Insights.
The 5 Most Frequently Asked Questions About the Cyber Resilience Act (CRA) in Biometric Access Control
The impact of the Cyber Resilience Act is still often underestimated in practice. The questions we are frequently asked: Who must comply with the CRA? We do not manufacture anything. Why does this concern us? We are not subject to NIS2. Why is this still relevant for...
The EU Cyber Resilience Act (CRA) and Biometric Access Control
The EU Cyber Resilience Act (CRA) and Biometric Access Control With the Cyber Resilience Act (Regulation (EU) 2024/2847), the European Union introduces binding cybersecurity requirements for products with digital elements placed on the EU market. The regulation is...
Why Europe is increasingly moving toward full ownership and control of data
Why Europe is increasingly moving toward full ownership and control of data. Europe is moving toward full data ownership. This may involve data storage within Europe or within an organization’s own infrastructure. Why? Because data stored elsewhere may fall under...
What is vein pattern recognition and how does it work?
In the world of biometric security, vein pattern recognition is an innovative technique that is gaining more and more traction. But what exactly is it, and how does it work? What is vein pattern recognition? Vein pattern recognition is a biometric technique that uses...
From Responsibility to Progress
In recent years, it has become clear that legislation such as the GDPR and, more recently, the NIS2 Directive has led to stagnation, confusion, and hesitation within organizations. In both cases, the root cause lies not in the intent of the legislation, but in the way...
Superuser functionality biometric technology
Due to the explosive growth of cybercrime, the need for higher levels of security will increase enormously in the coming years, especially biometric security solutions based on…
Biometric access control and privacy: what does the GDPR say?
The GDPR (General Data Protection Regulation) has been in force since 2018, and this has not gone unnoticed. Many organisations still struggle with its interpretation. In our own field…
FAR and FRR: security level versus ease of use
FAR and FRR. Anyone looking to assess or compare the performance of biometric security systems cannot avoid these terms. In this article, we explain what FAR and FRR mean, how they affect each other…
5 common biometric techniques compared
The best-known forms of biometric security are the fingerprint and iris scan. In addition, facial recognition and vein pattern recognition (of both finger and palm) are also on the rise.
How does vein pattern recognition work
There are three forms of vein pattern recognition. Palm vein pattern recognition, finger vein pattern recognition (both of which work using so-called near infrared* light) and retina vein pattern recognition.










