Biometrics that are wireless, battery-operated and/or can utilise existing infrastructure will be most favoured in the ongoing adoption of biometric technology
Proving ROI, setting proper customer expectations and training is imperative to
the success of biometric implementation

End user customers increasingly expect their security systems to provide measurable benefits beyond protection of people, facilities and assets. The biometrics sector is undergoing a similar shift in mindset: The benefits of using biometrics to drive business operations and other corporate functions are becoming part of the return on investment (ROI) “equation.” 

Cost savings & efficiencies influence biometric adoption

Many customers now recognise that a biometric system saves money in the long run, says Arie Melamed Yekel, CMO, FST Biometrics. The company’s In Motion Identification (IMID) technology uses a combination of facial and body behaviour analytics. Yekel says the system can demonstrate cost savings in two ways. First, the system avoids the need to issue or replace cards and keys – potentially a very large expense that is simply not a factor with biometrics systems. Another cost saving is related to time: Both users and administrators continually save time by removing barriers to entry. The associated savings include, among others, the time spent waiting in line to enter a building, time looking for a key or card, time lost when a user can’t enter a building because they don’t have their key or card, and staff time required to issue a new key or card.

“Once the biometric system is in place, there are inherent savings of cost and time compared to standard card systems,” says Yekel. “Furthermore, quality biometric solutions such as IMID are far more secure than other identification systems.”

Every user of a card-based system needs a dedicated ID card, he says, and the cost of the cards, and of replacing lost/damaged cards, can become a great expense for organisations. For example, a system that supports 1,000 users can expect to spend $3,000 to $5,000 annually replacing lost cards.

Improving efficiency via automation and accurate identification

Automating manual processes is another cost saving. In many cases, we found that our customer decided to replace the human guard with IMID Access solution” says Yekel, “as the outcome of placing IMID Access will be even more accurate and more secure than using a human guard, and it saves them tens of thousands of dollars annually.”

An example is the Granite Club, Canada’s 10,000-member premier family, recreation and athletic club. The club wanted a solution that would ensure only Granite Club members, staff and authorised visitors would be able to access its athletic and children’s centres as well as the dining and meeting facilities. With a health and hygiene focus, the Granite Club also wanted a touch-free solution that would not require users to swipe a card, carry a fob or punch in a code. The Granite Club selected FST Biometrics because it is a non-invasive, secure access solution that does not impede the movements of members and staff, or detract from the Granite Club’s atmosphere. IMID Access is used in various access points throughout the Granite Club, allowing members and staff to freely access restricted areas of the facility. IMID was also deployed in the children’s centre, supplying a highly secure level of protection.

Many customers now recognise that a biometric system save money in the long run
Once a biometric system is in place, there are inherent savings of cost and time
compared to standard card systems

Lower costs of biometric technology make ROI much easier

Prior to the last 10 to 15 years, biometrics primarily existed only in the public sector, where government has both an obvious need and budget for advanced biometric security, says Larry Reed, CEO, ZKAccess, another biometrics company. “Fast-forward 10 to 15 years and the cost of biometric security has been reduced dramatically,” he adds, “and it’s within the budgets of even individual consumers.”

Indeed, the proliferation of fingerprint sensors retrofitted into today’s smart phones is all around us. Apart from smart phones, as with any product, the market adoption rate for biometrics is normally consistent with the ROI associated with that new product, says Reed. The most commonly acknowledged ROI for biometrics is when used for lowering payroll expenses, since payroll is often 10 percent or more of any company’s overall operating budget. Biometric time clocks are used to prevent “buddy punching” (hourly-wage employees fraudulently punching in for each other and getting paid for unearned work hours).

Another obvious ROI is avoiding fines from the U.S. Department of Labor’s Occupational Safety and Health Administration (OSHA), says Reed. Among other things, OSHA safeguards employees from being injured from the accidental/unauthorised startup of dangerous mechanical equipment (i.e., trash compactors, cardboard balers, forklift trucks, etc.). Without first authenticating to a biometric reader, electricity remains cut off from the machine. “Where you can prove an ROI, you’ll find a customer willing to pay for biometrics,” says Reed.

Proving ROI to encourage biometrics adoption

Prior to any technology change/refresh, a customer must first be convinced the change will either result in increased revenues or reductions in operating expenses. Reed says ROI can be more easily proven if/when any of the following scenarios are acknowledged by the customer: 1) Buddy punching payroll losses; 2) OSHA fines for non-protected dangerous equipment; 3) Recent break-in or misuse of employee access ID badges; or 4) downtime (accidental lockouts) experienced when employees misplace ID badges and must be reprocessed to gain access to their workplace.

