IT Brief New Zealand logo
Technology news for New Zealand's largest enterprises
Story image

Biometrics: the time is now

By Contributor
Fri 1 Oct 2010
FYI, this story is more than a year old

Biometrics, the science of identifying people by physical or behavioural characteristics, has been a successful technology in criminal justice for decades. It has increasingly become commonplace when travelling and even in interactions with many civil government organisations.

The use of biometrics in the enterprise has been much slower in coming, but recently the investment case has begun to swing in favour of commercial deployments in both staff and customer facing systems.

The drivers for biometric deployments are fairly universal: the increasing need for improved security and data protection compliance, coupled with a desire to reduce costs through automation.

Securing the least secure channel

The financial services industry has significantly strengthened the internet and physical channels through programmes such as Verified by Visa and Chip and PIN. This has left the voice channel as a significant, poorly protected target; the first figures collated on phone banking fraud by the UK Cards Association measured this at £12.10 in the UK in 2009. Current call centre processes are also expensive as caller authentication can take up to four minutes, at an average cost to the organisation of $1 per minute. Given the volume of calls, the cost of telephone identity authentication is projected to be over $500m in Australia alone, according to Dr Clive Summerfield, CEO of Auraya Systems.

Speaker recognition technology is now in a position to reduce this burden, leveraging the significant investment that companies have made in Interactive Voice Response systems.

Many private sector and government organisations are adopting voice biometrics in order to reduce call centre costs and improve customer service, with a number of Australian banks in the process of purchasing systems. Speaker authentication can secure the voice channel against social engineering attacks, which are becoming more prevalent with the commoditisation of personal information, thanks to social networking. This authentication is typically carried out on-shore, prior to a call being transferred to an off-shore contact centre, preventing sensitive authentication data being passed overseas and improving compliance with privacy regulations. For additional convenience and security, customers’ ‘personal information’ questions can be recorded by the customer and spoken in any language – this is especially valuable for multilingual contact centres or where businesses have overseas customers.

Social acceptability of the technology appears to be high, most likely due to the familiarity with IVR systems which resemble speaker recognition systems in customer interaction. An early adopter of biometrics, to improve authentication security, was Centrelink, an agency of the Australian Federal Government, which delivers a wide range of payments and services, including crisis referrals and disaster response services

The Centrelink solution has allowed it to not only strengthen identity authentication and enhance privacy compliance in its call centres, but also to automate a number of routine transactions and provide these on a 24/7 service to applications which would previously have needed agent assistance. These include such transactions as ‘change of address’ which, whilst relatively easy to automate (using speech recognition), could not be deployed because there was no way to adequately authenticate caller identity.

With voice biometrics, however, caller identity is assured and as a consequence such applications can be safely deployed, not only enhancing service levels, but also increasing the efficiency of the contact centre.

Reducing losses through employee fraud

The problem of payroll fraud is endemic in many businesses with large casual workforces, particularly in construction and heavy industries.

Figures from the UK construction industry suggest that fraudulent claims (including buddy punching and ghost working) can comprise up to 6% of wage bills. In this context, biometrics provides a method for securely combining time and attendance monitoring with physical access control.

Prevalent technologies being used are facial recognition, hand geometry and vein recognition (such as PalmSecure® or finger vein).

Enrolment of employees typically occurs during the usual HR joining process; this strongly binds a single person with their employment record and presented documents. In day-to-day operation employees will identify themselves via the biometric solution, preventing employee substitution and automating the collection of accurate time and attendance information.

Whilst countering employee payroll fraud is the principal driver in the deployment of these systems, adopters tend to also benefit in other areas. Firstly, legislative compliance is significantly improved; including ensuring all persons on site have auditable right to work checks, have been through site training and induction, and that necessary qualifications have been checked and linked to the individual.

Secondly, site security tends to be improved through the deployment of linked time and attendance and physical access control, this is principally because of the inability for access cards to be lost or lent to others, improving compliance in terms of site access. Other sectors such as healthcare and education are likely to adopt similar solutions in the medium term to ensure awareness of those entering or leaving site for safety reasons.

