< Day Day Up > |
There are many different types of biometric systems available on the market. Chapter 4 explained what makes a good biometric for network security. Once the decision has been made about which biometric system to use, it needs to be implemented in the company. Since this particular implementation will impact the daily use of the network and the applications on the users' desktops, it cannot be done without planning and testing. The stages in accomplishing this include:
Each of the above stages comprises a separate chapter in this section. Each stage is dependent on the success of the previous one, which means that every stage needs to be completed. Skipping stages will result in failures and disappointments in the biometric system. Two examples will further illustrate the application of the methodologies being discussed. The examples are a culmination of actual implementations done over several years . The names and companies have been changed, but the situations are real. At the end of each example, the actual methodologies are explained in detail. The first example is told from the perspective of Martin. Martin works for a Fortune 500 financial institution as a senior manager for a technology group . Martin's story illustrates what happens when the suggested methodologies are used. The second example is told from the perspective of Jason. Jason works for a large corporate enterprise with locations throughout the world and is a project manager working for the corporate IT organization. Jason's story illustrates what happens when the suggested methodologies are not adhered to. The POC and vendor selection involve the following steps:
Each part of the POC is discussed in great detail in this chapter. |
< Day Day Up > |