BIO-key MobileAuth

BIO-key MobileAuth

BIO-key International has introduced its new mobile app, BIO-key MobileAuth™ with PalmPositive™ the latest among over sixteen strong authentication factors available for BIO-key's PortalGuard® Identity-as-a-Service (IDaaS) platform. MobileAuth’s fast, touchless biometric user authentication – using a palm scan – works with any Android or iOS device to provide the unprecedented combination of a simple, privacy-protected, and convenient user experience with the identity integrity and availability that enterprises require.

While multi-factor authentication (MFA) is an essential part of any IAM strategy, organizations such as NIST and the FBI have warned that traditional MFA methods such as passwords and phone-based methods, including one-time password (OTP) generators and SMS codes, remain vulnerable to social engineering and cyberattacks. Moreover, relying parties, lose control over who is accessing their systems, since the end-user can share a credential or enroll additional users into their phones, without the relying party’s consent. In addition, hardware tokens with their lifecycle costs, lost token churn and difficult user experiences present other challenges.

According to the 2020 Verizon Data Breach Investigations Report, 81% of hacking-related breaches leverage stolen or weak passwords. This, along with other well-documented password challenges, has driven the adoption of passwordless workflows using phone apps secured with user-controlled device-based biometrics or other device-unlock factors.  While more secure than passwords, reports of account sharing, unauthorized delegation, and SIM swapping demonstrate that this type of biometrics lacks the integrity and availability required to support enterprise-level security.

BIO-key MobileAuth with PalmPositive offers a different way to authenticate, eliminating the inconvenience, security risks, and costs of traditional authentication methods by introducing the new category of Identity-Bound Biometrics (IBB), which are well-suited for everyday use cases including remote workforces, third-party access, Customer IAM (CIAM), and passwordless workflows.

Starting with PalmPositive as the first Identity-Bound Biometrics authentication method, future methods including voice and facial recognition will be added to BIO-key MobileAuth in 2021 to continue to offer the highest levels of:

  • Integrity: by permanently binding a biometric (palm scan) to the user’s digital identity to ensure only they can use their account privileges, not a proxy.
  • Availability: because the user is free to authenticate themselves across multiple devices, even if a new device is introduced.
  • Security: because biometrics cannot be forgotten, phished, stolen, or forged. Built-in liveness detection prevents imposters from using scanned pictures or fakes.
  • Accuracy: a palm scan is up to 400x more accurate than common user-controlled device-based biometric authentication methods.

Featured

  • 2024 Security Today New Product of the Year Award Winners Announced

    More than 20 companies are being recognized this year for products that help keep us safe. Read Now

  • It Always Rains in Florida

    Over the years, and many trips to various cities, I have experienced some of the craziest memorable things. One thing I always count on when going to Orlando is a massive rainstorm after the tradeshow has concluded the first day. Count on it, it is going to rain Monday evening. Expect that it will be a gully washer. Read Now

    • Industry Events
  • Live from GSX 2024 Preview

    It’s hard to believe, but GSX 2024 is almost here. This year’s show runs from Monday, September 23 to Wednesday, September 25 at the Orange County Convention Center in Orlando, Fla. The Campus Security Today and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Whether you’re attending the show or keeping tabs on it from afar, we’ve got you covered. Make sure to follow the Live from GSX page for photos, videos, interviews, product demonstrations, announcements, commentary, and more from the heart of the show floor! Read Now

    • Industry Events
  • Elevate Your Business

    In today’s dynamic business environment, companies specializing in physical security are constantly evolving to remain competitive. One strategic shift these businesses can make to give them the advantage is a full or partial transition to a recurring revenue model, popularly called a subscription service. This approach will bring numerous benefits that not only enhance business stability but also improve customer relationships and drive innovation. Recurring monthly revenue (RMR) or recurring annual revenue (RAR) are two recurring cadence choices that work simply and effectively. Read Now

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3