HID Global

White Paper

Considerations for Banks and Financial Institutions

HID Global

White Paper

Considerations for Banks and Financial Institutions

Smart devices, mobile phones and tablets are becoming the control hub for the myriad of connected devices and the Internet of Things (IoT) – as are bring-your-own-device (BYOD) policies in many organizations today. But this is creating unique and heightened security risks for IT professionals, such as higher exposure to data breaches, malware and compliance violations. BYOD is no longer an industry trend; it’s a fact of life for enterprise-wide operations and the IT organizations that must support them.

As technology becomes more intelligent, so do fraudsters, who continuously come up with new, innovative ways to trick users into giving up their personal and security details.

Behavioral biometrics, in contrast to physical biometrics which track users’ height, weight and appearance, identify unique and measurable patterns in human behavior. The patterns create a behavioral biometrics profile and can consist of everything from the user's IP address, to how the user interacts with an application, which device they use, how they hold the device and even their typing patterns.

It is a revolutionary technology that enables increased real-time fraud detection and prevention.

However, using this technology raises new questions on collecting, processing and protecting personal data. You may wonder what legislation and regulations are in place to cover the privacy and security aspects of behavioral biometrics technology.

This white paper examines the legal framework of the EU legislation, mainly GDPR, in the area of biometric systems and data, and discusses how Risk Management Systems (RMS), like HID’s solution, uses behavioral biometrics to fight fraud.

Meet the Speaker

Download the white paper

Smart devices, mobile phones and tablets are becoming the control hub for the myriad of connected devices and the Internet of Things (IoT) – as are bring-your-own-device (BYOD) policies in many organizations today. But this is creating unique and heightened security risks for IT professionals, such as higher exposure to data breaches, malware and compliance violations. BYOD is no longer an industry trend; it’s a fact of life for enterprise-wide operations and the IT organizations that must support them.

Assa Abloy

© HID Global Corporation/ASSA ABLOY AB. All rights reserved. Privacy | Terms of Use | Contact Us