KuppingerCole's Advisory stands out due to our regular communication with vendors and key clients, providing us with in-depth insight into the issues and knowledge required to address real-world challenges.
Compare solution offerings and follow predefined best practices or adapt them to the individual requirements of your company.
Meet our team of analysts and advisors who are highly skilled and experienced professionals dedicated to helping you make informed decisions and achieve your goals.
Meet our business team committed to helping you achieve success. We understand that running a business can be challenging, but with the right team in your corner, anything is possible.
Access controls all too often rely on things such as passwords, security questions, and physical tokens that can be shared or stolen, making such systems vulnerable to abuse. However, security can be improved by using biometrics that measure the physical and behavioral characteristics of the person seeking to gain access to something.
Join identity experts at KuppingerCole Analysts and iProov to as they discuss the vulnerabilities of access control systems that rely on something that is known or possessed, and the value of adding biometrics. They will also discuss the role of biometrics in identity verification and proofing, and how to ensure biometrics are used safely to address privacy concerns.
Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will look at the drivers of the growing demand for identity verification and identity proofing across a range of use cases from B2E to B2B and B2C, including the Work from Anywhere trend and Supply Chain Security/3rd Party Risk Management. He will also look at which signals can be used for identity proofing.
Joe Palmer Chief Product & Innovation Officer of iProov will explain how biometrics can improve security for digital and physical access. He will also provide guidance on aligning biometrics with high-risk changes in the identity lifecycle, inclusivity considerations, and mitigating the risk of generative AI in cyber-attack methodologies.