Biometrics booms in SA

April 2009 Access Control & Identity Management

Biometric technology is growing into a formidable part of the security industry. What used to be confined to a few scientific experiments and testing labs some 20 years ago is now an established technology that continues to add value across an array of industries.

Biometric technology is growing into a formidable part of the security industry. What used to be confined to a few scientific experiments and testing labs some 20 years ago is now an established technology that continues to add value across an array of industries.

Ideco Biometric Security Solutions (IBSS) has reported record sales of biometric readers to control workplace access across a diversity of South African businesses. November 2008 saw sales hit new highs of R9m, for example, with the year closing on a record total of R81m. According to Gary Jones, managing director of IBSS, the figures highlight the constant year-on-year growth the company has experienced since 2004. Over the past four years IBSS, part of the Ideco Group, has achieved annual growth of over 80%.

Gary Jones, managing director of IBSS
Gary Jones, managing director of IBSS

Jones says: “The figures emphasise the widespread adoption of biometrics within the South African workplace. The technology is not futuristic. It is tried-and-tested and is delivering a range of benefits that empower businesses to protect their bottom line in an increasingly tough financial climate.”

This view is confirmed by Liam Terblanche, CIO at Accsys. “Biometrics is definitely expanding and has reached a stage where the algorithms for image processing have become standardised and consistently stable, to the point where the false-reject ratio, (a measure of instability in biometric devices), is becoming almost negligible. I do not think one can quantify the growth possibility as there are just too many variables that will drive the expansion into new industries.”

Liam Terblanche, CIO at Accsys
Liam Terblanche, CIO at Accsys

Biometric technology is used extensively for security and access control and deduces measurements from living organisms. It uses a variety of metrics – from fingerprints and palm profiles to retinal scanners and voice identification. Its appeal within industry is based on a number of benefits such as flexibility, and long-term cost saving.

As an example of the expansion of the technology, biometrics is being incorporated into a variety of business environments where it can add value and increase security. For example, Zurich-based idematrix AG recently signed a multimillion rand agreement with Sagem Sécurité to integrate Swiss LEGIC contactless smartcards with one of Sagem’s access control fingerprint readers.

“While this technology has gained popularity, this must be put into perspective. The saving of time and money by regulating working hours is a factor that can be addressed by more conventional identification systems such as bar-code readers, RFID cards and smartcards,” Terblanche continues. “However, biometric technology is invaluable to access control and efforts to curb buddy clocking. The long-term cost saving of not having to issue badge cards, tagging devices or bar-code cards is mission-critical in the modern work environment.”

He adds that biometrics is unfortunately also seen as the silver bullet for all access control challenges, leaving a lot of buyers disillusioned and disappointed when they realise that it is just another arrow in the security quiver. “Industry experts have a responsibility to inform companies of the huge advantages gained by utilising biometrics, without neglecting the controls and backup systems that need to be in place for this technology to really become what we all want it to be – a friendly interface between humans and systems.”

Teryl Schroenn, CEO at Accsys, agrees saying, “Biometrics is a fast evolving field. Flexibility is built into the software that drives the hardware infrastructure and is essential in the planning of the implementation and satisfying the client requirements. Hardware is becoming more robust, but there are still applications and sites where biometrics is not suitable.”

When existing access control systems are in place – and if the client invested in the appropriate software that can handle different devices from different vendors – upgrading your access control to implement biometrics is merely a matter of replacing parts of the hardware devices.

Says Terblanche, “Instead of deciding on a biometric device, and then buying whatever software comes with it, one should rather look for software that can cater for multiple devices, implement your security and access control systems according to your requirements, and then go out to find the appropriate biometric devices for your needs. This will allow you to adopt new technologies in future without losing your investment in the setup and training on the software.

Biometric technology is positioned to evolve into a highly robust, effective, flexible and people-friendly technology. However, there is more work to be done for the man-machine interface to be entirely non-invasive and non-intimidating.

Identity anywhere

Brand New Technologies announced the release if its IDMobile device, a robust and portable device aimed at simplifying the processes of collecting biographic and biometric information and verifying people’s identity.

Incorporating all the hardware devices needed to create a high-quality registry into one portable unit the IDMobile device is suitable for use in large-scale projects such as civil registration, voter registration, national identification and immigration control. Hardware components can include a fingerprint scanner, signature pad, digital camera and electronic ID reader, although devices can be added, removed or changed according to client specifications.

The unit has been designed for use under adverse climatic conditions, making it ideal for use in South Africa’s rural areas, where reliability and good performance are required. In addition it is quick and simple to set up, with a user friendly interface allowing the operator to easily manage the registration and identification process with very little operator training or technical knowledge. The software can also be adapted to meet client specifications.

The IDMobile software and hardware components comply with international standards including biometric processing and interoperability, image quality and compression, and electronic ID card support standards.

For more information contact Gary Jones, Ideco, +27 (0)11 745 5600, [email protected], www.ideco.co.za, or Accsys, +27 (0)11 719 8000, www.accsys.co.za

Benefits of IDMobile:

* Prints voter lists, identity documents and electronic cards.

* Automatic picture cropping and double flash source.

* Up to 2 hours internal battery autonomy and 8 hours extra with external battery.

* Various fingerprint scanners options available.

* Alternative power sources such as solar power panels, diesel generators, gas and UPS.

* Portable and light, designed to be easily transported and used.

For more information contact Brand New Technologies, +27 (0)11 450 3088, www.brandnew.za.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...
T&A in South Africa’s retail sector
ERS Biometrics Access Control & Identity Management
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Paxton opens second experience centre
Paxton News & Events Access Control & Identity Management
Security technology manufacturer, Paxton, has opened a new experience centre in Cape Town on 12 February in partnership with its exclusive distributors, Reditron and Regal Security.

Read more...
DoorBell with built-in AI
Ajax Systems Access Control & Identity Management Products & Solutions Smart Home Automation
Ajax Systems has announced the release of Ajax DoorBell, which features built-in AI, an IR sensor, and app control, seamlessly integrating into the Ajax ecosystem to ensure efficiency and security confidence.

Read more...
Physical security evolving beyond security teams
ATG Digital Access Control & Identity Management
The landscape of physical security is undergoing a major shift. Traditionally, selecting access control and visitor management solutions fell squarely on the shoulders of security professionals, but today includes legal, IT, technical operations and more.

Read more...
A passwordless future?
Access Control & Identity Management
The digital landscape is evolving rapidly, and with it comes the urgent need for more secure authentication methods. Passwords, once the cornerstone of online security, are now easy targets for cybercriminals.

Read more...