Cross Match Technologies
Cross Match Technologies
Blog Post

New blog articles detected.

  • Retail Loss Prevention Strategies – Part I
    In this blog series, I am going to talk about challenges facing the retail industry and share some strategies for protecting hard won profits while increasing efficiency at the store front. The good news is that there are concrete steps that retailers can take to strengthen their bottom lines no matter what market changes are afoot. Retail Loss Prevention Strategies – PART I Retailers Respond to T...
Cross Match Technologies
Cross Match Technologies
Blog Post

New blog articles detected.

  • EU General Data Protection Regulations. What You Need to Know
    If you do business in or with the European Union there are important changes coming that will impact how your business collects, stores, and manages personal user data for citizens of EU member states. Known as the General Data Protection Regulation (GDPR), it will require your organization to review and refine its data handling, security, privacy, and compliance procedures or potentially face hef...
Cross Match Technologies
Cross Match Technologies
Blog Post

New blog articles detected.

  • The Role of Biometrics in a Cashless Society
    The days of writing checks and carrying around wads of dollars appear to numbered as the trend towards more “cashless” transactions gains momentum. The reason? Biometric technology is leading the way as the primary driver to a more secure and trusted payments ecosystem. How Biometrics Factors In In the technological arms race of hackers against payment providers and merchants, biometrics play a vi...
Cross Match Technologies
Cross Match Technologies
Blog Post

New blog articles detected.

  • Going Beyond 2FA With Citrix NetScaler
    Mobility is becoming both the present and the future of working professionals because organizations have found it essential to embrace the flexibility of a mobile workforce if they want to stay competitive and expand their global presence. With the latest trend of allowing access to company resources at any time, in any location, the question of security always comes up. Citrix NetScaler two-facto...
Cross Match Technologies
Cross Match Technologies
Blog Post

New blog articles detected.

  • Facebook is Getting Rid of Passwords, When Will You?
    The password is dead. I know it’s true because I read it on Facebook. The social media giant announced plans to replace static passwords with something more secure and easier to recover for their users. The headline value of this announcement is worth a thousand blogs. But stepping back for just a moment, you realize they have tapped into the zeitgeist of the moment. There is a general stampede aw...
Cross Match Technologies
Cross Match Technologies
Blog Post

New blog articles detected.

  • A Bridge Too DFARS: Authentication and the DoD Deadline for Cyber Compliance
    In the epic war film “A Bridge Too Far,” a group of World War II GIs scramble to save the last bridge crossing over a river before the enemy blows it up. If you’re a U.S. Department of Defense prime or sub-contractor, you may feel like you’re facing a similar mad dash, only in this case, to meet compliance with the Defense Federal Acquisition Regulation Supplement –A Bridge Too DFARS? Ok, cornines...
Cross Match Technologies
Cross Match Technologies
Blog Post

New blog articles detected.

  • 5 Things You Need to Know to Become a GDPR Authentication Hero
    Take a deep breath. Okay, now process this: we are a mere 365 days until the General Data Protection Regulation becomes enforceable. That’s right, on 25 May 2018, a wave of new regulations embodied in GDPR go into effect with far-ranging consequences for your authentication and identity strategy. If 365 days sounds like a lot of time to get your act together, seek out, test, and implement technolo...
Cross Match Technologies
Cross Match Technologies
Blog Post

New blog articles detected.

  • Solving the Challenge of “Combined” Fingerprints in EBTS 10.0
    When the FBI released the EBTS 10.0 specification in 2013, it contained requirements for a number of capabilities which were not yet available on the market. Over time, the biometrics industry and the FBI itself have partnered to meet the high bar set by EBTS 10.0, delivering new functionality and robust standards to end users in the field. Mobile tenprint enrollments are one area where EBTS 10.0 ...
Cross Match Technologies
Cross Match Technologies
Blog Post

New blog articles detected.

  • Fingerprint Image Capture Quality
    Under normal conditions, commercially-available fingerprint scanning systems are able to capture quality prints that satisfy the FBI’s Appendix F certification but there is still a sizable group of individuals with difficult-to-capture fingerprints due to various physical and environmental conditions. Fingerprinting was traditionally the mainstay of law enforcement but the increasing demand from b...
Cross Match Technologies
Cross Match Technologies
Blog Post

New blog articles detected.

  • Revisiting the NIST 800-63-3 SMS Authentication Conversation
    It’s been nearly a year since the National Institute of Standards and Technology, commonly referred to as NIST, rocked the two-factor authentication world with its recommendation that classic, traditional Short Message Service (SMS) not be used to deliver One-Time Passwords. The recommendation—in their draft 800-63-3—set off a wave of debate in the security community over the role of the entrenche...
Cross Match Technologies
Cross Match Technologies
Blog Post

New blog articles detected.

  • Is Privatization the Future of Travel Security Technology?
    When Crossmatch participated in the recent World Border Congress in Morocco, we were treated to a behind-the-scenes tour of Casablanca airport. During the tour, one piece of the security workflow stood out as symptomatic of a new trend in the travel security industry. After passing through physical security checks and standard border control procedures, travelers are put through a secondary check,...
Cross Match Technologies
Cross Match Technologies
Blog Post

New blog articles detected.

