O'Reilly logo

Biometrics for Network Security by Paul Reid

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 12. Preparing for the Proof of Concept and Selecting a Vendor

There are many different types of biometric systems available on the market. Chapter 4 explained what makes a good biometric for network security. Once the decision has been made about which biometric system to use, it needs to be implemented in the company. Since this particular implementation will impact the daily use of the network and the applications on the users' desktops, it cannot be done without planning and testing. The stages in accomplishing this include:

  • Preparation for the proof of concept (POC) and vendor selection

  • Pilot design and implementation

  • Final deployment and rollout of the biometric system

Each of the above stages comprises a separate chapter in this section. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required