Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Wednesday, 29 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Biometric authentication: The identity of a modern enterprise

by The Gurus
May 31, 2016
in News, This Week's Gurus

1b752e65-bf89-4456-b84a-b1b418837d7e

Share on FacebookShare on Twitter

Biometric technologies that use a person’s fingerprints, voice, heartbeat or even gait (the way we walk) as methods of authentication have attracted a lot of attention here in the UK for some time now. These techniques are gaining traction as the primary form of authentication to protect devices, apps and data. Biometric authentication is already seeing rapid adoption within the consumer arena. For example, MasterCard and HSBC have recently announced the introduction of facial and voice recognition technology to authorise transactions. While Amazon has introduced ‘selfie’ recognition as a form of payment. However, when it comes to the corporate environment, biometric authentication has a long way to go in order to catch up to the level of adoption seen within the consumer realm today.
Whilst convenient, very few people realise the potential flaws behind the use of such methods. Fingerprint readers can easily become compromised by the likes of dirt or due to the nature of fingerprints themselves, which can become altered through blisters, cuts or burns. All of which can be a hindrance for organisations looking to include the authentication method as a single form of authentication. Rather biometric methods should be used as an additional layer of authentication as part of a wider Identity and Access Management (IAM) strategy.
By having an IAM strategy, organisations of all sizes are able to meet the security challenges of an increasingly connected and cloud-based business environment. IAM strategies also provide organisations with the ability to provide employees with a single-sign on service and, depending on the user provisioning, control employees’ access to sensitive information depending on their location.
Whilst embarking on their journey of digital transformation, organisations have found themselves faced with many challenges, particularly when reviewing IAM strategies. For biometric authentication to become mainstream in a business context, it assumes that all employees — not just some — have access to biometric readers. However, this is not a reality. Whilst we are now seeing devices enter the market with biometric recognition capabilities, there is still a considerable capital expenditure associated. This is exacerbated by the fact that a modern business has an increasingly remote workforce, who are either based at home or constantly on the move. Mobile workers present a wealth of additional challenges, as they often use a number of different devices, from desktops, to tablets, mobiles, wearable technologies and more, meaning authentication techniques must be universal and readily available on a whole host of different devices. With these challenges in mind, businesses looking to embrace biometrics as part of their digital transformation would need to ensure there are a number of different authentication methods available to employees. Not only would this increase the risk to the organisation, but would likely confuse staff.
Employees by nature avoid security methods that they find difficult and try to circumnavigate them. This puts the entire organisation at risk. To avoid this, organisations must embrace methods of Biometric authentication which are easy to use, non-invasive and non-threatening, no matter where employees are accessing the corporate network from.
If you’d like to hear more on this, be sure to visit OneLogin’s website or follow them on twitter.

FacebookTweetLinkedIn
Tags: AuthenticationBiometricbiometricsdetailsfingerprintgaitheartbeatHSBCIAMidentity and access managementlog inmastercardoneloginpasswordper stitchreaderssecurityselfiesign invoice
ShareTweetShare
Previous Post

ZCryptor ransomware spreads via removable drives

Next Post

Israeli researchers poke holes in Samsung KNOX security system

Recent News

Blue Logo OUTPOST24

New Research Examines Traffers and the Business of Stolen Credentials

March 28, 2023

How to Succeed As a New Chief Information Security Officer (CISO)

March 28, 2023

The Importance of Data Security and Privacy for Individuals and Businesses in the Digital Age

March 28, 2023
penetration testing

Cymulate’s 2022 Cybersecurity Effectiveness Report reveals that organizations are leaving common attack paths exposed

March 28, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information