Biometrics as a Convenience

Capoor, Sapna
December 2006
Security: Solutions for Enterprise Security Leaders;Dec2006, Vol. 43 Issue 12, p48
Trade Publication
The article focuses on the implementation and adoption of fingerprint-enabled biometric solutions in the business world. It specifically highlights the use of biometrics solutions for physical access control and PCI network security applications in the business. Voice verification biometric technologies is increasingly being used in the financial institutions. INSET: Banks Bank on 3D Biometrics.


Related Articles

  • 4 Ways to Improve Facility Security. Kempfer, Lisa M. // Material Handling Management;Mar2007, Vol. 62 Issue 3, p29 

    The article suggests several ways to improve security of factories and distribution centers. They include network security, keeping an electronic eye on assets, access control and security of containers. Several security technology that can be employed include biometric access-control and radio...

  • Group test: Biometric tools. Stephenson, Peter // SC Magazine: For IT Security Professionals (UK Edition);Oct2007, p64 

    The article introduces a series of articles that reviews several biometric tools and solutions that provide high-security access control to networks, personal computers and buildings. The biometric tools include the Bioscrypt VeriSoft, the Bioscrypt VisionAccess, the Bioscrypt V-Station, the...

  • SECURITY.  // Buildings;Apr2005 Buyer's Guide, p32 

    Presents a list of companies that provide security systems such as access control and remote monitoring. ADT Security Systems Inc.; Amano Cincinnati Inc.; Rangers Security Detectors Inc.; Detex Corp.

  • FUZZY SYSTEM TO AUTHENTICATE ASSISTED LIVING PATIENTS IN THEIR HOME ENVIRONMENT. Seetha Subramanian, Mohanavalli; Anand, Sheila // Journal of Computer Science;May2013, Vol. 9 Issue 5, p558 

    Patient identity verification is a critical requirement for a remote patient monitoring environment. The health of the patient is monitored and crucial medical decisions are taken based on the physiological data collected from the patient using sensors and sent to distant health care centers or...

  • Knowledge is Power. Martin, Jennifer // Security: Solutions for Enterprise Security Leaders;May2006, Vol. 43 Issue 5, p62 

    The article discusses the power of knowledge in the security systems industry. Education has become the deciding factor in every success or failure with evolution of technology and the ever-increasing demand of sophisticated security systems from end-users. One driver for education is the...

  • TECHNOLOGY UPDATE SECURITY.  // CRN;7/16/2007, Issue 1245, p24 

    The article focuses on Ingram Micro's Network Access Control (NAC), the solution to security risks posed by malware. According to the author, NAC can keep applications available, safeguard company data and ensure regulatory compliance. Moreover, NAC is a technology that protects against viruses,...

  • Endpoint security. Stephenson, Peter // SC Magazine: For IT Security Professionals (UK Edition);Nov/Dec2013, p28 

    The article discusses endpoint security which focuses on how data makes its way into and out of the endpoint. Endpoint security tools are said to be capable of protecting the device from malicious software (malware) and checking if the anti-malware protection can be accomplished successfully by...

  • Providing Security in Granting Agency Using Workflow CRBAC Model. Bahrami, Marzieh; Khayyambashi, Mohammad Reza; Ebrahimi, Seyed Ali Razavi // International Journal of Computer Science & Network Security;Nov2013, Vol. 13 Issue 11, p119 

    There have been many security solutions to secure representation in the work flow used in business processes and Grid Networks. Most of these solutions try to provide maximum security in workflow processes and most of them are used Role-Based Access Control model (RBAC). Capability Role-Base...

  • Can ACLs and NAC mix for security success? Snyder, Joel // NetworkWorld Asia;Jun2008, Vol. 4 Issue 5, p24 

    The article discusses the possibility of mixing the access control lists (ACL) and network access control (NAC) for security success. According to the article, the NAC envelope was pushed during the Interop with the decision that access control would be handled with a combination of ACLs and...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics