{"id":44531,"date":"2022-11-24T09:40:13","date_gmt":"2022-11-24T09:40:13","guid":{"rendered":"https:\/\/veridas.com\/?p=44531"},"modified":"2024-08-13T08:09:56","modified_gmt":"2024-08-13T08:09:56","slug":"what-is-nist","status":"publish","type":"post","link":"https:\/\/veridas.com\/en\/what-is-nist\/","title":{"rendered":"What is NIST? Meaning, Framework, Compliance &#038; Cybersecurity Explained"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"44531\" class=\"elementor elementor-44531 elementor-44499\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9debf15 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9debf15\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1b0fd9d\" data-id=\"1b0fd9d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d5391e7 elementor-widget elementor-widget-heading\" data-id=\"d5391e7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What NIST means?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4da4a75 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4da4a75\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9675519\" data-id=\"9675519\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5e48610 elementor-widget elementor-widget-text-editor\" data-id=\"5e48610\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.nist.gov\/\"><span style=\"font-weight: 400;\">The National Institute of Standards and Technology<\/span><\/a><span style=\"font-weight: 400;\">, NIST, is an American institution responsible for overseeing innovation and industrial competitiveness. It has laboratories accountable for programs of all kinds, from basic science to engineering, and conducts periodic assessments of cutting-edge technologies and innovations.<\/span>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2fdde73 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2fdde73\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-26f13e0\" data-id=\"26f13e0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-daee09a elementor-widget elementor-widget-heading\" data-id=\"daee09a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How is NIST different from ISO?\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2887520 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2887520\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e6cf1e6\" data-id=\"e6cf1e6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e7a3bd4 elementor-widget elementor-widget-text-editor\" data-id=\"e7a3bd4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<span style=\"font-weight: 400;\">NIST participates in developing international standards by being an active member of the <\/span><a href=\"https:\/\/www.iso.org\/home.html\"><span style=\"font-weight: 400;\">International Organization of Standardization<\/span><\/a><span style=\"font-weight: 400;\"> (ISO). Many evaluations performed by NIST establish the technical criteria that are then carried over into many ISO standards.<\/span>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-45b54e5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"45b54e5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d6546f8\" data-id=\"d6546f8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-922e6cc elementor-widget elementor-widget-heading\" data-id=\"922e6cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What role does NIST play in biometrics and identity verification?\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-83585bc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"83585bc\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b29c388\" data-id=\"b29c388\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7899fbe elementor-widget elementor-widget-text-editor\" data-id=\"7899fbe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">NIST has been measuring and evaluating the performance of biometric systems for more than 60 years, from fingerprints to faces, voice, iris, palm prints, and more. These evaluations have given them unique insight into the strengths and weaknesses of different biometrics. It has also helped them establish what criteria technologies are ready for mass use in different situations, such as <\/span><a href=\"https:\/\/veridas.com\/face-biometric-authentication\/\"><span style=\"font-weight: 400;\">facial biometrics for identity verification<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-dea7496 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"dea7496\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b5d66ee\" data-id=\"b5d66ee\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7ec43c2 elementor-widget elementor-widget-heading\" data-id=\"7ec43c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why is NIST considered the world's leading evaluator? \n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0a92296 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0a92296\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-891326b\" data-id=\"891326b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1cf1aeb elementor-widget elementor-widget-text-editor\" data-id=\"1cf1aeb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<span style=\"font-weight: 400;\">From the above, we deduce that NIST&#8217;s knowledge of biometrics is extensive, allowing it to define accurate and complete assessments. In addition, NIST has access to unique U.S. federal resources, which they use to prepare assessment scenarios with actual operational data. In addition, these are tremendously large data sets, allowing them to measure the performance of systems with an accuracy in the tens of thousands or even in the order of one error per million.<\/span>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bfd5261 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bfd5261\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cc54945\" data-id=\"cc54945\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f772bb0 elementor-widget elementor-widget-heading\" data-id=\"f772bb0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What biometric technologies does NIST evaluate, and what aspects of those technologies does it focus on?