Biometrics as a Convenience

Capoor, Sapna
December 2006
Security: Solutions for Enterprise Security Leaders;Dec2006, Vol. 43 Issue 12, p48
Trade Publication
The article focuses on the implementation and adoption of fingerprint-enabled biometric solutions in the business world. It specifically highlights the use of biometrics solutions for physical access control and PCI network security applications in the business. Voice verification biometric technologies is increasingly being used in the financial institutions. INSET: Banks Bank on 3D Biometrics.


Related Articles

  • 4 Ways to Improve Facility Security. Kempfer, Lisa M. // Material Handling Management;Mar2007, Vol. 62 Issue 3, p29 

    The article suggests several ways to improve security of factories and distribution centers. They include network security, keeping an electronic eye on assets, access control and security of containers. Several security technology that can be employed include biometric access-control and radio...

  • Group test: Biometric tools. Stephenson, Peter // SC Magazine: For IT Security Professionals (UK Edition);Oct2007, p64 

    The article introduces a series of articles that reviews several biometric tools and solutions that provide high-security access control to networks, personal computers and buildings. The biometric tools include the Bioscrypt VeriSoft, the Bioscrypt VisionAccess, the Bioscrypt V-Station, the...

  • SECURITY.  // Buildings;Apr2005 Buyer's Guide, p32 

    Presents a list of companies that provide security systems such as access control and remote monitoring. ADT Security Systems Inc.; Amano Cincinnati Inc.; Rangers Security Detectors Inc.; Detex Corp.

  • FUZZY SYSTEM TO AUTHENTICATE ASSISTED LIVING PATIENTS IN THEIR HOME ENVIRONMENT. Seetha Subramanian, Mohanavalli; Anand, Sheila // Journal of Computer Science;May2013, Vol. 9 Issue 5, p558 

    Patient identity verification is a critical requirement for a remote patient monitoring environment. The health of the patient is monitored and crucial medical decisions are taken based on the physiological data collected from the patient using sensors and sent to distant health care centers or...

  • Endpoint security. Stephenson, Peter // SC Magazine: For IT Security Professionals (UK Edition);Nov/Dec2013, p28 

    The article discusses endpoint security which focuses on how data makes its way into and out of the endpoint. Endpoint security tools are said to be capable of protecting the device from malicious software (malware) and checking if the anti-malware protection can be accomplished successfully by...

  • TECHNOLOGY UPDATE SECURITY.  // CRN;7/16/2007, Issue 1245, p24 

    The article focuses on Ingram Micro's Network Access Control (NAC), the solution to security risks posed by malware. According to the author, NAC can keep applications available, safeguard company data and ensure regulatory compliance. Moreover, NAC is a technology that protects against viruses,...

  • Knowledge is Power. Martin, Jennifer // Security: Solutions for Enterprise Security Leaders;May2006, Vol. 43 Issue 5, p62 

    The article discusses the power of knowledge in the security systems industry. Education has become the deciding factor in every success or failure with evolution of technology and the ever-increasing demand of sophisticated security systems from end-users. One driver for education is the...

  • Can ACLs and NAC mix for security success? Snyder, Joel // NetworkWorld Asia;Jun2008, Vol. 4 Issue 5, p24 

    The article discusses the possibility of mixing the access control lists (ACL) and network access control (NAC) for security success. According to the article, the NAC envelope was pushed during the Interop with the decision that access control would be handled with a combination of ACLs and...

  • Research on access control in grid environment. Wei Rong // Proceedings of the International Workshop on Information Securit;2009, p35 

    Role-Based Access Control, for short RBAC, is a security technology that ensures system resources can not be accessed by non-authorized users. It can be used in network security and works well for grid security as well. Based on the research of RBAC model at present the paper proposes a...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics