PRO+ Premium Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
March 2007

DigitalPersona Workstation Pro and Server for Biometric Authentication

BIOMETRIC AUTHENTICATION DigitalPersona Workstation Pro and Server 4.0 REVIEWED BY BRENT HUSTON DigitalPersona Price: Server, $1,499, plus $50 authentication license per user; Workstation without reader, $60, with DigitalPersona U.are.U 4000B reader, $149 @exb @exe Biometric authentication has met considerable market resistance, mostly because of integration issues, accuracy and cost. With improved tech- nology and the introduction of laptops equipped with fingerprint readers, biometrics may be starting to move into the mainstream. DigitalPersona Pro is a robust single sign-on (SSO) software suite that allows an enterprise to replace passwords with biometric fingerprint readers or provide dual-factor authentication. Installation and Setup B+   There are two pieces to the suite: DigitalPersona Pro Workstation software for individual systems and the server component, which integrates with Active Directory on your domain controller. While the workstation software can function by itself, the server provides domain-wide SSO. ...

Access this PRO+ Content for Free!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Features in this issue

  • Product review: Six removable device control security products

    Six removable device control security products that provide centrally managed granular control over ports, interfaces and storage devices are reviewed. This review evaluates: DeviceLock 6.0 from SmartLine, Sanctuary Device Con-trol 4.0 from SecureWave, Endpoint Access Manager 3.0 from ControlGuard, Device-Wall 4.5 from Centennial Software, Safend Protector 3.1 from Safend and Protect Mobile from Workshare.

  • Prioritizing compliance and information security

    Have compliance demands refocused and weakened information security efforts?

Columns in this issue