Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Main Line Biometrics

By Bill Zalud
September 20, 2001
Who ever said "cutting edge" had to be complicated "bleeding edge"? In the electronic access control domain, some of the up-and-coming technologies sound to some like futuristic James Bond systems. But when it comes right down to it, they might not be so different than that proximity reader you're using right now.

Biometrics, which replace a card with a unique characteristic of a person's body (such as hand, fingerprint, voice or face), have made the most inroads in U.S. applications. Biometric readers today are protecting everything from server rooms to computer access to daycare facilities.

Why Consider Biometrics?

It is a strong indication of the main line nature of today's biometrics that resellers and systems integrators of numerous sizes are eagerly handling products based on the personal identifier technology. Take for example Henry Olivares of A-Professional Locks, Inc., Gilbert, Ariz. He says his company has been selling biometrics for two years. "Most of it has been at the customer's request," he says. "They didn't want to carry any credentials or codes and wanted to ensure the person gaining access was that person. That's where biometrics typically come into play. We sell fingerprint and hand geometry readers. I know as time moves on others, such as retina, face and voice, will gain popularity."

Olivares observes, "Years ago it was all magnetic stripe or bar code. Now it's all proximity. In a few years we see biometrics replacing proximity."

In some instances, that evolution already has started to happen. "We've seen people use this for single door systems," says Bill Spence of Identix, Los Gatos, Calif. Identix fingerprint readers aim at the physical and logical access control markets. One of the firm's offerings, the V20, integrates into existing proximity card systems so end users can apply it in either standalone or network configurations. Such emerging biometrics device capabilities allows end users to leverage the increased convenience and security of biometrics into more and more access control solutions, even those for smaller and mid-sized systems.

Robert Sawyer of Group 4 Securitas Technology Corp., Torrance, Calif., believes that biometrics are definitely being end user driven. "The customer sees the availability of biometrics in different trade magazines, the general press and television...[so] it is becoming more widely accepted."

Interfaces also drive more use of biometrics. For example, a special interface to the hand reader from Recognition Systems, Inc. (Ingersoll-Rand, Campbell, Calif.) makes it easier to retrofit to access control panels. Adds Sawyer, "The size of the template required fits in with panel technology very easily. We've networked with probably most of the biometric technologies available."

While Sawyer notes that interest is increasing. "It's primarily security-driven right now on the customer end. The end user is looking for a higher degree of security than provided with a normal proximity card."

The technological approaches to biometrics vary but there also are common elements for all of them.

Concerning a person's eyes, there are retinal and iris based systems. Concerning a person's hands and fingers, there are systems that measure and compare a person's finger or hand, but, especially in the law enforcement arena, there are systems that measure and compare a full set of fingers. Most finger biometrics depend on one finger, however.

There are voice-based systems as well as systems that use the ways a person types a password or phrase on a keyboard.

There are facial recognition systems that measure a number of biometric items within a person's face.

Depending on the type of biometric approach, readers also vary - with finger biometrics boasting the smallest reader being applied to laptop computers, for example, as compared to special data collection devices for iris and retinal scanning and hand geometry, for example.

The Biometrics Sell

Of course, for some end users appreciate more education and explanation than with traditional card-based systems. Adds Mike Dismore of Ener-Tel, San Angelo, Texas, "[Corporate end users] don't realize that it's available and affordable for them, and that they can put it on their buildings now."

The cost differential between biometrics and more traditional access control technologies has long been a concern. But one that is diminishing with time.

Spence says, "The cost differential between cards and biometrics isn't that great."

"The challenge...is that many end users managed a card system before, so they need to be educated about the potential recurring costs."

Many times with biometrics, you don't have to have people administering card functions full time . You don't have to buy any cards. That's certainly a savings. Those savings are recurring costs and customers should weigh that against the additional cost of the readers when they look at systems.

In addition, when viewing the cost equation, the size of the installation is not the important issue when it comes to biometrics. A SECURITY survey of end users as part of its annual Industry Forecast research showed that there are a growing number of buildings with proximity that also includes several doors with biometrics.

Dismore adds that the cost of biometrics can also be offset in applications where several departments are using the readers. "We can go into a hospital setting and do door security with security on computers, as well as time clock and get three departments to share the cost of the system. There we certainly have a competitive edge. No one else can bring so many budget centers together on a single system."

Installing Biometrics

Installing biometrics is not much different from installing a card reader. Many biometrics readers, for example, use a standard Wiegand interface and can easily integrate into existing proximity card systems. Many units offer internal user memory, with room for hundreds of users, and can be optionally expanded as well as networked with distributed database capability.

Still, there are some differences that add to end user benefits. Even though you are interfacing with the reader like you would with any system, you still have to network within the readers so there is one source of enrollment. Even here, an end user can easily phase in biometrics into an existing system, one reader at a time.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Voice Biometrics to Address On-Line Banking Fraud

    See More
  • Survey Finds Biometrics More Secure than Usernames and Passwords

    See More
  • Security check 1

    Where to Draw the Line for Standing in Line

    See More

Related Products

See More Products
  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

  • Photonic Sensing: Principles and Applications for Safety and Security Monitoring

  • effective.jpg

    Effective Physical Security, 5th Edition

See More Products

Events

View AllSubmit An Event
  • May 7, 2012

    AXIS Cross Line Detection

    AXIS Cross Line Detection is a trip-wire application that will increase system efficiency by reducing bandwidth and storage needs and facilitate search of recorded events.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing