Empower and Secure Roving Employees Easily

In banking and finance, retail, manufacturing, hospitality, healthcare, and contact centers, roving employees utilize shared workstations or desktops for productivity and operational efficiency; however, this creates risks when access is not properly secured.

#1 Challenge

The device – a shared kiosk, workstation or desktop – cannot be used as part of the authentication criteria or tied to the identity of a single person, as it is a shared resource.

Other Key Challenges

Secure sensitive information and critical systems.

Manage high-user traffic locations.

Address environments where users cannot use phones or tokens.

Mainstream authentication solutions cannot support the unique scenarios presented by roving users, so they continue to rely on weak security measures, such as usernames and passwords. However, it is possible to utilize biometrics to address a variety of challenging scenarios.


Challenges in Authenticating Roving Users

Hospitality / Front of the House

The majority of hospitality employees work shifts 24/7, seven days a week. With vast amounts of customer personal information—such as credit card numbers and contact details—being accessible, it’s critical that only authorized individuals have access to shared computers.

Contact Centers

In the wake of the COVID-19 pandemic, contact centers have become increasingly attractive targets for fraudsters and cyberattack threats. For one, contact centers face high turnover rates, adding a layer of complexity when trying to secure and manage workforce identities. As a measure to address this, many contact centers do not allow the use of mobile phones or hardware tokens.

Manufacturing Floors

Mainstream authentication solutions fall short for many manufacturing facilities for a variety of reasons. First and foremost, it’s often unsafe to use mobile phones on the manufacturing floor, so security protocols typically prohibit their use. Second, with countless daily tasks and assignments, roving users on shared workstations are critical for workflow efficiency—both operationally and financially. For employers, it’s essential to have transparency regarding who is completing each task, as well as the ability to audit logs and track time spent.

Roving user environments are incredibly complex in terms of authentication, and mainstream solutions are failing to support them. The proper security solution needs to be efficient and seamless for the end user, cost-effective for the business, and secure enough to prevent a variety of cyberattacks and fraudulent behavior.

Are you struggling to secure shared workstations while maintaining productivity?


Less Friction & Frustration

More Security & Flexibility for your IAM needs

An effective and efficient shared workstation login experience is one that makes authentication easy for authorized users while protecting against unauthorized access. BIO-key’s unified IAM platform, PortalGuard®, is robust and flexible, adapting to your specific needs, requirements, and environment. It includes an advanced Multi-Factor Authentication (MFA) solution that can even facilitate the transition to passwordless authentication.

Identify the Person

A one-touch scan of a finger at any device in any location authenticates the user’s identity, only the authorized person is accessing a shared system.

Cost Effective

A minimal, one-time investment eliminates the need to purchase multiple tokens or mobile devices to significantly reduce your overall IT costs.

Frictionless Experience

The simple, one-touch authentication across every workstation saves countless hours and increases productivity with a consistent, frictionless user experience.

Find out what PortalGuard® can do for your business.