Securing financial institutions with biometrics

October 2015 Financial (Industry), Access Control & Identity Management, Integrated Solutions

The theft of money remains the primary goal of most criminals and what better place to acquire it than through the depository of most cash – financial institutions. Addressing the need to stop increasingly sophisticated criminals from unlawfully accessing another’s funds is something that all financial institutions cite as a priority. The use of biometrics to achieve this objective is picking up pace.

John Powell, MD of Powell Tronics.
John Powell, MD of Powell Tronics.

According to John Powell, managing director of Powell Tronics, one needs to differentiate between the larger registered financial service providers (RFSPs) and the micro RFSPs such as retail outlets that offer customers credit cards or loyalty cards.

The larger RFSPs deal with large numbers of people entering their branches on a daily basis, with a vast number of account holders being the norm. The trend, as detailed in the adoption of HANIS by SABRIC bank members, is to register customers, especially new account holders, biometrically. These biometric records will form part of the account holder’s personal banking profile and can be verified via the HANIS systems to ensure that no account is illegally accessed.

In addition to this new system, Powell says that the company often receives requests from financial institutions to ­provide bio­metric systems that will control the ingress and egress of employees, especially in sensitive areas such as the vaults and IT departments. However, he adds, the greatest demand comes from the micro RFSPs where managing staff and securing their facilities is their biggest security issue.

Physical and logical access

Since customers do not actually visit micro RFSP facilities, the primary access issue is protecting customer information. The goal here is to limit admission into the site/system specifically to those people who are registered to access the sensitive data. Powell Tronics has deployed a number of its PT-AD systems into this market sector. With the incorporation of MS Active Directory into the ImproNet access control system, the system is able to institute a higher level of access control management in terms of linking Internet and IT access to physical access to specific employees.

Once enrolled on the system, PT-AD will verify that users are permitted to access the IT domain which then manages all records centrally. If an employee is dismissed or leaves the company, the HR department will note this electronically on the employee’s record via the Windows Directory and the system will automatically revoke their access both into and out of the building, as well as into the IT system. Access control solutions are typically now being integrated with business management and surveillance systems to provide a comprehensive holistic security solution.

Powell says that it is easier to provide standard solutions to the micro RFSPs due to the smaller number of people entering the facilities. However, customisation is also an option, depending on the specific customer requirements. He says that providing such levels of access control via a product like PT-AD would be logistically difficult for banking customers and he therefore does not foresee this happening in the immediate future.

Mobility

As with most market sectors, mobile technology is fast gaining ground. Powell cites a number of examples where mobile technology is used to provide access into facilities with electronic visitor management systems at business and residential estates and within the educational sector. He believes that this technology will also be adopted by the financial sector.

He emphasises that before instituting a biometric security solution, RFSPs should request documented customer references from a supplier to ensure that the technology is capable of providing maximised results in a specific application. Coupled with this is the selection of solutions that are provided by a recognised brand leader who has invested in the scalability and sustainability of the specific access technology. In addition, end users should ensure that the system integrator or installer that they employ to source and install their access technology has a proven track record and is able to deploy a solution that is tailored towards that specific market sector.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Proactive strategies against payment fraud
Financial (Industry) Security Services & Risk Management
Amid a spate of high-profile payment fraud cases in South Africa, the need for robust fraud payment prevention measures has never been more apparent, says Ryan Mer, CEO of eftsure Africa.

Read more...
Future trends for electronic safety and security in mining
Fang Fences & Guards Mining (Industry) Integrated Solutions AI & Data Analytics
The mining industry is ever evolving, driven by technological advancements and the growing need for enhanced safety and security measures, with significant innovation seen in turnkey electronic security for mining operations.

Read more...
Unlocking enhanced security for mining
Mining (Industry) Integrated Solutions
In the dynamic landscape of African mining, security remains of paramount concern as threats evolve and challenges persist, and mining companies seek innovative solutions to safeguard their operations, assets, and personnel.

Read more...
A constant armed struggle
Technews Publishing XtraVision Editor's Choice Integrated Solutions Mining (Industry) IoT & Automation
SMART Security Solutions asked a few people involved in servicing mines to join us for a virtual round table and give us their insights into mine security today. A podcast of the discussion will be released shortly-stay tuned.

Read more...
Understanding the power of digital identity
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
The way we perceive business flourishing is undergoing a paradigm shift, as digital identity and consumer consent redefine the dynamics of transactions, says Shanaaz Trethewey.

Read more...
Access & identity expectations for 2024
Technews Publishing IDEMIA ZKTeco Gallagher Salto Systems Africa Regal Distributors SA Reditron Editor's Choice Access Control & Identity Management Information Security AI & Data Analytics
What does 2024 have in store for the access and identity industry? SMART Security Solutions asked several industry players for their brief thoughts on what they expect this year.

Read more...
Access and identity in 2024
Technews Publishing Gallagher HID Global IDEMIA Ideco Biometrics Enkulu Technologies neaMetrics Editor's Choice Access Control & Identity Management Integrated Solutions
SMART Security Solutions hosted a round table discussion with various players in the access and identity market, to find out what they experienced in the last year, as well as their expectations for 2024.

Read more...
The promise of mobile credentials
Technews Publishing Suprema neaMetrics HID Global Editor's Choice Access Control & Identity Management IoT & Automation
SMART Security Solutions examines the advantages and disadvantages of mobile credentials in a market dominated by cards and fobs, in which biometrics is viewed as a secure alternative.

Read more...
Prepare for cyber-physical attacks
Gallagher Information Security Access Control & Identity Management
As the security landscape continues to evolve, organisations must fortify their security solutions to embrace the changing needs of the security and technology industries. Nowhere is this more present than with regard to cybersecurity.

Read more...
Unleash the full potential of AI at the edge
Suprema AI & Data Analytics Access Control & Identity Management
Efficient AI algorithms, when embedded in edge access control devices, enable companies to optimise their use of AI and edge processing to deliver reliable and fast authentication.

Read more...