Call us 

Discovering Identity and Access

Management Solutions

Tag Archives: Biometrics

Physical Access Control: Five Trends To Watch

Physical Access Control: Five Trends To Watch Each market segment faces its own distinct security challenges in 2015, whether it’s regulatory compliance for federal agencies and government ID applications, or budgetary issues in K-12 and higher education, or protecting facilities as well as user privacy in banking and healthcare applications. At the same time, all […]

Read More

IBM plans to broadly offer its Identity Mixer technology

IBM plans to broadly offer its Identity Mixer technology IBM said Wednesday that it will make technology called Identity Mixer, a cryptographic algorithm to better secure identities, available to developers via its BlueMix cloud platform. Identity Mixer’s technology uses an algorithm to encrypt personal data that’s verified—age, birthdates, address, credit card number etc.—and share only […]

Read More

Intelligence Driven IAM

With today’s cyber landscape, it’s essential that organizations take an Intelligence Driven approach to Security. At RSA, we’ve pioneered this approach. Intelligence Driven Security is an information security strategy that can help organizations like yours mitigate the risk of operating in a digital world by enabling you to detect, investigate, and respond to advanced threats; […]

Post Tagged with , ,
Read More

What you should consider when choosing a password manager

Many security experts feel that passwords are no longer sufficient to keep online accounts safe from hackers, but we’re still a long way from widespread adoption of biometrics and alternative methods of authentication. Most of us are stuck with using passwords as the primary keys to our online lives, so we should at least strive […]

Read More

ImageWare Signs Three-Year Agreement With Major International Retailer to Provide Multi-Modal Biometric Identity Management on the Fujitsu Cloud

ImageWare Systems, Inc., a leader in mobile and cloud-based, multi-modal biometric identity management solutions, has signed a three-year agreement with a major international retailer to provide its cloud-based, multi-modal biometric identity management product suite running on the Fujitsu Trusted S5 Cloud platform. Under the agreement, ImageWare’s IWS CloudID® product suite will use face, finger, iris […]

Read More

How your electronic DNA could be the secure login of the future

New research could allow our physical behaviour to be used as a secure way of logging in to our computers and smartphones, a team at the University of Oxford say, claiming that they can also detect when a person is drunk or has had sex. Researchers have identified that every individual creates a unique pattern […]

Read More

Can biometrics solve the identity management riddle?

Can biometrics solve the identity management riddle? The stuff of science-fiction already is a reality at some agencies, where the use of biometrics — think iris scans, palm prints, voice identification — is either in place or under development. But are biometrics the answer to the identity management problems the government is struggling to solve? […]

Read More

EyeLock Myris is a USB eye scanner offering security that’s unique to you

When it comes to unique passcodes, it doesn’t get much more secure that an eye scan. Thanks to EyeLock’s Myris, you’ll be able to create super complex passwords that you won’t have to remember — using a USB-powered add-on to authenticate your identity instead. Read more at Engadget- EyeLock Myris is a USB eye scanner […]

Read More

SyferLock Joins the Ping Identity Technology Alliance Program to Provide Software-Based Authentication for PingFederate Identity Bridge Software

SyferLock Technology Corporation (http://www.SyferLock.com) today announced that it has joined the Ping Identity Technology Alliance Program and has proven interoperability of SyferLock’s GridGuard™ enhanced single-factor, two-factor and multi-factor authentication solutions with PingFederate® identity bridge software. Together, Ping Identity and SyferLock provide stronger access controls to cloud, remote access and a range of other sensitive applications. […]

Read More

The evidence is growing, passwords are dead

In Greek mythology, Cassandra was the daughter of King Priam and Queen Hecuba of Troy. Her beauty caused Apollo to grant her the gift of prophecy. When Cassandra refused Apollo’s attempted seduction, he placed a curse on her so that her predictions and those of all her descendants would not be believed. In the understanding […]

Read More