Biometric Technology

Biometric Technology News

View All News

Biometric Technology Get Started

Bring yourself up to speed with our introductory content

  • image replay attack

    An image replay attack is the use of a picture to fool an authentication method. Image replay attacks are most commonly used by an attacker trying to gain entry to a system protected by less-than-secure biometric authentication technology ... Continue Reading

  • mobile authentication

    Mobile authentication is the verification of a user’s identity through the use a mobile device and one or more authentication methods for secure access. Continue Reading

  • FIDO (Fast Identity Online)

    FIDO (Fast ID Online) is an open standard for a secure and easy-to-use universal authentication interface created to address the lack of interoperability among strong authentication devices. The FIDO standard supports multifactor authentication and... Continue Reading

View All Get Started

Evaluate Biometric Technology Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

Product Reviews

Powered by IT Central Station View All Evaluate

Manage Biometric Technology

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Biometric Technology Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close