\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-155d29d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"155d29d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bfc5548\" data-id=\"bfc5548\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c39e0ab elementor-widget elementor-widget-text-editor\" data-id=\"c39e0ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Currently, NIST has facial, voice, fingerprint, iris, and DNA biometric assessments. These assessments focus on both verification and identification scenarios, with <\/span><a href=\"https:\/\/csrc.nist.gov\/glossary\/term\/verification\"><span style=\"font-weight: 400;\">verification<\/span><\/a><span style=\"font-weight: 400;\"> being understood as the confirmation or denial of an identity by comparing two biometric factors (e.g., two images of faces or two voices) against each other, or 1:1 comparison, and <\/span><a href=\"https:\/\/csrc.nist.gov\/glossary\/term\/identification\"><span style=\"font-weight: 400;\">identification<\/span><\/a><span style=\"font-weight: 400;\"> being the process of discovering an identity among a collection or set of people (e.g., set of images or voices), also known as a 1:N comparison.\u00a0<\/span><\/p><p><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); text-align: var(--text-align);\">Specifically, facial biometrics evaluations focus on the metric called <\/span><a style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); font-weight: var( --e-global-typography-text-font-weight ); text-align: var(--text-align); background-color: #ffffff;\" href=\"https:\/\/csrc.nist.gov\/glossary\/term\/false_non_match_rate\">False Non-Match Rate<\/a><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); text-align: var(--text-align);\"> (FNMR) for 1:1 or False Negative Identification Rate (FNIR) for 1:N. Those metrics measure the percentage of times that an operation with a &#8220;reliable&#8221; image fails to be verified or positively identified, i.e., the number of times the system gives a negative result for a known person when it should be positive.\u00a0<\/span><\/p><p><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); text-align: var(--text-align);\">The other relevant metric in facial biometrics is the <\/span><a style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); font-weight: var( --e-global-typography-text-font-weight ); text-align: var(--text-align); background-color: #ffffff;\" href=\"https:\/\/csrc.nist.gov\/glossary\/term\/false_match_rate\">False Match Rate<\/a><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); text-align: var(--text-align);\"> (FMR) for 1:1 or the False Positive Identification Rate (FPIR) for 1:N. In this case, those metrics measure the percentage of times that an operation with an image of an &#8220;impostor&#8221; is verified or positively identified, that is, the times that for a person who should be unknown, the system gives a positive response. These metrics allow knowing the convenience of use of the system (the funnel) and its security (robustness against impostors).<\/span><\/p><p><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); text-align: var(--text-align);\">On the other hand, when we talk about <\/span><a style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); font-weight: var( --e-global-typography-text-font-weight ); text-align: var(--text-align); background-color: #ffffff;\" href=\"https:\/\/veridas.com\/voice-biometric-authentication\/\">voice biometric<\/a><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); text-align: var(--text-align);\"> evaluations, also known as <\/span><a style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); font-weight: var( --e-global-typography-text-font-weight ); text-align: var(--text-align); background-color: #ffffff;\" href=\"https:\/\/sre.nist.gov\/\">Speaker Recognition Evaluation<\/a><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); text-align: var(--text-align);\"> (SRE), and focusing on the latest editions (SRE19, SRE20, and SRE 21), the metric being used is a Primary Metric. This Primary Metric consists of a basic cost model to measure speaker verification performance defined as a weighted sum of <\/span><a style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); font-weight: var( --e-global-typography-text-font-weight ); text-align: var(--text-align); background-color: #ffffff;\" href=\"https:\/\/csrc.nist.gov\/glossary\/term\/false_reject_rate#:~:text=Definition(s)%3A,identity%20that%20are%20incorrectly%20denied.\">False Rejection Rate<\/a><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); text-align: var(--text-align);\"> (FRR) and <\/span><a style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); font-weight: var( --e-global-typography-text-font-weight ); text-align: var(--text-align); background-color: #ffffff;\" href=\"https:\/\/csrc.nist.gov\/glossary\/term\/false_accept_rate\">False Accept Rate<\/a><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); text-align: var(--text-align);\"> (FAR) probabilities, giving more weight to the latter in the weighting (FAR is given 30 times more weight than FRR).\u00a0<\/span><\/p><p><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); text-align: var(--text-align);\">NIST imposes this weighting, which may differ from the interests of each use case, so when comparing systems in the commercial environment, it is often preferred to use the &#8220;Equal Error Rate&#8221; (EER or equal error rate). The EER is the place on the curve where the false acceptance rate and false rejection rate are equal.\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3905421 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3905421\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ff39206\" data-id=\"ff39206\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5bd3f61 elementor-widget elementor-widget-image\" data-id=\"5bd3f61\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"450\" src=\"https:\/\/veridas.com\/wp-content\/uploads\/2021\/01\/Grafico-EER-v2.png\" class=\"attachment-large size-large wp-image-15470\" alt=\"What NIST means?