Biometric Product Marketers, BIPA Remains Unaltered

(Part of the biometric product marketing expert series)

You may remember the May hoopla regarding amendments to Illinois’ Biometric Information Privacy Act (BIPA). These amendments do not eliminate the long-standing law, but lessen its damage to offending companies.

Back on May 29, Fox Rothschild explained the timeline:

The General Assembly is expected to send the bill to Illinois Governor JB Pritzker within 30 days. Gov. Pritzker will then have 60 days to sign it into law. It will be immediately effective.

According to the Illinois General Assembly website, the Senate sent the bill to the Governor on June 14.

While the BIPA amendment has passed the Illinois House and Senate and was sent to the Governor, there is no indication that he has signed the bill into law within the 60-day timeframe.

So BIPA 1.0 is still in effect.

As Photomyne found out:

A proposed class action claims Photomyne, the developer of several photo-editing apps, has violated an Illinois privacy law by collecting, storing and using residents’ facial scans without authorization….

The lawsuit contends that the app developer has breached the BIPA’s clear requirements by failing to notify Illinois users of its biometric data collection practices and inform them how long and for what purpose the information will be stored and used.

In addition, the suit claims the company has unlawfully failed to establish public guidelines that detail its data retention and destruction policies.

From https://www.instagram.com/p/C7ZWA9NxUur/.

The Single Solution Microsoft E5 License vs. Best-in-class Individual Solutions

The phrase of the day is “Microsoft E5 License.”

Identity Jedi used is in the 82nd edition of his newsletter.

The biggest threat to every single vendor in the identity space right now are the following words: Microsoft E5 License.

If you read that and shuddered, I’m sorry.

The argument for a single solution

Sounds scary. But isn’t Microsoft here to help? Threatscape makes the case.

The cohesive suite of security and productivity solutions provided by an E5 licence can significantly streamline your technological landscape, doing away with a number of on-premises and SaaS tools.

While many organisations opt for the lower-cost E3 licence, they may find this soon requires a supplementary selection of single-solution tools from alternate vendors to patch gaps in its capabilities.

Too many solutions means confusion, an often-disjointed workflow, potential overlap and overspend, and crucially, increased security risk.

By consolidating your collaboration, productivity, automation, and security solutions into a single trusted vendor platform, IT management becomes simplified, redundant solutions can be axed, and ROI can be better measured.

The Microsoft E5 Security Components

So you get everything from a single source with no finger pointing. What could go wrong?

Plenty, according to those who still think of Microsoft as an evil empire.

By Lucasfilm – Star Wars Episode VI: Return of the Jedi, Fair use, https://en.wikipedia.org/w/index.php?curid=38430548.

Let’s return to the Identity Jedi.

Microsoft is making a compelling case to businesses to consolidate into the Microsoft umbrella of products. The ease of use, and financial motives just make too much sense. Now do those customers get a great IAM experience with that? Meh…kinda. Entra SSO is solid product, Active Directory/EntraID is solid, MIM…well….we don’t talk about MIM.

Microsoft Identity Manager

Well, I will talk about MIM, or Microsoft Identity Manager.

Actually, we’re talking about Microsoft Identity Manager 2016.

Microsoft Identity Manager (MIM) 2016 builds on the identity and access management capabilities of Forefront Identity Manager (FIM) 2010 and predecessor technologies. MIM provides integration with heterogeneous platforms across the datacenter, including on-premises HR systems, directories, and databases.

MIM augments Microsoft Entra cloud-hosted services by enabling the organization to have the right users in Active Directory for on-premises apps. Microsoft Entra Connect can then make available in Microsoft Entra ID for Microsoft 365 and cloud-hosted apps

Is it any good? Sources say that, from a quantitative perspective, Gartner Peer Insights ranks several products higher than MIM’s 4.3 rating, including:

  • Okta Advanced Server Access (4.4)
  • Ivanti Security Controls (4.5)
  • One Identity Active Roles (4.7)
  • Imprivata’s SecureLink Customer Connect (4.8)
  • Bravura Safe (5.0, 1 rating)

The argument against a single solution

But what of the argument that it’s better to get everything from one vendor? Other companies will tout their best-in-class products. While you’ll end up with a possibly disjointed solution, the work will get done more accurately.

In the end, it’s up to you. Do you want a single solution that is “good enough” and is already pre-made, or do you want to take the best solution from the best-in-class vendors and roll your own?

The (Biometric) Sound of Silence

Identity/biometrics marketers (some of you), why is your company so SILENT?

One way to communicate is by a company blog. Blogging provides clear benefits to the firms that use it consistently.

  • About one-third of them HADN’T SAID A SINGLE THING to their prospects and customers in the preceding two months.

Bredemarket can help those firms (you know who you are) start creating prospect/customer awareness content now.

Yes, I know we’re right in the middle of summer, and some of you will put this off until next week, or probably the week after next.

  • For me, that’s just as well. That gives me more time to create content for your competitors.
  • I recently had to delay working with a company because its competitor was ready to move first.
  • Good “problem” for Bredemarket to have…but not so good for the slower companies.

Contact Bredemarket…today.

P.S. Originally this was only going to be a social media post that merely cross-referenced part of an old blog post. Yes, I sometimes goof up myself.

And yes, this blog’s title (with a singular “Sound”) was intentional.

From https://youtu.be/nkUOACGtGfA?si=6nN5moOxoBerxT1a.

Can Your Firm Use Bredemarket’s Analysis Work?

(Part of the biometric product marketing expert series)

Is your firm asking the following questions?

  • Who are the competitors in the market for my product?
  • Which features do competitive products offer? How do they compare to the features my product offers?
  • Which industries do competitors target? How do they compare with the industries my company targets?
  • Which contracts have the competitors won? How do they compare with the contracts my company has won?
  • How effective is my company’s product marketing? My website? My social media? My key employees’ social media?

Bredemarket can help you answer these questions.

Types of analyses Bredemarket performs

For those who don’t know, or who missed my previous discussion on the topic, Bredemarket performs analyses that contain one or more of the following:

  • Analysis of one or more markets/industries for a particular product or product line.
  • Analysis of one or more (perhaps tens or hundreds) of competitors and/or competitive products for a particular product or product line.
  • Analysis of a firm’s own product or product line, including how it is marketed.

How Bredemarket conducts its analyses

Bredemarket analyses only use publicly available data.

  • I’m not hacking websites to get competitor prices or plans.
  • I’m not asking past employees to violate their non-disclosure agreements.

How Bredemarket packages its analyses

These analyses can range in size from very small to very large. On the very small side, I briefly analyzed the markets of three prospect firms in advance of calls with them. On the large side, I’ve performed analyses that take between one and six weeks to complete.

  • For the small self-analyses (excluding the very small quick freebies before a prospect call), I deliver these under my Bredemarket 404 Web/Social Media Checkup banner. When I first offered this service in 2020, I had a complex price calculation mechanism that depended upon the number of pages I had to analyze. Now I’ve simplified it and charge one of two flat rates.
  • Because the larger analyses are of undetermined length, I offer these at an hourly rate under my Bredemarket 4000 Long Writing Service banner. These reports can number 40 pages or more in length, sometimes accompanied by a workbook describing 700 or more competitor products or contracts.

Obviously I can’t provide specifics upon the analyses I’ve already performed since those are confidential to my customers, but I always discuss the customers’ needs before launching the analysis to ensure that the final product is what you want. I also provide drafts along the way in case we need to perform a course correction.

Do you need a market, competitor, or self analysis? Contact me. Or book a meeting with me at calendly.com/bredemarket to talk about your needs (and check the “Market/competitor analysis” check box).

Identity/Biometric Firms: Does Anyone Know Who You Are?

Identity/biometric firms: does anyone know who you are?

Who can help your firm create content?

Who knows identity/biometrics:

  • Biometric modalities?
  • Verification and authentication factors?

Who can provide content:

  • Blog posts?
  • Case studies?
  • White papers?
  • Social media?
  • Market and competitive analyses?

I know who can help.

Contact Bredemarket: https://bredemarket.com/contact/

Bredemarket Identity Firm Services, July 2024.

Identity Crisis

Identity professionals, what’s in a name?

You cannot uniquely identity someone by name alone.

What’s in a name?

A unique identification relies on multiple factors.

If your firm desires to tell a story about how your identity solution surpasses name-based solutions, Bredemarket can help.

Booking a Free 30 Minute Meeting With Bredemarket: Market/Competitor Analysis

If you book a free 30 minute meeting with Bredemarket, you’ll now find an additional option in the “What Type of Content Do You Need?” section: Market/competitor analysis. I’ve done these for years, but never added the option to the form.

My analyses ONLY use publicly available information that is NOT subject to NDA. So you won’t get access to the analyses I’ve performed for other clients, and they won’t get access to the analysis I prepare for you.

While I primarily provide these analyses in the identity/biometrics industry, I’m open to discussing analysis needs in other industries.

Book a meeting to discuss your content needs.

Who You Are, Plus What You Have, Equals What You Are

(Part of the biometric product marketing expert series)

Yes, I know the differences between the various factors of authentication.

Let me focus on two of the factors.

  • Something You Are. This is the factor that identifies people. It includes biometrics modalities (finger, face, iris, DNA, voice, vein, etc.). It also includes behavioral biometrics, provided that they are truly behavioral and relatively static.
  • Something You Have. While this is used to identify people, in truth this is the factor that identifies things. It includes driver’s licenses and hardware or software tokens.

There’s a very clear distinction between these two factors of authentication: “something you are” for people, and “something you have” for things.

But what happens when we treat the things as beings?

Who, or what, possesses identity?

License Plate Recognition

I’ve spent a decade working with automatic license plate recognitrion (ALPR), sometimes known as automatic number plate recognition (ANPR).

Actually more than a decade, since my car’s picture was taken in Montclair, California a couple of decades ago doing something it shouldn’t have been doing. I ended up in traffic school for that one.

But my traffic school didn’t have a music soundtrack. From https://www.imdb.com/title/tt0088847/mediaviewer/rm1290438144/?ref_=tt_md_2.

Now license plate recognition isn’t that reliable of an identifier, since within a minute I can remove a license plate from a vehicle and substitute another one in its place. However, it’s deemed to be reliable enough that it is used to identify who a car is.

Note my intentional use of the word “who” in the sentence above.

  • Because when my car made a left turn against a red light all those years ago, the police didn’t haul MY CAR into court.
  • Using then-current technology, it identified the car, looked up the registered owner, and hauled ME into court.

These days, it’s theoretically possible (where legally allowed) to identify the license plate of the car AND identify the face of the person driving the car.

But you still have this strange merger of who and what in which the non-human characteristics of an entity are used to identify the entity.

What you are.

But that’s nothing compared to what’s emerged over the past few years.

We Are The Robots

When the predecessors to today’s Internet were conceived in the 1960s, they were intended as a way for people to communicate with each other electronically.

And for decades the Internet continued to operate this way.

Until the Internet of Things (IoT) became more and more prominent.

From LINK REMOVED 2025-01-20

How prominent? The Hacker News explains:

Application programming interfaces (APIs) are the connective tissue behind digital modernization, helping applications and databases exchange data more effectively. The State of API Security in 2024 Report from Imperva, a Thales company, found that the majority of internet traffic (71%) in 2023 was API calls.

Couple this with the increasing use of chatbots and other artificial intelligence bots to generate content, and the result is that when you are communicating with someone on the Internet, there is often no “who.” There’s a “what.”

What you are.

Between the cars and the bots, there’s a lot going on.

What does this mean?

There are numerous legal and technical ramifications, but I want to concentrate on the higher meaning of all this. I’ve spent 29 years professionally devoted to the identification of who people are, but this focus on people is undergoing a seismic change.

KITT. By Tabercil – Own work, CC BY-SA 3.0, https://commons.wikimedia.org/w/index.php?curid=14927883.

The science fiction stories of the past, including TV shows such as Knight Rider and its car KITT, are becoming the present as we interact with automobiles, refrigerators, and other things. None of them have true sentience, but it doesn’t matter because they have the power to do things.

The late Dr. Frank Poole, died in 2001. From https://cinemorgue.fandom.com/wiki/Gary_Lockwood.

In the meantime, the identification industry not only has to identify people, but also identify things.

And it’s becoming more crucial that we do so, and do it accurately.

True Stories

Image CC BY 2.0.

“If you’re not careful, you might learn something before it’s done.”

(Quote from William H. Cosby, M.A., Ed.D., L.H.D. (resc), from the Fat Albert TV show theme song. From https://www.streetdirectory.com/lyricadvisor/song/upujwj/fat_albert/.)

