Access "Vein-reader biometric authentication for health care, financials"
This article is part of the February 2009 issue of Improving your network security strategy in a recession
An accident victim is rushed to the ER. He has no ID -- perhaps his wallet is still in the wreckage of his car, perhaps he simply left it at home. A staff person takes the victim's hand and waves his palm over a vein reader. In seconds, the hospital knows not only who he is, but has access to all his records, including blood type, allergies, pre-existing medical conditions and, yes, insurance. Not every use case for vein reading authentication technology is this dramatic, but health care facilities, along with financial institutions, are prime market targets for Fujitsu's PalmSecure, which has been in use in Japan and is now being marketed through partners in the U.S. "It makes the registration process, once someone is enrolled, much more streamlined for subsequent visits," said Rogel Reyes, director of patient access for Pleasanton, Calif.-based ValleyCare Health System. "Each time they come to a point of service they are not asked for their card or license; they simply place their palm over the scanner." Fujitsu partner HT Systems markets PalmSecure as a ... Access >>>
Premium Content for Free.
10 tips to improve your network security strategy in a recession
Here are 10 steps you can take to improve your threat management posture that require minimum investment, manpower and give you a fast return on your investment.
Recession forces security to measure and prioritize risks
Compliance demands, hacker threats, insider risks and integration concerns brought on by mergers and acquisitions make information security somewhat recession proof.
Encryption, DLP, disaster recovery top 2009 priorities
Information Security magazine's annual Priorities 2009 survey identifies data protection and disaster recovery among the top priorities for security managers.
Product Review: IronKey Enterprise Secure Flash Drive
by Ed Tittel, Contributor
IronKey Enterprise Secure Flash Drives enable organizations to control access to sensitive information on portable flash drives.
- 10 tips to improve your network security strategy in a recession
Product Review: PGP Endpoint
PGP Endpoint provides automated whole disk encryption that is centrally managed.
Product Review: Rohati TNS 100
Rohati's Transaction Network System brings NAC to the application level, and delivers granular access control for Web-based applications and file shares.
Product Review: Astaro Mail Gateway 4000
Astaro Mail Gateway 4000 is an antivirus and antispam appliance that is suitable for a midmarket organizations because of its simple central management capabilities.
- Product Review: PGP Endpoint
Vein-reader biometric authentication for health care, financials
Health care facilities, along with financial institutions, are prime market targets for vein-reading technology, the latest in biometric applications.
Shoestring security budgets mean innovation and prioritization
Security managers face a lean economic year in 2009, but that doesn't mean threats and compliance demands will abate.
Proactive state privacy laws change security focus to prevention
New data breach notification acts in Nevada and Massachusetts are changing the way that organizations handle data.
Schneier, Ranum debate social networking risks
Should companies be concerned about employees' social networking? Bruce Schenier and Marcus Ranum take opposite sides on this issue.
- Vein-reader biometric authentication for health care, financials
More Premium Content Accessible For Free
Compliance and risk modeling
You can fight compliance or embrace it, but one way or the other, you can’t escape it. Increasingly, smart organizations are not just accepting ...
Essentials: Threat detection
Antivirus and intrusion prevention aren’t the threat detection stalwarts they used to be. With mobile endpoints and new attack dynamics, enterprises ...
Managing identities in hybrid worlds
The world in which successful IAM programs must be implemented is increasingly complex, a mix of legacy on-premise IAM infrastructures, cloud-based ...