The maintenance of biometric equipment is vital to its effective use

September 2012 Access Control & Identity Management

Biometric technology has become an integral part of many of the access control, security, asset protection and risk management systems commonly used by businesses today. The benefits are significant, not just in terms of security, but for enablement of related business processes, like time and attendance.

Unfortunately, a biometrics solution is only ever as good as the weakest link in the system. Maintenance of the database, networks, doors, locks, readers, cameras and related systems and applications that support, or are controlled by, the biometrics solution is vital.

Failure of any component in the biometrics system can compromise the security of assets, operations, the safety of personnel and the accuracy of reporting systems. The risk to business, and its bottom line, can be considerable over time.

There are two key considerations. Accurate setup and configuration of the hardware, software and network components are very important, but you cannot 'set and forget'. Similarly, once the physical components are installed and integrated, a 'break-fix' approach to ensuring the system is functioning optimally is not acceptable if the risk profile that these systems facilitate is to be maintained.

Setup and clean up

Successful setup of a biometrics system hinges first and foremost on accurate registration of unique identifiers, eg fingerprint or iris scans that are entered into a database. If the registration process is faulty, the system will deliver false positives or erratically deny access. Administration of the database also needs to be meticulous, much like other access control technologies, if someone leaves the company or their status changes, the database must be updated and cleaned. This is crucial as biometrics databases usually have a limit to the number of registrations they can efficiently process. Exceed this and the system slows down, stalls and begins to fail, affecting operational and productivity efficiencies and increasing risk.

Wear and tear also has an impact, even if your readers have the toughest (IP66 ruggedised) rating. To put use of biometrics systems into perspective, consider that a larger corporate building may see 3000 to 4000 transactions per day and a large mining operation may see hundreds of transactions over a single shift change.

All the physical components that make up the system need to be regularly assessed for mechanical or other failure. If the biometrics reader gets grimy or is damaged through use or exposure to harsh environments or the elements (rain, dust, heat), it can literally collapse the entire system. Biometrics secured access is also of little use if the door granting access has faulty locking units. In addition, network access and reliability, including quality of service, need to be regularly reviewed to ensure the biometrics system and all the processes it enables (access, time and attendance) can operate and respond efficiently.

Maintenance optimises performance

Regular maintenance every three months, or as often as use demands, could eliminate these challenges and extend the life of the system. To also optimise the performance of the system it is crucial, however, to appoint a service provider with the appropriate technical skills and insight.

The ideal partner for such maintenance is a company that understands, and has broad experience of installation and management of biometric technology and related systems (access control, CCTV, alarms, etc.) across a variety of industries (corporate, manufacturing, mining, transport, public sector) and technology platforms. This partner should have a track record and qualified staff and most of all be flexible to attend to your specific maintenance needs.

A maintenance agreement of this sort should include doing the necessary diagnostics on all systems, critically assessing the network, the database, environmental factors, and the impact of other devices on the biometrics and related systems. The service provider should also be able to proactively address or make provision for changes in organisational processes, infrastructure and personnel. Identified challenges would need to then be addressed in a way that improves overall performance.

As technology becomes increasingly part of physical operations, it is easy to overlook the fact that both technology and physical maintenance is needed and that service providers offering such maintenance need to have both skills. Maintenance to biometrics systems is becoming non-negotiable as companies increasingly come to understand how this can impact mission-critical processes and affect the effective and efficient operations of extended systems. Do not get caught short.

For more information contact Jasco, +27 (0)11 894 7127, [email protected], www.jasco.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...
T&A in South Africa’s retail sector
ERS Biometrics Access Control & Identity Management
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Paxton opens second experience centre
Paxton News & Events Access Control & Identity Management
Security technology manufacturer, Paxton, has opened a new experience centre in Cape Town on 12 February in partnership with its exclusive distributors, Reditron and Regal Security.

Read more...
DoorBell with built-in AI
Ajax Systems Access Control & Identity Management Products & Solutions Smart Home Automation
Ajax Systems has announced the release of Ajax DoorBell, which features built-in AI, an IR sensor, and app control, seamlessly integrating into the Ajax ecosystem to ensure efficiency and security confidence.

Read more...
Physical security evolving beyond security teams
ATG Digital Access Control & Identity Management
The landscape of physical security is undergoing a major shift. Traditionally, selecting access control and visitor management solutions fell squarely on the shoulders of security professionals, but today includes legal, IT, technical operations and more.

Read more...
A passwordless future?
Access Control & Identity Management
The digital landscape is evolving rapidly, and with it comes the urgent need for more secure authentication methods. Passwords, once the cornerstone of online security, are now easy targets for cybercriminals.

Read more...