Blog

Biometrics for Identity Proofing in the Private Sector

2019-01-10T13:47:57+00:00By |

Before an employer officially hires new personnel, security protocols typically require them to verify their applicant’s claimed identity. This process is known as “identity proofing”. It ensures that the identity information supplied by the applicant is truthful and accurate, answering the question, “who are you?” and in doing so, establishing them as a trusted employee. [...]

Using biometric authentication to elevate enterprise security

2018-12-18T15:51:51+00:00By |

Biometric authentication in the enterprise? It’s just a matter of time Mobile biometric authentication is officially here to stay. Most of today’s leading devices come with native biometric sensors, and virtually all have cameras, microphones and touchscreens that can be used for biometric authentication. Consumers have embraced this transformation; 86 percent have shown interest [...]

The Case for Multimodal Biometric Authentication in the Enterprise

2018-12-06T15:28:28+00:00By |

Identity verification has always been a cornerstone of enterprise security. Businesses must be able to create identities for each of their employees, and determine the extent of access granted to those identities across physical and digital assets. They also need to authenticate the identity of users each time they attempt to access an information system [...]

How Biometrics Enhance Multifactor Authentication in the Enterprise

2018-12-06T15:30:30+00:00By |

Passwords and PINs predate the first moon landing, yet we still rely on them to access personal and professional devices and applications. Why? They can, and often are intercepted and stolen. Every time we type a username and password combination into a website or application, we transfer that information over the internet. And so hackers create fake [...]

Aware lands among Enterprise Security Magazine’s Top Ten Multifactor Authentication Solution Providers for 2018

2018-03-19T18:38:42+00:00By |

Passwords were conceived for the computing systems of the 1960s; they are insecure and inconvenient for users of today’s Internet-centric computing environment. No matter what we do to shore up their effectiveness, hackers devise new ways to defeat them. Phishing, interception, knowledge-based guessing, brute-force attacks, and large-scale data breaches make authentication based solely on passwords unacceptably vulnerable.

White Paper   |   Mobile Biometric Authentication: Pros and Cons of Server and Device-Based

2018-01-22T11:27:54+00:00By |

Multiple biometric modalities for authentication can achieve higher biometric performance. Introduction: Biometrics use “inherent” factors (something the user is) to authenticate a user’s identity. Relative to knowledge- and possession-based authentication methods (something the user knows and something the user has), inherent authentication factors like biometrics are difficult to steal and spoof. We can’t easily tell when a fraudster uses a stolen password or mobile device, but with biometrics and liveness detection we can better detect when a fraudster is at work so that their access can be prevented.

The Future of Authentication is Already Here

2018-01-18T06:45:33+00:00By |

Introduction If you looked into your Magic 8-Ball and asked, “Will I ever be able to stop using passwords for authentication?” it would certainly reply: “Outlook good.” And the outlook is good considering biometrics are making authentication simpler and more secure than ever. Passwords have never looked so retro. But if you asked us the same question, [...]

The Future of Mobile Authentication: Multimodal Biometrics

2017-12-13T13:41:17+00:00By |

The Future of Mobile Authentication: Multimodal Biometrics - The vast majority of modern authentication implementations strive to maximize both security and convenience; that is, to: - Make it as difficult as possible for a fraudster to steal or spoof the rightful user’s authentication factors (e.g. device, password, token, biometric). - Avoid interference with access to the protected asset or service for the rightful user. - Dissuade the user from circumventing the intended security mechanisms.

The Future of Biometrics in Banking Is by the Books

2017-08-09T10:21:18+00:00By |

Financial institutions in the European Union have long acted as fintech beacons for the rest of the world. Case in point, the chip-and-PIN card technology that the U.S. only started rolling out in 2014 has been in use throughout the EU since the mid-2000s. Now the EU is preparing to take its next leap forward [...]

Mobile Biometric Security in Digital Banking

2017-07-25T15:40:37+00:00By |

The financial sector is doing a better job preventing cyber security breaches and fraud than other industries. According to a report from the Identity Theft Resource Center and CyberScout, the banking, credit, and financial sector experienced fewer data breaches in 2016 than any other sector. That doesn't mean banks are clear of threats. Financial institutions [...]