Fujitsu, IBM Offer Biometric Security Solution That Replaces Passwords


IBM and Fujitsu Frontech North America Inc. recently announced a new security solution that integrates palm vein biometric technology from Fujitsu with IBM's single sign-on solution.

The new offering aims to help companies bypass the hassles of managing multiple passwords for access to critical business information by enabling employees to scan their palms to verify their identities. By integrating the palm vein technology with IBM's single sign-on software, employees can securely access applications, files and websites with a single scan of their palm -- eliminating the need to remember multiple passwords and the threats posed by those lost or stolen.

The solution combines Fujitsu PalmSecure LOGONDIRECTOR with IBM Tivoli Access Manager for Single Sign-On, providing organizations with a comprehensive authentication solution for protecting data while also complying with HIPAA, Sarbanes Oxley, PCI DDS and other industry and federal regulations.

For example, an employee simply holds his or her hand over a small scanning device attached to a computer that reads the vein patterns in their palm and instantly recognizes the user's identity and what access that affords them. The Fujitsu PalmSecure palm vein authentication technology uses near-infrared light to capture a person's palm vein pattern, generating a unique biometric template that is matched against users' pre-registered palm vein patterns.

Palm vein identification is an unobtrusive and highly accurate technology, and the International Biometrics Group (IBG), which evaluates biometric products through comparative testing, found that palm vein technology competes well with iris scanning technology in accuracy, and demonstrated extremely low occurrences of both false positive and false negative readings. It utilizes no trace technology which leaves virtually no biometric footprint behind and therefore it is difficult to spoof, especially when compared with cheaper fingerprinting devices.

"A typical organization spends hundreds of dollars per employee per year on lost passwords through help desk support," said E.K. Koh, program director for single sign-on, IBM Tivoli software. "IBM's work with Fujitsu replaces archaic password structures with a single path of access that resides in the palms of the employees' hands, and can be managed more efficiently, saving companies thousands of dollars in IT support while protecting critical organizational data and information."

IBM Tivoli Access Manager for Enterprise Single Sign-On allows a user to log in once to gain access to various systems or applications to do their jobs without being prompted to log in again at each of them. The combined solution from IBM and Fujitsu now uses palm vein technology in place of a user needing to even type a password once.

"The combination of PalmSecure LOGONDIRECTOR and IBM Tivoli Access Manager for Enterprise Single Sign-On validates that strong biometric authentication is a critical component in addressing IT security and compliance requirements," said Jim Preasmyer, director of sales and business development, Advanced Technology Group, Fujitsu Frontech of North America Inc. "We are proud to partner with IBM, one of the leading management and single sign-on providers, to expand PalmSecure LOGONDIRECTOR adoption. This partnership underscores Fujitsu's commitment to partnering with world-class organizations to resolve security issues associated with lost, stolen or forgotten passwords."

As part of this integration, Fujitsu PalmSecure LOGONDIRECTOR has been validated through the Ready for IBM Tivoli Software program, ensuring that the integration with Tivoli products meets IBM's requirements for interoperability and user experience. Validated products bear the Ready for IBM Tivoli logo as an assurance to customers of their compliance.

"For more than seven years, we have helped healthcare organizations, financial services firms and companies in other industries protect sensitive information and comply with various regulations by implementing IBM's security solutions," said Jerry Sforza, president of Encode Inc., a Freehold, N.J.-based IBM business partner. "Integrating the Fujitsu biometric solution with IBM's technology gives our customers a smart security solution that ensures the right people have the right level of access to critical organizational data."

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3