Chapter 12. Preparing for the Proof of Concept and Selecting a Vendor

There are many different types of biometric systems available on the market. Chapter 4 explained what makes a good biometric for network security. Once the decision has been made about which biometric system to use, it needs to be implemented in the company. Since this particular implementation will impact the daily use of the network and the applications on the users' desktops, it cannot be done without planning and testing. The stages in accomplishing this include:

  • Preparation for the proof of concept (POC) and vendor selection

  • Pilot design and implementation

  • Final deployment and rollout of the biometric system

Each of the above stages comprises a separate chapter in this section. ...

Get Biometrics for Network Security now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.