Biometrics suites earn a thumbs up

Bracco, Tere'
May 2000
Network World;05/08/2000, Vol. 17 Issue 19, p135
Trade Publication
Evaluates the effectiveness of biometric verification in protecting corporate databases. Functions of biometric verification; Factors to consider before installing biometric devices; Features of several biometric products. INSETS: BioNetrix Authentication Suite.;How we did it.;NetResults.;OUR `NOT SO IMPOSSIBLE' MISSION.


Related Articles

  • Is the use of biometrics an invasion of privacy? Nanavati, Samir; Steinhardt, Barry // Network World;05/08/2000, Vol. 17 Issue 19, p143 

    Presents arguments in favor of and against the use of biometrics in business data protection in the United States. Benefits of biometrics to businesses; Biometrics' potentials for misuse; Discussion of the issue of privacy in using biometrics.

  • BIOMETRICS EYES THE ENTERPRISE. Gaudin, Sharon // Network World;05/08/2000, Vol. 17 Issue 19, p129 

    Reports on the growing number of businesses that use biometric devices in ensuring data security in the United States. Capabilities of biometrics; Cost of the devices; Companies that manufacture biometric devices. INSET: NO SYSTEMS IS FOOLPROOF..

  • SECURITY SURVEY. Weinberg, Neal // Network World;05/08/2000, Vol. 17 Issue 19, p133 

    Highlights the results of a survey conducted by Enterprise Management Associates concerning security features used by businesses in the United States to protect their networks. Most popular security feature; Percentage of respondents who consider their security infrastructure adequate; Types of...

  • Biometrics at work? Andress, Mandy // InfoWorld;05/28/2001, Vol. 23 Issue 22, p73 

    Focuses on biometrics and its growing deployment in business enterprises for security purposes. Biometric techniques that can be of practical use by enterprises; Human body parts used in biometrics; Considerations in biometrics selection. INSETS: THE BOTTOM LINE;FINDING SPECIALIZED SUCCESS.

  • Data Protection in Global Business. Uchytil, Maria E. // Contract Management;Sep2002, Vol. 42 Issue 9, p44 

    Discusses the need for multinational corporations to implement measures to protect databases containing personal data of executives, employees, suppliers and customers in order to avoid penalties and sanctions from international privacy law. Individuals' rights; Privacy and confidentiality...

  • 10 Steps to Reduce Risk, Improve Database Security, and Adhere to Compliance Mandates.  // Database Trends & Applications;Mar2010, Vol. 24 Issue 1, p18 

    The article provides information on how to protect one's database security, suggested by Application Security Inc., a company that provides database security, risk, and compliance solutions for business enterprises. The company formulated 10 steps which claimed to reduce risk and to obtain...

  • IT Security Staffing Level Breaks Downward Trend.  // Computer Economics Report;Apr2011, Vol. 24 Issue 4, p10 

    The article presents a study which evaluates the security staffing needs of 200 information technology (IT) organizations. Four metrics were provided to assess those needs and the organizations with IT security staff and the amount and frequency of IT security outsourcing were also examined. The...

  • Understanding the two types of security virtualization. Freeze, Jim // Database & Network Journal;Jun2010, Vol. 40 Issue 3, p16 

    A conference paper on security virtualization which helps companies to dynamically manage the capacity of security infrastructure and apply the right combinations of security in the event of attack in traffic is presented. It discusses the types of security virtualization which combines software...

  • Corporate security more than just a password.  // Inside Tucson Business;02/17/97, Vol. 6 Issue 47, p9b 

    Offers security tips for business enterprises in Tucson, Arizona. Use of cross-shredder to destroy draft files and documents; Locking up of sensitive files.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics