Steps to successful biometric implementation

1 December 2019 Access Control & Identity Management

Biometrics has often been considered a risky and unreliable investment for many organisations. Its rocky reputation, influenced by poorly managed and integrated installations, seldom factor into key considerations such as the environment, operational impact and legalities. However, the Goode Intelligence study found that biometric authentication delivers improved security and compliance benefits, and allows for a balance between security and convenience without compromising on either.

Biometrics can provide the organisation with a balanced and accessible authentication platform that supports the customer, the business and an omni-channel strategy, but it has to be implemented correctly.

To minimise frustration and to help customers protect their investment, there are seven steps that should be taken from first consideration through to final implementation. The first is to assess the business to determine whether or not biometrics is a good fit. Different types of biometric identification introduce their own metrics and requirements and are better suited to different working conditions. By selecting the right solution for the environment, the business can ensure the safety and security of staff at various sites across different locations. Before opting into a specific biometric solution, the business should also establish the risk associated with visitor concerns, union concerns or challenges, hygiene factors and the ongoing operational expenses.

The second step is to ensure that every individual at the organisation is uniquely enrolled into the solution and that the enrolment process follows the highest standards. If using fingerprint verification, the quality of the prints can be enhanced by using prescan treatment or a technique known as ‘milking the finger’ to raise the fingerprint ridges and improve the quality of the reference fingerprint. It is also essential to get every individual’s consent before embarking on the process as this will not only encourage buy-in from employees, but may mitigate concerns raised by unions.

Accuracy, reliability and performance

The third step is to select a biometrics solution that delivers precisely what your organisation requires and that ticks the boxes of accuracy, reliability and performance. There is a difference in performance between solutions that are average versus those that are best in class.

For example, selecting biometric readers that are immune to electrostatic discharge, capable of extracting clear images and fast in finding an accurate match, are all critical to ensure a good user experience. It’s also advisable to work with a system that offers extensive interoperability, provides assurance in the integrity of the system through the use of common testing criteria, and doesn’t force vendor lock-in.

In fourth position is the need to assess the impact of a biometric solution on existing IT infrastructure by determining network capacity, server and software requirements, and integration into other systems such as payroll or operations. A comprehensive assessment of the business will allow for a more seamless integration that takes all the unique business factors into consideration. This is further supported by the fifth consideration: appointing a certified installer. Only work with a company that has a solid reputation and that delivers a solid solution from the outset.


Marius Coetzee.

Future-proof solution

The sixth point ties in neatly with the fifth: ensure that your biometrics partner offers you after-sales support, a warranty programme and future-proof foundation that’s capable of integrating next-generation technology. Finally, ensure that any biometric implementation carefully considers all the legal implications by ensuring that all employees and individuals give consent, that there is a policy in place for if something goes wrong, and that you’re completely aware of what to do in the event of a breach or data loss. Biometric records can be used in a court of law so it is critical to ensure that all governance, risk and compliance requirements are met.

By working with a reputable partner that invests in best-in-class technology with future-proof capability, strong after-sales support, high-end enrolment policies and business relevant applications, you are setting your biometric system up for success. It is a complex but robust technology that requires due diligence and intelligent application to ensure that any implementation is both sustainable and successful.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Secure vehicle access in residential estates
Issue 2 2020, Protoclea Advanced Image Engineering , Access Control & Identity Management
Can technology offer a cost-effective solution that will provide both secure access control and free-flowing traffic in estates?

Read more...
Managing people’s attendance and time
Issue 2 2020, Secutel Technologies , Access Control & Identity Management
Managing people’s attendance, along with access control is a basic, yet critical challenge for any organisation.

Read more...
Modular ANPR camera solution
Issue 2 2020 , Access Control & Identity Management
Videalert has announced the immediate availability of Stingray, a new modular ANPR camera solution designed for use with mobile enforcement vehicles.

Read more...
Digital document revolution
Issue 2 2020 , Access Control & Identity Management
A new white paper that examines the implications of the transition from physical to digital security documents has been published by Reconnaissance International.

Read more...
Facial access control for ministry
Issue 1 2020, ZKTeco , Access Control & Identity Management
The Ministry of Culture in Saudi Arabia has adopted ZKTeco’s facial recognition technology and fingerprint biometrics to manage access control into its building.

Read more...
New Door Pilot app from dormakaba
Issue 1 2020, dormakaba South Africa , Access Control & Identity Management
With new dormakaba Door Pilot, automated doors can also now be operated on the basis of remote control technologies. The system, comprising the Door Pilot app for smartphones and a Wi-Fi interface for ...

Read more...
Identity lifestyle
Issue 1 2020, Suprema , Access Control & Identity Management
Once the technology of the future, biometrics has quietly snuck into our daily lives through smartphones and access controls into our places of work.

Read more...
Securing BP’s new head office
Issue 1 2020, ISF SFP , Access Control & Identity Management
ISF SFP was awarded the contract to secure the first development phase for Oxford Parks, the new head office for BP South Africa.

Read more...
Combining aesthetics and access control
Issue 1 2020, Turnstar Systems , Access Control & Identity Management
Prestigious law firm Bowman Gilfillan recently upgraded its physical security with the addition of four Turnstar Speedgate Express access control lanes.

Read more...
Video doorbells from Ring
Issue 1 2020 , Access Control & Identity Management
Ring has a number of video doorbells available in South Africa that run off batteries or power and enable users to answer their doors from anywhere.

Read more...