IRIS ID

/IRIS ID

About IRIS ID

This author has not yet filled in any details.
So far IRIS ID has created 192 blog entries.

Iris ID Technology Is Scalable

The word “scalability” is often used by manufacturers when they mention their products. But what does scalability really mean as it relates to the use of biometrics in security, national identity programs or time and attendance? Scalability refers to the ability of a product or system to keep up with an organization’s growth or other

December 10th, 2019|Blog|

U.S. Marshals Video Shows Iris ID Technology in Booking Stations

A recent video from the United States Marshals Service shows how Iris ID technology will be incorporated in booking stations operated in each of the agency’s 94 judicial districts across the country. When installed, these stations will include the collection of a suspect’s fingerprints, facial photograph, iris capture, signature and other demographic information. All components

December 2nd, 2019|Blog|

AST Names 2019 ‘ASTORS’ Homeland Security Awards Winners at the Javits Center in NYC

Thousands of government and security industry and security and public safety professionals convened in New York City last week to meet with experts from over 350 industry-leading innovators and technical reps, at the Northeast’s largest physical and IT security trade show to check out the latest in security technologies. A prominently featured Special Event on the opening day of ISC East,

November 26th, 2019|News|

Iris ID Wins Third Prestigious ASTORS Award

For the third time in four years, Iris ID was named a platinum-level winner in the American Security Today’s annual ASTOR awards program. The magazine recognized Iris ID’s IrisAccess iCAM 7S identity authentication platform as 2019’s Best Facial and Iris Recognition product during a ceremony at the recent ISC East conference in New York City.

November 21st, 2019|Blog|

Multi-Factor and Multi-Layer Identification Are Not Necessarily the Same

By Mohammed Murad The use of two-factor identification (2FA) for authenticating a person’s identity is widely recognized as a best practice for enterprise physical and logical access control. Yet people often refer to multi-layer authentication (MLA) and multi-factor authentication (MFA) as though they are the same time. That’s not necessarily true. A good end-to-end solution

November 19th, 2019|Blog|
  • Iris Time

IrisTime: The Timeclock for the Modern Workforce

By Mohammed Murad Ensuring all employees are paid on time, accurately and in accordance with local tax codes, labor laws and corporate policies is one of the biggest challenges facing human resource managers. The process involves identifying employees as they clock in and out each workday and then integrating that data with payroll software applications

November 12th, 2019|Blog|
  • Iris and finger biometrics

FBI Recommends Including Biometrics as Part of Multi-Factor Authentication

By Mohammed Murad Multi-factor authentication (MFA) has become a popular tool for organizations to authenticate the identity of employees and vendors using the corporate network. These MFA efforts often include the use of tokens and multi-digit codes sent to smartphones in an effort to reduce successful cyberattacks. However, a recent FBI report found criminals have

November 4th, 2019|Blog|
  • cybersecurity symbol

SMBs Can Benefit from End-to-End Security

By Mohammed Murad A recent survey by a leading computer security and encryption provider found two-thirds of global small and mid-sized business had suffered a cyberattack within the past 12 months. That’s scary. But what may be even more frightening is that U.S. businesses report their attacks are almost twice as likely to come from

October 29th, 2019|Blog|
  • Iris Time

Iris Time FAQ

What is IrisTime™? IrisTime™ is a fully customizable time and attendance platform designed to meet the needs of organizations small and large. It is a product of Iris ID, the global leader in iris recognition technology for 20 years. IrisTime enables the creation an application eco-system for the time and attendance market.  It designed to

October 21st, 2019|Blog|
  • GDPR Logo

Data Privacy Requires a Security Response

By Mohammed Murad This is where biometrics can play an important role in securing databases. Passwords, cards and PINs can be hacked, shared or stolen; a biometric identifier cannot. Biometrics offer a way for our industry to meet security goals for the protection of data while also restoring public confidence. Biometrics involve the measurement of

October 4th, 2019|News|