Articles by Dave Bulless
Many forward-thinking organizations are rightly reassessing their security options In many industries, security and dependability are at the forefront of customers’ minds. But the fact is that firewalls and encryptions will only ever form part of the solution. Use of biometrics presents one of the most secure options for organizations, say Jon Mooney and Dave Bulless, security experts at Ingersoll Rand in the US and UK respectively. They list out the numerous benefits of biometric systems such as fingerprint scanners and hand readers over traditional card-based access systems; dispel the various myths surrounding the use of biometric security and present a checklist for adopting biometrics to enhance security. The key challenge for offsite storage and information handling facilities has always been to provide employees and customers with immediate access, maintaining a high level of security. However, a simple card-based access control system, where access cards can be lost or stolen is not the answer. Using Biometrics For Reliable Access Control Many forward-thinking organizations are rightly reassessing their security options after realising that card-based access systems no longer provide the required protection or the level of convenience to meet their needs. For data industry leaders, when assessing the questions of physical access control, the overwhelming answer is biometric technology. The reality is that although biometrics is arguably the most secure option in terms of people and assets, many still don’t understand the mechanics behind it and often perceive it as a threat... Hand recognition readers and finger recognition scanners in particular provide a level of security beyond that of a conventional card system by verifying the identity of the person. At the same time they eliminate the burden and expense of a card-based system. For some, hand readers and fingerprint scanners sound like the stuff of Bond movies but the reality is, this is where security teams arguably need to be focusing their efforts. Hand readers and finger scanners make up 80 per cent of biometric access control applications. They are complementary, as each meets specific needs of the market. Biometric Fingerprint Readers - Advantages Finger recognition scanners are currently being used most successfully in smaller organizations. Best suited to low volume openings, for instance where doors are accessed by less than 100 people or at a slower rate, finger recognition technology offers a secure option where cost is a key consideration. It is often employed for the protection of sensitive documents and for high-value storage locations. Larger installations use biometric hand readers at the entrance Biometric Hand Readers - Advantages Hand reader technology, by contrast, presents an ideal solution for many larger organizations. Due to its accuracy and speed with which user identification can be assessed, it provides essential control without slowing the flow of a large group of people. By scanning the shape and detail of an individual’s hand it offers a truly unique record. Typically, larger installations use biometric hand readers at the entrance, on the security corridor and at individual customer areas. Administration of the system is handled by identity management software, which can be tailored to the client’s specific requirements including remote enrolment for multi-facility management and expiring privileges for temporary access. The hand readers interface directly with their access control panels and can be configured to control a lock independent of a panel. The set-up process for adding someone to a hand reader system is simple. Once a person has enrolled in the hand reader software, the system creates a similar account in the primary access control system and the user’s hand effectively acts as a badge. The hand reader then compares the hand template with the stored biometric template triggered by a card or pin and, if it matches, sends an output representing the badge or pin number to the primary system. The primary system then decides whether the person is allowed entry. Dispelling The Myths Surrounding Biometric Solutions The reality is that although biometrics is arguably the most secure option in terms of people and assets, many still don’t understand the mechanics behind it and often perceive it as a threat... For some, hand readers and finger scanners sounds like the stuff of Bond movies but the reality is, this is where security teams arguably need to be focusing their efforts The fundamental point about hand recognition readers and finger recognition scanners is that they recognisepeople, not plastic cards. This is paramount for organizations that require a high level of security, and absolutely critical to the prevention of unauthorized access to hardware and sensitiveinformation. They provide an additional layer of security, ensuring that lost or stolen cards are not later used to access facilities. Crucially, they ensure that ‘you are you.’ Biometrics, such as hand readers do not require any details about an individual other than their name. Details of home addresses, bank account numbers or other personal information are not stored in any file or database. The measurements taken of an individual’s hand are simply converted through a unique algorithm into a number, which is stored in the database. In fact, even if gained entry to the PC that the software is stored on, they would not find any personal information. It must also be remembered that in the main organizations will be using biometrics once individuals have pre-registered within their facilities either as employees or contractors. The finger, palm, iris or face is then used merely to confirm the individual is who they say they are. Using Biometrics For Office Security Or The Education SectorThere’s no doubt that there are data protection issues in many schools and other organizations, particularly in relation to personal information, addresses and other confidential information from social services for example. But, biometrics is not part of this problem and should not be lumped together with wider computer security issues. The reality is that biometrics is safe, cost effective and it does what alternatives, such as card-based systems can’t do, and that’s keep people and assets fully secure. The fact is, whether you’re an educational institute or a data organization, investment in the right security technology is vital. Biometrics is not the problem. In fact, in security terms, it is the answer. The fundamental point about biometric hand readers and finger scanners is that they recognize people, not plastic cards Biometric Systems Checklist: • Investigation – Where are you now? Has your organization recently grown or accumulated new assets and are you fully protected? Be honest, interrogate your levels of access and protection and ensure that your systems are fit for purpose. • Records – do you have a series of auditable checks and records in place? Make sure that your security systems offer you a complete view of access patterns and potential issues across all of your facilities. • Scalability – perhaps you require increased security but can’t afford a significant investment? If so, make sure that you start with a secure, scalable platform as a minimum, which can be built upon over time, as funds allow. • Technology – is there a better system out there for your needs? Keep on top of the latest technology news and be open about the needs of your organization. Don’t wait until it’s too late.
How To Ramp Up Perimeter Security With License Plate Reader TechnologyDownload
Solve Access Control Challenges in the Healthcare SectorDownload
Getting the Most Value From Software Subscription AgreementsDownload
Shifting Trends in Operation Centers and Control Rooms for 2021Download