Biometrics in financial services

Issue 2/3 2023 Financial (Industry), Access Control & Identity Management

There are increasing concerns related to the security in authenticity and integrity of banking systems. The weakness of the current verification or authentication methods, such as pin numbers and passwords, contributes significantly towards information leakage stored in automated teller machines (ATMs) or smart card, which results in loss of money from bank accounts.

Today, it is possible to verify our identity using a selfie, our voice or by placing our finger on the fingerprint reader of our mobile phone. Using those features that make us unique is a simple, secure way to access online banking services.

The impact of biometrics

Over the last few years, more studies have been done on digital banking, financial technology, and the impact of biometrics within banking and retailing in South Africa. Biometric data has become increasingly important when it comes to security in digital banking. Biometric authentication in the banking sector can be used in various ways; document verification combined with biometric verification removes the need for manual verification, such as filling in forms or heading to a branch in person to prove your identity.

Biometric authentication has ensured that customers can access their bank accounts and start making payments in minutes as opposed to days. In the banking sector, the use of these biometric authentication systems represents a step forward in the protection of user data, for example, by replacing or strengthening traditional alphanumeric passwords. They also serve as a reliable, fast, and convenient method of verification when using or purchasing products and services.

Fingerprint verification is undoubtedly the most well-known and traditional biometric method and is used worldwide. Most smartphones currently have a fingerprint reader, so it is possible to use it to perform day-to-day operations such as activating your mobile phone to make a payment or accessing digital banking.

Facial recognition

Now we also have facial recognition using the device’s camera (such as mobile phone, computer or tablet), the image is captured and a mathematical pattern is created to associate it with an identity, taking into account aspects such as distance between the eyes, position of the nose, size of forehead, etc.

In digital banking, for example, it is possible to open a bank account with a smartphone, using the camera to send a photo of ourselves and a copy of our identity card. This enables the system to compare the two images and verify the data. Biometric facial recognition and live fingerprint detection are becoming powerful ways to prevent bank fraud.

Facial recognition technology within the banking sector allows you to get a personal connection with thousands of customers and reward their patronage. You can maximise bank security using face recognition and control access to the most sensitive areas of banks, ensuring that only authorised personnel are allowed in secure locations.

Biometric identification in the digital banking sector has several advantages. Convenience and simplicity of use is undoubtedly one of them. Whether it is placing our finger on a reader or taking a photograph etc., none of these actions involves any great difficulty, as could happen with passwords or codes, which need to be remembered. As no two fingerprints or faces are identical, the security of this type of identification is greater. It is also a method that significantly reduces the chances of suffering crimes such as phishing, a fraudulent practice with which cyber criminals seek to access our personal data by sending e-mails.

Lastly, one of the advantages of biometric security is its continuous innovation. As technology advances, so do authentication methods. For example, one of the most recent steps in this direction is behavioural biometrics, which considers a combination of factors to identify the legitimacy of banking customers’ operations, such as how they type on the keyboard, the locations from which they frequently perform operations or their purchasing habits.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Paxton opens second experience centre
Paxton News & Events Access Control & Identity Management
Security technology manufacturer, Paxton, has opened a new experience centre in Cape Town on 12 February in partnership with its exclusive distributors, Reditron and Regal Security.

Read more...
Gallagher Security expands Digital Badge Programme
News & Events Access Control & Identity Management Training & Education
Following a successful launch and roll out across Australia and Papua New Guinea in 2023, Gallagher announced its Digital Badge programme is now available to channel partners and end users across the rest of APAC IMEA.

Read more...
Integrated Control Technology and Ingram Micro sign distribution agreement
News & Events Access Control & Identity Management
Integrated Control Technology, a global manufacturer of intelligent electronic access control and security solutions, announced it has extended its presence in the Middle East and Africa region by entering a distribution agreement with Ingram Micro.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
Nice launches DC Blue Astute garage door motor
Nice Group South Africa Technews Publishing News & Events Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Nice Systems SA has launched the Nice DC Blue Astute, a garage door motor for the South African market featuring a pre-installed lithium-ion battery instead of traditional lead-acid batteries.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Federated identity orchestration
Technews Publishing SMART Security Solutions Editor's Choice Access Control & Identity Management Security Services & Risk Management AI & Data Analytics
Understanding exactly who resides at the end of a digital device is key, and simple identity number verification by the Department of Home Affairs is no longer a viable solution on its own.

Read more...
Gallagher Security obtains SOC2 Type 2 recertification
Gallagher News & Events Access Control & Identity Management
Global security leader Gallagher has achieved renewal of attestation status for System and Organisation Controls (SOC2 Type 2) as related to the cloud-hosted services of its integrated security solution, Command Centre.

Read more...