\" srcset=\"https:\/\/veridas.com\/wp-content\/uploads\/2021\/01\/Grafico-EER-v2.png 960w, https:\/\/veridas.com\/wp-content\/uploads\/2021\/01\/Grafico-EER-v2-300x169.png 300w, https:\/\/veridas.com\/wp-content\/uploads\/2021\/01\/Grafico-EER-v2-768x432.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d590e19 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d590e19\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e773794\" data-id=\"e773794\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-764017c elementor-widget elementor-widget-heading\" data-id=\"764017c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What databases does NIST use to validate biometric engines? \n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a14534e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a14534e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-fcabddf\" data-id=\"fcabddf\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-494e5d6 elementor-widget elementor-widget-text-editor\" data-id=\"494e5d6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">NIST evaluates biometric engines on different databases that resemble different production cases.\u00a0<\/span><\/p><p><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); text-align: var(--text-align);\">Looking exclusively at facial biometrics evaluations, databases are sets of photographs of faces used to measure systems&#8217; performance in different assessments. Different databases are used at NIST, for example:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Visa <\/b><span style=\"font-weight: 400;\">&#8211; Consists of photographs taken in compliance with ISO\/ICAO standards for facial photography. This would correspond to photos used for passports or identity documents.\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Mugshot <\/b><span style=\"font-weight: 400;\">&#8211; Built with photographs taken less strictly according to Visa standards. They are usually photographs taken by the police while searching for convicts in prisons.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Wild <\/b><span style=\"font-weight: 400;\">&#8211; Compiles photographs without any control and may come from news articles, newspapers, sporting events, etc.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Border<\/b><span style=\"font-weight: 400;\"> &#8211; Consists of photographs taken at border control facilities, typically airports.<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-88c2f06 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"88c2f06\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-df9eb34\" data-id=\"df9eb34\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b1441b4 elementor-widget elementor-widget-image\" data-id=\"b1441b4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"323\" src=\"https:\/\/veridas.com\/wp-content\/uploads\/2022\/11\/Imagenes-aeropuertos-1024x413.png\" class=\"attachment-large size-large wp-image-44509\" alt=\"Cuatro identidades en aeropuertos\" srcset=\"https:\/\/veridas.com\/wp-content\/uploads\/2022\/11\/Imagenes-aeropuertos-1024x413.png 1024w, https:\/\/veridas.com\/wp-content\/uploads\/2022\/11\/Imagenes-aeropuertos-300x121.png 300w, https:\/\/veridas.com\/wp-content\/uploads\/2022\/11\/Imagenes-aeropuertos-768x309.png 768w, https:\/\/veridas.com\/wp-content\/uploads\/2022\/11\/Imagenes-aeropuertos.png 1082w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6867b08 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6867b08\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a62aafe\" data-id=\"a62aafe\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7624c0f elementor-widget elementor-widget-text-editor\" data-id=\"7624c0f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><em><span style=\"font-weight: 400;\">Source: Image taken from NIST FRVT 1:1 report (<\/span><a href=\"https:\/\/pages.nist.gov\/frvt\/reports\/11\/frvt_11_report.pdf\"><span style=\"font-weight: 400;\">https:\/\/pages.nist.gov\/frvt\/reports\/11\/frvt_11_report.pdf<\/span><\/a><span style=\"font-weight: 400;\">)<\/span><\/em><\/p><p><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); text-align: var(--text-align);\">For voice biometrics, the philosophy is different. Instead of clearly defined datasets with which NIST evaluates the various facial biometrics engines, the organization first provides a dataset just for training the algorithms, then delivers another small dataset for refinement or finetuning, and finally distributes the evaluation dataset with many more audios.<\/span><\/p><p><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); text-align: var(--text-align);\">The training and evaluation datasets are changed annually within the NIST voice evaluations. They usually change the language, channel, number of speakers, and even databases for multimodal biometrics.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ce32277 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ce32277\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9bcaa0d\" data-id=\"9bcaa0d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fc7a057 elementor-widget elementor-widget-heading\" data-id=\"fc7a057\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What types of evaluations exist, and how often are they conducted?\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-614e11a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"614e11a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3312663\" data-id=\"3312663\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8efad37 elementor-widget elementor-widget-text-editor\" data-id=\"8efad37\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Regarding facial biometrics, there is the Face Recognition Vendor Test (FRVT), which is a compendium of continuous assessments with no end date:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/pages.nist.gov\/frvt\/html\/frvt11.html\"><span style=\"font-weight: 400;\">FRVT 1:1<\/span><\/a><span style=\"font-weight: 400;\"> &#8211; Evaluates facial verification systems using evaluation protocols where pairs of images labeled as &#8220;trustworthy&#8221; (same person) or &#8220;impostor&#8221; (faces of different people) comparisons are compared.