I recently had the opportunity to attend Identity Week in Washington, D.C. While this is a smaller conference compared to RSA Conference or Black Hat, some of the conversations were just as powerful and much more focused on the identity market. I was at first encouraged by the large focus of biometrics at the conference, but quickly discouraged upon seeing the limited use cases many of the vendors were promoting.
Biometrics has the potential to make identities more secure while improving ease of access for users. Smart phone companies have caught on to this, and most major cell phones now allow unlock utilizing a fingerprint or even facial recognition. But one of the challenges, of course, is capturing those biometrics, securely storing a representation of them in digital format, then accurately comparing the biometrics on file to a user. So, I was very happy to see a large number of biometrics vendors at the conference featuring their capture and storage technologies. Unfortunately, many of these vendors seem unsure what to do with the biometrics once they’ve been captured.
The most common question I asked these vendors was, “What can I do with these biometrics after I’ve captured them?” In most cases, the response was focused on background checks or similar verification of identity, such as employee onboarding requirements for human resources. But that seems to be where most of these vendors stopped – no integration with identity access management, identity governance, or access control technologies. While there were several vendors present offering identity governance, none of these vendors seemed to have strong integration with any of the biometrics capture technologies.
Imagine an employee onboarding experience that goes something like this:
With biometrics and identity governance technology currently available, all of this should be possible. As an industry, though, we seem very siloed and unable to expand the scope of what our solutions can do, even if it’s through third-party integrations. Instead of developing smooth integrations for easy onboarding, we put the bulk of the work on the new employee, requiring them to fill out multiple forms with duplicate information and visit multiple departments, then employees perform duplicate working entering this same information into multiple, separate systems. While it’s great that these duties are separated, the usage of an integrated system should be the true goal of any identity governance efforts through the total management of a complete employee identity’s lifecycle.
I’m very encouraged by the advances being made in the realm of biometrics, identity access management, access control, and identity governance. Now, it’s time to bring it all together and operate as a single, unified system for enterprise identity governance.