Identification vs Verification: What’s the Difference?
By Ian E. Muller | July 12, 2018
Often, when people think about biometrics-based access management and security, they think of two different words: Identification and verification. However, when it comes to actually implementing and using access control systems and setting up a security infrastructure that deploys biometrics, they often confuse these terms and how they apply to their security needs. It can […]Read More
Biometric Mythbusters: Do Stolen Fingerprints Mean Identity Theft?
By Ian E. Muller | February 6, 2018
This article focuses on the theft of a complete fingerprint image. Stay tuned for a follow-up article on why you also don’t need to worry to much if your biometric template is stolen from an authentication system. With the rise of biometrics in use across our business and personal lives, it can be easy to […]Read More
Identity Theft & Biometrics
By Ian E. Muller | April 5, 2016
One of the major hurdles for businesses when it comes to investing in and deploying biometrics solutions is misinformation. There are a wide variety of myths surrounding biometric authentication systems that have to be properly “busted” in order to clear up this innovated security infrastructure and ensure that a strong foundation of understanding exists. By […]Read More