Pro+ Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
Dec. 2012/Volume 14 / No. 10

Biometric authentication methods: Comparing smartphone biometrics

Smartphones can be pesky little endpoints. With their small size and their tendency to get lost, you can’t be sure if the smartphone requesting network access is really in the hands of a trusted employee, or if a malicious hacker is using someone else's device to access privileged data or other network resources. SDKs enable VARs to integrate the fingerprint reader with network access software at a corporate site, or develop their own applications utilizing the reader. Using strong mobile device authentication technology can reduce the risk posed by mobile devices, and one of the strongest technology options available today is biometric mobile authentication. This tip examines three biometric authentication methods that can add an extra layer of security to your customers' smartphones. Making the case for smartphone biometrics Authenticating users of smartphones and mobile device users has become imperative in today’s world. Laptops have long required user authentication since they can typically be used to access a broad swath ...

Features in this issue

Columns in this issue

MicroscopeUK

SearchCloudProvider

SearchSecurity

SearchStorage

SearchNetworking

SearchCloudComputing

SearchConsumerization

SearchDataManagement

SearchBusinessAnalytics

-ADS BY GOOGLE

Close