The time may finally be right for biometrics I've been following biometrics and, specifically, fingerprint technology for a past 10-12 years. Each time I think it's about to take off, the sizzle turns to a fizzle once again. But now the time might be right. Not that biometrics are any more acceptable (even though they are), nor that the accuracy has improved (even though it has), but because the right application has come along. Biometrics: 3 Tips for Success Biometric security systems can, at first glance, seem futuristic. In some minds, they are still the stuff of science fiction. Biometrics are often criticized as being expensive and not practical in many business ... Biometrics make user authentication convenient and secure - at the same time! There’s usually an inverse relationship between enterprise security and end user convenience. When you tighten security, it often means more hoops for users to jump through – more complex passwords to remember, more sign-ons to endure, more tokens or cards to carry. That’s when you end up with passwords on Post-its, completely defeating your attempts at stronger security. Using smart cards vs. passwords for identification A recent Datamonitor survey showed that 62% of enterprises have experienced problems relating to passwords being shared, borrowed or stolen from within their organizations. The survey of 200 enterprises also found that ... Start-up measures users' trustworthiness for authentication into sites It never ceases to amaze me that as soon as I think some company is unique within a particular niche, another vendor comes along - sometimes three or four others - to occupy the same space. So it was that just after I submitted last week's newsletter about AdmitOne and its keystroke dynamics authentication method that I became aware of recent start-up Delfigo, which incorporates what it dubs "keyboard biometrics" into its multifactor authorization product. Authentication factors Last issue I talked about the Blues Cruise and how it was a good real world illustration of identity issues. While on the cruise we stopped at Roadtown on Tortola in the British West Indies (BWI). And while there I stopped into Pusser's bar for a "painkiller" (worked real good!). And, oddly enough, it reminded me of an upcoming event that should interest you. Validation, authorization: The next steps to identity management As someone pointed out to me last week, we're still spending an inordinate amount of time talking about authentication, and still trying to find a way to obviate the need for users to either memorize or write down lists of passwords and account names. Certainly that issue has come up in this newsletter a number of times over the past few weeks and months. The last word on federated provisioning...for now I'd thought we'd probably had the last word on federated provisioning, but a couple of old friends (and regular readers) had some more information which they've allowed me to share with you. Identity theft leads to murder Identity theft is getting truly nasty. In this case a woman who was apparently breaking into corporate accounts and stealing identities as well as dollars, was killed by three men who wanted her laptop and likely the cash stream the identity thefts were generating. Enter for a Microsoft training giveaway from New Horizons New Horizons Computer Training is offering a free Microsoft training course worth up to $2,500 to be given to one lucky Microsoft Subnet reader. Deadline for entry is March 31. Network World on Twitter Get our tweets and stay plugged in to networking news. |
No comments:
Post a Comment