Reducing the cost of password management: two approaches

Managing user passwords is an expensive business. In large enterprises, password resets average at 1.5 calls per user, per year, or 30% of helpdesk calls. Case studies put the cost for some companies as high as $600,000 per year, plus the cost of lost productivity for the affected employees. Two schools of thought have arisen to combat this problem: automate the reset process or do away with passwords altogether.

Many enterprises have attempted to automated password resets through self help portals, either accessed from the login screen, or via standalone terminals in offices. However, portals are designed primarily for fixed office environment and are ill suited to the growing groups of largely mobile workers. User acceptance of portals is also problematic, as many users will, by default, use the current help desk number if it remains available. In this context, voice biometrics provide a clear opportunity for enterprises to augment their existing help desk systems in a manner that remains intuitive for users and diverts unnecessary help desk calls. Typically the system changes needed to the existing infrastructure are small and the speaker recognition components compare favourably in price to other biometric implementations. Pricing options include per enrolee, or per call charging, allowing customers to ensure payment is by results.

The other option is to integrate biometrics directly with an enterprise class identity and access management tool, deploying biometric readers direct to the user’s desktop.

A wide range of biometrics are supported by products such as IBM’s Tivoli suite, most commonly deployed are fingerprint and vein because of their size and ease of deployment in a typical office setup. Using biometrics for logical access control is particularly suited to enterprises with a traditional desktop based infrastructure where there is less need to accommodate mobile users or those with specialist desktop arrangements.

Early adopters of biometric logical access control have been contact centres, financial services and healthcare providers. These organisations need to be able to demonstrate much more explicitly their compliance with access to records and have had a history of problems with password sharing between temporary or casual employees. It is likely that the next group of adopters are likely to be other regulated industries or government agencies, where clear adherence to data protection principals is vital.

Identity in the cloud

As more enterprises offer and consume cloud or cloud-like services, there arises both risk and opportunity in the use of ‘identity’. On the risk side, in the cloud it becomes increasingly difficult to establish a distinct identity for consumers of services and prompts a rethink of how access to services is controlled. A number of providers are developing solutions to this quandary by enhancing their enterprise identity management tools to include biometrics. This will expand in the coming years to incorporate more tools for biometric authentication in mobile devices, to provide the same assurance on the move as in the office.

The advantage of identity services in the cloud is that it lowers the cost of deployment for those enterprises wishing to add biometrics into their IT environment. Companies such as VoiceVault already make their services available in an on-demand manner via web services and it is likely other vendors will follow suit.

It is likely that biometric based identity and access management solutions will form part of the offerings for Desktop as a Service (DaaS) offerings from major providers, again providing economies of scale for consumers of outsourced IT services.

Commercial biometrics: the time's now

Biometric technologies have now reached a stage where they are mature and widely deployed across the public sector. This has led to much greater public exposure to and acceptance of these technologies. With increasing pressure on commercial organisations to better manage their customers’ and employees’ identities whilst also driving out cost, biometrics have likely come of age for commercial organisations as well.

The early adopters of these technologies are financial services for voice biometrics and biometric logical access control, and the construction industry for biometric based time and attendance systems. The return on investment in these industries is often shorter than one year; however, other organisations are also likely to see significant returns in the short to medium term.

