ADAPTIVE BIOMETRIC AUTHENTICATION

Step up or step out

Daltrey’s biometric authentication process is fully customisable, allowing organisations to adapt identity requests to suit each unique risk level. Using a mix of adaptive, step-up and multi-factor authentication, it promotes a seamless user experience while ensuring identity certainty.

Frictionless access to high-risk resources

Give users seamless access to low-risk resources, then employ step-up authentication to verify their identity again before granting access to anything more sensitive. For example, an IT administrator may authenticate the same way others do when accessing standard applications. This can be as easy as glancing at a camera. Then in order to access high-risk applications, users are being prompted to authenticate with their voice, fingerprint or other suitable modality.

The right modality for the right application

Not every biometric modality ensures the same level of certainty. Facial recognition, for example, is convenient and significantly more secure than a password but less so than iris. For this reason, iris should be used for accessing more sensitive operations and locations whilst face is the default authentication method for all other standard applications.

Secure interactions with sensitive documents

Perhaps your finance team works within an open-plan office, but need to keep employee payment reports private. Facial recognition allows privileged personnel to access and view the relevant documents. But if an unauthorised face appears in the background, the screen is automatically blurred.

Anti-spoofing liveness detection

Assure user presence with continual biometric liveness detection, which distinguishes an image or motion mimicked by a photo or video display from a real user.

Striking a balance between security and seamless user experience, Daltrey’s authentication processes can be informed by user role, resource sensitivity, user location or other. Importantly, they ensure sensitive tasks are being executed by the right users following the right processes – ultimately holding people accountable.

FREE REPORT: The future of security

Free Report

The business value of security

Download this free report to find out how identity thieves attack, how to break the attack chain and why moving to Identity-as-a-Service is the future of security.