Chapter 12. Preparing for the Proof of Concept and Selecting a Vendor

There are many different types of biometric systems available on the market. Chapter 4 explained what makes a good biometric for network security. Once the decision has been made about which biometric system to use, it needs to be implemented in the company. Since this particular implementation will impact the daily use of the network and the applications on the users' desktops, it cannot be done without planning and testing. The stages in accomplishing this include:

  • Preparation for the proof of concept (POC) and vendor selection

  • Pilot design and implementation

  • Final deployment and rollout of the biometric system

Each of the above stages comprises a separate chapter in this section. ...

Get Biometrics for Network Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.