Biometrics to Unveil Face Recog Tech at ISCBiometrics to Unveil Face Recog Tech at ISC
Bioscrypt announced the unveiling of its 3D face recognition solutions will take place at the ISC West Conference, March 28th - 30th
March 22, 2007
TORONTO -- Bioscrypt Inc. (TSX: BYT), a leading provider of enterprise access control technology, today announced the unveiling of its 3D face recognition solutions will take place in booth 17087 at the ISC West Conference, March 28th - 30th.
With the acquisition of A4Vision, Bioscrypt is the first company to offer off-the-shelf finished readers for both finger and 3D face biometrics for use in physical access control. This unique position allows Bioscrypt to further establish itself as the leading vendor of access control technologies to the enterprise.
Bioscrypt will also be exhibiting:
VeriSeries readers featuring industry-leading fingerprint biometric authentication technology for physical access control
VisionAccess solutions featuring industry-leading 3D face biometric authentication technology for physical access control
VeriSoft Single Sign On, Bioscrypt's logical access solution that supports both finger and 3D face biometrics All above products also support card and PIN protocols for identity verification, while VeriSoft extends further to include passwords, tokens and other methods of authentication.
"As one of the premiere security showcases in North America, the ISC West show is the perfect opportunity to demonstrate our 3D facial products and show how this new capability fits into our continuing commitment to the Door to Desktop vision," said Robert L. Williams, President and CEO of Bioscrypt. "We are looking forward to unveiling this next evolution in our solutions for access control to our channel partners, integrators and prospective customers."
About the Author(s)
Tricks to Boost Your Threat Hunting GameNov 06, 2023
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
The Burnout Breach: How employee burnout is emerging as the next frontier in cybersecurity
AI in Cybersecurity: Using artificial intelligence to mitigate emerging security risks
Protecting Critical Infrastructure: The 2021 Energy, Utilities, and Industrials Cyber Threat Landscape Report