Biometrics booms in SA

April 2009 Access Control & Identity Management

Biometric technology is growing into a formidable part of the security industry. What used to be confined to a few scientific experiments and testing labs some 20 years ago is now an established technology that continues to add value across an array of industries.

Biometric technology is growing into a formidable part of the security industry. What used to be confined to a few scientific experiments and testing labs some 20 years ago is now an established technology that continues to add value across an array of industries.

Ideco Biometric Security Solutions (IBSS) has reported record sales of biometric readers to control workplace access across a diversity of South African businesses. November 2008 saw sales hit new highs of R9m, for example, with the year closing on a record total of R81m. According to Gary Jones, managing director of IBSS, the figures highlight the constant year-on-year growth the company has experienced since 2004. Over the past four years IBSS, part of the Ideco Group, has achieved annual growth of over 80%.

Gary Jones, managing director of IBSS
Gary Jones, managing director of IBSS

Jones says: “The figures emphasise the widespread adoption of biometrics within the South African workplace. The technology is not futuristic. It is tried-and-tested and is delivering a range of benefits that empower businesses to protect their bottom line in an increasingly tough financial climate.”

This view is confirmed by Liam Terblanche, CIO at Accsys. “Biometrics is definitely expanding and has reached a stage where the algorithms for image processing have become standardised and consistently stable, to the point where the false-reject ratio, (a measure of instability in biometric devices), is becoming almost negligible. I do not think one can quantify the growth possibility as there are just too many variables that will drive the expansion into new industries.”

Liam Terblanche, CIO at Accsys
Liam Terblanche, CIO at Accsys

Biometric technology is used extensively for security and access control and deduces measurements from living organisms. It uses a variety of metrics – from fingerprints and palm profiles to retinal scanners and voice identification. Its appeal within industry is based on a number of benefits such as flexibility, and long-term cost saving.

As an example of the expansion of the technology, biometrics is being incorporated into a variety of business environments where it can add value and increase security. For example, Zurich-based idematrix AG recently signed a multimillion rand agreement with Sagem Sécurité to integrate Swiss LEGIC contactless smartcards with one of Sagem’s access control fingerprint readers.

“While this technology has gained popularity, this must be put into perspective. The saving of time and money by regulating working hours is a factor that can be addressed by more conventional identification systems such as bar-code readers, RFID cards and smartcards,” Terblanche continues. “However, biometric technology is invaluable to access control and efforts to curb buddy clocking. The long-term cost saving of not having to issue badge cards, tagging devices or bar-code cards is mission-critical in the modern work environment.”

He adds that biometrics is unfortunately also seen as the silver bullet for all access control challenges, leaving a lot of buyers disillusioned and disappointed when they realise that it is just another arrow in the security quiver. “Industry experts have a responsibility to inform companies of the huge advantages gained by utilising biometrics, without neglecting the controls and backup systems that need to be in place for this technology to really become what we all want it to be – a friendly interface between humans and systems.”

Teryl Schroenn, CEO at Accsys, agrees saying, “Biometrics is a fast evolving field. Flexibility is built into the software that drives the hardware infrastructure and is essential in the planning of the implementation and satisfying the client requirements. Hardware is becoming more robust, but there are still applications and sites where biometrics is not suitable.”

When existing access control systems are in place – and if the client invested in the appropriate software that can handle different devices from different vendors – upgrading your access control to implement biometrics is merely a matter of replacing parts of the hardware devices.

Says Terblanche, “Instead of deciding on a biometric device, and then buying whatever software comes with it, one should rather look for software that can cater for multiple devices, implement your security and access control systems according to your requirements, and then go out to find the appropriate biometric devices for your needs. This will allow you to adopt new technologies in future without losing your investment in the setup and training on the software.

Biometric technology is positioned to evolve into a highly robust, effective, flexible and people-friendly technology. However, there is more work to be done for the man-machine interface to be entirely non-invasive and non-intimidating.

Identity anywhere

Brand New Technologies announced the release if its IDMobile device, a robust and portable device aimed at simplifying the processes of collecting biographic and biometric information and verifying people’s identity.

Incorporating all the hardware devices needed to create a high-quality registry into one portable unit the IDMobile device is suitable for use in large-scale projects such as civil registration, voter registration, national identification and immigration control. Hardware components can include a fingerprint scanner, signature pad, digital camera and electronic ID reader, although devices can be added, removed or changed according to client specifications.

The unit has been designed for use under adverse climatic conditions, making it ideal for use in South Africa’s rural areas, where reliability and good performance are required. In addition it is quick and simple to set up, with a user friendly interface allowing the operator to easily manage the registration and identification process with very little operator training or technical knowledge. The software can also be adapted to meet client specifications.

The IDMobile software and hardware components comply with international standards including biometric processing and interoperability, image quality and compression, and electronic ID card support standards.

For more information contact Gary Jones, Ideco, +27 (0)11 745 5600, [email protected], www.ideco.co.za, or Accsys, +27 (0)11 719 8000, www.accsys.co.za

Benefits of IDMobile:

* Prints voter lists, identity documents and electronic cards.

* Automatic picture cropping and double flash source.

* Up to 2 hours internal battery autonomy and 8 hours extra with external battery.

* Various fingerprint scanners options available.

* Alternative power sources such as solar power panels, diesel generators, gas and UPS.

* Portable and light, designed to be easily transported and used.

For more information contact Brand New Technologies, +27 (0)11 450 3088, www.brandnew.za.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Read more...
Access Selection Guide 2024
Access Control & Identity Management
The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.

Read more...
Biometrics Selection Guide 2024
Access Control & Identity Management
The Biometrics Selection Guide 2024 incorporates a number of hardware and software biometric identification systems aimed at the access and identity management market of today.

Read more...
Smart intercoms for Sky House Projects
Nology Access Control & Identity Management Residential Estate (Industry)
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app.

Read more...
Authentic identity
HID Global Access Control & Identity Management
As the world has become global and digital, traditional means for confirming authentic identity, and understanding what is real and what is fake have become impractical.

Read more...
Research labs secured with STid Mobile ID
Access Control & Identity Management
When NTT opened its research centre in Silicon Valley, it was looking for a high-security expert capable of protecting the company’s sensitive data. STid readers and mobile ID solutions formed part of the solution.

Read more...
Is voice biometrics in banking secure enough?
Access Control & Identity Management AI & Data Analytics
As incidents of banking fraud grow exponentially and become increasingly sophisticated, it is time to question whether voice banking is a safe option for consumers.

Read more...
Unlocking efficiency and convenience
OPTEX Access Control & Identity Management Transport (Industry)
The OVS-02GT vehicle detection sensor is the newest member of Optex’s vehicle sensor range, also known as ‘virtual loop’, and offers reliable motion detection of cars, trucks, vans, and other motorised vehicles using microwave technology.

Read more...
Protecting our most vulnerable
NEC XON Access Control & Identity Management Products & Solutions
In a nation grappling with the distressing rise in child kidnappings, the need for innovative solutions to protect our infants has never been more critical. South Africa finds itself in the throes of a child abduction pandemic.

Read more...
Understanding the power of digital identity
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
The way we perceive business flourishing is undergoing a paradigm shift, as digital identity and consumer consent redefine the dynamics of transactions, says Shanaaz Trethewey.

Read more...