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/pages.nist.gov\/frvt\/html\/frvt1N.html\"><span style=\"font-weight: 400;\">FRVT 1:N<\/span><\/a><span style=\"font-weight: 400;\"> &#8211; Evaluates facial identification systems using protocols where there is a database of known persons and searching for persons known to be in that database (positive expected result search) and for persons known not to be there (negative expected result searches).<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/pages.nist.gov\/frvt\/html\/frvt_quality.html\"><span style=\"font-weight: 400;\">FRVT Quality<\/span><\/a><span style=\"font-weight: 400;\"> &#8211; Evaluates algorithms for measuring the quality of a photograph taken of a face. Currently, quality is calculated as a predictor of the ability of a biometric system to give a correct response with an image. Therefore, the procedures used in this evaluation measure the correlation between the predictor of image quality and the system&#8217;s accuracy with those images.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/pages.nist.gov\/frvt\/html\/frvt_morph.html\"><span style=\"font-weight: 400;\">FRVT Morph<\/span><\/a><span style=\"font-weight: 400;\"> &#8211; Evaluates the ability to detect Morphing attacks. In this attack, the impostor makes a <\/span><a href=\"https:\/\/www.researchgate.net\/figure\/Our-face-morphing-pipeline-consists-of-an-image-alignment-based-on-estimated-facial_fig1_341419478\"><span style=\"font-weight: 400;\">mixture of two photographs<\/span><\/a><span style=\"font-weight: 400;\">, one of him and another of a different person, getting the police to print a passport or identity card using that mixed photo. Then the impostor uses it to impersonate the other person, for example, at borders, airports, etc.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/pages.nist.gov\/frvt\/html\/frvt_pad.html\"><span style=\"font-weight: 400;\">FRVT PAD<\/span><\/a><span style=\"font-weight: 400;\"> &#8211; Evaluates presentation attacks (impersonation). The presentation attacks evaluated consist of showing physical artifacts (paper masks, photographs on screens, realistic latex masks, etc.) to pass off the artifact as a real live captured sample of the person you want to replace. They also evaluate situations of identity concealment, in which the impostor does not seek to look like anyone. Instead, the impostor tries to enroll in the system with a captured face that can not be related to his real face.\u00a0<\/span><\/li><\/ul><div>\u00a0<\/div><p><span style=\"font-weight: 400;\">Other evaluations include <\/span><a href=\"https:\/\/pages.nist.gov\/frvt\/html\/frvt_twins_demonstration.html\"><span style=\"font-weight: 400;\">FRVT Twins Demonstration<\/span><\/a><span style=\"font-weight: 400;\">, <\/span><a href=\"https:\/\/pages.nist.gov\/frvt\/html\/frvt_facemask.html\"><span style=\"font-weight: 400;\">FRVT Face Mask Effects<\/span><\/a><span style=\"font-weight: 400;\">, <\/span><a href=\"https:\/\/pages.nist.gov\/frvt\/html\/frvt_demographics.html\"><span style=\"font-weight: 400;\">FRVT Demographic Effects<\/span><\/a><span style=\"font-weight: 400;\">, and <\/span><a href=\"https:\/\/pages.nist.gov\/frvt\/html\/frvt_paperless_travel.html\"><span style=\"font-weight: 400;\">FRVT Paperless Travel.<\/span><\/a><span style=\"font-weight: 400;\"> But these still need to be started or have not been repeated over time, being not as relevant as the previous ones.<\/span><\/p><p><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); text-align: var(--text-align);\">Concerning voice biometrics, the goal of the NIST Speaker Recognition Evaluation, SRE, is not so much to compare biometric engines as it is to contribute to the direction of research efforts and calibration of the technical capabilities of text-independent speaker recognition. Ultimately, speech evaluations have always been about pushing the technology forward, measuring the state of the art, and finding the most promising algorithmic approaches.<\/span><\/p><p><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); text-align: var(--text-align);\">The SRE challenges (annual or biannual) change with each edition, so it is impossible to state them in this post by becoming obsolete. At the beginning of the evaluations, NIST announces the official evaluation plan, clearly saying the tasks, data, performance metrics, and rules for participation. The assessment culminates in a follow-up workshop, where NIST reports the official results along with performance analyses, and researchers share and discuss their findings with NIST and each other.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b088264 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b088264\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a60dc41\" data-id=\"a60dc41\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ec79c52 elementor-widget elementor-widget-html\" data-id=\"ec79c52\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper\" id=\"hs-cta-wrapper-77fe6e3f-1266-4bbd-bedb-a6e94d72729b\"><span class=\"hs-cta-node hs-cta-77fe6e3f-1266-4bbd-bedb-a6e94d72729b\" id=\"hs-cta-77fe6e3f-1266-4bbd-bedb-a6e94d72729b\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/19918211\/77fe6e3f-1266-4bbd-bedb-a6e94d72729b\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-77fe6e3f-1266-4bbd-bedb-a6e94d72729b\" style=\"border-width:0px;\" height=\"348\" width=\"1280\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/19918211\/77fe6e3f-1266-4bbd-bedb-a6e94d72729b.png\"  alt=\"[DEMO GRATUITA]: Descubre c\u00f3mo funciona nuestra tecnolog\u00eda en vivo\"\/><\/a><\/span><script charset=\"utf-8\" src=\"https:\/\/js.hscta.net\/cta\/current.js\"><\/script><script type=\"text\/javascript\"> hbspt.cta.load(19918211, '77fe6e3f-1266-4bbd-bedb-a6e94d72729b', {\"useNewLoader\":\"true\",\"region\":\"na1\"}); <\/script><\/span><!