BIOMETRIC TECHNOLOGIES TAKE US TO THE NEXT LEVEL - New Work Means New Security Challenges: Work has changed. Advances in mobility and connectivity have accelerated the evolution of the modern business, allowing new types of enterprises to emerge. Thanks to the ubiquity of smartphones, tablets, and other connected devices, the classic nine-to-five workday confined to the cubicles of an office space is no longer the norm.
The US Department of Defense uses Aware’s WebEnroll™ platform on 3,500 workstations for browser-based biometric enrollment and data management to make their background check system more secure and its maintenance more efficient. The U.S. Department of Defense workforce consists of 1.4 million men and women in uniform, and over 800,000 civilian personnel. The Defense [...]
Banks keep making banking easier, and that means cutting down on branch visits or eliminating them altogether by giving customers really great mobile apps. Perhaps more than any type of business, banking and financial services firms increasingly rely on the sophistication and ease-of-use of their mobile applications to attract new customers and keep them. They [...]
Biometrics have been primarily the business of governments for many years, which—for applications like law enforcement, defense, and border control—applied biometric search to “identify” people, essentially verifying their claimed identity.
Today, biometric sensors are ubiquitous, and millions of people are using biometrics many times each day for authentication. It’s now hard to remember a time when the association of biometrics with criminality was reflexive; a notion that collection of my fingerprints—let alone a mugshot— represents accusation and inherent mistrust. This is a powerful paradigm shift for the industry not only in terms of market potential but for the change in how consumers view biometrics [...]
Some form of identity theft is at the heart of most financially-motivated fraud. A proliferation of personally identifiable information (PII) available through social media and other public sources is easily accessible to aspiring fraudsters, while the anonymity of Internet commerce and communication gives them plenty of cover. Illicit call centers troll for private identity data [...]