Feeds

RSA gets into fingerprints

Factor 3

  • alert
  • submit to reddit

Protecting against web application threats using SSL

RSA Security is to add biometric recognition technology to its popular line of two-factor authentication products. This will give customers the opportunity to add another layer of authentication to its identity management system.

RSA Security will integrate Precise Biometrics' Precise BioMatch fingerprint authentication technology with RSA SecurID Passage smart card software and the RSA SecurID USB Token to enable strong protection and validation of a user's identity based on a biometric.

RSA plans to provide an integrated biometric/smart card package for customers who want either strong two or three-factor authentication. This technology could be used in applications such as protect access to corporate apps, to unlock credentials stored on a smart card, or to digitally sign electronic forms or documents.

Organisations needing to balance ease of use with another level of security can select from either two or three-factor authentication with the use of a smart card or USB token (something you have) the biometric (something you are) and a PIN (something you know).

Sarah Kent, RSA bizdev director, said the company is seeing customer interest in three-factor authentication to control access to government buildings. For enterprise customers, integration between RSA's tokens and biometrics technology has ease of use advantages because it means companies can do away with the need to use PINs.

RSA Security expects to make the integration with Precise Biometrics technology available in the second half of 2003.

RSA SecurID Passage replaces static passwords with a Java platform smart card for user authentication to workstations, networks and sensitive data. Its Java Card multi-application capability allows customers to deploy other applications - ranging from electronic purse, custom designed employee applications and now biometric functionality - to the same card. The RSA SecurID USB Token combines a USB device with secure storage of digital credentials on a standards-based Java platform. ®

Related Stories

RSA teams up with Courion for identity management
UK firm touts alternative to digital certs
Microsoft marries RSA Security to Windows
Liberty Alliance unveils secure sign-on specs
RSA touts DIY certificates

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Jihadi terrorists DIDN'T encrypt their comms 'cos of Snowden leaks
Intel bods' analysis concludes 'no significant change' after whistle was blown
Home Depot: 56 million bank cards pwned by malware in our tills
That's about 50 per cent bigger than the Target tills mega-hack
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
China hacked US Army transport orgs TWENTY TIMES in ONE YEAR
FBI et al knew of nine hacks - but didn't tell TRANSCOM
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.