-- end HubSpot Call-to-Action Code -->\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-017ca42 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"017ca42\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-65e77d2\" data-id=\"65e77d2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5dc8ec7 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"5dc8ec7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-62a20e2 elementor-widget elementor-widget-heading\" data-id=\"62a20e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What are the requirements for submitting a system for a NIST evaluation?\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0c6e718 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0c6e718\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cd7442d\" data-id=\"cd7442d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f5584b8 elementor-widget elementor-widget-text-editor\" data-id=\"f5584b8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">This section also has differences between facial and voice biometric engine evaluations. If we focus on the former, the FRVT requires the submission of a system that can be deployed in a commercial application, and the system must be compiled with an API (in C++) offered by NIST. The system is provided to the organizers confidentially and free of charge, while participation in the evaluation is also free. Finally, participants submit a version of their algorithms, and NIST evaluates them with data that NIST does not share.<\/span><\/p><p><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); text-align: var(--text-align);\">On the contrary, if we talk about the SRE, the organization sends the training and evaluation data, and the participants have to send the comparison result so that only NIST can evaluate the outcome. Therefore, here the participants can bring into play all the capacity and resources they deem appropriate to obtain the best possible result (fusion of different systems, calibrations, etc.) since, among other things, they do not have to send the algorithm as such to NIST.<\/span><\/p><p><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); text-align: var(--text-align);\">Participation in SRE is open to anyone who finds the evaluation of interest and can comply with the evaluation rules outlined in the evaluation plan. While there is also no cost to participate in SRE21 (i.e., the assessment, data, web platform, and scoring software will be available free of charge), NIST requires that participating teams be represented at the post-assessment workshop.<\/span><\/p><p><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); text-align: var(--text-align);\">It should be stressed that, unlike facial biometrics, the objective of voice evaluation is not to compare commercial solutions (it is not a vendor test) but to obtain an insight into state of the art and to promote its evolution within the scientific community. For this reason, the organization of the SRE allows the anonymity of the participants (which are generally made up of teams of different types such as universities, laboratories, technological institutes, companies, etc.), as well as establishing strong restrictions on the use of the results obtained by the industry.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-adac3b1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"adac3b1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1f4317f\" data-id=\"1f4317f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-853d25a elementor-widget elementor-widget-heading\" data-id=\"853d25a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">NIST compliance and why is it essential that evaluates different biometric technology providers<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f0f2c4b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f0f2c4b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9cbfc4b\" data-id=\"9cbfc4b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f67e02f elementor-widget elementor-widget-text-editor\" data-id=\"f67e02f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">There is a regulatory gap in ensuring that biometric systems behave as expected technically. Some certifications allow systems to be tested, such as ISO-30107, written to evaluate the ability to detect presentation attacks in facial biometrics. But none of these standards give a binding certification level but only provide conformity to an evaluation methodology.\u00a0<\/span><\/p><p><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); text-align: var(--text-align);\">Consequently, standards are being developed in Europe and internationally to fill this gap. And this is where NIST is playing an essential role in filling the gap by offering a unique way to compare competitors under the same conditions.\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4ff6c49 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4ff6c49\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3c5f0e4\" data-id=\"3c5f0e4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8015a66 elementor-widget elementor-widget-heading\" data-id=\"8015a66\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Understanding the NIST cybersecurity framework<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6e64394 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6e64394\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7c32762\" data-id=\"7c32762\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-016d77d elementor-widget elementor-widget-text-editor\" data-id=\"016d77d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">NIST discusses three main problems regarding facial biometrics engines:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Demographic differentials<\/b><span style=\"font-weight: 400;\"> &#8211; This is commonly known as &#8220;biases,&#8221; and it is hoped that they will continue to emphasize analyzing the state of art in terms of these differentials and comparing the evolution of the systems over time concerning this issue.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Biometrics with twins<\/b><span style=\"font-weight: 400;\"> &#8211; Twins represent about 4% of the population in the USA, so there is a lot of interest in improving the performance of biometric systems in this regard. The technology is not yet ready, but NIST poses challenges of this type so that technology developers are encouraged to participate and show the actual state of their systems with twins.