Fingerprint solutions firm BIO-key has announced that it will be highlighting its authentication solutions connect:ID 2016, March 14-16 in Washington, D.C. Jim Sullivan, BIO-key's SVP Global Sales, will be representing the IBIA on a panel session entitled Biometric Authentication: Changing the face of mobile security, presented in association with the FIDO Alliance.The panel will discuss the future of mobile authentication — specifically, how the integration of biometrics into traditional two-factor authentication tasks is transforming mobile security for simpler and strong authentication for end users.BIO-key's roadmap to provide a root of trusted identity with a biometrically-enabled FICAM CSP as part of the enrollment process, then binding that enrollment with FIDO authentication thereafter, allows both FIDO online authentications and in-person identity verifications and fraud elimination through a common user experience.In a statement, the firm noted that through its partnership with 2FA, Inc., BIO-key has developed an enterprise biometric authentication solution that extends device authentication available in Windows Hello to traditional Active Directory (AD) joined systems.BIO-key will also be highlighting the recently announced SideTouch, its latest in a series of affordable compact fingerprint readers. SideTouch, was developed to address the growing market of enterprise and consumer users wanting to replace passwords with biometric authentication solutions such as Windows Hello, on existing devices.”BIO-key is delighted to be both a sponsor and invited presenter at this prestigious conference,” said Jim Sullivan, BIO-key SVP Global Sales. “The FIDO panel on the future of mobile authentication is a gathering of thought leaders on this important topic, and intends to demystify the interrelation of several foundational concepts on how biometrics can be used in simplifying authentication, as well as combatting fraud. Hackers were recently successful in stealing $80M of a $1B attempted bank heist from Bangladesh's central bank using stolen SWIFT credentials, captured using on-device malware. The time is now for a comprehensively better way to authenticate.”