ADAPTIVE BIOMETRIC AUTHENTICATION
Step up or step out
Daltrey’s biometric authentication process is fully customisable, allowing organisations to adapt identity requests to suit each unique risk level. Using a mix of adaptive, step-up and multi-factor authentication, it promotes a seamless user experience while ensuring identity certainty.
Frictionless access to high-risk resources
Give users seamless access to low-risk resources, then employ step-up authentication to verify their identity again before granting access to anything more sensitive. For example, an IT administrator may authenticate the same way others do when accessing standard applications. This can be as easy as glancing at a camera. Then in order to access high-risk applications, users are being prompted to authenticate with their voice, fingerprint or other suitable modality.
The right modality for the right application
Not every biometric modality ensures the same level of certainty. Facial recognition, for example, is convenient and significantly more secure than a password but less so than iris. For this reason, iris should be used for accessing more sensitive operations and locations whilst face is the default authentication method for all other standard applications.
Secure interactions with sensitive documents
Perhaps your finance team works within an open-plan office, but need to keep employee payment reports private. Facial recognition allows privileged personnel to access and view the relevant documents. But if an unauthorised face appears in the background, the screen is automatically blurred.
Anti-spoofing liveness detection
Assure user presence with continual biometric liveness detection, which distinguishes an image or motion mimicked by a photo or video display from a real user.
Striking a balance between security and seamless user experience, Daltrey’s authentication processes can be informed by user role, resource sensitivity, user location or other. Importantly, they ensure sensitive tasks are being executed by the right users following the right processes – ultimately holding people accountable.
The business value of security
Download this free report to find out how identity thieves attack, how to break the attack chain and why moving to Identity-as-a-Service is the future of security.