{"id":734,"date":"2006-02-18T00:00:00","date_gmt":"2006-02-18T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/02\/18\/biometrics-struggle-to-go-mainstream\/"},"modified":"2021-12-30T11:38:04","modified_gmt":"2021-12-30T11:38:04","slug":"biometrics-struggle-to-go-mainstream","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/02\/18\/biometrics-struggle-to-go-mainstream\/","title":{"rendered":"Biometrics struggle to go mainstream"},"content":{"rendered":"<p>A host of problems is keeping biometric security from becoming a mainstream application, a panel of experts at this year&#8217;s RSA Conference concluded.   &#8220;The largest complaint at biometrics conferences is that every year people say that: &#8216;This is the year of biometrics.&#8217;   And then they come back the next year and say: &#8216;Maybe this is the year of biometrics,'&#8221; said Richard Lazarick, chief technologist at CSC Global Security Solutions.  One of the major problems, Lazarick argued, that prevents biometrics from becoming mainstream is lack of agreed standards.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This prevents organisations from using equipment from several vendors in creating interoperable networks such as a global network of airports using a single database with iris scan information.<\/p>\n<p>Common applications base authentication on finger prints, iris, face and voice and vein scans.<\/p>\n<p>The panel conceeded finger print scanners are readily available with many notebook makers offering such technology as an option with their business models.  However, it was argued that availability of hardware was not enough to guarantee adoption of biometrics.<\/p>\n<p>&#8220;But just because you have the hardware, that doesn&#8217;t mean that each person who uses it will use it in such a way that you get value for the organisation,&#8221; warned Samir Nanavati, a partner with Biometric Group (IBG), an independent consultancy organisation.<\/p>\n<p>The technology is mainly struggling to cross over from government applications to the public sector, they argued, as vendors remain primarily focused on selling to governments.<\/p>\n<p>http:\/\/www.vnunet.com\/2150496<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-734","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/734","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=734"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/734\/revisions"}],"predecessor-version":[{"id":3221,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/734\/revisions\/3221"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=734"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=734"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=734"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}