Skip to content
Techzine Global
  • Home
  • Topstories
  • Topics
    • Analytics
    • Applications
    • Collaboration
    • Data Management
    • Devices
    • Devops
    • Infrastructure
    • Privacy & Compliance
    • Security
  • Insights
    • All Insights
    • Agentic AI
    • Analytics
    • Cloud ERP
    • Generative AI
    • IT in Retail
    • NIS2
    • RSAC 2025 Conference
    • Security Platforms
    • SentinelOne
  • More
    • Become a partner
    • About us
    • Contact us
    • Terms and conditions
    • Privacy Policy
  • Techzine Global
  • Techzine Netherlands
  • Techzine Belgium
  • Techzine TV
  • ICTMagazine Netherlands
  • ICTMagazine Belgium
Techzine » News » Security » Microsoft secures businesses with facial recognition
2 min Security

Microsoft secures businesses with facial recognition

Face Check widely available

Laura HerijgersAugust 14, 2024 3:59 pmAugust 14, 2024
Microsoft secures businesses with facial recognition

Microsoft’s Entra Verified ID will now offer facial recognition as a login method. This becomes possible now that the company makes Face Check technology generally available to business users. It can also be purchased as a separate solution.

Face Check should offer businesses a secure and simple login method. The authentication capability has recently been available as a separate solution and as part of the Microsoft Entra Suite.

The technology compares an employee’s uploaded photo in Verified ID with the person sitting behind the work laptop. Verification costs companies $0.25 per verification. It is also part of the Verified ID suite for premium users.

Source: Microsoft

Companies know who is logging in

Facial recognition is a solution to hacks that occur with stolen login credentials. According to Microsoft, this is a common problem: “Attackers use insecure login credentials in 66% of attack paths.” Most recently, Ticketmaster fell victim to a data breach in this manner.

Also read: Ticketmaster incident shows: attackers no longer break in, but log in

It also gives more security to companies that remotely onboard employees. For this method of work, deepfakes are a growing challenge. This is because it is increasingly difficult to verify through digital channels whether a person is who he or she claims to be. Even for tech companies, this is not always clear, as the North Korean infiltration at KnowBe4 showed.

Tip! Scammers abuse AI to acquire IT jobs in key companies

Tags:

facial recognition / Login / Microsoft / Microsoft Entra ID

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Stay tuned, subscribe!

Nieuwsbrieven*

Related

Slackbot can take over the role of Microsoft Copilot on any business PC

Microsoft secures AI agents with Defender, Entra, and Purview

Major warning: Secure your Microsoft environment

Microsoft now enforces stricter security within Intune

Editor picks

Wiz: AI is infrastructure, even if not everyone realizes it yet

Despite ongoing doubts about the exact details of AI adoption, the te...

Nexperia denies that it intends to harm Wingtech shareholders

Significant financial consequences for Nexperia owner Wingtech are no...

OpenAI ends exclusive partnership with Microsoft, AWS welcomes models

Microsoft is losing its exclusive access to OpenAI’s technology. Op...

Google Gemini Enterprise to become the AI platform for everyone

Gemini Enterprise was introduced a few months ago as the new AI tool ...

Techzine.tv

Your network isn't ready for AI: Here's what needs to change

Your network isn't ready for AI: Here's what needs to change

How JFrog secures binaries in the age of AI coding assistants

How JFrog secures binaries in the age of AI coding assistants

NetApp balances sovereignty with AI infrastructure needs

NetApp balances sovereignty with AI infrastructure needs

Cisco doubled down on compute for the AI and edge era

Cisco doubled down on compute for the AI and edge era

Read more on Security

Security by Design prevents higher bills
Top story

Security by Design prevents higher bills

Those who build in security only after the fact pay up to fifteen times the original cost. That’s why a str...

Berry Zwets April 16, 2026
Critical kernel vulnerability affects a wide range of Linux distributions

Critical kernel vulnerability affects a wide range of Linux distributions

A recently discovered vulnerability in the Linux kernel is causing concern within the open-source community. ...

Mels Dees 21 hours ago
NTT Research wants to accelerate innovation with Scale Academy: SaltGrain is the first result
Top story

NTT Research wants to accelerate innovation with Scale Academy: SaltGrain is the first result

Attribute-based encryption at the data layer

Sander Almekinders April 15, 2026
OpenAI prepares GPT-5.5-Cyber for trusted security researchers

OpenAI prepares GPT-5.5-Cyber for trusted security researchers

OpenAI is preparing to launch GPT-5.5-Cyber. It is to be a specialized cybersecurity model restricted to vett...

Erik van Klinken 17 hours ago

Expert Talks

The only thing constant in technology is change, except for unrealistic hopefulness

The only thing constant in technology is change, except for unrealistic hopefulness

If anyone was ever forced to pick the tritest phrase in the world, it...

mnemonic opens Dutch Security Operations Centre (SOC) and relocates to new office in Utrecht

mnemonic opens Dutch Security Operations Centre (SOC) and relocates to new office in Utrecht

The new SOC in the Netherlands further strengthens mnemonic’s regio...

AI governance: the invisible prerequisite for success

When AI never gets past the demo

Agentic AI is reshaping the network – and it’s time to upgrade

Wireless connectivity is becoming a critical infrastructure for the A...

Tech calendar

Team '26

May 5, 2026 Anaheim

Knowledge 26

May 5, 2026 Las Vegas

GISEC GLOBAL 2026

May 5, 2026 DUBAI

Red Hat Summit

May 11, 2026 Atlanta

DevOpsCon London

May 11, 2026 London

Digitale soevereiniteit in de boardroom

May 11, 2026 Maarssen

Whitepapers

Experience Synology’s latest enterprise backup solution

Experience Synology’s latest enterprise backup solution

How do you ensure your company data is both secure and quickly recove...

How to choose the right Enterprise Linux platform?

How to choose the right Enterprise Linux platform?

"A Buyer's Guide to Enterprise Linux" comprehensively analyzes the mo...

Enhance your data protection strategy for 2025

The Data Protection Guide 2025 explores the essential strategies and...

Strengthen your cybersecurity with DNS best practices

The white paper "DNS Best Practices" by Infoblox presents essential g...

Techzine Global

Techzine focusses on IT professionals and business decision makers by publishing the latest IT news and background stories. The goal is to help IT professionals get acquainted with new innovative products and services, but also to offer in-depth information to help them understand products and services better.

Follow us

Twitter
LinkedIn
YouTube

© 2026 Dolphin Publications B.V.
All rights reserved.

Techzine Service

  • Become a partner
  • Advertising
  • About Us
  • Contact
  • Terms & Conditions
  • Privacy Statement