classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2018


Give passwords the finger
May 2017, Financial (Industry), Access Control & Identity Management

Biometrics in its many forms has become standard in many organisations, especially for access control and time and attendance (T&A) functionality. But biometrics can be used for much more.

In a few companies, fingerprint biometrics is also being used to control which employees have access to sensitive areas and sensitive functions where rogue employees are able to fiddle with a company’s finances. Yet, most companies still rely on passwords and ‘traditional’ virtual access control methods to protect bank accounts and accounting packages (and for virtual access on the whole) – most of them without managing the passwords people use or how they go about remembering them.

A few companies have taken the plunge and now use fingerprint biometrics to control access to their premises as well as their virtual premises. Instead of logging on with a password, a swipe of the finger is all it takes. Perhaps the growth of fingerprint access on smartphones has made people more aware of the possibilities.

Yet, despite the obvious security benefits of biometrics, many companies have no plans to change their operational systems to incorpor-ate them, even in sensitive positions. Hi-Tech Security Solutions asked ViRDI SA’s Deon Janse van Rensburg for his take on why this is happening despite the growing global awareness of fingerprint biometrics.

Janse van Rensburg says that he is finding more companies enquiring about the convergence between physical and virtual access control systems. However, the enquiries seldom turn into a rollout. He says there are two main issues preventing virtual biometric access from becoming mainstream: cost and an understanding of how these systems work.

“Any converged system becomes an expensive capex exercise due to the complexity of the system, resulting in many man-hours in configuration and training,” Janse van Rensburg explains. “Users rarely have an idea of this complexity and rarely understand the impact that the deployment of such a solution will have on their businesses from a capex, administration, maintenance, infrastructure layout and IT infrastructure point of view.

“I call it the ‘Hollywood Effect’ and many other disciplines are experiencing the same where expectation rarely meets reality.“

More secure access?

Janse van Rensburg is clear that biometrics does add to the level of security. “As any IT security specialist will tell you, passwords to access computer systems are predictable due to users using passwords that they can remember and that are familiar to them. I recently read an article that provided examples of such predictable passwords which include names of pets, family members, birthdays etc.

“Another issue is that passwords are shared with other people, rendering the security features virtually useless. With fingerprint biometrics and the way the extraction technologies work, this becomes exponentially more difficult as fingerprint templates are extremely complex and should be encrypted to an AES standard.”

Additionally, he notes that since the same optics and algorithms are used for both physical and virtual access control, the virtual systems are as secure as the systems being used for access control and T&A. “The challenge is that physical access control systems, i.e. the biometric terminals, are very rarely the object of targeted malicious software and hacking attacks. This is where the difference lies, virtual systems are under constant hacking attacks and the safeguarding thereof cannot be handled by the biometric devices. If the network security can be breached then the system is vulnerable.”

ViRDI’s virtual access devices

When it comes to the options customers have from ViRDI for virtual access, Janse van Rensburg says the company supplies various PIV/AFIS types of devices – dependent on the application. “Normally we would supply our FOH02 USB reader, but if the client has the requirement for FBI approved PIV/iAFIS devices they would be looking at the FOH04 and V-ScanFB series of devices.

“Our off-the-shelf software is actually a combination of packages. V-Bioguard interacts with Active Directory and replaces the password functionality with fingerprints. It provides a GUI for rights assignment, monitoring and reporting functionality. The second portion of the software solution is the MASS-Server, which allows the identification of a 1:1 000 000 (1:N) fingerprints in under 1 second.”

For more information contact ViRDI Distribution, +27 (0)11 454 6006, deon@virditech.co.za, www.virditech.co.za


Credit(s)
  Share via Twitter   Share via LinkedIn      

Further reading:

  • More than locking the door
    April 2019, Technews Publishing, Salto Systems Africa, ZKTeco, Entertainment and Hospitality (Industry), Access Control & Identity Management, Asset Management, EAS, RFID
    Electronic locks offer hotels far more than simply a more convenient way to manage doors, they can be integrated into a host of other systems and services.
  • Wide-area surveillance on estates, farms and other large properties
    April 2019, Protoclea Advanced Image Engineering, Access Control & Identity Management, Integrated Solutions
    Using the right solution to protect large, open areas can be accomplished with the right technology and planning.
  • Visible light facial recognition
    April 2019, ZKTeco, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    ZKTeco recently expanded its reach in the facial recognition market with the launch of its new series of visible light facial recognition (VLFR) products.
  • Split design hotel door
    April 2019, ZKTeco, Products, Access Control & Identity Management
    LH7500 hotel door locks are the latest models from ZKTeco’s Smart Lock series with elegant designs and support for Mifare cards and the EU standard mortise.
  • Slim hotel door lock
    April 2019, ZKTeco, Products, Access Control & Identity Management
    The LH7000 hotel door lock is the latest from the ZKTeco Smart lock series, supporting Mifare cards and the EU standard mortise.
  • Alastair McPhail joins Jarrison
    April 2019, Jarrison Systems, News, Access Control & Identity Management
    Alastair McPhail has taken the position of national marketing manager at time and attendance manufacturers, Jarrison Systems.
  • Access in the mobile era
    April 2019, Suprema, Products, Access Control & Identity Management
    BioStar 2 Mobile Card offers convenience to end-users by storing biometric information, to function as a credential, in their own smartphones.
  • Facial recognition for hotel efficiency
    April 2019, ZKTeco, Entertainment and Hospitality (Industry), Access Control & Identity Management, Products
    Visible light facial recognition technology has been developed for purposes where high-speed facial recognition at an extremely high level of accuracy is vital.
  • Stop hacking of access control ­systems
    March 2019, This Week's Editor's Pick, Access Control & Identity Management, Cyber Security
    Think someone hacking your access control system not a big deal? Scott Lindley suggests that you think again.
  • Secutel partners with Matrix Comsec
    March 2019, Secutel Technologies, News, CCTV, Surveillance & Remote Monitoring, Access Control & Identity Management
    Secutel Technologies announced it is the exclusive distributor of Matrix Comsec access control products and IP video management software in South Africa. Established in 1991, around 40% of Matrix’s ...
  • Countering the threats of retail ­terrorist vehicle attacks
    March 2019, This Week's Editor's Pick, Access Control & Identity Management, Security Services & Risk Management, Retail (Industry)
    Bollard systems operate individually or in groups and are aesthetically pleasing and let pedestrians move between them in non-roadway applications.
  • Shopping with your face
    March 2019, ZKTeco, Retail (Industry), Access Control & Identity Management
    Facial recognition is being used in many businesses to verify payments, grant access and improve existing security systems.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.