Securing financial institutions with biometrics

October 2015 Financial (Industry), Access Control & Identity Management, Integrated Solutions

The theft of money remains the primary goal of most criminals and what better place to acquire it than through the depository of most cash – financial institutions. Addressing the need to stop increasingly sophisticated criminals from unlawfully accessing another’s funds is something that all financial institutions cite as a priority. The use of biometrics to achieve this objective is picking up pace.

John Powell, MD of Powell Tronics.
John Powell, MD of Powell Tronics.

According to John Powell, managing director of Powell Tronics, one needs to differentiate between the larger registered financial service providers (RFSPs) and the micro RFSPs such as retail outlets that offer customers credit cards or loyalty cards.

The larger RFSPs deal with large numbers of people entering their branches on a daily basis, with a vast number of account holders being the norm. The trend, as detailed in the adoption of HANIS by SABRIC bank members, is to register customers, especially new account holders, biometrically. These biometric records will form part of the account holder’s personal banking profile and can be verified via the HANIS systems to ensure that no account is illegally accessed.

In addition to this new system, Powell says that the company often receives requests from financial institutions to ­provide bio­metric systems that will control the ingress and egress of employees, especially in sensitive areas such as the vaults and IT departments. However, he adds, the greatest demand comes from the micro RFSPs where managing staff and securing their facilities is their biggest security issue.

Physical and logical access

Since customers do not actually visit micro RFSP facilities, the primary access issue is protecting customer information. The goal here is to limit admission into the site/system specifically to those people who are registered to access the sensitive data. Powell Tronics has deployed a number of its PT-AD systems into this market sector. With the incorporation of MS Active Directory into the ImproNet access control system, the system is able to institute a higher level of access control management in terms of linking Internet and IT access to physical access to specific employees.

Once enrolled on the system, PT-AD will verify that users are permitted to access the IT domain which then manages all records centrally. If an employee is dismissed or leaves the company, the HR department will note this electronically on the employee’s record via the Windows Directory and the system will automatically revoke their access both into and out of the building, as well as into the IT system. Access control solutions are typically now being integrated with business management and surveillance systems to provide a comprehensive holistic security solution.

Powell says that it is easier to provide standard solutions to the micro RFSPs due to the smaller number of people entering the facilities. However, customisation is also an option, depending on the specific customer requirements. He says that providing such levels of access control via a product like PT-AD would be logistically difficult for banking customers and he therefore does not foresee this happening in the immediate future.

Mobility

As with most market sectors, mobile technology is fast gaining ground. Powell cites a number of examples where mobile technology is used to provide access into facilities with electronic visitor management systems at business and residential estates and within the educational sector. He believes that this technology will also be adopted by the financial sector.

He emphasises that before instituting a biometric security solution, RFSPs should request documented customer references from a supplier to ensure that the technology is capable of providing maximised results in a specific application. Coupled with this is the selection of solutions that are provided by a recognised brand leader who has invested in the scalability and sustainability of the specific access technology. In addition, end users should ensure that the system integrator or installer that they employ to source and install their access technology has a proven track record and is able to deploy a solution that is tailored towards that specific market sector.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Paxton opens second experience centre
Paxton News & Events Access Control & Identity Management
Security technology manufacturer, Paxton, has opened a new experience centre in Cape Town on 12 February in partnership with its exclusive distributors, Reditron and Regal Security.

Read more...
Gallagher Security expands Digital Badge Programme
News & Events Access Control & Identity Management Training & Education
Following a successful launch and roll out across Australia and Papua New Guinea in 2023, Gallagher announced its Digital Badge programme is now available to channel partners and end users across the rest of APAC IMEA.

Read more...
Integrated Control Technology and Ingram Micro sign distribution agreement
News & Events Access Control & Identity Management
Integrated Control Technology, a global manufacturer of intelligent electronic access control and security solutions, announced it has extended its presence in the Middle East and Africa region by entering a distribution agreement with Ingram Micro.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
Nice launches DC Blue Astute garage door motor
Nice Group South Africa Technews Publishing News & Events Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Nice Systems SA has launched the Nice DC Blue Astute, a garage door motor for the South African market featuring a pre-installed lithium-ion battery instead of traditional lead-acid batteries.

Read more...
edgE:Tower video analytics integrated with SEON
Surveillance Integrated Solutions AI & Data Analytics
Sentronics has announced a new integration between its edgE:Tower advanced AI-driven video analytics solution and SEON, a Central Monitoring Software (CMS) platform. This integration enhances real-time situational awareness and automated threat detection for control rooms.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...