SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    One system, one card
    One system, one card
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    One system, one card
    One system, one card
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Effective high-security wedge barriers by Delta
    • SCD secures major contract for HD MWIR detectors
    • ASSA ABLOY's Aperio: Revolutionising digital security
    • VIVOTEK supports ecological restoration in Taiwan
    One system, one card
    One system, one card
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    One system, one card
    One system, one card
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    One system, one card
    One system, one card
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    One system, one card
    One system, one card
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • Wire-free locks
  • AI special report
  • Cyber security special report
  • Casino security & surveillance
  • 6
Electronic access control
  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

Alcatraz AI explains how facial authentication can solve the problem of proximity card shortages

Alcatraz AI explains how facial authentication can solve the problem of proximity card shortages
Contact company
Contact Alcatraz AI
icon Add as a preferred source Download PDF version
Related Links
  • Alcatraz AI highlights the latest biometrics in the healthcare sector - The future of hospital security
  • What does the Metaverse mean for security?

The global chip supply chain has been in shambles since the pandemic started in early 2020, and it doesn’t appear to be recovering any time soon. From cars being shipped without CarPlay to businesses that are unable to obtain proximity cards for security purposes, it appears no industry is immune.

Proximity cards and fobs are widely used throughout corporate enterprises. Users have likely used one before and may have simply referred to it as a badge. These badges are used for more than just a fashion statement.

Powered card reader

Inside a proximity card, the cardholder's credentials are contained which grant access to a controlled environment if the cardholder is authorised to access the designated space. For example, some individuals have locked business buildings, and only those with an employment badge, or employee proximity card, can gain entry.

When the card receives power, it utilises RFID to transmit the data stored on the card to the reader

While other businesses may have spaces that are only accessible to certain employees with particular credentials. Therefore, not every employee’s proximity badge would let them into these areas, only those with the appropriate credentials, which are stored within the card itself. Proximity cards function when the antenna inside the badge is powered when within range of a powered card reader. When the card receives power, it utilises radio frequency (RFID) to transmit the data stored on the card to the reader.

RFID chip shortage

Due to the RFID chip shortage and ensuing supply chain challenges, businesses have been unable to get proximity cards manufactured and delivered in a timely fashion. Without replacement cards, security infrastructure becomes at risk.

This is certainly an unprecedented time. And this is a problem that is not going to be solved immediately. As more employees return to the workplace, the demand for cards will likely increase - exacerbating the issue even more. Many businesses are reviewing their security posture to determine if an alternative approach is feasible. Is there a way to improve security and make a safer workplace given these new constraints?

Enhanced security option

The use of an individual's biometrics as their credential increases the security posture of their business

Many businesses have found using biometrics as a security method is not only a great alternative to proximity cards but also an enhanced security option. Unlike proximity cards that could be lost or stolen, biometrics use factors that are unique to each individual. The use of an individual's biometrics as their credential increases the security posture of their business.

Facial authentication is another tool in the biometric arsenal; however, unlike its predecessors, it offers hands-free, frictionless access. Tools like the Rock, developed by Alcatraz AI, can authenticate the face of individuals attempting to gain access to a physical space, with that of those on the allowlist, and allow or deny access accordingly. Not all facial authentication products are equal.

Deep learning algorithms

The Rock allows for a simplified automatic enrolment and uses deep learning algorithms to adjust as the lighting or individual changes over time. The Rock also includes anti-tailgating features to notify the appropriate staff if an unauthorised attempt is made to access a secured area.

Given the RFID chip shortage, many businesses are seeking alternative security methods

Given the RFID chip shortage, many businesses are seeking alternative security methods. While biometrics is not the only option for access control; others seem archaic when compared to today’s technology. A business could revert to a physical lock with metal keys, or install a pin pad requiring a code - yet this is unlikely. Now is the time to look toward the future and install systems, like the Rock, that offers uncompromising protection without the typical inconveniences.

Access control system

Whether users are replacing a less reliable security measure or adding to an existing stack, installing the Rock is simple. Affix the device near an access point, integrate it with their ACS, then begin the enrolment process.

The enrolment process itself is also just as easy as opening the phone. Stand in front of the device to let it analyse the points on user’s face. Once that is complete, the face is converted into binary code with 0 chance of being reconstructed into any sort of image. This is a crucial fact when comparing other biometric devices. The Rock has a proprietary algorithm that links the binary biometric data code with the profile already stored in the access control system of the building.

Access control requirements

Implementing an entirely new security system can be a bit daunting

As mentioned earlier, proximity cards can be lost or stolen, so even businesses that use them for access control have found themselves seeking out other security methods to implement a multi-factor authentication approach. Given the enhanced security biometric access control offers, many are choosing to add it to their security stack.

By doing so, even if a proximity card is lost, shared, or stolen, access would not be granted to an unauthorised individual because they would not pass the biometric portion of the access control requirements. Until the RFID chip supply chain can meet the demand, the harsh reality is that businesses must find an alternative way to authenticate individuals for physical access.

Implementing an entirely new security system can be a bit daunting. From researching what is best for the business, as well as its employees, to the actual implementation, and everything in between. Fortunately, there are biometric security businesses, like Alcatraz AI, that help make the transition to enhanced security as seamless as possible.

Discover how AI, biometrics, and analytics are transforming casino security

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Physical security
  • Security devices
  • Security access systems
  • Radio frequency Identification
  • Voice recognition systems
  • Facial recognition systems
  • Video analytics
  • Metal detectors
  • Electronic access control
  • Fingerprint reader
  • Building security
  • Door access control
  • Security software
  • Security service
  • Physical Security Information Management (PSIM)
  • Data Security
  • Mobile access
  • COVID-19
  • Related links
  • Access Control Software Access control software
  • Biometric Access control software
  • Broadcast Messenger Access control software
  • Contact Access control software
  • Mifare Access control software
  • Carpool Anti-passback Access control software
  • Central Monitoring Option Access control software
  • Centrally managed access solution Access control software
  • Door Monitoring Option Access control software
  • DVR Interface Access control software
  • Guard tool module Access control software
  • High Level Interface Access control software
  • License Access control software
  • Management Systems Upgrade Access control software
  • NStar software upgrade Access control software
  • Remote software for telecode door entry phone system Access control software
  • Server software for MSDE Access control software
  • Version Upgrade Access control software
  • Related categories
  • Access control software
Related white papers
One system, one card

One system, one card

Download
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Modernizing access control

Modernizing access control

Download
Related articles
Effective high-security wedge barriers by Delta

Effective high-security wedge barriers by Delta

What’s behind (perimeter) door #1?

What’s behind (perimeter) door #1?

TDSi by Hirsch: Reinventing UK access control

TDSi by Hirsch: Reinventing UK access control

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Electronic access control
  4. News
  5. Corporate news
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
One system, one card
One system, one card
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec