FB pixel

Commeg

Website: commeg.com

With the TimePro(R) system from Commeg, planning employee hours, controlling unauthorized hours and reducing manual processes has never been simpler, more cost effective or more immediately achievable.

Explaining Biometrics

 

Determining the best biometric reader for an application

This guest post was contributed by Anixter. Biometric physical access control is the most secure means for allowing access due…

 

Back to the secure future: The need for multi-factor authentication

By Ján Lunter, Founder and CEO of Innovatrics  Apparently, doomsday won’t be a meteorite strike, but a cyber-security tragedy: According…

 

Explainer: Gesture recognition

Gesture recognition has been defined as the mathematical interpretation of a human motion by a computing device.  Gestures can originate…

 

Application of biometric face identification technologies in financial institutions

By T. R. Abdullin, T. V. Shipunov, M. N. Zakirov, R. L. Zainulin, A. A. Shnyrev, and A. A.Bunyatyan of…

 

The role of biometrics and IAM in reinforcing the security of your enterprise applications

By Deepak Gupta, CTO & Co-Founder of LoginRadius We’re in an era where we need to authenticate ourselves numerous times daily. Whether…

 

Explainer: Biometric Middleware

Biometric middleware is authentication software that enables various biometric devices and technologies and allows the match or no—match decisions made…

More Explainers

Most Read From This Week

Featured Company

Biometrics Insight, Opinion

Biometrics White Papers

Biometrics Events

Explaining Biometrics