Global biometrics trends adoption

1 March 2019 Access Control & Identity Management, Government and Parastatal (Industry)

Pine Pienaar
Pine Pienaar

Globally, digital transformation and consumer acceptance of biometrics as a measure to increase security protocols are both having a significant impact on driving the rapid adoption of biometrics. However, it must be recognised that the opportunities are far greater than just for security.

In fact, as widespread adoption of digital technologies such as cloud computing, machine learning (ML) and Internet of Things (IoT) continues to grow in mainstream markets, we are seeing faster innovation in the biometrics space too. And, while uses and uptake for mobile and multimodal identity management solutions will still grow significantly in the coming years, parallel to this, we are also seeing exciting developments in solutions that meet new uses/applications – offering consumers increased convenience and enhanced experiences across more mainstream markets.

As we closely follow developments across global markets, I’ve identified three uses/applications where I believe biometric-based solutions will increasingly be deployed:

#1: Biometrics to introduce paperless airport transfers

There have been a number of developments and pilot programmes rolled out in airports across the world; aimed at capturing, storing and making use of an individual’s biometrics as a form of authenticating a traveller’s identity. The move to biometrics can be underpinned by two key drivers; increased security at/through airports and improving the customer/traveller experience.

From a security point-of-view, it is well recognised that there is a global phenomenon with fake documents, including passports, and linked to identity theft. However, the introduction of multimodal biometric solutions - which generally involve an Automated Biometric Identification System (ABIS) as the basis and offers far more accurate identity verifications. And when these systems are securely integrated with appropriate databases, they are also able to deliver reliable results instantly.

Biometrics-based security protocols also create opportunities to streamline and speed up check-ins, customs and border control, and transfers at airports. This can reduce customer/traveller stress points and frustrations – of having to stand in queues and produce multiple documents every time they travel - and thereby significantly improve their overall experience.

While it is uncertain if biometrics will ever replace the need to apply for and/or renew one’s passport – advances in biometrics make a strong business case for frictionless authentication and paperless airport transfers. However, the aviation and travel industries aren’t alone in cottoning onto ‘frictionless authentication’.

#2: Frictionless authentication for payments

Driven by a heightened sense of competition, from traditional and non-traditional players, the banking industry in many markets around the world is arguably among the earlier adopters of new technology, as there is a strong direct correlation between offering innovation solutions and enhanced customer experience and retention.

Added to this, given the propensity of risk in financial services, this industry has a greater need to be able to offer customers strong security protocols – and are compelled by regulation to ensure their customers’ data and their money is protected.

It’s not surprising then that banks are starting to incorporate biometrics-based solutions into their business (from fingerprint capturing for identification authentication and as a security metric to protect a customer’s accounts) to fingerprint and facial recognition as a frictionless extra layer of security to authenticate and approve payments, etc. To demonstrate this massive market potential, research suggests that there will be over 2.6 billion biometric payment users by 2023.

#3: Identity management takes on behavioural biometrics with digital signature verification

Behavioural biometrics go hand-in-hand with digital and frictionless identity management. The only difference is that it’s the process or application of authenticating an individual based on their unique behavioural traits, rather than their physical characteristics.

The earliest noted behavioural trait is the signature and even digital signatures have a history of development that dates back to the late 1970s. It should be noted that a digital signature still makes use of physical biometrics, and most commonly fingerprints, whereby unique bar codes are created from the fingerprint pattern or image.

Due to widespread digital adoption and as more businesses and consumers alike, look to automate and streamline as many processes and/or tasks, it’s not surprising that digital signatures as a form of biometrics is currently receiving a lot more attention.

Adoption is largely dependent on a case-by-case growing need for effective authentication, security and control linked to specific actions. For example, using a digital signature as an extra line of security to authenticate a user’s identity during a digital transaction. However, the acceptance and adoption rate of digital signatures will strongly be influenced by cyber laws and industry specific regulation of individual markets.

These are only a few of the uses/applications for biometrics that are starting to emerge and receive a lot of attention, though there are many more currently being explored and across varying markets and industries, from travel to healthcare, for example. What is interesting to note though is that all of these uses and applications are still dependent on the one basic principle of biometrics – to accurately identity an individual – and then to address a need or action.

For more information contact Afiswitch, +27 12 679 2900, enquiries@afiswitch.com, www.afiswitch.com.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...
Cloud security in visitor management and access control
SA Technologies Access Control & Identity Management Infrastructure Residential Estate (Industry) Commercial (Industry)
Cloud has become the default platform for modern security operations, from visitor management portals and remote access control to incident logging, reporting, analytics, and integrations. But “in the cloud” does not mean “someone else is securing it for us”.

Read more...
Centurion raises the bar at HomeSec Expo
Centurion Systems News & Events Access Control & Identity Management Residential Estate (Industry) Smart Home Automation Commercial (Industry)
Centurion Systems unveiled its latest product lines at HomeSec Expo 2026, introducing SMART+, a simpler way for installers and end users to manage their Centurion installations - as well as a few new products.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
Protecting citizens’ identities: a shared responsibility
Access Control & Identity Management
A blind spot in identity authentication today is still physical identity documents. Identity cards, passports, and driver’s licences, biometric or not, are broken, forged, or misused, fueling global trafficking networks and undermining public trust in institutions.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.