The COVID effect

Access & Identity Management Handbook 2021 Access Control & Identity Management

No event has disrupted the lives of every human on earth – and every organisation – as much as the COVID-19 global pandemic. It has also become clear that when we are on the other side of this crisis, the world will have been forever changed.

Both for businesses which have closed or gone remote during the pandemic, and for those which have remained open throughout, employers are changing their priorities to recognise the vital importance of supporting health and safety among their populations. As the economy prepares for the post-COVID era, management and human resources are adopting new stringent personal and workplace hygiene rules and processes for personnel.

To further address these concerns, organisations have placed a priority on searching for technology solutions to help curb the spread of viruses and microbes. From doors to sinks to elevators, these new technologies will be centred primarily on delivering a touchless experience. These are not just temporary changes. Now that we have all experienced the massive disruption that a pandemic can cause, business owners and other leaders will be implementing permanent changes in an effort to avoid a recurrence and avert any new health threats.

Spotlight on human capital management needs

Among the new products and processes that are being researched now are those in the time and attendance market. These solutions are often combined with access control products, with an employee’s entrance and exit providing data on the start and end times of their workday. These products have traditionally been card-based – a paradigm that requires contact. It is the responsibility of human capital management and security professionals to discover a new way to collect this data while minimising health risks.

In evaluating potential contactless solutions for time and attendance, the technology that has been most widely accepted today falls into two categories: biometrics and proximity devices of all types.

Why facial recognition is becoming more attractive

While it is true that facial recognition continues to meet steep challenges in acceptance and adoption, it has emerged as the leader among biometric solutions and will stand out even more in the future. There are several reasons for this. The other biometric technologies currently available in the market include iris recognition, palm vein scanners and fingerprint readers. Iris recognition is often misunderstood to be a retina scanner, a misunderstood and sometimes-feared technology, and this has limited its growth.

Like palm vein scanners, iris recognition is also too costly for many organisations. Fingerprint readers continue to be a successful technology; however, they are not a contactless solution which may affect growth of this technology in a future touchless world. These limitations leave facial recognition in a very strong position; one which is further cemented by the ever-increasing high accuracy of this technology.

In fact, the level of accuracy for facial recognition has improved enormously in the last 10 years, according to an evaluation performed by the National Institute of Standards and Technology’s (NIST). The failure rate for searches, meaning that the software failed to find the matching face residing within a database, has dropped from 5% in the year 2010 to just 0,2% in 2018 – a reduction of 96%.

When facial recognition software scans a face to look for a match, it is processing a number of different geometric vectors. While all software is different, most read such factors as the distance between eyes and the distance from chin to forehead. Depending on the sophistication of the software, it may be reading 50, 75 or more different factors. Typically, each analysis is performed individually, and – important in alleviating any concerns about personal information being collected – the only data stored on databases is the physical information contained in the photos themselves, along with the identities of the individuals in the photos.

The ascendency of proximity solutions

While proximity technology has held a steady place in the identity authentication market, it is certain to gain traction in a newly contactless world. This category encompasses proximity cards and devices, and mobile technology in the form of apps added to users’ smartphones. Non-contact cards can be expected to hold their position, while mobile solutions are likely to gain traction as they offer the benefit of not needing additional administrative support.

Mobile card solutions offer other advantages as well; it is far more likely that an individual would forget or misplace a card or device than their phone, which is typically within reach of most people most of the time. Mobile apps can be automatically and frequently updated, ensuring all employees are using the most recent version. While the primary limiting factor here would be the cost, there are also solutions available that can mitigate this, such as the devices that attach to RF card readers and translate the Bluetooth signals of mobile access cards to RF signals

Time and attendance in a new world

There is no way to know exactly when the world will return to normal once the pandemic has been fully brought under control. However, we can be certain that when it does, the world will not look the same as it did at the beginning of 2020. There will have been a significant evolution in the way time and attendance data is collected. Leading this evolution will be a new wave of contactless access products to enable authentication of identities at entry and exit. Chief among these solutions will be those featuring facial recognition and proximity technologies, with facial recognition likely to assume a dominant role for its accuracy and convenience.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
Protecting citizens’ identities: a shared responsibility
Access Control & Identity Management
A blind spot in identity authentication today is still physical identity documents. Identity cards, passports, and driver’s licences, biometric or not, are broken, forged, or misused, fueling global trafficking networks and undermining public trust in institutions.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Luxury residential access
Access Control & Identity Management Residential Estate (Industry)
Clifftown Shore is an exclusive collection of 51 luxury 1, 2 and 3-bedroom seafront apartments and penthouses set within a protected conservation park area, served by CAME’s XiP system and door entry system.

Read more...
From identity to insight
neaMetrics Access Control & Identity Management
Identity outlives technology. When it is trusted, it becomes a foundation for insight and scale. When it is not, every system built on it inherits the risk. Identity quality matters, at both human and system levels, and getting it right is what allows security to endure.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.