Cloud Security

Amazon One Enterprise Enables Palm-Based Access to Physical Locations, Digital Assets

AWS announces Amazon One Enterprise, a palm-based identity service that enables users to easily access physical locations and digital assets.

Amazon One Enterprise

On the first day of its re:Invent conference, Amazon Web Services (AWS) announced Amazon One Enterprise, a new palm-based identity service that enables users to securely access both physical locations and digital assets.

Amazon One has been available for identification, payment, and entry at Whole Foods Market stores, but AWS is now expanding it to enterprises with Amazon One Enterprise.

The fully managed enterprise access control service can be used to enter secured offices, residential buildings, data centers, hotels, airports, and educational institutions, as well as for access to digital resources, such as HR records and financial data. 

The Amazon One biometric identification device where users scan their palm can easily be installed by IT or security teams, with user and device management being done from the AWS console. 

“Amazon One Enterprise combines palm and vein imagery for biometric matching and delivers an accuracy rate of 99.9999%, which exceeds the accuracy of other biometric alternatives — even more accurate than scanning two irises,” AWS explained.

“The new service’s palm-recognition technology uses advanced artificial intelligence and machine learning to create a palm signature that is associated with identification credentials like a badge, employee ID, or PIN. The palm signature is a unique numerical vector created from the user’s palm image that cannot be replicated or used for impersonation,” it added.

Amazon One Enterprise is currently available in preview in the United States and it’s already being used by several major organizations. 

AWS announces new security features and capabilities

Advertisement. Scroll to continue reading.

Just before the start of its re:Invent event, AWS announced several new security features and capabilities. This includes new AWS Control Tower controls designed to help organizations meet digital sovereignty requirements, which specify where data resides, where it flows, and who has control over it.

In the identity and access management (IAM) category, AWS announced two new features in IAM Access Analyzer: a new analyzer that continuously monitors users and roles for unused permissions, and custom policy checks that ensure new policies don’t grant unintended permissions.

In addition, Amazon EKS Pod Identity has been launched to simplify IAM permissions for applications on Elastic Kubernetes Service (EKS) clusters. 

The cloud giant also announced Amazon GuardDuty ECS Runtime Monitoring, which is designed to detect runtime security issues in Elastic Container Service (ECS) clusters.

The company also informed customers that Amazon Detective adds new capabilities to accelerate and improve cloud security investigations.

Related: AWS Using MadPot Decoy System to Disrupt APTs, Botnets

Related: These Are the Top Five Cloud Security Risks

Related Content

Cloud Security

Cloud security specialists found data exposure risk associated with Azure, AWS, and Google Cloud command-line tools.

Cloud Security

SecurityWeek speaks to Tom Scholl, VP and distinguished engineer at AWS, on how the organization tackles IP Spoofing and DDoS attacks.

Cloud Security

New Ahoi attacks Heckler and WeSee target AMD SEV-SNP and Intel TDX with malicious interrupts to hack confidential VMs.

Cloud Security

Please the fireside chat as Phil Bues, Cloud Research Manager at IDC, discusses the challenges and best practices for cybersecurity leaders managing cloud identities.

Malware & Threats

A new malware campaign has been observed targeting misconfigured Apache Hadoop, Confluence, Docker, and Redis instances.

Cloud Security

An active cloud account takeover campaign has impacted dozens of Azure environments and compromised hundreds of user accounts.

Cybersecurity Funding

Device Authority raises $7 million in a Series A funding round for its enterprise identity and access management for IoT solution.

Network Security

A "frictionless defense” is about integrating security measures seamlessly into the digital landscape to safeguard against threats while ensuring a positive user experience.

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version