Fast-forward 10 to 15 years and the cost of biometric security has been reduced dramatically and it will be within the budgets of even individual consumers

“For biometrics veterans, we’re well aware of the inherent security flaws and unnecessary expense of managing a card-based access control system,” says Reed. However, without the customer feeling the “pain” of a security breach, financial loss or inconvenience acknowledged by the customer, it will be more difficult to convince that customer to invest in biometric technology.

“Once you’re proven an ROI, the next step is ensuring that time and labour (and total cost of ownership) for the biometric install is minimised,” says Reed. Biometrics that are wireless, battery-operated and/or can utilise existing infrastructure will be most favoured.

Lastly, setting proper customer expectations and training is imperative to the success of biometric implementation, says Reed. Without the cooperation and commitment of both the decision-maker and all of their employees to learn and properly operate the biometric solution, the project is doomed to fail, he notes. 

Download PDF version Download PDF version

Author profile

Larry Anderson Editor, SecurityInformed.com & SourceSecurity.com

An experienced journalist and long-time presence in the US security industry, Larry is SourceSecurity.com's eyes and ears in the fast-changing security marketplace, attending industry and corporate events, interviewing security leaders and contributing original editorial content to the site. He leads SourceSecurity.com's team of dedicated editorial and content professionals, guiding the "editorial roadmap" to ensure the site provides the most relevant content for security professionals.

In case you missed it

Crossing the divide - automating security processes across physical, business and IT domains
Crossing the divide - automating security processes across physical, business and IT domains

Security is a critical requirement for all organisations. Getting security right involves the correct mix of people, processes and technology working together. However, many enterprise companies don’t look at the full mix that encompasses information security, and instead split their physical security and business continuity teams away from their IT security departments. According to research by ASIS, around half (52 per cent) of companies have converged two or three out of their physical, IT security and business continuity teams together, with the majority of those opting to bring together their continuity and physical security teams. Of those that have not brought teams together, around 70 per cent have no plans to do so. It's Important to bring all department's security together The reason for this is that cybersecurity is perceived as having a more specialist role within the business and that this prevents companies from bringing their departments together. However, while IT security has its own specialist requirements and skills, it should not be looked at alone. Businesses are looking at how to manage risk more effectively across all their operations, and they have problems when their teams are siloed and don’t have the full picture. The Cybersecurity and Infrastructure Security Agency (CISA) has developed its own guide to this area, based on the growth of the Internet of Things and more connected devices entering both homes and businesses, so this will continue to grow in importance. The rise of automation The pace of change that companies face today, coupled with the impact of the COVID-19 pandemic, means that more organisations are moving to digital services and automating their operations as much as they can. Security is no exception here - according to our research on security and automation, 75 percent of companies say they would need an additional three or more analysts in place to deal with all their incoming alerts in the same day, while 83 percent say their teams face ‘alert fatigue.’ IT security teams are drowning in data, but they feel unable to cope - yet at the same time, they will have to work more closely with other departments as well. Automation is necessary to deal with all these problems, but it should not be looked at in isolation. While IT security teams are keen to invest in automation using technologies like Security Information and Event Management (SIEM) and Security Orchestration, Automation and Response (SOAR), these investments can be used across both physical and IT security. As IT security teams invest in automation, they can adapt and extend their approach to help risk management and security in the physical world as well. The best approach to be successful around this is to look at areas where real-world and IT security challenges cross over for businesses. To adopt this approach successfully involves understanding business processes better. Fraud detection processes Automation involves using data and analytics to improve how a process operates from beginning to end, including where IT and technology is used to support physical interactions or activities. A good example of this would be a bank’s fraud detection process, where multiple digital and physical transactions have to be monitored and investigated. Bringing together different teams - physical security, business continuity, risk management and IT security - is about how to protect the whole organisation against risk. While the most well-known area for fraud investigation would be credit card transactions, there are multiple different types of transactions to track, from national and international wire transfers to prepaid phone cards and other prepaid cards that can be used for credit purchases. Each of these will have its own workflows and requirements to investigate a transaction, This can include looking at whether transactions are false positives or need further investigation, which is based on a mix of digital documentation for online purchases and physical data from in-person transactions. At the same time, the sophisticated nature of fraud can mean there is a large IT component to any investigation. Members of the IT security team may need to be involved alongside the anti-fraud department. While this investigation is necessary, it pulls analysts away from cybersecurity tasks, which can be especially frustrating where false positives are concerned. Instead, automating the investigation process can help. Consolidating Physical, IT and risk management By consolidating processes and automating the workflow, this pulls physical, IT and risk management together in a smarter and more efficient manner. It also improves productivity for an anti-fraud team as they can remove false positives from the workflow and get automated support for IT analysis. If the team needs more human insight, they can bring this in where they need it rather than requiring it for every investigation. While anti-fraud is one example of where this kind of convergence and collaboration is required, there are other use cases. For instance, industrial control and manufacturing applications that run production lines around the clock are frequently targeted for attacks, either to steal vital data or to disrupt business operations. This crosses over from the realm of IT into the world of operational technology, where systems are very different and the systems used may have been in place for years, even decades. Bringing together different teams - physical security, business continuity, risk management and IT security - is about how to protect the whole organisation against risk. By working together, teams can be more efficient rather than working in their respective silos. This involves better use of data across those teams, which will rely on more automation to be efficient. Using SOAR, security analysts and business risk professionals can cut the amount of time needed to respond to potential problems, reducing the impact and remediating faster. At the same time, it reduces the waste associated with false positives and manual work. The emphasis here should be on how to support the business with better security - by consolidating processes and working more effectively, security teams across the organisation can achieve that goal.