Related stories
Top stories
Story image
IDC
High level of Customer Identity & Access Management adoption
The study from Okta revealed that the pandemic has either accelerated or highlighted the need for digital-first strategies.
Story image
Application Performance Monitoring / APM
New Relic integrates offering with Atlassian’s Jira Software
New Relic has integrated errors inbox with Jira Software to allow developers to easily access and set up complete stack error tracking and software performance monitoring from within the tool.
Story image
Privileged Access Management / PAM
The importance of stopping identity sprawl for cybersecurity
The 2021 Data Breach Investigations Report (DBIR) shows that 61% of all breaches involve malicious actors gaining unauthorised, privileged access to data by using a compromised credential. Unfortunately, it is often too late when the misuse of a credential is detected.
Story image
Ingram Micro
Ingram Micro NZ sees $74 million revenue growth in 2021
Ingram Micro New Zealand's latest financial report reveals that its revenue from contracts with customers increased by almost $74 million in 2021.
Story image
Data Protection
VMware introduces advanced workload protection for AWS
VMware Carbon Black Workload for AWS delivers comprehensive visibility and security across on-premises and cloud environments for AWS customers.
Story image
SaaS
AvePoint rebrands SaaS learning product to MaivenPoint
"Our mission with MaivenPoint is to make your learning experience limitless and inspire everyone to achieve their aspirations."
Story image
Storage
DCI Data Centers breaks ground on AKL02 center
DCI Data Centers has commenced construction on Auckland's largest data center.
Story image
Inde
Exclusive: Inde provides innovative solutions across the tech sector
Inde likes to call its approach the 'power of the collective', which essentially means that if a client approaches the company with a problem, they'll get the team's collective insight to help drive the best outcome.
Story image
Data
Talend announces support for Amazon Redshift Serverless
Talend has announced its support for Amazon Redshift Serverless, with the company saying the integration reinforces its commitment and leadership in supporting businesses.
Story image
Financial results
Jade Software’s plan to get back to surplus in 2022
Jade Software has released its latest financial report, revealing that the company has kept its loss low from $567,000 in FY 2020 to just $153,000 in FY 2021.
Story image
Google Cloud
Google Cloud to open first cloud region in NZ - among others
Google Cloud has announced plans to bring three new cloud regions, one each in New Zealand, Malaysia and Thailand.
Story image
LG Electronics
LG Electronics’ revenue in NZ grows by 57% in FY 2021
The New Zealand branch of LG Electronics Australia's total revenue shot up by nearly NZD $45 million reaching a total of $123.7 million for FY 2021.
AWS Marketplace
See how managed security services (MSS) have evolved to Managed Detection and Response (MDR) and Extended Detection and Response (XDR). Learn how these new holistic solutions can simplify security management and improve your threat detection and response.
Link image
Story image
Tech job moves
Tech job moves - Cohesity, Equinix, IDC, Proofpoint & Xero
We round up all job appointments from July 29 - August 5, 2022, in one place to keep you updated with the latest from across the tech industries.
Story image
Charity
SnapLogic teams up with meetmagic for charity and children
SnapLogic has announced its partnership with meetmagic, an online Australian platform that combines business and philanthropy.
Story image
Malware
Avast One extends protection with Online Safety Score
Avast One has extended its cross-platform support by adding its Online Safety Score feature to both the Mac and iOS platforms of Avast One.
Story image
Hybrid Cloud
The essential guide to digital transformation by SolarWinds
Digital transformation is a buzzword thrown around all the time by companies, but what does it actually mean and why is it important? SolarWinds breaks it down.
Story image
Neat
Workplace design a crucial factor for better employee experience - report
The key to a successful workplace could be its design, according to research from Ecosystm and Neat.
Story image
Artificial Intelligence
Exclusive: NZ-based DEFEND offers global cyber protection
DEFEND supports customers in 66 countries across the globe with a relentless focus on ensuring that every dollar spent on security provides a meaningful return on investment and reduces cyber risk.
Story image
Microsoft
Spectralink DECT devices now integrated with Microsoft Teams SIP Gateway
Spectralink DECT devices are now integrated with Microsoft Teams SIP Gateway to help create better results for business-critical frontline workers.
Story image
New Zealand
