• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint

Benefits

These types of systems are relatively inexpensive and provide a higher level of security for your computing devices, whether they are desktops, laptops, or personal digital assistants. This is because the strongest form of authentication occurs when systems combine techniques in order to achieve what is known as “three-factor” authentication. This technique combines what a person knows (such as a username and password) with what they have (such as a hardware key fob) and who they are (obtained via biometrics).

However, not all security applications require this three-factor authentication or even a two-factor authentication. Facial recognition by itself can be applied to a wide variety of scenarios ranging from the identification of known criminals in public spaces like airports and shopping centers to being used as part of a broader verification mechanism for high-security corporate or government applications. If you want to move beyond one-factor authentication using just a username and password, the best bets are either to add a hardware key-fob, which comes with many virtual private networking products such as RSA SecurID, or to add biometrics.


PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint