Biometrics reinforces identity ­authentication

October 2013 Access Control & Identity Management, Products & Solutions

For companies, knowing who a person is, where they are on the premises and why they are there – and validating this information – is the main driver behind security and biometric access control technology integration in the workplace.

To this end, technology which captures and processes biometric data using fingerprints or facial recognition, for example, remains a dominant technology. However, that does not mean other solutions are just legacy systems, say experts, there are many examples of installations of hybrid technology that meet a current and growing need in the market.

Biometric technology has traditionally found mainstream application within manufacturing and retail sectors. However, because of the inherent practical benefits of using this technology, there is now more widespread application across various industries and sectors says Teryl Schroenn, CEO, Accsys.

“In high security areas which keep valuables or house confidential information, biometric technology has become very popular because it is able to record and process information with high levels of accuracy, instantaneously. It is also straightforward technology that is easy to use and regulate,” explains Schroenn.

Although the technology is holistic, competitive and has a broad-based value, there is still an element of risk and management process required to ensure accuracy and stability. It is also important to remember that the value and cost benefit to company will depend on the number of readers, the level at which the company requires security and surveillance, and the length of time the infrastructure has been in place.

According to Accsys after a period of between three and twelve months, the business should start to experience cost savings.

“Integration and centralisation through the application of multi-biometric and hybrid biometric solutions characterises this market. It reflects the desire of companies to protect their resources, comply with corporate governance legislation and generate profit at the same time. Access control as part of broader people management and security solutions development is significant,” adds Schroenn.

She believes that as the importance of data increases, and the need to secure assets grows against ongoing threats, biometric technology will become even more relevant.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
Recording 40 high-resolution channels
Dallmeier Electronic Southern Africa Surveillance Products & Solutions
With the new MK4 revision of the DMS 2400, Dallmeier introduces a more powerful version of its video appliance, enabling the recording of up to 40 high-resolution video streams, and offering significantly increased capacity.

Read more...
Short-range indoor LiDAR sensor
OPTEX Perimeter Security, Alarms & Intruder Detection Infrastructure Products & Solutions
The REDSCAN Lite RLS-1010L has been developed to provide comprehensive coverage and protect high-risk security zones and vulnerable, narrow indoor spaces that are difficult to protect with traditional sensors.

Read more...
Who has access to your face?
Access Control & Identity Management AI & Data Analytics
While you may be adjusting your privacy settings on social media or thinking twice about who is recording you at public events, the reality is that your facial features may be used in other contexts.

Read more...
Is your entrance security secure?
SMART Security Solutions Centurion Systems Technews Publishing News & Events Access Control & Identity Management Smart Home Automation
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security.

Read more...
Continuum launches centralised access and identity management
Editor's Choice Access Control & Identity Management Integrated Solutions Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...
Innovations shaping the safety and security landscape
Integrated Solutions Products & Solutions
TMT Services and Supplies is excited to connect with all attendees, share insights, and explore the latest trends and innovations shaping the safety and security landscape.

Read more...
Putting security in gear
Asset Management Products & Solutions
The inaugural Securex Cape Town 2025 will showcase a number of companies focused on vehicle and fleet security on South Africa’s dangerous and often crime-infested roads.

Read more...
Managing assets and clear communication
Asset Management Products & Solutions
Communication is essential for security management as well as efficient asset control. A few companies at Securex Cape Town 2025 might have the solution you are looking for.

Read more...
Drones and a hint of access control
Surveillance Products & Solutions
Drones are an indispensable tool for security operations, with more functionality and capabilities than ever. Securex Cape Town 2025 will naturally have drone service providers available to light the way for interested parties.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.