2degrees announces appointments to newly established board
2degrees has announced Liz Coutts as the board chair, while Russell Stanners and Kathy Meads join her as directors.
Story image
APAC
Automation to take over 63 million jobs in APAC by 2040 - report
Forrester forecasts that working populations in the five largest economies in APAC are more at risk of physical robot automation than in Europe and North America.
Story image
Data analytics
Data analytics a struggle for A/NZ healthcare organisations
A study by InterSystems has found that most Australian and New Zealand healthcare organisations struggle to use data analytics to support their business objectives.
Story image
Cybersecurity
Datacom research explores reality of zero trust in A/NZ
Zero trust is fast emerging as global best practice in cybersecurity and local leaders are on board, with 83% considering it essential to security.
Story image
Digital Transformation
Adobe and FC Bayern collaborate on a multi-year partnership
Adobe is embarking on a multi-year partnership with FC Bayern, using its enterprise solutions to carry out the club’s digital transformation.
Story image
Sustainability
NZ program recovers and recycles more than 177 tonnes of e-waste
The TechCollect NZ pilot program says its milestone of recovering and recycling more than 177 tonnes of ICT e-waste recognises the efforts of many.
Story image
Indusface
Why enhancing bot protection for web and API endpoints matters
The trouble with bots is that they aren’t all bad. Unfortunately, this can make it challenging to detect malicious bots that find their way into your system and threaten your business.
Story image
Pure Storage
Pure Storage named leader in GigaOm report for Kubernetes storage
Pure Storage named the leader for the third consecutive year by GigaOm Radar Report for enterprise Kubernetes storage.
Story image
Enterprise Resource Planning / ERP
Why the right ERP (and partner) is crucial to an innovative and successful business
Enterprise Resource Planning (ERP) is a foundational step to ensuring a robust business model; here's why choosing the right one could be vital to ensuring long-term success and innovative results.
Story image
Compliance
Why security needs to shape your journey to the cloud
It's estimated that 80% of workloads could be in the cloud in the next few years. How can you make all that data secure?
Story image
Open source
Flashpoint acquires Echosec Systems, elevates OSINT capabilities
Flashpoint has acquired Echosec Systems, a provider of open-source intelligence and publicly available information.
Story image
10 Minute IT Jams
Video: 10 Minute IT Jams - An update from Heidrick & Struggles
Graham Kittle joins us today to discuss how the company is helping organisations bring about change within their business.
Story image
Gigabit
Keysight Technologies and Nokia’s public test of 800GE success
Keysight and Nokia have successfully demonstrated the first public 800GE test, validating the readiness of next-generation optics for service providers and network operators.
Story image
Healthcare
Why the Metaverse could be the key to enhancing the healthcare sector
The experts at Accenture understand that the programmable world is about building the next version of the physical world in healthcare, understanding complex layers in order to fully utilise technology to its maximum effect.
Story image
SaaS
Claroty launches new cloud-based industrial cybersecurity platform
The company says Claroty xDome is the industry's first solution to deliver the ease and scalability of SaaS without compromising on visibility, protection, and monitoring controls.
Story image
Gartner Magic Quadrant
Gartner positions Commvault as Leader in 2022 Magic Quadrant
Gartner has named Commvault a Leader in its 2022 Gartner Magic Quadrant for Enterprise Backup and Recovery Software Solutions report.
Story image
Red Hat
Red Hat announces 2022 awards winners for A/NZ region
Red Hat recently acknowledged Australia and New Zealand partners with its annual awards, highlighting partners across various categories.
Story image
Dark web
Beware the darkverse and its cyber-physical threats
A darkverse of criminality hidden from law enforcement could quickly evolve to fuel a new industry of metaverse-related cybercrime.
Story image
Cybersecurity
Palo Alto Networks responds to rise in threats with MDR service
Unit 42 Managed Detection and Response is a new service that can offer continuous 24/7 threat detection, investigation and response.
Story image
Document Management
TrustRadius gives M-Files two document management awards
TrustRadius has recognised M-Files with both a 2022 Best Feature Set and a 2022 Best Relationship award in document management.
AWS Marketplace
Learn how security orchestration, automation, and response (SOAR) enhances your security strategy.
Link image