Steps to successful biometric implementation

1 December 2019 Access Control & Identity Management

Biometrics has often been considered a risky and unreliable investment for many organisations. Its rocky reputation, influenced by poorly managed and integrated installations, seldom factor into key considerations such as the environment, operational impact and legalities. However, the Goode Intelligence study found that biometric authentication delivers improved security and compliance benefits, and allows for a balance between security and convenience without compromising on either.

Biometrics can provide the organisation with a balanced and accessible authentication platform that supports the customer, the business and an omni-channel strategy, but it has to be implemented correctly.

To minimise frustration and to help customers protect their investment, there are seven steps that should be taken from first consideration through to final implementation. The first is to assess the business to determine whether or not biometrics is a good fit. Different types of biometric identification introduce their own metrics and requirements and are better suited to different working conditions. By selecting the right solution for the environment, the business can ensure the safety and security of staff at various sites across different locations. Before opting into a specific biometric solution, the business should also establish the risk associated with visitor concerns, union concerns or challenges, hygiene factors and the ongoing operational expenses.

The second step is to ensure that every individual at the organisation is uniquely enrolled into the solution and that the enrolment process follows the highest standards. If using fingerprint verification, the quality of the prints can be enhanced by using prescan treatment or a technique known as ‘milking the finger’ to raise the fingerprint ridges and improve the quality of the reference fingerprint. It is also essential to get every individual’s consent before embarking on the process as this will not only encourage buy-in from employees, but may mitigate concerns raised by unions.

Accuracy, reliability and performance

The third step is to select a biometrics solution that delivers precisely what your organisation requires and that ticks the boxes of accuracy, reliability and performance. There is a difference in performance between solutions that are average versus those that are best in class.

For example, selecting biometric readers that are immune to electrostatic discharge, capable of extracting clear images and fast in finding an accurate match, are all critical to ensure a good user experience. It’s also advisable to work with a system that offers extensive interoperability, provides assurance in the integrity of the system through the use of common testing criteria, and doesn’t force vendor lock-in.

In fourth position is the need to assess the impact of a biometric solution on existing IT infrastructure by determining network capacity, server and software requirements, and integration into other systems such as payroll or operations. A comprehensive assessment of the business will allow for a more seamless integration that takes all the unique business factors into consideration. This is further supported by the fifth consideration: appointing a certified installer. Only work with a company that has a solid reputation and that delivers a solid solution from the outset.


Marius Coetzee.

Future-proof solution

The sixth point ties in neatly with the fifth: ensure that your biometrics partner offers you after-sales support, a warranty programme and future-proof foundation that’s capable of integrating next-generation technology. Finally, ensure that any biometric implementation carefully considers all the legal implications by ensuring that all employees and individuals give consent, that there is a policy in place for if something goes wrong, and that you’re completely aware of what to do in the event of a breach or data loss. Biometric records can be used in a court of law so it is critical to ensure that all governance, risk and compliance requirements are met.

By working with a reputable partner that invests in best-in-class technology with future-proof capability, strong after-sales support, high-end enrolment policies and business relevant applications, you are setting your biometric system up for success. It is a complex but robust technology that requires due diligence and intelligent application to ensure that any implementation is both sustainable and successful.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Read more...
Access Selection Guide 2024
Access Control & Identity Management
The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.

Read more...
Biometrics Selection Guide 2024
Access Control & Identity Management
The Biometrics Selection Guide 2024 incorporates a number of hardware and software biometric identification systems aimed at the access and identity management market of today.

Read more...
Smart intercoms for Sky House Projects
Nology Access Control & Identity Management Residential Estate (Industry)
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app.

Read more...
Authentic identity
HID Global Access Control & Identity Management
As the world has become global and digital, traditional means for confirming authentic identity, and understanding what is real and what is fake have become impractical.

Read more...
Research labs secured with STid Mobile ID
Access Control & Identity Management
When NTT opened its research centre in Silicon Valley, it was looking for a high-security expert capable of protecting the company’s sensitive data. STid readers and mobile ID solutions formed part of the solution.

Read more...
Is voice biometrics in banking secure enough?
Access Control & Identity Management AI & Data Analytics
As incidents of banking fraud grow exponentially and become increasingly sophisticated, it is time to question whether voice banking is a safe option for consumers.

Read more...
Unlocking efficiency and convenience
OPTEX Access Control & Identity Management Transport (Industry)
The OVS-02GT vehicle detection sensor is the newest member of Optex’s vehicle sensor range, also known as ‘virtual loop’, and offers reliable motion detection of cars, trucks, vans, and other motorised vehicles using microwave technology.

Read more...
Protecting our most vulnerable
NEC XON Access Control & Identity Management Products & Solutions
In a nation grappling with the distressing rise in child kidnappings, the need for innovative solutions to protect our infants has never been more critical. South Africa finds itself in the throes of a child abduction pandemic.

Read more...
Understanding the power of digital identity
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
The way we perceive business flourishing is undergoing a paradigm shift, as digital identity and consumer consent redefine the dynamics of transactions, says Shanaaz Trethewey.

Read more...