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Morphing<\/b><span style=\"font-weight: 400;\"> &#8211; NIST already has a concrete evaluation related to this aspect. They will probably work more on this topic, making special reports that will allow us to know how the morphing detection technology is evolving. It is true that the technology still needs to be ready for satisfactory exploitation in a product. Still, it is a significant problem that states face, especially in the passage of citizens across borders between countries.<\/span><\/li><\/ul><div>\u00a0<\/div><p><span style=\"font-weight: 400;\">Regarding the field of voice biometrics, in the past editions of the SRE. the challenges explored are language crossover, where the system is trained only with the language (e.g., English) and evaluated with totally different languages (e.g., Cantonese and Tagalog in SRE16 or Tunisian in SRE18). The last evaluation also tested cross-channel, where phone audios were compared with audios extracted from a video. <\/span><a href=\"https:\/\/veridas.com\/veridas-takes-part-in-the-first-joint-face-and-voice-recognition-evaluation-from-nist\/\"><span style=\"font-weight: 400;\">Even NIST tested multimodal biometric systems using face and voice<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-00c3393 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"00c3393\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e75f265\" data-id=\"e75f265\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c70c024 elementor-widget elementor-widget-heading\" data-id=\"c70c024\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Veridas present at NIST face and voice biometrics evaluations\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-667e2c6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"667e2c6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-efb8ba3\" data-id=\"efb8ba3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5892fb3 elementor-widget elementor-widget-text-editor\" data-id=\"5892fb3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">In line with our faithful commitment to transparency and regulation of biometric technologies, at Veridas, we periodically submit our facial biometrics and voice biometrics engines to NIST evaluations. And we do it because, today, NIST is the best reference to know which systems are competitive and valuable in production and which do not achieve the expected results.<\/span><\/p><p><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); text-align: var(--text-align);\">At Veridas, we submit to NIST only those biometric engines we then deliver to real customers for production use, avoiding possible adjustments that other players might exploit to get the best results with systems that never actually make it to market. And yet, at Veridas, we always get fantastic results across all categories, ranking among the best biometric engines in the world.<\/span><\/p><p><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); text-align: var(--text-align);\">Specifically, as of November 2022, Veridas ranks in the top 20% of companies in the world in facial biometrics evaluations (FVRT 1:1), being the 5th best European company in this respect. As for voice biometrics, NIST regulations prevent us from communicating our exact position, although it is worth noting that Veridas is considered among the best systems in the world in a very prominent way.<\/span><\/p><p><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); text-align: var(--text-align);\">Thanks to this continuous commitment to excellence, we already have first-class clients in more than 25 countries. Customers who have opted for certified, transparent, and fully automated technology. Technology <\/span><i style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); font-weight: var( --e-global-typography-text-font-weight ); text-align: var(--text-align);\">made in Veridas<\/i><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); text-align: var(--text-align);\">.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-64ed75a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"64ed75a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cdf4ab0\" data-id=\"cdf4ab0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-da20f78 elementor-widget elementor-widget-html\" data-id=\"da20f78\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper\" id=\"hs-cta-wrapper-9d2f027d-2e80-4f2b-8103-8f570f0ddc7c\"><span class=\"hs-cta-node hs-cta-9d2f027d-2e80-4f2b-8103-8f570f0ddc7c\" id=\"hs-cta-9d2f027d-2e80-4f2b-8103-8f570f0ddc7c\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/19918211\/9d2f027d-2e80-4f2b-8103-8f570f0ddc7c\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-9d2f027d-2e80-4f2b-8103-8f570f0ddc7c\" style=\"border-width:0px;\" height=\"348\" width=\"1280\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/19918211\/9d2f027d-2e80-4f2b-8103-8f570f0ddc7c.png\"  alt=\"[FREE DEMO]: Find out how our technology works live\"\/><\/a><\/span><script charset=\"utf-8\" src=\"https:\/\/js.hscta.net\/cta\/current.js\"><\/script><script type=\"text\/javascript\"> hbspt.cta.load(19918211, '9d2f027d-2e80-4f2b-8103-8f570f0ddc7c', {\"useNewLoader\":\"true\",\"region\":\"na1\"}); <\/script><\/span><!-- end HubSpot Call-to-Action Code -->\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Discover what NIST is, its meaning, framework, and compliance standards. Learn how NIST impacts cybersecurity, including certification and biometric standards.<\/p>\n","protected":false},"author":20,"featured_media":69623,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_theme","format":[252],"meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[72],"tags":[],"country":[],"resource":[293],"topic":[249,251],"industry":[],"solution":[],"class_list":["post-44531","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-identity-biometrics","resource-yes","format-article","topic-compliance","topic-identity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What Is NIST? Meaning, Framework, Compliance &amp; Cybersecurity Explained<\/title>\n<meta name=\"description\" content=\"Discover what NIST is, its meaning, framework, and compliance standards. Learn how NIST impacts cybersecurity, including certification and biometric standards.