Pro+ Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
March 2007

DigitalPersona Workstation Pro and Server for Biometric Authentication

BIOMETRIC AUTHENTICATION DigitalPersona Workstation Pro and Server 4.0 REVIEWED BY BRENT HUSTON DigitalPersona Price: Server, $1,499, plus $50 authentication license per user; Workstation without reader, $60, with DigitalPersona U.are.U 4000B reader, $149 @exb @exe Biometric authentication has met considerable market resistance, mostly because of integration issues, accuracy and cost. With improved tech- nology and the introduction of laptops equipped with fingerprint readers, biometrics may be starting to move into the mainstream. DigitalPersona Pro is a robust single sign-on (SSO) software suite that allows an enterprise to replace passwords with biometric fingerprint readers or provide dual-factor authentication. Installation and Setup B+   There are two pieces to the suite: DigitalPersona Pro Workstation software for individual systems and the server component, which integrates with Active Directory on your domain controller. While the workstation software can function by itself, the server provides domain-wide SSO. ...

Access this Pro+ Content for Free!

By submitting you agree to recieve email from TechTarget and its partners. If you reside outside of the United States you consent to having your personal data transferred and processed in the United States. Privacy Policy

Features in this issue

  • Product review: Six removable device control security products

    Six removable device control security products that provide centrally managed granular control over ports, interfaces and storage devices are reviewed. This review evaluates: DeviceLock 6.0 from SmartLine, Sanctuary Device Con-trol 4.0 from SecureWave, Endpoint Access Manager 3.0 from ControlGuard, Device-Wall 4.5 from Centennial Software, Safend Protector 3.1 from Safend and Protect Mobile from Workshare.

  • Prioritizing compliance and information security

    Have compliance demands refocused and weakened information security efforts?

Columns in this issue

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

-ADS BY GOOGLE

Close