UBM: TECH DIGITAL RESOURCE LIBRARY

Simple, Mobile Biometrics

Aug 17, 2010

Download Authentication mechanisms must not get in the way of end-users or become a pain in the neck, otherwise they run the risk of people trying to find short-cuts and workarounds that end up compromising the integrity of security processes. The most sustainable security solutions must be natural to use in the course of day-to-day activities, yet provide an appropriate level of authenticity and integrity for the value of the assets they are intended to protect.


Whitepaper