Is Biometrics Finally Ready to Grow Up?
The early history of biometrics technologies proved to be premature on its promises. Now might be time to reconsider and embrace its coming of age as a primetime security solution.
Let’s have the teenager in the room escorted to the door because it’s time they left the party. That would be the shady reputation biometrics has had with many security integrators, end users, distributors and even us consultants
Biometrics has evolved through those turbulent teenage years to become a responsible young adult. Not fully mature, but certainly ready to start a productive career in the security industry. So let me tell you more about biometrics’ not-so-great reputation.
We’ve all probably had a few moments as a security industry teenager that got us into trouble and aren’t really too proud of, but that is just part of growing up. We could blame it on the security parents who did not properly train, discipline or care for their technology products. In the early years, the manufacturers of biometrics got a little too full of themselves and seriously overpromised and underdelivered reliable products. This generation of products got into bad situations and ran with the wrong crowd, and got biometrics in trouble by misapplying the technology.
As a result, the entire security industry labeled the biometrics technology as not mature enough for a real career opportunity or one you would risk your career on implementing. The promise of possibilities to improve security designs and operations, and lower the total cost of ownership was admittedly pretty darn seductive. It’s difficult to forget or fake a credential if you were born with it.
Is IP Reluctance Repeating Itself?
Remember when IP video walked into the prom in 1996 without a date? This was the nerd that no popular girl would be caught dead dancing with or take on a drive-in movie date. But IP video grew up into a very handsome and successful movie star. So why can’t biometric access control blossom too?
At ISC West this year I was fortunate to moderate a gifted panel of leaders in the security industry as part of PSA Security’s educational track. The panelists included Eric Yunag of Dakota Security, Scott Ranger of Contava and Scott Lord of All Systems. We explored the “Top 10 Lessons Learned” implementing IP-centric solutions, and I posed the following questions:
1. What was the biggest challenge your company faced as you began to enter the world of IP-centric security solutions; how did you handle it and what advice would you give to our audience?
2. What was the biggest challenge your company faced in your strategic planning to enter the network-centric market?
3. What was the biggest challenge your company faced in your tactical planning as you entered the world of IP-centric security solutions?
4. What was the biggest challenge your company faced as you had to make decisions selecting IP-centric partners that would help you implement your strategic and tactical plans?
5. What was the biggest challenge your company faced as you worked with managing your customers’ expectations to migrate technologies away from legacy toward IP-centric solutions?
Security Is Our Business, Too
For professionals who recommend, buy and install all types of electronic security equipment, a free subscription to Security Sales & Integration is like having a consultant on call. You’ll find an ideal balance of technology and business coverage, with installation tips and techniques for products and updates on how to add sales to your bottom line.
A free subscription to the #1 resource for the residential and commercial security industry will prove to be invaluable. Subscribe today!
Recommended For You
Cloud security can present a paradox: companies love the flexibility and versatility of cloud security management, but are unsure if the cloud itself is secure enough to house their vitally important systems.
From processing power to lens selection to proper positioning, here are 13 tips to help shed light on proper installation of cameras in low-light conditions.