Skip to Content Skip to footer
Welcome to the Kensington site. We've directed you here based on your current location.
Suggestions
  • No Suggestions

Biometrics Explained

We’re not far off from biometrics becoming commonplace in our everyday lives. In fact, it already is. Biometrics unlocks your phone, pays bills, grants access, and so much more — all by identifying your unique physical characteristics.

Why biometrics?

Because physical features such as fingerprints and pupils are so difficult to forge, biometrics is a strong security solution, though we see biometrics as part of a comprehensive security solution that might also include a password and/or physical device such as a key, card, or token.

In the workplace, biometrics can be part of a strong security protocol for access to internal systems, files, information, and data. And it can be as simple as touching a finger or looking into a camera lens.

Person using VeriMark fingerprint scanner with laptop

For large organizations, biometrics can be an effective way for IT to manage security protocols for employee access, privileges, and passwords.

Without getting too techy . . .

Like anything, biometrics is only as good as its weakest link. So it’s important that the biometric data collected, stored, or transferred is secure and accurate. But how?

Biometrics 101

Learn why biometric security is needed and what technology is used to secure your biometric information.

Compliance with FIDO Technology

The latest industry standard for fast and secure authentication.

Support for Enterprise Applications such as Windows Hello™ and Windows Hello™ for Business

Ideal for enterprise deployment and easily integrated into current IT infrastructure. Users keep their key for secure login, while IT can easily manage employee access, privileges, and passwords.

Secure Encryption and Transfer of Data

Advanced fingerprint technology such as Match-in-Sensor™ securely stores encrypted fingerprint data in the sensor module, whereas the older Match-on-Host system transfers unsecured data between the sensor and host device.

Anti-Spoofing Technology

Delivers results above the industry standard for false rejection rate (FRR) and false acceptance rate (FAR).

Authentication terminology and what it means

 

FIDO Alliance terminology chart

Why risk it?

Data loss accounts for billions of dollars in losses every year, as well as potential damage to a company’s reputation. As the Verizon 2017 Data Breach Investigations Report (DBIR) states, "81 percent of hacking-related breaches leveraged either stolen and/or weak passwords."

While no security solution can guarantee full protection, biometrics is yet another strong link in your security chain. In addition to the inherent uniqueness of an individual’s biometric data (and therefore the level of security this offers), biometrics offers a passwordless solution.

“Third party data breach to blame for data leaks of major hotel chains.”

Scott Ikeda, Cyber Security News

 

“CBP says traveler photos and license plate images stolen in data breach.”

Zach Whittaker

“Over 10 Million people hit in single Australian data breach: OAIC.”

Asha Barbaschow

 

“More than 12M people may be affected by latest medical data breach. Why those patients are now vulnerable.”

Jared Weber, USA Today

“Police investigate University of South Wales data breach.”

ITPro Newsletter

 

“A cyber forensics team has been called in to investigate breaches that exposed nearly 20 million patient records.”

Connor Jones

Microsoft Intelligent Security Association logo

 

Kensington is proud to be a member of the Microsoft Intelligent Security Association (MISA), an ecosystem of independent software vendors and managed security service providers that have integrated their solutions to better defend against a world of increasing threats. Download the e-book and presentation to learn more about the benefits of biometrics for password security.

 

Kensington biometrics

As leaders in physical device security, it’s only natural for us to evolve our offerings to include biometric security.

 

VeriMark Fingerprint Key on grey background

VeriMark™

K67977WW

View Product

VeriMark IT Fingerprint Key on grey background

VeriMark™ IT

K64704WW

View Product

VeriMark Desktop Fingerprint Key on grey background

VeriMark™ Desktop

K62330WW

View Product

VeriMark Guard on grey background

VeriMark™ Guard

K64708WW & K64709WW

View Product

Supported services and setup instructions

In 2017, we released the VeriMark™ Fingerprint Key, a USB insertable solution that supports FIDO U2F (2nd level authentication), as well as Windows Hello™. This solution is excellent for individuals and small businesses.

In 2019, we released the VeriMark™ IT Fingerprint Key. This version is optimized for passwordless deployments in Windows-based environments and offers the encrypted end-to-end security with Match-in-Sensor™ Fingerprint Technology. Easy integration into a current IT infrastructure with support for Windows Hello™, Windows Hello™ for Business, and other Microsoft services on Edge make it ideal for enterprise deployment. The user keeps the key for secure login, while IT can easily manage employee access, privileges, and passwords.

And in 2021, we released the VeriMark™ Guard Fingerprint Key and the VeriMark™ Desktop Fingerprint Key. Available in USB-A and USB-C versions, VeriMark™ Guard delivers the latest in biometric authentication technology, featuring cross-platform compatibility for Windows, MacOS, and Chrome OS; FIDO U2F and FIDO2 certification; and encrypted end-to-end security with Match-in-Sensor™ Fingerprint Technology. VeriMark™ Desktop is perfect for business-class desktop security, with Windows Hello and FIDO U2F certification; WebAuthn compatibility; encrypted end-to-end security with Match-in-Sensor™ Fingerprint Technology; and a long (3.9 ft./1.2m) USB cable.

Security where, when, and how you need it

Enterprise Deployment

Enterprise Deployment

VeriMark™ IT easily integrates into an existing IT infrastructure, offers passwordless logon to Windows Hello™, Windows Hello™ for Business, and other Microsoft services on Edge, and makes it easy for IT to manage employee access, privileges, and passwords.
Government Use

Government Use

VeriMark™ IT is TAA compliant and can be used to support a company’s cybersecurity measures consistent with (but not limited to) such privacy laws as GDPR, BIPA, and CCPA.
Personal Security

Personal Security

Both VeriMark™ and VeriMark™ IT fingerprint keys deliver out-of-the-box access for Windows computers and platforms, including biometric login for Windows Hello™, Google, Dropbox, GitHub, and Facebook. Compatible with popular password managers.

FAQs

  • What is biometric authentication?
  • How does biometric authentication work?
  • What are biometric authentication methods?
What is biometric authentication? Chevron Icon

Biometric authentication is the technology used to confirm one’s identity that helps create a secure, password-less access model for enhanced security.

How does biometric authentication work? Chevron Icon

Today’s biometric authentication systems use the same forensic methods to compare and match two sets of biological characteristics. First, you register your information in a system and connect it to your profile. How the system matches your information to the stored records depends on the type of biometrics involved.

What are biometric authentication methods? Chevron Icon

Some types of biometric authentication methods available are:

  • Fingerprint scanners
  • Facial and voice recognition
  • Iris scanners
  • Hand geometry

The most common type of biometric authentication available today is fingerprint scanners. The scanners and software are becoming more common in laptops, mobile devices, or as a connected peripheral to improve your device security.

Live chat by BoldChat