Why Biometrics Are Becoming Core to Enterprise IAM Strategy
Corey Nachreiner, WatchGuard CSO/CISO, explains that biometrics tend to be relatively frictionless for users.
“While no single factor of authentication is perfect or ‘unhackable’, biometrics are strong factors that are harder to mimic,” he says. “They may not be as strong as hardware keys or digital certificates, but they are stronger factors of identity than any password.”
He says authentication is primarily about verifying identity, and sometimes that means continuous authentication.
“Since biometrics really are the unique human factors, we can check to verify identity. They play a strong role in general zero-trust principles and authentication,” Nachreiner says.
CHECK OUT: Get the security trends to watch in 2026.
Biometric-Unlocked Passkeys: Phishing-Resistant Workforce Authentication
Nachreiner explains that biometric-unlocked passkeys allow users to verify their identity quickly, without the risk of entering their credentials into a lookalike phishing site.
“When setting up a passkey, the device or token creates a set of encryption keys tied to the site they are enrolled with,” he says.
This expands the identity process from only verifying the user to also verifying the site they are submitting their credentials to, preventing phishing attacks.
Cristian Rodriguez, field CTO for the Americas at CrowdStrike, says that passkeys are cryptographically bound to legitimate domains: If an adversary tricks you into clicking a fake login page, the passkey simply won’t work there because it recognizes the domain is wrong.
“The credential can’t be stolen or reused elsewhere,” he says.
This cryptographic protection is strengthened by FIDO2-based biometric authentication, which requires verified physical proximity between the MFA device (mobile) and authentication device (laptop, workstation) to approve access.
“This prevents remote phishing attacks like MFA fatigue, where adversaries spam push notifications hoping users accidentally approve one,” Rodriguez says.
