Biometrics in financial services

Issue 2/3 2023 Financial (Industry), Access Control & Identity Management

There are increasing concerns related to the security in authenticity and integrity of banking systems. The weakness of the current verification or authentication methods, such as pin numbers and passwords, contributes significantly towards information leakage stored in automated teller machines (ATMs) or smart card, which results in loss of money from bank accounts.

Today, it is possible to verify our identity using a selfie, our voice or by placing our finger on the fingerprint reader of our mobile phone. Using those features that make us unique is a simple, secure way to access online banking services.

The impact of biometrics

Over the last few years, more studies have been done on digital banking, financial technology, and the impact of biometrics within banking and retailing in South Africa. Biometric data has become increasingly important when it comes to security in digital banking. Biometric authentication in the banking sector can be used in various ways; document verification combined with biometric verification removes the need for manual verification, such as filling in forms or heading to a branch in person to prove your identity.

Biometric authentication has ensured that customers can access their bank accounts and start making payments in minutes as opposed to days. In the banking sector, the use of these biometric authentication systems represents a step forward in the protection of user data, for example, by replacing or strengthening traditional alphanumeric passwords. They also serve as a reliable, fast, and convenient method of verification when using or purchasing products and services.

Fingerprint verification is undoubtedly the most well-known and traditional biometric method and is used worldwide. Most smartphones currently have a fingerprint reader, so it is possible to use it to perform day-to-day operations such as activating your mobile phone to make a payment or accessing digital banking.

Facial recognition

Now we also have facial recognition using the device’s camera (such as mobile phone, computer or tablet), the image is captured and a mathematical pattern is created to associate it with an identity, taking into account aspects such as distance between the eyes, position of the nose, size of forehead, etc.

In digital banking, for example, it is possible to open a bank account with a smartphone, using the camera to send a photo of ourselves and a copy of our identity card. This enables the system to compare the two images and verify the data. Biometric facial recognition and live fingerprint detection are becoming powerful ways to prevent bank fraud.

Facial recognition technology within the banking sector allows you to get a personal connection with thousands of customers and reward their patronage. You can maximise bank security using face recognition and control access to the most sensitive areas of banks, ensuring that only authorised personnel are allowed in secure locations.

Biometric identification in the digital banking sector has several advantages. Convenience and simplicity of use is undoubtedly one of them. Whether it is placing our finger on a reader or taking a photograph etc., none of these actions involves any great difficulty, as could happen with passwords or codes, which need to be remembered. As no two fingerprints or faces are identical, the security of this type of identification is greater. It is also a method that significantly reduces the chances of suffering crimes such as phishing, a fraudulent practice with which cyber criminals seek to access our personal data by sending e-mails.

Lastly, one of the advantages of biometric security is its continuous innovation. As technology advances, so do authentication methods. For example, one of the most recent steps in this direction is behavioural biometrics, which considers a combination of factors to identify the legitimacy of banking customers’ operations, such as how they type on the keyboard, the locations from which they frequently perform operations or their purchasing habits.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Centurion raises the bar at HomeSec Expo
Centurion Systems News & Events Access Control & Identity Management Residential Estate (Industry) Smart Home Automation Commercial (Industry)
Centurion Systems unveiled its latest product lines at HomeSec Expo 2026, introducing SMART+, a simpler way for installers and end users to manage their Centurion installations - as well as a few new products.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
Banking’s AI reckoning
Financial (Industry) News & Events AI & Data Analytics
From agentic commerce disputes to quantum-powered risk modelling, SAS experts offer a ‘banker’s dozen,’ 13 industry-defining predictions that will separate institutions that master intelligent banking from those still struggling with the basics.

Read more...
2026 Industry Trends Report calls out security’s next opportunity
Integrated Solutions Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Gallagher Security has released its 2026 Security Industry Trends Report, drawing on insights from end users, channel partners, consultants, and technology stakeholders; highlighting a growing opportunity for security to play a more strategic, value-driven role across organisations worldwide.

Read more...
Smarter access, stronger defence
Secutel Technologies Security Services & Risk Management Access Control & Identity Management Retail (Industry)
The holiday season brings excitement, increased foot traffic and, unfortunately, a spike in criminal activity targeting retail environments. Taking a proactive approach to security is essential in ensuring staff and assets remain safe.

Read more...
AI rewrites financial crime
Security Services & Risk Management Financial (Industry)
Criminals are exploiting South Africa’s high connectivity and still-maturing regulation to scale attacks faster than we can defend them. The speed and sophistication of these scams are outpacing the systems designed to stop them.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.