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/veridas.com\/en\/what-is-nist\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is NIST? Meaning, Framework, Compliance &amp; Cybersecurity Explained\" \/>\n<meta property=\"og:description\" content=\"Discover what NIST is, its meaning, framework, and compliance standards. Learn how NIST impacts cybersecurity, including certification and biometric standards.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/veridas.com\/en\/what-is-nist\/\" \/>\n<meta property=\"og:site_name\" content=\"Veridas\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-24T09:40:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-13T08:09:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/veridas.com\/wp-content\/uploads\/2024\/02\/nist.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Paco Zamora\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@VeridasOfficial\" \/>\n<meta name=\"twitter:site\" content=\"@VeridasOfficial\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Paco Zamora\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/veridas.com\/en\/what-is-nist\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/veridas.com\/en\/what-is-nist\/\"},\"author\":{\"name\":\"Paco Zamora\",\"@id\":\"https:\/\/veridas.com\/en\/pt\/#\/schema\/person\/10fdfcea52cd13a96d8be9bb065e32f0\"},\"headline\":\"What is NIST? Meaning, Framework, Compliance &#038; Cybersecurity Explained\",\"datePublished\":\"2022-11-24T09:40:13+00:00\",\"dateModified\":\"2024-08-13T08:09:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/veridas.com\/en\/what-is-nist\/\"},\"wordCount\":2272,\"publisher\":{\"@id\":\"https:\/\/veridas.com\/en\/pt\/#organization\"},\"image\":{\"@id\":\"https:\/\/veridas.com\/en\/what-is-nist\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/veridas.com\/wp-content\/uploads\/2024\/02\/nist.jpg\",\"articleSection\":[\"Identity &amp; Biometrics\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/veridas.com\/en\/what-is-nist\/\",\"url\":\"https:\/\/veridas.com\/en\/what-is-nist\/\",\"name\":\"What Is NIST? Meaning, Framework, Compliance & Cybersecurity Explained\",\"isPartOf\":{\"@id\":\"https:\/\/veridas.com\/en\/pt\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/veridas.com\/en\/what-is-nist\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/veridas.com\/en\/what-is-nist\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/veridas.com\/wp-content\/uploads\/2024\/02\/nist.jpg\",\"datePublished\":\"2022-11-24T09:40:13+00:00\",\"dateModified\":\"2024-08-13T08:09:56+00:00\",\"description\":\"Discover what NIST is, its meaning, framework, and compliance standards. Learn how NIST impacts cybersecurity, including certification and biometric standards.\",\"breadcrumb\":{\"@id\":\"https:\/\/veridas.com\/en\/what-is-nist\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/veridas.com\/en\/what-is-nist\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/veridas.com\/en\/what-is-nist\/#primaryimage\",\"url\":\"https:\/\/veridas.com\/wp-content\/uploads\/2024\/02\/nist.jpg\",\"contentUrl\":\"https:\/\/veridas.com\/wp-content\/uploads\/2024\/02\/nist.jpg\",\"width\":1200,\"height\":675,\"caption\":\"what is NIST\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/veridas.com\/en\/what-is-nist\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/veridas.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Identity &amp; Biometrics\",\"item\":\"https:\/\/veridas.com\/en\/category\/identity-biometrics\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What is NIST? Meaning, Framework, Compliance &#038; Cybersecurity Explained\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/veridas.com\/en\/pt\/#website\",\"url\":\"https:\/\/veridas.com\/en\/pt\/\",\"name\":\"Veridas\",\"description\":\"Just be you\",\"publisher\":{\"@id\":\"https:\/\/veridas.com\/en\/pt\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/veridas.com\/en\/pt\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/veridas.com\/en\/pt\/#organization\",\"name\":\"Veridas\",\"url\":\"https:\/\/veridas.com\/en\/pt\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/veridas.com\/en\/pt\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/veridas.com\/wp-content\/uploads\/2021\/09\/logo-veridas-calidad.png\",\"contentUrl\":\"https:\/\/veridas.com\/wp-content\/uploads\/2021\/09\/logo-veridas-calidad.png\",\"width\":2048,\"height\":1076,\"caption\":\"Veridas\"},\"image\":{\"@id\":\"https:\/\/veridas.com\/en\/pt\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/VeridasOfficial\",\"https:\/\/es.linkedin.com\/company\/veridas\",\"https:\/\/www.instagram.com\/veridas.life\/\",\"https:\/\/www.youtube.com\/@VeridasOfficial\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/veridas.com\/en\/pt\/#\/schema\/person\/10fdfcea52cd13a96d8be9bb065e32f0\",\"name\":\"Paco Zamora\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/veridas.com\/en\/pt\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/veridas.com\/wp-content\/uploads\/2025\/01\/Paco-Zamora-150x150.jpg\",\"contentUrl\":\"https:\/\/veridas.com\/wp-content\/uploads\/2025\/01\/Paco-Zamora-150x150.jpg\",\"caption\":\"Paco Zamora\"},\"description\":\"Technology | Core Tech Manager\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/francisco-zamora-martinez-9a048436\/\"],\"url\":\"https:\/\/veridas.com\/en\/author\/paco-zamora\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Is NIST? Meaning, Framework, Compliance & Cybersecurity Explained","description":"Discover what NIST is, its meaning, framework, and compliance standards. Learn how NIST impacts cybersecurity, including certification and biometric standards.