• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Valid Tech Assimilates Biometric Authentication Into the Enterprise

    February 13, 2007 Alex Woodie

    The brave new world of biometric authentication may be closer than you thought. As organizations struggle with identity management and password headaches, the promise of a simple way to authenticate users through a practically unspoofable tactic–reading their fingerprints–holds great possibility. And one vendor helping to drive the uptake of biometric authentication, Valid Technologies, just expanded its reach.

    Valid Tech’s biometric offering, called Valid Secure System Authentication (VSSA), is designed to be the backbone of an enterprise-wide, two-factor authentication system that simplifies user log-ons by eliminating reliance on passwords, and decreases help desk cost due to forgotten passwords.

    The product itself is composed of a development tool for directly embedding the VSSA calls into business applications written in RPG, COBOL, C++, Java, or Visual Basic, and a server component that runs under OS/400. Valid Tech recommends customers run VSSA on an iSeries, which its leaders consider to be the most secure business computer on the market, but that doesn’t stop VSSA from authenticating users who are logging onto applications running on other platforms.

    Once the software and devices have been installed, and users and their fingerprints (not the actual image, but a binary rendering of the image) have been enrolled into the system, people can start using the USB-based fingerprint readers, instead of passwords, to authenticate their log-ins. If the fingerprint data taken from fingerprint readers matches the data gathered during the initial enrollment period, the user is granted access. If it doesn’t, the user is denied access, and the event is noted in the log.

    Last week, Valid Tech announced several new ways that VSSA can be implemented into customers’ IT infrastructure and integrated with their current access control systems, including those from Microsoft.

    First, VSSA was validated by IBM to work with Tivoli Access Manager, giving the company and the product an edge at the large companies using Tovoli to control access to a variety of applications and platforms. “The combination of Tivoli best-of-breed enterprise security and management control with VSSA best-of-breed biometric authentication provides customers with tremendous competitive advantages,” says Greg Faust, Valid Tech’s CEO.

    Secondly, Valid Tech announced better integration with Windows machines through two new integration options: the VSSA Managed Domain Signon for Windows Active Directory and the VSSA Password Automation Service.

    According to Valid Tech, both solutions integrate at the domain controller level to deliver biometric authentication from a secure iSeries server–not a PC or AD domain server. People can use VSSA technology to authenticate from practically anywhere, using Virtual Private Network (VPN) or other Windows remote desktop technologies, Valid Tech says.

    The final bit of news out of Boca Raton, Florida, where Valid Tech keeps its headquarters, involves service oriented architecture (SOA) technology. The reception of the “Ready for IBM SOA” certification from IBM shows that VSSA has a central role in securing next-generation SOA architectures.

    “The IBM SOA principles of business resiliency and efficiencies are strongly supported in VSSA,” Faust says. “A secure, consistent, and manageable foundation for user authentication is essential if the enterprise is to stay compliant and competitive.”

    RELATED STORIES

    Valid Tech Delivers Biometric Authentication Solution for OS/400

    Two New iSeries ISVs Target Large Accounts



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Raz-Lee Security

    Start your Road to Zero Trust!

    Firewall Network security, controlling Exit Points, Open DB’s and SSH. Rule Wizards and graphical BI.

    Request Demo

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    Bytware:  StandGuard Network Security 3.0, the next generation of System i security
    nuBridges:  Leading provider of secure FTP on the iSeries
    COMMON:  Join us at the 2007 conference, April 29 – May 3, in Anaheim, California

    Books on Sale at the IT Jungle Store: 30 Percent Off for 30 Days

    The System i Pocket RPG & RPG IV Guide: List Price, $69.95; Sale Price, $49.00
    The iSeries Pocket Database Guide: List Price, $59.00; Sale Price, $41.00
    The iSeries Pocket Developers' Guide: List Price, $59.00; Sale Price, $41.00
    The iSeries Pocket SQL Guide: List Price, $59.00; Sale Price, $41.00
    The iSeries Pocket Query Guide: List Price, $49.00; Sale Price, $34.00
    The iSeries Pocket WebFacing Primer: List Price, $39.00; Sale Price, $27.00
    Migrating to WebSphere Express for iSeries: List Price, $49.00; Sale Price, $34.00
    iSeries Express Web Implementer's Guide: List Price, $59.00; Sale Price, $41.00
    Getting Started with WebSphere Development Studio for iSeries: List Price, $79.95; Sale Price, $56.00
    Getting Started With WebSphere Development Studio Client for iSeries: List Price, $89.00; Sale Price, $62.00
    Getting Started with WebSphere Express for iSeries: List Price, $49.00; Sale Price, $34.00
    WebFacing Application Design and Development Guide: List Price, $55.00; Sale Price, $38.00
    Can the AS/400 Survive IBM?: List Price, $49.00; Sale Price, $34.00
    The All-Everything Machine: List Price, $29.95; Sale Price, $21.00
    Chip Wars: List Price, $29.95; Sale Price, $21.00

    IBM X-Force Says For-Profit Cyber Attacks to Increase in 2007 Be Content with Content Assist

    Leave a Reply Cancel reply

Volume 7, Number 6 -- February 13, 2007
THIS ISSUE SPONSORED BY:

LANSA
Vision Solutions
LXI
SafeData
RJS Software Systems

Table of Contents

  • Lawson Brings Former Intentia ERP Suite Closer to Landmark
  • iSeries Web Adventures Call with iSafari
  • Valid Tech Assimilates Biometric Authentication Into the Enterprise
  • Gumbo’s Dumpster Dives Into i5/OS Spool Files
  • Security Vendors Form PCI Alliance
  • nuBridges Adds Invoice Management Capabilities to Existing Products
  • Table Tennis Giant Finds Extol the Right Fit for B2B
  • WorksRight Boosts Canadian Postal Code Processing
  • Agilon to Resell Linoma’s Transfer Anywhere Tool
  • XAware Updates Integration Software

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • You Can Now Get IBM Tech Support For VS Code For i
  • Price Cut On Power S1012 Mini Since Power S1112 Ain’t Coming Until 2026
  • IBM i: Pro and Con
  • As I See It: Disruption
  • IBM i PTF Guide, Volume 27, Number 30
  • The Turning Point For Power Systems Is Here, And Now
  • How IBM i Users Can Compete In The Digital Era With Composable Commerce
  • IBM Streamlines Data Migration With New Partition Mirror Tech
  • Profound Logic Adds MCP To IBM i AI Tool
  • IBM i PTF Guide, Volume 27, Number 29

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle