Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Making the Cut

May 1, 2005
Biometrics is the science of measuring a person’s unique physical properties, including voice, fingerprints, iris pattern in the eyes or the contours and shape of one’s face. Such devices are now widely used by security firms, governments and companies who have the need to protect access to sensitive areas or data in addition to traditional methods like magnetic cards and punch codes.

New anti-terrorist measures include the recording of biometric information at ports of access to a country. For example, the U.S. records facial information in addition to fingerprinting and photography of every person that enters through its international airports. Other countries are sure to follow the American example.

Not every biometric identification technology is as popular as its counterparts, as seen in Table 1. But though the field is still in its infancy, many people believe that biometrics will play a critical role in future computers, especially in electronic commerce. Personal computers of the future might include a fingerprint scanner, for which different genetic identities could be granted various levels of access – the ability to use credit card information to make electronic purchases, for example.

Rapid developments

Technology and development in the many areas of biometrics are moving at a rapid rate, driven largely by the security needs of the federal government. But an increasing abundance of varied solutions is not the answer; the stability of a technology with actual use of standards in an application will produce the best results.

In the field of biometrics, development has taken large strides to produce faster, more accurate, portable and affordable systems. As application providers speed to produce the next best system with new biometric technologies, standards and interoperability tend to just exist in the background as compliant in the application. However, no real use of it exists other than enterprise-type systems offered by a handful of application providers.

The development of technology with implementation of standards for interoperability will prove to bridge the gap between the multitudes of core systems. The ability for different technologies to be interoperable will allow application providers to materialize such systems that the field requires without the need to integrate with all biometric technologies. Of course, qualifications according to performance test results will need to be addressed to define what is a qualified technology. An application is only as good as its biometric core.

Although biometrics technology has been used in private sectors for quite some time, Sept. 11 spurred heavy investigation into such technologies. The fast rise of identify theft in recent years is also driving the biometrics market. In response, countries around the world are embedding facial and fingerprint characteristic data on passports and even driver’s licenses. As identification and/or verification by biometrics becomes a necessity, a concern over privacy and personal space will continue to echo in this field.

Process changes

When looking at the big picture, processes will need to be put in place for incorporation of biometric technology to make it easy to use with confidence and trust from the end user. Even though the technologies record only characteristic data with a high encryption, multiple registrations due to different systems will discourage the end user from having their characteristic data recorded multiple times or stored in multiple locations.

Numerous pilot tests have also been notorious for holding back expansion into real world implementations of biometrics. There is a fine line between acceptable pilot testing and actual emergence of a solution. Proper steps are being followed to minimize the work when making changes to a system, but nothing beats real-world results. Many application providers are geared up and prepared to make appropriate changes, but an actual launch of these systems need to happen.

Biometrics is very dynamic. For example, people’s fingerprints are unique, but every time a finger is captured there are other external factors that change the condition during capturing. Therefore, it is difficult to choose a sensor that will work every time when that particular finger is placed on a sensor. An acceptable performance standard should be proposed and met by technology providers, while a reasonable tolerance should be accepted by those seeking biometric solutions. Without an understanding of the technology and its proposed standards, rather than adopting a system, potential users simply end up repeating the test cycle indefinitely.

As systems are adopted and standards fall in place, two major concerns are becoming apparent: the protection of data, and the need for a strong legislation defining how data will be used by governments and corporations. Both considerations would require the development of a certificate of authority for those able to register a biometric into a common database.

End users can play a significant role in the future of biometrics by way of education and awareness. Although biometrics technologies are relatively easy to use, they only become so when they’re familiar. Often, end users need only simple devices to ease the application of biometrics. For example, a simple notification for entry applicants to wipe residue from their fingers could make the difference between a successful biometric access control system and a high-tech complaint generator.

End users will also play a significant role in deciding which devices make the cut. Buyers should weigh all the trade-offs between price and value (security) of a product. Biometrics is part of high technology and thus should always stay competitive without a decline in security. But end users need to know what to expect when they are evaluating such systems. Apples need to be compared to apples. If a system is drastically less costly than another system then most likely the end user should expect a performance difference between the two. End users also should learn more about their vendors and qualifications. Familiarity of standards will protect end users from being locked into a specific technology and allow them to define the shape and use of biometrics for future generations.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC0721-WIS-Reid-Feat-slide_900px

    The Magic of Making a Difference

    See More
  • Security Learns to Measure Twice, Cut Once

    See More
  • Fulton County, Ga. May Cut Courthouse Security Plan

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing