Steps to successful biometric implementation

1 December 2019 Access Control & Identity Management

Biometrics has often been considered a risky and unreliable investment for many organisations. Its rocky reputation, influenced by poorly managed and integrated installations, seldom factor into key considerations such as the environment, operational impact and legalities. However, the Goode Intelligence study found that biometric authentication delivers improved security and compliance benefits, and allows for a balance between security and convenience without compromising on either.

Biometrics can provide the organisation with a balanced and accessible authentication platform that supports the customer, the business and an omni-channel strategy, but it has to be implemented correctly.

To minimise frustration and to help customers protect their investment, there are seven steps that should be taken from first consideration through to final implementation. The first is to assess the business to determine whether or not biometrics is a good fit. Different types of biometric identification introduce their own metrics and requirements and are better suited to different working conditions. By selecting the right solution for the environment, the business can ensure the safety and security of staff at various sites across different locations. Before opting into a specific biometric solution, the business should also establish the risk associated with visitor concerns, union concerns or challenges, hygiene factors and the ongoing operational expenses.

The second step is to ensure that every individual at the organisation is uniquely enrolled into the solution and that the enrolment process follows the highest standards. If using fingerprint verification, the quality of the prints can be enhanced by using prescan treatment or a technique known as ‘milking the finger’ to raise the fingerprint ridges and improve the quality of the reference fingerprint. It is also essential to get every individual’s consent before embarking on the process as this will not only encourage buy-in from employees, but may mitigate concerns raised by unions.

Accuracy, reliability and performance

The third step is to select a biometrics solution that delivers precisely what your organisation requires and that ticks the boxes of accuracy, reliability and performance. There is a difference in performance between solutions that are average versus those that are best in class.

For example, selecting biometric readers that are immune to electrostatic discharge, capable of extracting clear images and fast in finding an accurate match, are all critical to ensure a good user experience. It’s also advisable to work with a system that offers extensive interoperability, provides assurance in the integrity of the system through the use of common testing criteria, and doesn’t force vendor lock-in.

In fourth position is the need to assess the impact of a biometric solution on existing IT infrastructure by determining network capacity, server and software requirements, and integration into other systems such as payroll or operations. A comprehensive assessment of the business will allow for a more seamless integration that takes all the unique business factors into consideration. This is further supported by the fifth consideration: appointing a certified installer. Only work with a company that has a solid reputation and that delivers a solid solution from the outset.


Marius Coetzee.

Future-proof solution

The sixth point ties in neatly with the fifth: ensure that your biometrics partner offers you after-sales support, a warranty programme and future-proof foundation that’s capable of integrating next-generation technology. Finally, ensure that any biometric implementation carefully considers all the legal implications by ensuring that all employees and individuals give consent, that there is a policy in place for if something goes wrong, and that you’re completely aware of what to do in the event of a breach or data loss. Biometric records can be used in a court of law so it is critical to ensure that all governance, risk and compliance requirements are met.

By working with a reputable partner that invests in best-in-class technology with future-proof capability, strong after-sales support, high-end enrolment policies and business relevant applications, you are setting your biometric system up for success. It is a complex but robust technology that requires due diligence and intelligent application to ensure that any implementation is both sustainable and successful.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Bespoke access for prime office space
Paxton Access Control & Identity Management
Nicol Corner is home to a six-star fitness club, prime office space, and an award-winning rooftop restaurant. It is also the first building in South Africa to have its glass façade fully incorporate fritted glazing, saving 35% on energy consumption.

Read more...
Gallagher Security launches Augmented Reality Training in Australia
Gallagher Training & Education Access Control & Identity Management
Gallagher Security has announced the latest addition to its innovative suite of training solutions, Augmented Reality Training, demonstrating its continued commitment to innovation and improving access to security training opportunities.

Read more...
Fluss launches the next wave of IoT solutions
IoT & Automation Access Control & Identity Management News & Events
Fluss has announced its newest IoT product; Fluss+ continues to allow users to manage access from anywhere globally and brings with it all the advantages of Wi-Fi connectivity.

Read more...
The future of digital identity in South Africa
Editor's Choice Access Control & Identity Management
When it comes to accessing essential services, such as national medical care, grants and the ability to vote in elections to shape national policy, a valid identity document is critical.

Read more...
Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Read more...
Access Selection Guide 2024
Access Control & Identity Management
The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.

Read more...
Biometrics Selection Guide 2024
Access Control & Identity Management
The Biometrics Selection Guide 2024 incorporates a number of hardware and software biometric identification systems aimed at the access and identity management market of today.

Read more...
Smart intercoms for Sky House Projects
Nology Access Control & Identity Management Residential Estate (Industry)
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app.

Read more...
Authentic identity
HID Global Access Control & Identity Management
As the world has become global and digital, traditional means for confirming authentic identity, and understanding what is real and what is fake have become impractical.

Read more...
Research labs secured with STid Mobile ID
Access Control & Identity Management
When NTT opened its research centre in Silicon Valley, it was looking for a high-security expert capable of protecting the company’s sensitive data. STid readers and mobile ID solutions formed part of the solution.

Read more...