Biometric technology has become an integral part of many of the access control, security, asset protection and risk management systems. The benefits are significant, not just in terms of security, but for enablement of related business processes, like time an attendance, says KOBUS LE ROUX of Jasco Security Solutions.
Failure of any component in the biometrics system can compromise the security of assets, operations, the safety of personnel and the accuracy of reporting systems. The risk to business, and its bottom line, can be considerable over time.
There are two key considerations. Accurate setup and configuration of the hardware, software and network components are very important, but you can’t ‚”set and forget‚”. Similarly, once the physical components are installed and integrated, a ‚”break-fix‚” approach to ensuring the system is functioning optimally is not acceptable if the risk profile that these systems facilitate is to be maintained.
Setup and clean up
Successful setup of a biometrics system hinges first and foremost on accurate registration of unique identifiers e.g., fingerprint or iris scans that are entered into a database. If the registration process is faulty, the system will deliver false positives or erratically deny access. Administration of the database also needs to be meticulous much like other access control technologies, if someone leaves the company or their status changes, the database must be updated and ‚’cleaned’. This is crucial as biometrics databases usually have a limit to the number of registrations they can efficiently process. Exceed this and the system slows down, stalls and begins to fail, affecting operational and productivity efficiencies and increasing risk.
Wear and tear also has an impact, even if your readers have the toughest (IP66 ruggedised) rating. To put use of biometrics systems into perspective, consider that a larger corporate building may see 3000 to 4000 transactions per day and a large mining operation may see hundreds of transactions over a single shift change.
All the physical components that make up the system need to be regularly assessed for mechanical or other failure. If the biometrics reader gets grimy or is damaged — through use or exposure to harsh environments or the elements (rain, dust, heat) it can literally collapse the entire system. Biometrics secured access is also of little use if the door granting access has faulty locking units. In addition, network access and reliability, including quality of service, need to be regularly reviewed to ensure the biometrics system and all the processes it enables (access, time and attendance) can operate and respond efficiently.
Maintenance optimises performance
Regular maintenance every three months or as often as use demands could eliminate these challenges and extend the life of the system. To also optimise the performance of the system it is crucial, however, to appoint a service provider with the appropriate technical skills and insight.
The ideal partner for such maintenance is a company that understands, and has broad experience of installation and management of biometric technology and related systems access control, CCTV, alarms, etc — across a variety of industries (corporate, manufacturing, mining, transport, public sector) and technology platforms. This partner should have a track record and qualified staff and most of all be flexible to attend to your specific maintenance needs.
A maintenance agreement of this sort should include doing the necessary diagnostics on all systems, critically assessing the network, the database, environmental factors, and the impact of other devices on the biometrics and related systems. The service provider should also be able to proactively address or make provision for changes in organisational processes, infrastructure and personnel. Identified challenges would need to then be addressed in a way that improves overall performance.
As technology becomes increasingly part of physical operations, it’s easy to overlook the fact both technology and physical maintenance is needed and that service providers offering such maintenance need to have both skills. Maintenance to biometrics systems is becoming non-negotiable as companies increasingly come to understand how this can impact mission critical processes and affect the effective and efficient operations of extended systems. Don’t get caught short.
Prepare for Wi-Fi 6
From traffic to healthcare, the applications of the new Wi-Fi 6 standard are set to transform how we connect.
20 years ago, with the release of 802.11b, Wi-Fi began its conquest of the world networking scene in earnest. Wi-Fi can easily be called out as one of the most popular technologies of the last two decades. Just as mobile telephony and mobile internet, it has become a part of everyday life. And with the advent of IoT and the introduction of 5G, the time has come for the new standard – Wi-Fi 6.
Beyond being significantly faster than the previous generation, Wi-Fi 6 delivers up to four times greater capacity. Latency is vastly improved, allowing for near real-time use cases. Wi-Fi 6 is also easier on connected devices’ batteries.
So what impact will Wi-Fi 6 have on business in the coming years?
Digitisation, mobility and IoT are driving the need for connectivity. By 2022, more IP traffic will cross global networks than in all prior ‘internet years’ combined up to the end of 2016. In other words, more traffic will be created in 2022 than in the 32 years since the internet started. In 3 years, 28 billion devices will be connected to the Internet, many of which (robots, production lines, medical devices) will communicate over a wireless network. Against this background, it is easy to understand why we need a redesigned wireless standard that is more responsive to present and future challenges.
Wi-Fi 6: The business impact
“In the first phase, we expect the new wireless standard to gain a significant foothold in the B2B field, where it brings important innovations,” said Garsen Naidu, Country Manager, Cisco South Africa. “We will see it, together with other technologies, penetrate significantly into manufacturing, into the logistics industry. The technology is also more effective in high-density settings like large lecture halls, stadiums and conference rooms, so we are likely to see significant penetration in these settings too. And, with its extremely low latency, Wi-Fi 6 also promises to open up new opportunities in AR/VR, healthcare, and self-driving vehicles. ”
Ever since the launch of the Internet, every leap in network speed has had a major impact on technological innovation: 4G has brought along the age of smartphones, whilst 5G and Wi-Fi 6 will transform the business world. According to Cisco experts, these two technologies – 5G and Wi-Fi – will be widely adopted at the same time, complementing each other.
A short history of Wi-Fi
In 1999, half a dozen technology companies, including Aironet, which was later acquired by Cisco, formed the Wireless Ethernet Compatibility Alliance. The standard announced that year, 802.11b, which gained significant commercial traction, was the first to emerge under the ‘Wi-Fi’ brand. As such, 1999 marks the year in which Wi-Fi really began.
Solutions that carry the official Wi-Fi logo work consistently with the IEEE 802.11 data transfer standard. These solutions are certified by the Wi-Fi Alliance, which guarantees compatibility between various wireless devices. In addition, networking manufacturers have done a lot to improve compatibility. Launched as early as 2002, Cisco Compatible eXtensions is a free licensing program that has enabled other vendors’ Wi-Fi products to be securely deployed on Cisco wireless networks.
Subsequent developments in Wi-Fi technology included managing interference and increasing data stability. Cisco is supporting these with the Cisco Flexible Radio Assignment and Cisco CleanAir technologies. The latter is capable of identifying and graphically displaying radio interference, identifying the source of the problem, and directing users to other, less crowded, channels.
Challenges of the present and opportunities for the future
One of the most widespread business applications of wireless technology is office Wi-Fi. Using Wi-Fi, employees can move freely and access the network from anywhere where there is a hotspot. Wi-Fi-based analysis and location services are also becoming increasingly popular. And with the spread of IoT, Wi-Fi is becoming ubiquitous, and is today found everywhere from agricultural fields to production lines.
“We see promising business opportunities and a wide range of new applications. At the same time, with hundreds and thousands of new devices connecting to wireless networks, IT teams are facing increasing complexity. So we need to rethink IT architectures from the ground-up,” added Naidu.
Much of this need to rethink network architectures is driven by the enormous growth in wireless connectivity.
Wi-Fi has driven growth in general IT use, which in turn has led to the need to provide and run bigger and more complex networks with a greater variety of endpoint device types on them. This complexity ‘feedback loop’, driven in no small part by Wi-Fi, requires that new solutions are developed to deal with this complexity.
Cisco has pioneered in this area, using AI, machine learning, and machine reasoning, via products such as Cisco DNA Assurance to eliminate manual troubleshooting and reduce the time spent resolving service issues.
The latest Wi-Fi 6 developments introduced earlier this year make a consistent, efficient and seamless wireless connectivity experience a reality.
Now for hardware-as-a-service
Integrated ICT and Infrastructure provider Vox has entered into an exclusive partnership with Go Rentals to introduce a Hardware-as-a-Service (HaaS) offering, which is aimed at providing local small and medium businesses (SMEs) with quick, affordable, and scalable access to a wide variety of IT infrastructure – as well as the management thereof.
“Despite an increasingly competitive business environment where every rand counts, many business owners are still buying technology-based equipment outright rather than renting it,” says Barry Kemp, Head of Managed IT at Vox. “The problem with this is that the modern device arena has grown in variety and complexity, making it more difficult to manage, and to reduce the overheads of controlling these devices.”
According to Kemp, there is a global trend being observed in businesses moving away from owning and managing IT infrastructure. This started with the move away from servers and toward cloud-based subscription services, and now organisations are looking to do the same with the remaining on-premise hardware – employees’ desktop systems.
The availability of HaaS changes the way in which local businesses consume IT, by allowing them to direct valuable capital expenditure toward the more efficient and competitive operation of their organisation, rather than spending on hardware products.
“The rental costs are up to 50% lower than if they buy these products through traditional asset financing methods. Furthermore, using HaaS gives businesses the ability to scale up and down depending on their infrastructure requirements. Customers on a 12 month contract can return up to 10% of the devices rented, while those customers on 24 and 36 month contracts can return up to 20% of the devices – at any time during the contract,” adds Kemp.
More than just a rental
HaaS gives business access to repurposed Tier 1 hardware from vendors such as Dell, HP and Lenovo, equipped with the required specifications (processor, memory, and storage), and come installed with the latest Microsoft Windows operating system, unless an older version is specifically requested by the customer.
Kemp says: “Where HaaS is different from simply renting IT hardware is that businesses get full asset lifecycle management, such as having all company software pre-installed, flexible refresh cycles and upgrades, support and warranty management and transparent and predictable per user monthly fees.”
The ability to upgrade during the contract period means that businesses can keep pace with the latest in technology without needing to invest on depreciating equipment, while ensuring maximum productivity and efficiency for employees. Returned devices are put through a decommissioning process that ensures anonymity, certified data protection, and environmental compliance.
Businesses further stand to benefit from Vox Care, which incorporates asset management and logistical services for customers. This includes initial delivery and setup in major centres, asset tagging of all rented items, creation, and the repair and/or replacement of faulty machines within three business days – again in the main metropolitan areas.
Vox Care also assists in the design, testing and deployment of custom images, whereby HaaS clients can have the additional programmes they need (security, productivity tools, business software, etc) easily pre-installed along with the Windows operating system, on all their machines.
Kemp says HaaS customers can get further peace of mind by outsourcing the day to day management of their desktop environment to Vox Managed Services, as well as leverage the company’s knowledge and expertise to manage and host workstation backups to ensure business continuity.
Says Kemp: “Hardware-as-a-Service allows businesses to reduce the total cost of ownership of their hardware and ensure they only pay for what they use. Making the switch to a service model helps them take advantage of the global move in this direction, and to turn their business into a highly functional, flexible, low cost, change your mind whenever you want workplace.”