Fujitsu launches biometric authentication solution

Fujitsu PalmSecure ID Login solution can replace traditional password logins

Tags: BiometricCyber crimeFujitsu Ltd (www.fujitsu.com)Fujitsu Technology Solutions - UAE
  • E-Mail
Fujitsu launches biometric authentication solution Fujitsu PalmSecure is already being deployed across the world (Shutterstock)
By  Aasha Bodhani Published  June 18, 2017

Fujitsu has launched a biometric authentication solution that allows organisations to secure their networks against unauthorised access and reduce the risk of attack from hackers.

The PalmSecure ID Login integrates Fujitsu's biometric palm vein authentication technology into corporate network environments using Microsoft Active Directory - helping boost IT security while also making it easier for users to log on to their system without needing to remember complex passwords.

To log on to their PC, or authenticate for internal system access, PalmSecure ID Login users hover their hand over a contactless palm vein scanner. As each palm vein pattern is unique and it stays the same throughout a person's life, it works by capturing an infrared scan of oxygen-depleted blood veins within the palm of a hand.

Enrolled users can log in from any device within a corporate network, since PalmSecure ID Login is connected to Microsoft Active Directory, which centrally manages and stores all access data, including biometrics.

Thomas Bengs, director and Head of Biometrics at Fujitsu in EMEIA, said: "Replacing password logins with palm vein biometric authentication technology reduces the risk of misuse from stolen or unsecured passwords, including the worst-case scenarios of catastrophic hacker attacks, identity fraud and large scale data theft. It's also impossible to forget your credentials, since they're in the palm of your hand - unlike a smart card, or a difficult to remember password."

Fujitsu PalmSecure is already being deployed across the world by government organisations, in data centres, by healthcare providers, at airports and in banks for controlling mission-critical site access, time logging, web access, mobile apps and network login. The technology operates ‘live' in real-time and is resistant to forgery, since authentication includes checking that blood is still flowing.

Add a Comment

Your display name This field is mandatory

Your e-mail address This field is mandatory (Your e-mail address won't be published)

Security code