Biometrics reinforces identity ­authentication

October 2013 Access Control & Identity Management, Products & Solutions

For companies, knowing who a person is, where they are on the premises and why they are there – and validating this information – is the main driver behind security and biometric access control technology integration in the workplace.

To this end, technology which captures and processes biometric data using fingerprints or facial recognition, for example, remains a dominant technology. However, that does not mean other solutions are just legacy systems, say experts, there are many examples of installations of hybrid technology that meet a current and growing need in the market.

Biometric technology has traditionally found mainstream application within manufacturing and retail sectors. However, because of the inherent practical benefits of using this technology, there is now more widespread application across various industries and sectors says Teryl Schroenn, CEO, Accsys.

“In high security areas which keep valuables or house confidential information, biometric technology has become very popular because it is able to record and process information with high levels of accuracy, instantaneously. It is also straightforward technology that is easy to use and regulate,” explains Schroenn.

Although the technology is holistic, competitive and has a broad-based value, there is still an element of risk and management process required to ensure accuracy and stability. It is also important to remember that the value and cost benefit to company will depend on the number of readers, the level at which the company requires security and surveillance, and the length of time the infrastructure has been in place.

According to Accsys after a period of between three and twelve months, the business should start to experience cost savings.

“Integration and centralisation through the application of multi-biometric and hybrid biometric solutions characterises this market. It reflects the desire of companies to protect their resources, comply with corporate governance legislation and generate profit at the same time. Access control as part of broader people management and security solutions development is significant,” adds Schroenn.

She believes that as the importance of data increases, and the need to secure assets grows against ongoing threats, biometric technology will become even more relevant.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

New fire blanket for lithium-ion battery fires
Fire & Safety Products & Solutions
SafeQuip launched its newly developed range of high-performance, multi-use lithium-ion battery fire blankets, specifically designed to address fires involving devices with lithium-ion batteries, providing a crucial tool for safety in environments where these batteries are in use.

Read more...
SafeQuip launches lithium-ion battery fire extinguishers
Fire & Safety Products & Solutions
[Sponsored] SafeQuip has launched the SANS 1910-2022 approved Lith-Ex fire extinguisher range, which carries NTA 8133:2021 (KIWA/POOO55865) test approval, which proves its lithium-ion battery fire extinguishing capability.

Read more...
Watermist suppression in mining
FS Systems Fire & Safety Mining (Industry) Products & Solutions
Watermist suppression systems are highly effective in suppressing flames and controlling heat spread, especially in confined spaces commonly found in mining environments, by generating fine droplets with an increased surface area, enabling rapid heat absorption and cooling during fire incidents.

Read more...
FS partners with Oculus
FS Systems Fire & Safety Products & Solutions
FS Systems announced a strategic partnership with Oculus Innovations to combine the company’s integrated security management solutions with Oculus Innovations’ expertise in designing state-of-the-art control room environments.

Read more...
Quality fire detection installation at Baywear Clothing
G2 Fire Fire & Safety Industrial (Industry) Products & Solutions
JZL Projects and Solutions was asked to provide a comprehensive yet cost-effective and reliable fire detection solution for Baywear Clothing that would be installed with minimum disruption to the factory.

Read more...
From wireless alarms to smart homes
Elvey Security Technologies Perimeter Security, Alarms & Intruder Detection Products & Solutions
The final brand SMART Security Solutions features in its discussions with companies operating in South and southern Africa’s detection and alerting technologies market is DSC, distributed in the region by Elvey Security Technologies.

Read more...
The AX Hybrid PRO Series offers reliable wired and wireless protection
Hikvision South Africa Editor's Choice Perimeter Security, Alarms & Intruder Detection Products & Solutions
Hikvision has announced the launch of a new AX Hybrid PRO alarm system with innovative Hikvision ‘Speed-X’ transmission technology. This system offers reliable wired protection while delivering expanded flexibility with seamless wireless integration.

Read more...
Advanced Perimeter Intrusion Detection Systems
XtraVision OPTEX Technews Publishing Modular Communications Perimeter Security, Alarms & Intruder Detection Integrated Solutions Products & Solutions
Making full use of fibre installations around the perimeter by adding Perimeter Intrusion Detection Systems means you can easily add another layer of security to existing surveillance and fencing systems.

Read more...
New State of Physical Access Control Report from HID
HID Global Editor's Choice Access Control & Identity Management News & Events
HID released the 2024 State of Physical Access Control Report, identifying five key trends shaping access control's future and painting a picture of an industry that has been undergoing considerable transformation.

Read more...
Smart intercoms are transforming access control
Access Control & Identity Management Products & Solutions
Smart intercoms have emerged as a pivotal tool in modern access control. They provide a seamless and secure way to manage entry points without the need for traditional security guards to validate visitors before granting them access.

Read more...