Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Access ManagementIdentity ManagementEnterprise Services

How the global pandemic is changing time and attendance solutions

By Stephen Sardi
Time and attendance COVID-19 evolution
October 19, 2020

No event has disrupted the lives of every human on earth – and every organization – as much as the COVID-19 global pandemic. It has also become clear that when we are on the other side of this crisis, the world will be forever changed.

Both for businesses which have closed or gone remote during the pandemic, and for those which have remained open throughout, employers are changing their priorities to recognize the vital importance of supporting health and safety among their populations.  As the economy prepares for the post-COVID era when businesses, schools and offices will be open again, security professionals, management and human resources are adopting new stringent personal and workplace hygiene rules and processes for their organizations.

To further address these concerns, organizations have placed a priority on searching for technology solutions to help curb the spread of viruses and microbes. From doors to sinks to elevators, these new technologies will be centered primarily on delivering a touchless experience. These are not just temporary changes. Now that we have all experienced the massive disruption that a pandemic can cause, business owners and other leaders will be implementing permanent changes in an effort to avoid a recurrence and avert any new health threats to the population.

Spotlight on human capital management needs

Among the new products and processes that are being researched now are those in the time and attendance market. These solutions are often combined with access control products, with an employee’s entrance and exit providing data on the start and end times of their workday. These products traditionally been card-based – a paradigm that requires contact. It is the responsibility of human capital management and security professionals to discover a new way to collect this data while minimizing health risks.

In evaluating potential contactless solutions for time and attendance, the technology that has been most widely accepted today falls into two categories: biometrics and proximity devices of all types.

Facial recognition is becoming more attractive

While it is true that facial recognition continues to meet steep challenges in acceptance and adoption, it still has emerged as the leader among biometric solutions and will stand out even more in the future. There are several reasons for this. The other biometric technologies currently available in the market include iris recognition, palm vein scan and fingerprint readers. Iris recognition is often misunderstood to be a retina scanner, a misunderstood and sometimes-feared technology, and this has limited its growth. Like palm vein scanners, iris recognition is also too costly for many organizations. Fingerprint readers continue to be a successful technology; however, they are not a contactless solution which may affect growth of this technology in a future touchless world. These limitations leave facial recognition in a very strong position; one which is further cemented by the ever-increasing high accuracy of this technology.

In fact, the level of accuracy for facial recognition has improved in the last 10 years, according to an evaluation performed by the National Institute of Standards and Technology’s (NIST). The failure rate for searches, meaning that the software failed to find the matching face residing within a database, has dropped from 5% in the year 2010 to just 0.2% in 2018 – a reduction of 96%.

When facial recognition software scans a face to look for a match, it is processing a number of different geometric vectors. While all software is different, most read such factors as the distance between eyes and the distance from chin to forehead. Depending on the sophistication of the software, it may be reading 50, 75 or more different factors. Typically, each analysis is performed individually, and – important in alleviating any concerns about personal information being collected – the only data stored on databases is the physical information contained in the photos themselves, along with the identities of the individuals in the photos.

The ascendency of proximity solutions

While proximity technology has held a steady place in the identity authentication market, it is certain to gain traction in a newly contactless world. This category encompasses proxy cards and devices, and mobile technology in the form of apps added to users’ smartphones. Non-contact cards can be expected to hold their position, while mobile solutions are likely to gain traction as they offer the benefit of not needing additional administrative support.

Mobile card solutions offer other advantages as well; it is far more likely that an individual would forget or misplace a card or device than their phone, which is typically within reach of most people most of the time.

Mobile apps can be automatically and frequently updated, ensuring all employees are using the most recent version. While the primary limiting factor here would be the cost, there are also solutions available that can mitigate this such as the devices that attaches to RF card readers and translates the Bluetooth signals of mobile access cards to RF signals.

Time and attendance in a new world

There is no way to know exactly when the world will return to normal once the pandemic has been fully brought under control. However, we can be certain that when it does, the world will not look the same as it did at the beginning of 2020.

By the time workers, visitors and others begin to return to the facilities where their organizations are based, there will have been a significant evolution in the way time and attendance data is collected. Leading this evolution will be a new wave of contactless access products to enable authentication of identities at entry and exit.

 

KEYWORDS: access management identity (ID) management security technology

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Stephensardi
Stephen Sardi is Vice President of Workforce Management at Suprema.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • vertical colorful wires

    The new information landscape is changing how security leaders work

    See More
  • Top 30 Voices in Healthcare Security: How Is the Industry Changing?

    See More
  • How Security is Shifting to a Global Approach

    See More

Related Products

See More Products
  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing