There are many different types of biometric systems available on the market. Chapter 4 explained what makes a good biometric for network security. Once the decision has been made about which biometric system to use, it needs to be implemented in the company. Since this particular implementation will impact the daily use of the network and the applications on the users' desktops, it cannot be done without planning and testing. The stages in accomplishing this include:
Preparation for the proof of concept (POC) and vendor selection
Pilot design and implementation
Final deployment and rollout of the biometric system
Each of the above stages comprises a separate chapter in this section. ...