<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=159683641205248&amp;ev=PageView&amp;noscript=1">

Increasing your level of access control: biometrics

Matt Golueke July 22, 2015 13:35 PM

ZKAccess_Biometric_face_reader_-_2Electronic Access Control (EAC) has been an integral security tool for physical security professionals for 40 years that has provided customers the control to authorize access for employees, contractors, suppliers and visitors into their facilities.

a blog submission from ZKAccess' Manish Dalal

Historically, credentials for authorized access included a plastic access card and/or PIN (personal identification number) code, like an ATM, to gain authorized access to specific areas of a building with specific time zones. Unlike locks and keys, EAC provides an audit trail of which card or PIN accessed a specific door. This tool provided security professionals a process for verifying that a credential (access card) or PIN (unique code) accessed a specific access point in a facility for investigation purposes.

But what are some of the inherent limits of traditional EAC systems? 

You don’t know with certainty “who” actually was granted access. What if the access card (credential) was lost or a PIN was shared with unauthorized individuals? Would you be able to take disciplinary, criminal or civil action based on the audit trail of a card or PIN? Not likely. The record of a credential or PIN alone would not help a security department or business owner prove unauthorized access or theft. The audit trail may also not enable law enforcement or prosecutors to build a solid enough case to seek criminal prosecution, arrest or civil recovery in a criminal event. If there was quality video surveillance evidence to collaborate the access records, then you have better evidence to pursue a criminal investigation and possible prosecution by authorities. Is there a more efficient and effective solution available than card/PIN code access systems?

Yes, biometric technology. It is now a mainstream solution and recently introduced in the new Apple iPhone 5S. If Apple deploys a technology, it becomes “main stream” for the rest of us.

Learn more here about leveraging Biometric Technologies to secure your facility

ZKAccess_Product_Positioning_thumbnail

 

 

Topics: Your Challenge, Our Solution

Medium Narrow Orange Line - horizontal
Need Help Icon orange
Medium Narrow Orange Line - horizontal
Search Keyword banner-2
    Medium Narrow Orange Line - vertical-1
    Subscribe Now Icon

    Search Keyword banner-2
      Need Help Icon orange