Dahua Technology’s video and access control solution enhances safety in Empresa Panamena de Alimentos food company’s facilities
Dahua Technology’s video and access control solution enhances safety in Empresa Panamena de Alimentos food company’s facilities

Dahua Technology is a globally renowned video-centric smart IoT solutions and services provider. Based on technological innovations, Dahua Technology offers end-to-end security solutions, systems, and services, in order to create value for city operations, corporate management, and consumers. Dahua Technology has designed a video surveillance and control solution for a popular Panamanian Food Company - Empresa Panamena de Alimentos (EPA). Dahua’s security solution Empresa Panamena de Alimentos is a renowned company in the processed food industry in Panama, Central America. It was founded in 2012 and owns production plants and warehouses in the capital city, as well as agencies around the country. EPA’s products, including all kinds of cookies, coffee, and pasta, are already important parts of consumers’ day-to-day life. With the prevailing COVID-19 pandemic risks, EPA needed a system to sustain efficient management and operation, over their staff and facilities. Implementing multiple access controls in the facilities As a food company, the operations of the company need to be under caution, especially during the pandemic As a food company, the operations of the company need to be under caution, especially during the pandemic. It was necessary to implement multiple access controls in the facilities. With multiple plants located around the nation and accelerated growth, a centralised monitoring system for all equipment, alert management and user reports was needed. The solution, applied at EPA’s facilities, integrates various electronic security systems under a single platform and was evaluated based on the company’s needs. ANPR, AI-based cameras and access control systems “Currently, 480 Dahua devices have been arranged. Among them are different models of cameras, access control systems, and automatic number plate recognition products. AI-based cameras enhance the level of personnel protection. Everything is monitored by a DSS Express server in the main plant,” said Luis Araujo, the Manager of Infrastructure and Telecommunications of the Secutec Panama. Every day, more than 800 employees enter EPA facilities nationwide, the access control system allows a faster and safer automated entry of the staff and their cars. Access controllers and Pro Network Video Recorders Besides, three Pro Network Video Recorders (NVR5864-4KS2) were also adopted Apart from automatic number plate recognition (ANPR) devices, more than 20 access controllers (ASI7213X-T1) were installed in main offices for temperature monitoring and attendance management. Besides, three Pro Network Video Recorders (NVR5864-4KS2) were also adopted. With a powerful processor, they have the capability of 4K resolution processing and high definition recording quality. Perimeter protection and access control In Dahua Technology’s security solution, perimeter protection and access control are both realised. “We have had Dahua equipment for 7 years. It is a brand that has been of great help to our safety. It has contributed to continuous and steady operations throughout the COVID-19 pandemic,” said Guillermo Figueroa, EPA’s Safety and Control Manager. Javier Rodríguez, Secutec Panama’s Operations Manager, valued the quality and technology of Dahua’s solution, which has been ‘key’ for the development of their projects, the support and accompaniment to the brands that are planned to be developed. Trust in Dahua Technology’s solution “We are very proud that our teams are here for EPA and that companies, like EPA and Secutec, trust Dahua Technology. We continue to innovate to offer solutions that help companies to work in a safer and smarter way,” said Fermín Osorio, an Engineer at Dahua Technology Ltd.

