Jeff Carpenter, Director of Identity Solutions
There is little doubt that the omnipresent “passwords” that act as the sentry securing access to the mass of sensitive data are fraught with risks and vulnerabilities. The challenge looming ahead for most organizations seeking an improved authentication process is on achieving a better state of access validation which is easy and quick for users while being elegant for the IT department. Setting a new paradigm in the multifactor authentication era, Crossmatch today empowers clients by providing cutting-edge convenience-optimized identity management solutions and a wide range of secure authentication methods.
At the heart of Crossmatch’s multifactor authentication solution is DigitalPersona, highly sophisticated identity and access management software that offers advanced authentication capabilities by considering a wide set of user factors such as fingerprints, keystrokes, user credentials, location, geolocation, and the user’s network. The solution’s unified management interface provides different types of authentication capabilities such as one-time passwords and smart card authentication.“We recently introduced the keystroke biometrics feature, an automated method of identifying the genuine user based on the rhythm of typing on a keyboard,” says Jeff Carpenter, Director of Identity Solutions, Crossmatch. Pioneering the access control solutions landscape, Crossmatch today is one of the largest independent providers of biometric hardware.
One of the core reasons for organizations gravitating towards Crossmatch is their solution’s flawless installation process. Rather than having a separate server, patching, or hardening process, Crossmatch has integrated DigitalPersona with Microsoft Domain Controller. “We use MS Active Directory replication scheme and even our management interface looks like the Microsoft management console,” explains Carpenter. For organizations moving to the cloud, Crossmatch has integrated with Microsoft office 365 ADFS, providing administrators with seamless configuration and management for logging on to Windows, network, and web resources.
The recently introduced keystroke biometrics feature is an automated method of identifying the genuine user based on the rhythm of typing on a keyboard
Furthermore, the product is compatible with solutions from Citrix, Juniper, and IBM. Oftentimes customers have one authentication system that supports the cloud users and another for their on-premise legacy users. “Our message is simple; with DigitalPersona, organizations can leverage the advantage of a solution that integrates with legacy, mobile, or on-premise applications, as well as web and cloud applications.”
Since opening its doors in 1996, Crossmatch’s highly advanced biometrics technology portfolio coupled with a unique blend of professional services offerings has made it an optimal solution provider for customers that include retail organizations, financial institutions, law enforcement agencies, governments, and defense departments. Explaining the value proposition of Crossmatch, Carpenter recalls an instance when the company assisted the GesaCredit Union to align with requirements for users to have different passwords for every application they use in the credit union. With the Crossmatch Password Manager, the company can replay different strong passwords to the credit application regardless of whether it is next-gen web-based, cloud, or legacy system.
Contemplating on the future of passwords, Carpenter draws attention to a very important question, “If your password is stolen, you can create a new one; but what happens if your fingerprint is stolen?” To tackle this scenario, Crossmatch’s think tank is set out to lead the way to a secure biometric template storage era. The company is developing a system with highly sophisticated algorithms to scramble the biometric templates to render them unusable and irreversible if stolen. In the long run, the company’s focus is on expanding its footprint across Europe, America, Latin Americas, and the Middle East to cater to the growing market requirements for secure authentication.