News

This whitepaper explores how organizations are deploying biometric systems that protect assets while addressing privacy, ...
In the network access control products we tested, authentication varies from very strong to very weak, and every point in-between.
In our first post in this series, we talked about authentication. The focus shifts to authorization and access control, says ESET's Lysa Myers.
The user-friendly technology provides fast and easy enrollment and authentication processes with the highest degrees of accuracy. In addition, iris recognition eliminates the need for magnetic access ...
REDWOOD CITY, Calif.—Alcatraz, developer of secure frictionless access control products, has added Three Factor Authentication (3FA) to the Rock facial authentication platform to deliver the ultimate ...
Cupertino, CA., September 1, 2022 – Alcatraz AI, the leader in autonomous access control using industry-leading 3D facial authentication and AI to create safe spaces, announced today they will ...
Maintain regulatory compliance by conducting regular audits, adhering to standards like ISO 27001, SOC 2, and GDPR, and ...
Microsoft this week announced a preview of 'Authentication Strength,' a new control for organizations using the Azure Active Directory Conditional Access service.
Last issue we talked about two-factor authentication and I described such a scheme used by a Swedish bank (see link below). The bank requires a user to enter a unique identifier - a national ID ...
It may seem overwhelming to successfully control access and secure apps in today’s digital-first world. But it doesn’t have to be.