Everbridge Control Center deployed by G4S to accelerate Abu Dhabi Global Market Square’s physical security digital transformation
Everbridge Control Center deployed by G4S to accelerate Abu Dhabi Global Market Square’s physical security digital transformation

The Abu Dhabi Global Market Square (ADGMS), located on Al Maryah Island, in the United Arab Emirates capital, Abu Dhabi, is a high-profile, architecturally compelling business and hospitality hub. Many of the most globally prestigious companies inhabit the buildings, in the award-winning financial centre. Abu Dhabi Global Market Square ADGMS also hosts frequent international dignitaries and large-scale public events, including the Abu Dhabi national New Year’s fireworks display. Abu Dhabi Global Market Square was the first project in the UAE, to achieve LEED Core and Shell (LEED-CS) Gold pre-certification, by the US Green Building Council (USGBC). The Abu Dhabi Global Market Square (ADGMS) consists of: 450,000 sq. m of office space, a lavish retail section and luxury business hotel offerings, 4 Grade-A commercial office towers with 30 floors each, 4 km waterfront promenade, Over 2,000 cameras, and Over 1,000 doors. Unconnected security systems and situational awareness gaps Because of its iconic status, the Abu Dhabi Global Market Square faces many unique challenges to security, including: Political pressure - Because of ADGMS’s status and frequent high-profile international visitors, any disruption to operations - be it natural disaster, activism, terror or other critical events, could cause issues on a national scale. Protection for VIPs - Regular visits from prestigious VIPs, such as sheikhs, the royal family, and global business leaders, elevates security risks and the need for executive protection. Unobtrusive security - ADGMS is a public space with tenanted offices, meaning that security must be robust, but unobtrusive and follow all global data, and privacy regulations. Physical location - Being situated on an island is an extra security risk, complicating the ability to enter and exit the space, during planned and unplanned critical events or emergencies. Architecture - The buildings in ADGMS are mostly glass, with many levels, making it difficult to secure. Previously, a number of systems were deployed to help with security and life safety, such as CCTV, access control, fire detection, and building management. However, these were not connected and left gaps in situational awareness, which ADGMS found unacceptable. In light of the above challenges, ADGMS building managers felt it essential to harden security, across the market square, within these buildings and in connecting areas. Risk intelligence & integrated control of physical assets Martin Grigg, Principal Consultant and Project Lead for PTS Middle East was selected to design and oversee the project Abu Dhabi Global Market Square approached PTS Middle East (PTS Consulting Group Ltd.), a multi-national security and digital transformation consultancy, which carried out the threat, risk and vulnerability assessment, designed the mitigation measures, and provided oversight of the installation and commissioning of the entire system. They were also tasked with ensuring that the system met the operational requirements and was fit for purpose, and proportional to the risks, faced by ADGMS. Martin Grigg, Principal Consultant and Project Lead for PTS Middle East was selected to design and oversee the project, right from concept to completion. Everbridge Control Center deployed Following the assessment, G4S, a British multi-national risk consultancy company, headquartered in the United Kingdom, was selected to deliver the project, based on its experience in helping secure many of the region’s most prestigious locations. G4S is also a global partner with Everbridge, and together, they have secured people, assets and infrastructure for numerous organisations. G4S selected Everbridge Control Center to integrate and manage all the technology, which is coming into their Security Command Centre (SCC). Everbridge Risk Center was also deployed to provide real-time threat intelligence to ADGMS. Critical issues solved by Everbridge technology: Consolidation of four control rooms into one, reducing the office space needed for security - This premium space is now free and able to be re-purposed as rentable office space, Reduction of man guarding costs, as fewer resources are needed to secure the facility, Real-time situational awareness allows for reduced risk, accelerated response times and keeps stakeholders informed, Everbridge Control Center provides event driven, unified interface and automated SOP presentation, Everbridge technology provides flexibility to adapt, as requirements change, Reduction in time taken to identify a security incident and resolve it, Intelligence from the facial recognition systems is proactively used to welcome friends and identify known criminals, Risk intelligence to identify events, such as sandstorms, allows ADGMS to act faster, enabling them to reduce the risk to people and operations, and Automated reporting capabilities save huge amounts of time and resources - A report that took 20 minutes can now be automated in seconds.