Skip to content
Techzine Europe
  • Home
  • Topstories
  • Topics
    • Analytics
    • Applications
    • Collaboration
    • Data Management
    • Devices
    • Devops
    • Infrastructure
    • Privacy & Compliance
    • Security
  • Insights
    • All Insights
    • Agentic AI
    • Analytics
    • Cloud ERP
    • Generative AI
    • IT in Retail
    • NIS2
    • RSAC 2025 Conference
    • Security Platforms
    • SentinelOne
  • More
    • Become a partner
    • About us
    • Contact us
    • Terms and conditions
    • Privacy Policy
  • Techzine Europe
  • Techzine Netherlands
Techzine News Security Microsoft secures businesses with facial recognition
2 min Security

Microsoft secures businesses with facial recognition

Face Check widely available

Laura HerijgersAugust 14, 2024 3:59 pmAugust 14, 2024
Microsoft secures businesses with facial recognition

Microsoft’s Entra Verified ID will now offer facial recognition as a login method. This becomes possible now that the company makes Face Check technology generally available to business users. It can also be purchased as a separate solution.

Face Check should offer businesses a secure and simple login method. The authentication capability has recently been available as a separate solution and as part of the Microsoft Entra Suite.

The technology compares an employee’s uploaded photo in Verified ID with the person sitting behind the work laptop. Verification costs companies $0.25 per verification. It is also part of the Verified ID suite for premium users.

Source: Microsoft

Companies know who is logging in

Facial recognition is a solution to hacks that occur with stolen login credentials. According to Microsoft, this is a common problem: “Attackers use insecure login credentials in 66% of attack paths.” Most recently, Ticketmaster fell victim to a data breach in this manner.

Also read: Ticketmaster incident shows: attackers no longer break in, but log in

It also gives more security to companies that remotely onboard employees. For this method of work, deepfakes are a growing challenge. This is because it is increasingly difficult to verify through digital channels whether a person is who he or she claims to be. Even for tech companies, this is not always clear, as the North Korean infiltration at KnowBe4 showed.

Tip! Scammers abuse AI to acquire IT jobs in key companies

Tags:

facial recognition / Login / Microsoft / Microsoft Entra ID

"*" indicates required fields

Stay tuned, subscribe!

Nieuwsbrieven*
This field is for validation purposes and should be left unchanged.

Related

Yealink delivers secure collaboration with Microsoft’s MDEP

Microsoft set to withdraw direct kernel access from security software

Microsoft closes only one of two discovered Secure Boot bypasses

Microsoft launches free European Security Program: what does it entail?

Editor picks

Yealink delivers secure collaboration with Microsoft’s MDEP

The Microsoft Device Ecosystem Platform (MDEP) is scarcely one year o...

What is HPE VME and is it a direct competitor to VMware’s hypervisor?

HPE hit the bullseye with VME

HPE closes acquisition of Juniper Networks

Together for top spot

A Ferrari needs brakes, innovation needs cybersecurity

Practical insights into managed security from the field

Insight: Storage

It’s World Backup Day, but backups alone are not enough

It started as a Reddit post in 2011: World Backup Day. Every March 31...

Rubrik expands to AWS, Oracle Cloud Infrastructure and OpenShift

From now on, Rubrik is expanding and debuting its protection and back...

NetApp refreshes high-end AFF A-Series: all-flash for AI

NetApp refreshes high-end AFF A-Series: all-flash for AI

NetApp's all-flash portfolio is doing very well. Last year it grew by...

Storage is complex: think carefully about what you need

Storage is complex: think carefully about what you need

Complexity can make arranging storage difficult. Still, as an organiz...

Read more on Security

Ingram Micro hit by outage, being unavailable for almost a day

Ingram Micro hit by outage, being unavailable for almost a day

IT distributor Ingram Micro has been experiencing technical problems since 10 p.m. yesterday, rendering websi...

Berry Zwets 1 day ago
Hardcoded credentials in Cisco software give attackers root access

Hardcoded credentials in Cisco software give attackers root access

Patch available, no known exploitation

Erik van Klinken 1 day ago
IDE extensions threaten the software supply chain

IDE extensions threaten the software supply chain

Extensions in integrated development environments (IDEs) are useful tools that give developers more flexibili...

Erik van Klinken 2 days ago
A Ferrari needs brakes, innovation needs cybersecurity
Top story

A Ferrari needs brakes, innovation needs cybersecurity

Practical insights into managed security from the field

Sander Almekinders 3 days ago

Whitepapers

Experience Synology’s latest enterprise backup solution

Experience Synology’s latest enterprise backup solution

How do you ensure your company data is both secure and quickly recove...

How to choose the right Enterprise Linux platform?

How to choose the right Enterprise Linux platform?

"A Buyer's Guide to Enterprise Linux" comprehensively analyzes the mo...

Enhance your data protection strategy for 2025

The Data Protection Guide 2025 explores the essential strategies and...

Strengthen your cybersecurity with DNS best practices

The white paper "DNS Best Practices" by Infoblox presents essential g...

Tech calendar

GITEX DIGI_HEALTH 5.0 - Thailand

September 10, 2025 BITEC Bangkok, Thailand

IT Arena

September 26, 2025 Lviv, Ukraine

Innovation Week 2025

October 9, 2025 Prague

Luxembourg Venture Days

October 22, 2025 Luxembourg

Appdevcon

March 10, 2026 Amsterdam

Webdevcon

March 10, 2026 Amsterdam

Techzine Global

Techzine focusses on IT professionals and business decision makers by publishing the latest IT news and background stories. The goal is to help IT professionals get acquainted with new innovative products and services, but also to offer in-depth information to help them understand products and services better.

Follow us

Twitter
LinkedIn
YouTube

© 2025 Dolphin Publications B.V.
All rights reserved.

Techzine Service

  • Become a partner
  • Advertising
  • About Us
  • Contact
  • Terms & Conditions
  • Privacy Statement