Biometric Technology

Biometric Technology News

View All News

Biometric Technology Get Started

Bring yourself up to speed with our introductory content

  • keystroke ID (keystroke identification)

    The use of an individual's distinctive typing dynamics can be used as a non-intrusive and reliable form of biometric authentication. Continue Reading

  • strong authentication

    Although it is not a standardized term, with set criteria, strong authentication can be said to be any method of verifying the identity of a user or device that is intrinsically stringent enough to ensure the security of the system it protects by ... Continue Reading

  • image replay attack

    An image replay attack is the use of a picture to fool an authentication method. Image replay attacks are most commonly used by an attacker trying to gain entry to a system protected by less-than-secure biometric authentication technology ... Continue Reading

View All Get Started

Evaluate Biometric Technology Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

Product Reviews

Powered by IT Central Station View All Evaluate

Manage Biometric Technology

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Biometric Technology Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close