one of Banco Supervielle’s most important customer segments, was a complex and tedious process because the recipients had to endure an extensive authentication process with various documents and certificates.
This month, Security magazine brings you the Security 500 Report, Rankings and Thought Leader Profiles. How does your enterprise compare to others? Which security programs are leading the way? Also this month, we highlight artificial intelligence, ransomware attacks, vaping and cybersecurity regulations.