When I write about space aliens, there’s a reason. And that reason may be to warn identity vendors that silence is NOT golden.

Fake LinkedIn stories

As a frequent reader and writer on LinkedIn, I’ve seen all the tips and tricks to drive engagement. One popular trick is to make up a story that will resonate with the LinkedIn audience.

For example, the writer (usually a self-proclaimed career expert who is ex-FAANG) will tell the entirely fictional story of a clueless hiring manager and an infinitely wise recruiter. The clueless hiring manager is shocked that a candidate accepted a competing job offer. “Didn’t she like us?” asks the hiring manager. The wise recruiter reminds the clueless hiring manager that the candidate had endured countless delays in numerous interviews with the company, allowing another company to express interest in and snatch her.

Job seekers have endured countless delays in their own employment searches. When they read the post, they hoot and holler for the candidate and boo the clueless hiring manager. Most importantly, readers like and love the writer’s post until it goes viral, making the author an ex-FAANG top recruiting voice.

Even though no sources are cited and the story is fictional, it is very powerful.

Well…until you’ve read the same story a dozen times from a dozen recruiters. Then it gets tiresome.

My improvement on fake stories

But those fake stories powerfully drive clicks on LinkedIn, so I wanted to get in on the action. But I was going to add two wrinkles to my fake story.

First, I would explicitly admit that my story is fake. Because authenticity. Sort of.

Second, my story would include space aliens to make it riveting. And to hammer the point that the story is fake.

Now I just had to write a fake story with space aliens.

Or did I?

A repurposed and adapted fake story with space aliens

It turned out that I had already written a fake story. It didn’t have space aliens, but I liked the story I had spun in the Bredemarket blog post “(Pizza Stories) Is Your Firm Hungry for Awareness?

I just needed to make one of the characters a space alien, and since Jones was based on the striking Grace Jones, I went ahead and did it. If you can imagine Grace Jones with tentacles, two noses, and eight legs.

With a few additional edits, my fake space alien story was ready for the Sunday night LinkedIn audience.

The truth in the fake story

As the space alien’s tentacles quivered, I snuck something else into the LinkedIn story—some facts.

Kids who watched Fat Albert on TV not only enjoyed the antics, but also learned an Important Life Lessons. Now I don’t have multiple advanced degrees like Cosby, but then again I never had multiple degrees rescinded either.

But my life lesson wasn’t to stay in school or pull your pants up. My life lesson was to blog. The lesson was in the form of a statement by Jones’ humanoid colleague Smith, taken verbatim from the Pizza Stories post.

“Take blogging,” replied Smith. “The average company that blogs generates 55% more website visitors. B2B marketers that use blogs get 67% more leads than those who do not. Marketers who have prioritized blogging are 13x more likely to enjoy positive ROI. And 92% of companies who blog multiple times per day have acquired a customer from their blog.”

The stats originally appeared in an earlier post, “How Identity and Biometrics Firms Can Use Blogging to Grow Their Business.”

Data source: Daily Infographic, https://www.dailyinfographic.com/state-of-blogging-industry.

And the fake story also talked about companies (unnamed, but real) who ignored these facts and remained silent on their blog and social channels.

A huge mistake, because their competitors ARE engaging with their prospects, with real stories.

Is your company making the same mistake?

Do you want to fix it?

Drive content results with Bredemarket Identity Firm Services.

I guess I should mention David Byrne. OK, I did.

It’s Medicare Fraud Prevention Week

Signing the Medicare amendment (July 30, 1965). By White House Press Office. Public Domain, https://commons.wikimedia.org/w/index.php?curid=1394392.

The FBI and others are letting us know that June 3 through June 9 is Medicare Fraud Prevention Week. Pro Seniors:

Fraud costs Medicare an estimated $60 billion per year. It costs Medicare beneficiaries in time, stress, their medical identities, and potentially their health. It costs families, friends, and caregivers in worry and lost work when helping their loved ones recover from falling victim to Medicare fraud.

Of course my primary interest in the topic is ensuring that only the proper people can access Medicare data, preferably through a robust method of identity verification that uses multiple factors.

Not multiple modalities, especially ones that are well-known such as your Social Security Number and your mother’s maiden name.

Multiple factors, such as your government-issued driver’s license, your biometrics, and your geolocation.

For more information, see what these vendors are saying about using biometrics to counter healthcare fraud attempts.