Keep forgetting the passwords to your confidential computer files? In a few years, you may be able to forget them permanently. Instead, biometric security devices will verify your identity based on the unique attributes of your fingerprints, facial features, voice or even your handwriting. Recent breakthroughs in microchip technology and manufacturing processes have reduced both the size and the price of biometric devices. Taking advantage of such innovations, a small but growing number of PC makers, including Hewlett-Packard, are planning to incorporate biometric devices such as fingerprint readers into the keyboards and laptop casings of future product lines.
Still, given the cost and effort involved in switching from passwords to a relatively unproven technology like voice verification or fingerprint reading, why should a small business protect its computers with a biometric security system? Because passwords have simply ceased to provide an adequate level of computer security, says Robert Clyde, vice president and general manager of the Security Management Business Unit at AXENT Technologies Inc., a Rockville, Maryland, provider of information security solutions.
"Unfortunately, password cracking has become pretty straightforward," Clyde says. "Users choose passwords that are pretty easy to guess, and password-cracking programs are getting more powerful. Even passwords that were thought to be secure five years ago may not be secure today."
Another reason to upgrade to biometrics is convenience. "The biggest difference between biometrics and a password is that a fingerprint is a password you just don't forget," says Ed Murrer of Santa Clara, California, Veridicom Inc., a manufacturer of fingerprint readers. "In a few larger corporations, it's been shown that 50 percent of help-desk calls are related to forgotten passwords." It also means your IT manager will spend less time changing, updating and tracking passwords, and more time on important business functions.
While fingerprinting's similarity to police booking procedures might bother some people, Murrer says it hasn't really been an issue. "The people who adopt this technology know they have a security problem and believe the cure is worth the medicine," he says. "Fingerprint readers are used to authenticate users, not identify them."
Who's Got It?
- Fingerprint recognition: Key Tronic's Secure Finger Scanner Keyboard (http://www.keytronic.com) has incorporated a fingerprint-recognition device into a standard 104-key Windows keyboard.
- Face recognition: FaceIt PC software from Visionics Corp. (http://www.faceit.com) uses a video camera (not included) to detect the presence of an authorized user in front of a PC.
- Voice verification: T-NETIX Inc.'s VoicEntry I software (http://www.t-netix.com) features a voice-secured screen saver that remains locked until a registered user speaks a password into a microphone (not included).
- Signature verification: Cyber-SIGN from Cyber-SIGN Inc. (http://www.cybersign.com) verifies users' identities by the shape, speed, stroke and pressure of their signatures as written on an electronic pad included with the software.
AXENT Technologies Inc.,http://www.axent.com
Veridicom Inc., (408) 588-9400, email@example.com