Biometric fingerprint technology still dominates

Access & Identity Management Handbook 2014 Access Control & Identity Management

While biometric facial recognition access technology is gaining some ground in the market, fingerprint technology continues to retain a 90% share. This is according to Hendrik Combrinck, GM of ZKTeco (previously known as ZK Software).

“As the price of facial recognition technology decreases over time, it will continue to grow in demand, but I believe that fingerprint technology will remain dominant due to its long track record and extensive footprint in the market. Iris technology is predominantly used in areas where extremely high levels of access control are required, for instance laboratories. The fact that it has such a niche market means that the technology is very expensive.

“The biggest obstacles to the ready adoption of facial recognition technology, after its price, are the physical restraints. The camera size and the available lighting are often limiting factors. However, we do find that this technology proves popular with smaller companies where they have issues with fingerprint technology. A typical scenario is one where the fingerprints have been destroyed by chemicals or where dust is a major factor such as on construction sites,” said Combrinck.

Distributor challenges

“One of the biggest challenges that distributors of products face is local support of the technology. It is critical to align oneself with a fully-fledged supplier branch that has not only sufficient stockholding of technology and consumables, but which is also able to provide complete technical support for the products they sell,” Combrinck pointed out.

Distributors need to know that the products they market are fully covered by warranties and guarantees. While this is true of the well-known brands, the same cannot always be said of some of the cheaper, mass produced products flooding the country.

Pricing has been very negatively affected by the fluctuating Rand-Dollar exchange rate. The uncertainty makes it extremely difficult to estimate a feasible sales price even on a weekly basis. This has resulted in extra administrative costs for distributors as they attempt to balance the scales so that they do not price their goods too high or too low. This type of fluctuation inevitably influences the whole supply chain.

“Added to this is the juggling act that distributors are faced with when considering critical mass of stockholding. Gauging the market demand is often challenging, since technology that one might assume would be a ‘sure thing’ may not live up to expectations in terms of market acceptance,” he continued.

Importer challenges

Combrinck said that many of the challenges faced by distributors also affect the importers of technology. “In addition, the time zone of the originating and destination company can often be a large stumbling block. With time differences of up to eight hours, it can be difficult to ensure that there is a reasonable overlap period between the business hours of suppliers and those of importers. At ZKTeco’s head office in China, a team assigned to our South African office has been placed on shifts that coincide with our local working hours to provide us with uninterrupted access to resources.

“We have noticed that one of the challenges previously faced in terms of hold-ups at customs seems to have been eliminated. Instead of taking up to a week to clear imported goods, we now receive clearance within 24 hours. This seems to be a trend for other importing companies in the industry and we feel that this may be due to intervention from the Department of Trade and Industry.”

Full solutions

Combrinck explained that ZKTeco has implemented an international strategy to be branded as a full solutions biometrics and security product supplier. “This will allow us to offer customers an end-to-end holistic solution whereby we will eventually be able to provide whatever security technology needs the customer may have. We will be implementing more customised and high-end software and we will create APIs (Application Programming Interfaces) for integration with third-party technology or software.

“We already provide our own RFID cards, biometric products and door handles and locks, so the move to add CCTV and access control products is a logical one that will see us move towards the number one spot as a global security products distributor,” Combrinck concluded.

For more information contact ZKTeco (SA), +27 (0)12 259 1047, hendrik@zkteco.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
Protecting citizens’ identities: a shared responsibility
Access Control & Identity Management
A blind spot in identity authentication today is still physical identity documents. Identity cards, passports, and driver’s licences, biometric or not, are broken, forged, or misused, fueling global trafficking networks and undermining public trust in institutions.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Luxury residential access
Access Control & Identity Management Residential Estate (Industry)
Clifftown Shore is an exclusive collection of 51 luxury 1, 2 and 3-bedroom seafront apartments and penthouses set within a protected conservation park area, served by CAME’s XiP system and door entry system.

Read more...
From identity to insight
neaMetrics Access Control & Identity Management
Identity outlives technology. When it is trusted, it becomes a foundation for insight and scale. When it is not, every system built on it inherits the risk. Identity quality matters, at both human and system levels, and getting it right is what allows security to endure.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.