Biometric Technology Now at Assured

Assured’s TripleHelix® is the most comprehensive risk assessment system and the most precise cyber risk diagnostic system available. TripleHelix® comes with an optional run of AssuredScanDKV®, a deep software scanner than detects all known vulnerabilities lurking in software residing in a network.

This powerful framework also delivers a roadmap of cyber health improvements, a unique CyberScore® to measure and benchmark progress, plus it populates your Regulatory Compliance Dossier, all in one solution.

Now Assured has added a suite of biometric solutions to its comprehensive cybersecurity arsenal.


Biometrics measure and analyze a person’s unique characteristics. There are two types of biometrics: behavioral and physical. Behavioral biometrics are generally used for verification while physical biometrics can be used for either identification or verification. Integration of biometrics with state-of-the-art cybersecurity is at hand.

TripleHelix® Framework

Behavioral Biometrics

There are several behavioral biometric technologies that find unique identifying characteristics based on a user’s behavior while using their systems (keyboards, mouse, etc.).

Behavioral biometrics address major challenges in cyber defense and online fraud protection. Unlike physiological solutions, many behavioral biometrics do not require special hardware for data collection. They can be collected using standard devices such as a mouse, keyboard or smartphone; all which are readily available.

Physical Biometrics

Physical biometrics are based on a person’s unique and measurable physical traits like their fingerprints, retinas and face. These characteristics are scanned by a device that connects to a database. The goal is to identify the individual by matching their unique traits to an existing record/file.

Biometric Technologies Chart

How it Works

Depending on the application, biometric technology uses three primary modes of operation:

  1. Enrollment—each user has their own biometric template that is created for them by capturing sample data and constructing a mathematical representation of corresponding biometric traits.
  2. Verification—the user claims a distinct identity (e.g. by supplying a user name or identification). The person’s identity is validated by comparing the captured biometric data with the biometric template(s) stored in the system database for the claimed identity. It is a 1-to-1 matching process.
  3. Identification—the system must identify a sample, like a latent fingerprint at a crime scene, by comparing it to all existing templates in a database until there is a match.


Assured will secure this data in storage, in transit and in cybersecurity access. It’s the perfect synergy of cybersecurity and biometrics.

To learn more about Assured’s biometric capabilities, please contact us:

    Areas of Interest:
    Threat DetectionRisk AssessmentID AuthenticationBiometric Scanning & RecognitionNY State Cyber RegulationsCyber Security Compliance & ReportingEncryption Management

    Submission of this form indicates your willingness to accept communications from Assured Enterprises, Inc about products and services offered.