  • Should Children Be Fingerprinted?
    At Crossmatch, we have recently seen growing interest in the issue of fingerprinting children. As policymakers and operators start to grapple with the complicated issues surrounding this application of biometric technology, we thought we would lay out a few of our perspectives on the matter. In a recent advisory opinion, the European Union Agency for Fundamental Rights took up the complicated task...
Cross Match Technologies
Cross Match Technologies
Blog Post

New blog articles detected.

  • Cash Assistance Accountability with the Use of Biometrics
    There are an unprecedented 65 million forcibly displaced people worldwide as a result of conflict, persecution or environmental disasters. Perhaps the most glaring example is the ongoing Syrian refugee crisis which to date has displaced over 11 million people from their homes and resulted in 13.5 million people requiring humanitarian assistance. The sheer numbers alone of persons requiring assista...
Cross Match Technologies
Cross Match Technologies
Blog Post

New blog articles detected.

  • How Biometrics Advance the UN Sustainable Development Goals
    The UN Sustainable Development Goals set ambitious targets – some might say overly ambitious. Statements like “zero hunger” and “no poverty” ring true on a conceptual level, but sound much harder when it comes to practical implementation. What helps us move the needle on these generational challenges? The key may lie in goal sixteen – specifically the “strong institutions” part which strives to pr...
Cross Match Technologies
Cross Match Technologies
Blog Post

New blog articles detected.

  • What Brexit Means for the United Kingdom/Ireland Border
    Immigration was the centerpiece of the Brexit campaign – a key factor in Britain’s decision to leave the European Union. During the lead-up to the vote, the term “immigration” was used as a shorthand reference to asylum seekers, refugees, and workers from the periphery of the EU. In reaction to the idea that floods of immigrants were changing British society for the worse, voters took the drastic ...
Cross Match Technologies
Cross Match Technologies
Blog Post

New blog articles detected.

  • Biometrics, the Sendai Framework and the Hidden Risk of Corruption
    Last week, Crossmatch introduced its new foreign assistance/disaster relief solution at the Action on Disaster Relief Conference in Panama. While at that conference, we heard a lot about the Sendai Framework for Disaster Risk Reduction, a handbook for disaster preparedness efforts around the world. That got us thinking about how biometrics fit into existing models of disaster preparedness. Disaste...
Cross Match Technologies
Cross Match Technologies
Blog Post

New blog articles detected.

  • The Impact of Trump’s Executive Order on Vetting
    Today President Trump signed several Executive Orders on immigration, including one which moves toward the “extreme vetting” of refugees which he promised during the campaign. Now that political rhetoric is being transformed into operational reality, what do those of us in the biometrics industry expect? What does “extreme” vetting really mean? The value of vetting (whether through biometrics or a...
  • Promoting Accountability in Foreign Assistance through Biometrics
    Fraud, waste and abuse are significant problems in the assistance sector. From ghost beneficiaries to “leakage” from aid warehouses, the entire foreign assistance supply chain is vulnerable to exploitation. This is not merely a theoretical problem – it is a reality which impacts assistance operations around the world every day. There are many examples: A report by the UN Security Council found tha...
  • ETIAS and the Future of Travel Authorization Systems
    Border management once consisted of an isolated encounter with an immigration officer at a border crossing point. Now it is a complex, layered process bristling with technology that extends beyond a simple passport check. As governments get more sophisticated about how they manage border security and secure immigration workflows, they are pushing the idea of a “border” far beyond the physical port...
  • Migrants Should Benefit from Identity Management
    International Migrant Day is a valuable reminder of the many hurdles faced by migrants in the world today. From those escaping brutal conflicts to those who simply seek a better life, migrants deserve respect and dignity to match their courage. Increasingly, identity management plays a critical role in the experience of migrants. Governments started using tools such as biometrics, documents and da...
  • What will replace the CAC card?
    DOD CIO Terry Halvorsen threw down the gauntlet at a Washington conference in June. The fifteen year-old Common Access Card, long the staple of physical and logical access in the military, will be phased out within two years. Now DOD agencies are searching for answers. What will replace the CAC card? The short answer: we don’t know. Halvorsen himself admitted in a later interview that he signalled...
  • Why INTERPOL is Urging Wider Use of Biometrics
    INTERPOL knows that the identity data in its database is the best weapon governments have in the fight against terrorism and criminal activity. This is no news to terrorists and criminals, who have long used forged documents, aliases and other methods of deception to maintain a tactical advantage over law enforcement. Today’s integrated data systems – particularly those developed after 9/11 – were...
  • Cyber Security Awareness for All
    October is National Cyber Security Awareness Month! Created under the leadership of the U.S. Department of Homeland Security and the National Cyber Security Alliance, NCSAM is a collaborative effort between government and industry to ensure every American has the resources they need to stay safer and more secure online. Many of the security recommendations provided during this month-long event foc...
Cross Match Technologies
Cross Match Technologies
Landing Page

New Mobile Optimized Landing Page Detected

Cross Match Technologies
Cross Match Technologies
Landing Page

New Mobile Optimized Landing Page Detected

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.