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/veridas.com\/en\/what-is-nist\/","og_locale":"en_US","og_type":"article","og_title":"What Is NIST? Meaning, Framework, Compliance & Cybersecurity Explained","og_description":"Discover what NIST is, its meaning, framework, and compliance standards. Learn how NIST impacts cybersecurity, including certification and biometric standards.","og_url":"https:\/\/veridas.com\/en\/what-is-nist\/","og_site_name":"Veridas","article_published_time":"2022-11-24T09:40:13+00:00","article_modified_time":"2024-08-13T08:09:56+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/veridas.com\/wp-content\/uploads\/2024\/02\/nist.jpg","type":"image\/jpeg"}],"author":"Paco Zamora","twitter_card":"summary_large_image","twitter_creator":"@VeridasOfficial","twitter_site":"@VeridasOfficial","twitter_misc":{"Written by":"Paco Zamora","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/veridas.com\/en\/what-is-nist\/#article","isPartOf":{"@id":"https:\/\/veridas.com\/en\/what-is-nist\/"},"author":{"name":"Paco Zamora","@id":"https:\/\/veridas.com\/en\/pt\/#\/schema\/person\/10fdfcea52cd13a96d8be9bb065e32f0"},"headline":"What is NIST? Meaning, Framework, Compliance &#038; Cybersecurity Explained","datePublished":"2022-11-24T09:40:13+00:00","dateModified":"2024-08-13T08:09:56+00:00","mainEntityOfPage":{"@id":"https:\/\/veridas.com\/en\/what-is-nist\/"},"wordCount":2272,"publisher":{"@id":"https:\/\/veridas.com\/en\/pt\/#organization"},"image":{"@id":"https:\/\/veridas.com\/en\/what-is-nist\/#primaryimage"},"thumbnailUrl":"https:\/\/veridas.com\/wp-content\/uploads\/2024\/02\/nist.jpg","articleSection":["Identity &amp; Biometrics"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/veridas.com\/en\/what-is-nist\/","url":"https:\/\/veridas.com\/en\/what-is-nist\/","name":"What Is NIST? Meaning, Framework, Compliance & Cybersecurity Explained","isPartOf":{"@id":"https:\/\/veridas.com\/en\/pt\/#website"},"primaryImageOfPage":{"@id":"https:\/\/veridas.com\/en\/what-is-nist\/#primaryimage"},"image":{"@id":"https:\/\/veridas.com\/en\/what-is-nist\/#primaryimage"},"thumbnailUrl":"https:\/\/veridas.com\/wp-content\/uploads\/2024\/02\/nist.jpg","datePublished":"2022-11-24T09:40:13+00:00","dateModified":"2024-08-13T08:09:56+00:00","description":"Discover what NIST is, its meaning, framework, and compliance standards. Learn how NIST impacts cybersecurity, including certification and biometric standards.","breadcrumb":{"@id":"https:\/\/veridas.com\/en\/what-is-nist\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/veridas.com\/en\/what-is-nist\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/veridas.com\/en\/what-is-nist\/#primaryimage","url":"https:\/\/veridas.com\/wp-content\/uploads\/2024\/02\/nist.jpg","contentUrl":"https:\/\/veridas.com\/wp-content\/uploads\/2024\/02\/nist.jpg","width":1200,"height":675,"caption":"what is NIST"},{"@type":"BreadcrumbList","@id":"https:\/\/veridas.com\/en\/what-is-nist\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/veridas.com\/en\/"},{"@type":"ListItem","position":2,"name":"Identity &amp; Biometrics","item":"https:\/\/veridas.com\/en\/category\/identity-biometrics\/"},{"@type":"ListItem","position":3,"name":"What is NIST? Meaning, Framework, Compliance &#038; Cybersecurity Explained"}]},{"@type":"WebSite","@id":"https:\/\/veridas.com\/en\/pt\/#website","url":"https:\/\/veridas.com\/en\/pt\/","name":"Veridas","description":"Just be you","publisher":{"@id":"https:\/\/veridas.com\/en\/pt\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/veridas.com\/en\/pt\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/veridas.com\/en\/pt\/#organization","name":"Veridas","url":"https:\/\/veridas.com\/en\/pt\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/veridas.com\/en\/pt\/#\/schema\/logo\/image\/","url":"https:\/\/veridas.com\/wp-content\/uploads\/2021\/09\/logo-veridas-calidad.png","contentUrl":"https:\/\/veridas.com\/wp-content\/uploads\/2021\/09\/logo-veridas-calidad.png","width":2048,"height":1076,"caption":"Veridas"},"image":{"@id":"https:\/\/veridas.com\/en\/pt\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/VeridasOfficial","https:\/\/es.linkedin.com\/company\/veridas","https:\/\/www.instagram.com\/veridas.life\/","https:\/\/www.youtube.com\/@VeridasOfficial"]},{"@type":"Person","@id":"https:\/\/veridas.com\/en\/pt\/#\/schema\/person\/10fdfcea52cd13a96d8be9bb065e32f0","name":"Paco Zamora","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/veridas.com\/en\/pt\/#\/schema\/person\/image\/","url":"https:\/\/veridas.com\/wp-content\/uploads\/2025\/01\/Paco-Zamora-150x150.jpg","contentUrl":"https:\/\/veridas.com\/wp-content\/uploads\/2025\/01\/Paco-Zamora-150x150.jpg","caption":"Paco Zamora"},"description":"Technology | Core Tech Manager","sameAs":["https:\/\/www.linkedin.com\/in\/francisco-zamora-martinez-9a048436\/"],"url":"https:\/\/veridas.com\/en\/author\/paco-zamora\/"}]}},"_links":{"self":[{"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/posts\/44531","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/comments?post=44531"}],"version-history":[{"count":10,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/posts\/44531\/revisions"}],"predecessor-version":[{"id":83196,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/posts\/44531\/revisions\/83196"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/media\/69623"}],"wp:attachment":[{"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/media?parent=44531"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/categories?post=44531"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/tags?post=44531"},{"taxonomy":"country","embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/country?post=44531"},{"taxonomy":"resource","embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/resource?post=44531"},{"taxonomy":"format","embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/format?post=44531"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/topic?post=44531"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/industry?post=44531"},{"taxonomy":"solution","embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/solution?post=44531"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}