Steps to successful biometric implementation

1 December 2019 Access Control & Identity Management

Biometrics has often been considered a risky and unreliable investment for many organisations. Its rocky reputation, influenced by poorly managed and integrated installations, seldom factor into key considerations such as the environment, operational impact and legalities. However, the Goode Intelligence study found that biometric authentication delivers improved security and compliance benefits, and allows for a balance between security and convenience without compromising on either.

Biometrics can provide the organisation with a balanced and accessible authentication platform that supports the customer, the business and an omni-channel strategy, but it has to be implemented correctly.

To minimise frustration and to help customers protect their investment, there are seven steps that should be taken from first consideration through to final implementation. The first is to assess the business to determine whether or not biometrics is a good fit. Different types of biometric identification introduce their own metrics and requirements and are better suited to different working conditions. By selecting the right solution for the environment, the business can ensure the safety and security of staff at various sites across different locations. Before opting into a specific biometric solution, the business should also establish the risk associated with visitor concerns, union concerns or challenges, hygiene factors and the ongoing operational expenses.

The second step is to ensure that every individual at the organisation is uniquely enrolled into the solution and that the enrolment process follows the highest standards. If using fingerprint verification, the quality of the prints can be enhanced by using prescan treatment or a technique known as ‘milking the finger’ to raise the fingerprint ridges and improve the quality of the reference fingerprint. It is also essential to get every individual’s consent before embarking on the process as this will not only encourage buy-in from employees, but may mitigate concerns raised by unions.

Accuracy, reliability and performance

The third step is to select a biometrics solution that delivers precisely what your organisation requires and that ticks the boxes of accuracy, reliability and performance. There is a difference in performance between solutions that are average versus those that are best in class.

For example, selecting biometric readers that are immune to electrostatic discharge, capable of extracting clear images and fast in finding an accurate match, are all critical to ensure a good user experience. It’s also advisable to work with a system that offers extensive interoperability, provides assurance in the integrity of the system through the use of common testing criteria, and doesn’t force vendor lock-in.

In fourth position is the need to assess the impact of a biometric solution on existing IT infrastructure by determining network capacity, server and software requirements, and integration into other systems such as payroll or operations. A comprehensive assessment of the business will allow for a more seamless integration that takes all the unique business factors into consideration. This is further supported by the fifth consideration: appointing a certified installer. Only work with a company that has a solid reputation and that delivers a solid solution from the outset.


Marius Coetzee.

Future-proof solution

The sixth point ties in neatly with the fifth: ensure that your biometrics partner offers you after-sales support, a warranty programme and future-proof foundation that’s capable of integrating next-generation technology. Finally, ensure that any biometric implementation carefully considers all the legal implications by ensuring that all employees and individuals give consent, that there is a policy in place for if something goes wrong, and that you’re completely aware of what to do in the event of a breach or data loss. Biometric records can be used in a court of law so it is critical to ensure that all governance, risk and compliance requirements are met.

By working with a reputable partner that invests in best-in-class technology with future-proof capability, strong after-sales support, high-end enrolment policies and business relevant applications, you are setting your biometric system up for success. It is a complex but robust technology that requires due diligence and intelligent application to ensure that any implementation is both sustainable and successful.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Palm-vein biometric kiosks secure SAP at Transnet Engineering
Access Control & Identity Management Transport (Industry) Videos
Securing access to SAP is essential to avoid fraud or corruption. Ensuring that users can access the software quickly, easily, and conveniently to do their jobs is also essential.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
Nice launches DC Blue Astute garage door motor
Nice Group South Africa Technews Publishing News & Events Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Nice Systems SA has launched the Nice DC Blue Astute, a garage door motor for the South African market featuring a pre-installed lithium-ion battery instead of traditional lead-acid batteries.

Read more...
Towards a global digital passport?
Access Control & Identity Management
In a world where borders are more connected and closely monitored, the idea of a universal digital passport could revolutionise how we travel, work, and even perceive citizenship.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
A platform for access and identity at Securex 2025
Securex South Africa Access Control & Identity Management Facilities & Building Management
South African companies involved in supplying access control technology, security services, and data management are well-positioned to tap into the expanding access control market at Securex 2025.

Read more...
Background checks: risk levels and compliance
iFacts Access Control & Identity Management Security Services & Risk Management
Conducting background checks is a vital step in the hiring process for employers or when engaging service providers; however, it is crucial to understand the legal framework and regulations governing these checks.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
Identity is a cyber issue
Access Control & Identity Management Information Security
Identity and access management telemetry has emerged as the most common source of early threat detection, responsible for seven of the top 10 indicators of compromise leading to security investigations.

Read more...