Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Is Biometrics for Everyone?

May 1, 2005
Convergence of physical and logical security will drive biometrics and smart cards. Some fingerprint solutions ensure confidential and secure documents are viewed only by those authorized to do so when they emerge from the printer. Photo courtesy of SecurePrint through PRNewsFoto
Industry expert Kim Rahfaldt of Torrance, Calif.-based AMAG Technologies makes a good point. Just a few years ago, she tells me, companies fantasized about securing their buildings with fingerprint or hand geometry solutions, only to quickly abandon the idea once they saw the price tag. Today, biometric technology has become an affordable solution, and for companies who need to modify their security levels often, combining smart cards and biometrics has provided a long awaited answer for many security management challenges.

When combined with smart cards, fingerprint biometrics provides a second and even a third level of security when a swipe, PIN and fingerprint are necessary to secure a building or sensitive area.

You can start with a card and then add one at a time – a single finger, then a second, and finally the addition of a PIN as well, pointed out AMAG’s Adam Shane. “That is the beauty of biometrics; it allows you to ratchet security another notch that doesn’t exist without it,” said Bioscrypt’s John Cassise.

As the technology continues to find its place in security markets, companies and end users looking to apply it should look for the realization of certain current trends and goals.

Convergence

Physical and logical access controls are converging, often using biometrics to offers a powerful and cost effective solution. Tying enrollment into a single process, regardless of where it happens allows end users to apply single identities across their enterprises. Using biometrics further enhances that convergence. Such convergence can, for example, allow IT to set a rule that those who didn’t enter though the front door cannot log on to their PCs. Or, conversely, automatically log off an occupant’s computer as that person exits the building.

Biometrics also provides an excellent opportunity to thwart identity theft. “We see that with us depending so much on our identity and it coming under increased vulnerability, that fingerprint biometrics gives us back our security,” said Cassise.

The reasoning is simple: Identity thieves have a much harder time stealing an approved person’s physical features than an access device or card. Biometric technology provides an accurate option to not only access a building, but access a secure network, and authenticate a purchase. “We believe that fingerprint biometrics will be a part of everyone’s everyday life,” said Cassise.

Biometrics X2

As the acceptance of biometrics grows, the variety of biometric systems used will expand. Niche markets may find value in the less popular technology such as iris, and end users can implement a second biometric technology to add another layer of security.

“Just as a single biometric combined with smart card and/or PIN increases the level of security and was a catalyst in adoption of the technology, the implementation of multiple biometrics in a single device will again raise the bar,” commented Shane. “Such systems could provide protection against attacks using counterfeit biometrics such as the ‘gummy fingerprint’ many people have heard about.”

Such redundancy of biometric systems is a much more feasible option now that it doesn’t cost an arm and a leg to use an eye, a finger or any other appendage as access identification.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • School hallway with lockers

    Safety is Everyone’s Responsibility

    See More
  • Year for Biometrics? Maybe for Real, Zwipe

    Is 2016 the Year for Biometrics at Last?

    See More
  • cloud-enews

    Securing cloud access when everyone is now a privileged user

    See More

Related Products

See More Products
  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

  • Photonic Sensing: Principles and Applications for Safety and Security Monitoring

  • 150 things.jpg

    The Handbook for School Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing