ImageWare and SAP showcasing integrated solution at MWC

ImageWare Systems and SAP will showcase the GoVerifyID integration with the SAP HANA Cloud Platform and Fiori UX at Mobile World Congress later this month. GoVerifyID, SAP HANA Cloud Platform and SAP Cloud Identity Service together enable single sign-on multi-modal biometric user authentication for all SAP HANA Cloud Platform applications. GoVerifyID, combined with SAP Fiori, provides a secure, personalized user experience. “Simplifying the user experience while simultaneously enhancing security is the core value we offer,” commented Jim Miller, president and

Google working on fingerprint unlock feature for Chrome OS

Chromebook owners with the right hardware may be able to start using their fingerprints to access their laptops later this year. According to a PCWorld report, Chrome Story recently spotted a new flag in Chrome OS Canary that discusses “Quick Unlock (Fingerprint).” Fingerprint security features are also mentioned throughout the changelog for Chrome OS 58.0.3007.0 that was released to the dev channel on February 14. Reports that Google was working on adding a new log-in method using fingerprint sensors first

Facial recognition trial completed at South Korea government complex

South Korea’s Government Buildings Management Office is ramping up security at public buildings with a facial recognition system following a high-profile illegal entry at one of its offices last year. According to a Korea Bizwire report, the system, developed by local IT company SysOne, so far covers 186 gates at four complexes and is responsible for monitoring some 32,000 employees and 6,000 daily visitors. The Government Buildings Management Office is officially implementing the access control system after the success of

Centrify service assesses user behavior to prevent breaches

Centrify launched its new Analytics Service, which uses machine learning to assess and respond to risk based on user behaviour. The Centrify Analytics Service constantly analyzes the user’s continually evolving behavior patterns and assigns a risk score. The service then enforces an appropriate decision on whether the user is granted access, requires step-up authentication, or is blocked entirely. Now available in Australia and New Zealand, the Analytics Service can be added on to Centrify Identity Service and Centrify Privilege Service.

ZKAccess biometric readers integrated with AMAG Symmetry Access Control system

ZKAccess announced AMAG certification completion of its OP-200 fingerprint reader integration with AMAG’s Symmetry security management platform and that it is now a member of the Symmetry Preferred Partner Program. The OP-200 fingerprint reader interfaces with the Symmetry Access Control system to provide biometric capabilities without needing additional middleware. “OP-200 is just one model in our new Opera series of biometric readers designed to integrate with Symmetry,” said Manish Dalal, ZKAccess COO and product manager. ZKAccess and AMAG Technology cooperatively

Researchers develop all-in-one authentication solution

Researchers at the University of Surrey have developed an ‘all in one’ authentication system that will allow users to verify identity using their face, eyes or fingerprints — either in combination with or instead of word-based systems — on their computers. Pass∞, developed by the Department of Computer Science’s Dr Shujun Li and PhD student Miss Nouf Aljaffan, is backward-compatible with existing computer systems enabling it to be easily added to all systems immediately with little or no alterations made

Fujitsu’s technology uses biometric authentication to grant access to cloud services via IoT devices

Fujitsu Laboratories Ltd. has developed a new technology that provides secure and seamless access to cloud services through IoT devices using a smartphone’s biometric authentication functionality and near-field wireless functionality. By leveraging FIDO technology which authenticates a cloud service’s user without collecting biometric information from their smartphone, Fujitsu’s new technology creates a secure network between a cloud service, an IoT device, and a smartphone, while verifying the user’s identity. As a result, users can securely and conveniently access cloud services

Windows Hello to add feature that locks device when user moves away from camera

The upcoming Creators Update of Windows 10 will add a new feature to Windows Hello which automatically locks a device when the user walks away from the camera, according to a report by Network World. Windows 10’s security feature currently uses Azure Active Directory and hybrid environments with Azure Active Directory Connect. The Creators Update will open up Windows Hello’s use to all organizations with on-premise, Active Directory-only environments, especially those in public sector. Windows Hello will also feature Dynamic

FST Biometrics and AMAG collaborate on in-motion access control solution

AMAG Technology has certified version 3.6 of FST Biometrics‘ IMID as fully integrated with AMAG’s Symmetry access control solution, giving Symmetry users the combined benefits of AMAG’s security with the visual identification solution offered by FST. AMAG’s Symmetry architecture has been tested and approved for federal government compliance by Federal Identity, Credential, and Access Management (FICAM), HSPD-12 and FIPS-201 regulations. “FST Biometrics sees a high degree of consistency between our market-leading visual identification solutions and AMAG’s security management solutions,” said

Intel Security cloud report recommends firms to use multi-factor authentication, biometrics

Intel Security has published its second annual cloud security report, “Building Trust in a Cloudy Sky”, which recommends that organizations use authentication best practices, such as distinct passwords, MFA and biometrics. Based on the survey results of more than 2,000 IT professionals, the report details the current state of cloud adoption, the main concerns with private and public cloud services, security implications, and the evolving impact of Shadow IT. The report states that hackers are seeking the easiest targets, and