This content is part of the Essential Guide: Develop an IAM strategy for the mobile enterprise
Get started Bring yourself up to speed with our introductory content.

Get personal with mobile biometric authentication


Jump into biometric authentication methods

Source:  Si-Gal/Getty Images
Designer: Online Design

Everyone grew up hearing the words, "It's better to be safe than sorry." It is a kid's right to ignore this advice, but when it comes to mobile devices, failing to heed such a warning could be detrimental for organizations.

Passwords and PIN codes are not enough to protect mobile devices from attacks. One of the best defenses IT can implement is biometric authentication, which uses specific genetic markers to identify and grant device access to users. There are four main biometric authentication methods: fingerprint, facial, iris and voice authentication. The mobile device will make a copy of the user's genetic marking and save it in a back-end database. Each time a user attempts to access the device, it will compare the current image taken to the one stored. If it is a match, the user is granted passage; if not, he or she is denied access.

There are a few concerns surrounding mobile biometric authentication technology. The software has been known to cause false positive and negative matches. If a user's device is compromised, there is no way to change or edit the biometric, unlike a simple password reset. A scratch or smudge on the device camera or tracking pad could also compromise accessibility to the device. Mobile biometric authentication methods also tend to be on the pricey side, although they are growing more advanced by the day.

View All Photo Stories