CyberKey Teams on BiometricsCyberKey Teams on Biometrics
CyberKey has signed a Memorandum of Understanding with a leading manufacturer of biometric technology
May 16, 2006
ST. GEORGE, Utah -- CyberKey(R) Solutions, Inc. (OTC: CKYS) is pleased to announce that the Company has signed a Memorandum of Understanding with a leading manufacturer of biometric technology products. According to the terms of the Memorandum of Understanding, the companies have agreed to market each other's products and the manufacturer is also expected to develop and privately label biometric security solutions for CyberKey Solutions, Inc. to market and distribute to their military and government customers.
Biometrics is a method of authenticating the identity of a person based on physiological or behavioral characteristics. The most well known method is fingerprint identification, but other technologies include facial recognition, hand geometry, retinal scanning and voice recognition. The undisclosed company develops, markets, and supports a portfolio of highly robust proprietary security, OEM, and Biometric solutions. Additionally, they provide research and development services for the biometric industry worldwide.
"This agreement is a significant accomplishment for both companies and we look forward to future success with them. Their unique Biometric security solutions will be an important addition to our CyberKey product line and will allow us to further enhance our already robust security features and enter the multi-million dollar biometrics security market," stated Jim Plant, CEO of CyberKey Solutions, Inc.
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
Quantifying the Gap Between Perceived Security and Comprehensive MITRE ATT&CK Coverage
The Evolving Ransomware Threat: What Business Leaders Should Know About Data Leakage
Managed Security and the 3rd Party Cyber Risk Opportunity Whitepaper