A fingerprint in Mexico

October 2008 Access Control & Identity Management

Mexico City International Airport secures its data centre and other critical areas with Bioscrypt’s fingerprint readers.

Twenty-four million passengers flow in and out of the Mexico City International Airport (AICM) every year and their safety depends on the airport’s security measures – especially those taken to protect restricted areas. AICM was building a new state-of-the-art terminal with a Tier 4 data centre and it wanted an access control system that was likewise cutting edge in order to protect passengers.

The new Tier 4 data centre must meet rigorous standards set by the Uptime Institute – it must have 99,995% uptime capabilities and fully redundant power and cooling systems. Entry to these areas must also be carefully guarded and monitored: they must be protected by biometric readers and anti-tailgating devices so that only one person can enter at a time.

The airport also needed to secure its power facilities, access points leading to the platforms, the communications rooms that house the network switches, as well as all other high-security areas of Terminal 2.

In order to meet these strict standards for its infrastructure and to ensure passenger safety, the Mexico City International Airport decided to implement Bioscrypt’s V-Station fingerprint readers. The multifactor authentication solution is being leveraged to provide two-factor identity verification using smartcards and fingerprints to verify the identity of employees as they enter the airport’s data centre, communications room and other vulnerable areas.

“The airport requires cutting edge identity management solutions as we cannot tolerate any security breaches. We insisted on using only the highest quality and industry-proven equipment in the access control solution as well as all other systems within the terminal. The biometric readers are an integral part of the solution and are certainly no exception to the high standards set for Terminal 2,” said Gonzalo Martinez Ulloa, the CIO for Mexico’s Airport Administration Agency (ASA), which is responsible for designing and implementing the technology infrastructure at the airport. “The readers are deployed at the most sensitive and security-enhanced areas of the airport and they provide us with peace of mind, knowing that access to restricted areas will not be easily compromised.”

Bioscrypt’s solution had the further advantage of being tightly integrated with the airport’s new security platform Lenel’s OnGuard.

“Bioscrypt has provided this project with the high quality and reliable product that led to its outstanding reputation in the security industry”, said Dan Norris, director general, Logical Surveillance de Mexico. “Their quality approach, responsiveness to the market and outstanding support has helped us in the design, installation and implementation of the physical security systems at Terminal 2.”

Employees now authenticate themselves at V-Smart readers placed at entrances to critical areas. Their fingerprint is checked against a template placed on HID iClass smartcards. The V-Smart readers at Terminal 2 are a key part of a tightly integrated IP-based security system that uses Lenel’s IP-based access control platform and video software along with Axis Communications’ IP-based CCTV cameras and HID’s smartcards.

There is no longer any doubt about who is entering the Mexico City International Airport’s high-security areas. “Biometrics are the strongest form of authentication available to us and using an identification factor that cannot be stolen, forged or lost takes security to a new level. The heightened measures will present a would-be intruder with a significant barrier,” Martinez Ulloa said.

By installing a biometric access control solution, the airport can ensure that no one can get into the data centre. If unauthorised personnel gained entry, the airport could compromise its ability to ensure that its infrastructure does not experience any more than 0,4 hours of downtime per year. “Bioscrypt’s access control system is high sophisticated – but at the same time, it is elegantly simple. Employees only need their fingerprints and a smartcard to get it.” Norris said.

Bioscrypt’s partnerships with Lenel, HID and Axis Communications enabled the airport to create a solution in which the different elements worked together as a unified whole.

For more information contact Nichola Allan, G2 Security, +27 (0)11 462 5700, [email protected], www.g2security.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Who has access to your face?
Access Control & Identity Management Residential Estate (Industry) AI & Data Analytics
While you may be adjusting your privacy settings on social media or thinking twice about who is recording you at public events, the reality is that your facial features may be used in other contexts,

Read more...
Advanced time & attendance solutions
Technews Publishing Access Control & Identity Management Products & Solutions
From biometric devices to a powerful mobile app, you will see how businesses of all sizes save time, cut costs, and improve productivity with BioSyn.

Read more...
Smarter security for safer estate living
neaMetrics Suprema Integrated Solutions Surveillance Access Control & Identity Management Residential Estate (Industry)
The expansion of residential estates has led to many communities being constructed with security as an afterthought. Unfortunately, fencing, cameras, and a guard at the gate only create a false sense of safety, which vanishes after the first incident.

Read more...
Visitor management views
Entry Pro ATG Digital Technews Publishing SMART Security Solutions Access Control & Identity Management Residential Estate (Industry)
Visitor management is always changing, taking technology and legislation into account. SMART Security Solutions examines the latest trends with input from ATG Digital and Entry Pro.

Read more...
Securing your estate beyond the gate
ATG Digital Access Control & Identity Management Residential Estate (Industry) AI & Data Analytics
Protecting gated communities and lifestyle estates requires a modern, intelligent approach. A truly intelligent system protects both physical and digital perimeters, it must be a fully integrated ecosystem.

Read more...
Reliability, innovation and flexibility
Entry Pro Access Control & Identity Management Residential Estate (Industry) Products & Solutions
Through constant innovation and advancement in technology and systems, Entry Pro strives to provide its clients with not only the most suitable, but also the most advanced solution.

Read more...
Smarter security with automated visitor management
LD Africa Access Control & Identity Management Residential Estate (Industry) Products & Solutions
Automated visitor management solutions, like LD Access, are transforming this process by reducing human workload, while enhancing security and efficiency.

Read more...
Paxton enhances installer loyalty programme
Paxton Access Control & Identity Management News & Events
Paxton has made it easier for security installers to benefit from its popular loyalty programme, Paxton Rewards, with points now added automatically when purchasing through approved distribution partners.

Read more...
Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...
Rethinking access control in high-risk logistics environments
ATG Digital Access Control & Identity Management Transport (Industry) Logistics (Industry) Facilities & Building Management
South Africa’s logistics sector is under constant pressure, not only from external threats like hijackings and cargo theft, but also from internal vulnerabilities, operational blind spots, and limited support.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.