SecurityCurrent threat detection

Recently, I had the opportunity to sit down with Morey Haber, VP of Technology, BeyondTrust to discuss the future of biometrics and the role it played in advanced authentication techniques. While the general theme of the discussion is the role such solutions plays in an enterprise, we also touch on separating authentication from authorization, considerations of deploying a biometric solution, and new types of biometric-related authentication.


In this two-part Q&A discussion, Morey Haber and John Masserini discuss the current and future state of biometrics. Industry thought leaders, Haber and Masserini address leading questions surrounding deploying such technology from the vendor and enterprise perspective.

In part one, Morey and John examined the possibility of biometrics as a replacement for existing authentication technology and discussed methods for using biometrics to augment existing solutions and make a case for when such technology should not be used.  Additionally, they discuss topics such as separating authentication from authorization and distinguishing important data from less critical information.

Part 1: Point/Counterpoint: The Current State and Future of Biometrics – Part One

In part two, Haber and Masserini continue their assessment of fingerprints, facial recognition, infrared, retina, voice, and user behavioral identifiers.  They also discuss how such technologies can be integrated with other forms of adaptive authentication to develop a mature authentication stack. Finally, they examine the process for retaining and purging biometric data and some of the deployment considerations regarding privacy requirements.

Part 2: Point/Counterpoint: The Current State and Future of Biometrics – Part Two

For more on Identity and Access Management, view these articles.

Originally posted on SecurityCurrent.com.


Copyright © 2002-2024 John Masserini. All rights reserved.


By JM

Leave a Reply

Your email address will not be published. Required fields are marked *

Chronicles of a CISO