Biometrics Usage Statistics 2019

By: Dan Gelinas, Published on Jun 17, 2019

While face and fingerprint recognition are used regularly for smartphones, it is not as common in physical security.

In this note, we examine adoption rates of biometrics and share integrators' feedback on why they do or do not use biometrics in their deployments.

For background, see our Biometrics Pros and Cons For Electronic Access Control report and our Favorite Biometrics 2018.

***** **** *** *********** recognition *** **** ********* for ***********, ** ** not ** ****** ** physical ********.

** **** ****, ** examine ******** ***** ** biometrics *** ***** ***********' feedback ** *** **** do ** ** *** use ********** ** ***** deployments.

*** **********, *** ************* **** *** **** For ********** ****** ************* *** *********** ********** ****.

[***************]

Biometrics ***** **********

***** ** ********** *********, we ******** **** ******* 3% ** *** ***** are ***** **********:

*** ********* ***** ***** more **** */**** ** integrators ****** ***** *** biometrics:

Most *** ***** *** ** ****, ** ******

**% ** *********** **** they *** **** ********** on ***** **** **% of *** ***** ** the **** ****. ******* cited ****** **** **** of ***********, *********** ****, privacy ******** (**** *** citing *** ****)/ **** suspicion, *** **** ***** lack ** ****** **** customers, ***** **** ******** high-security ************* ** **** below:

  • "* **** ***** **********, cause **** ********** *** always ******** ** *******. It's **** **** ** convince *** ********* **** taking *** *********** **** won't ***** *** ******. Also, **** **** ** not ********* ** * low ** *** ****** which **** ****** **** harder. **** **** **** Vein ****** ***** ** another **** ** ********** where ***** ** ** taking ** *** ******** print ** *** **** its **** ** ******** the *********. ********* *** cards, **** ** *********** of *****."
  • "**% ** *** ********* have ******* **** **** of ********** ** * multi-factor ************* ********. ** deal **** ******-*** ******* and **** ** ***** the ******** *** ********. Typical ******* *** *** spending *** ***** ** deploy **** ***** ** security."
  • "**** ***, *** **** rules ***** ****** ** use **********."
  • "*. ** **** ** our ********. ** *** currently ******* ** * design ***** **** ********* this, *** ** ***** like **** **** **** the *********** ******* ***** they *** *** ********** cost ** ***** ****** Alarm.com."
  • "*% * **** ** IMS ***** ** ***** ago **** **** *** a **** ****. * was *****. ****** ** value *** **** ******* performance, **** ****, **** entry *** ****** **** risks **** *** *** be ********** ** ********. No ********** *** ******** so ******** ** *********** by ********* ** **** how ****** *** **** is."
  • "*%. *********** *** ****."
  • "****. *****, **** ** my ***** *** *** sites **** ******* ********* identification *** ******."
  • "*% ** ********* ** CLIENTS."
  • "*% *** ** ******* for **."
  • "* - ** **** seen * ******* ******* in ********** ******** **** our *******."
  • "**%, ** **** *** security ** ********** *** it ****** ***** **** to **** *** ** here ** *** *******."
  • "**** **** *% ** will ***** *** ***** on ****** ***** ******** doors **** ******** ** armory ***** **** ******* labs ** ******* *****. I'm ******* ******* ** facial *** *** ************ system *** **. ***** like ** *** **** happen. **** ** ** a **** *** ******* your *********** *** **** have *** ****** ****** the ****** *********** *******. So *** * *** promise ** *********, *********** and ***** **** ********."
  • "**% ** ******* ****** to ********* *****: ********, data *******, ******* ** chemical ********** ** ****-***** deposits."
  • "**** - * **** been ****** ** **** reliable ********* ******* ** any **** **** *** within *** ****** ** my *********."
  • "****. ****."
  • "**%. ** *** **** on ***** **** ******* double **************. ***** *****, IT *****, ***** *****."
  • "**% **** ** ********** areas."
  • "typically ********."
  • "****. *** *** **** needed ** ********* *** customers ** **********."
  • "*% - **** ****, heavy ** ******, ***** from **** *******, *** many *** ***** ** see."
  • "**% *** * ******* most *** ******* ** pay ***."
  • "**** **** *%, **** used *** ********* *** very ****-******** ***** ** customers **** **** **** to **** ***** *** office ****."
  • "*%. ** **** **** not **** *** ****** to ******* *** ****."
  • "**** **** ***. *** perception ** **** ** is ***** * ******* form ** ***** *** not ** **** ** presenting * ****."
  • "*%-*** *********** **** *** quality ** ******** ********** and ****."

Usage ** ****** ** ****-******** *** ********** *****-***** *****

*** *** **% ** integrators *** *** ***** biometrics ******* **** **% of *** ****, ****** themes *** *** ******** a ********** *****, ********** in *****-***** ***********, *** in ******** ****-******** *****, speed *** ************, *** pricing ******** **** ***********, as **** *****:

  • "**% - ** *** heavily ******** **** *** residential ****** ******* ******* and ********** ** * becoming * *****. ******** with ****** *********** ******** two *** ***** ** gaining ****** **** ********* seem ** ****."
  • "**% ** *** ********** Access ******* ******, ** the ****** *** **** biometrics ****** ***** ** less, ** ** ****** mostly ******** ** ** with ********* ****** ****** instead ** * ****. so *** ****** *** avoid ****** ********** *****."
  • "~**%. ** **** ******* biometric ******* ** ****-******** locations. **** ** *** systems ** ****** **** at ***** *** ****** room."
  • "**%. **** ***** *** biometrics *** ********* ***** like ****** *****."
  • "** **********, ****** ** percent ** **** ** install, ********* *** ********** access. **** ** * market *****."
  • "**% - ****** *** customer **** *** ********** with ****** *********** ****** now."
  • "**%, *** * ***** which ** **** ******."
  • "**% ** *** ********** mainly ** ***** *** bonded *****, ********* ******* are ********** ****** **********."

Comments (6)

*'* * ********* **********, and * ***** ****** putting ** ****** ** a ****** *********** ** palm ******. *** ***, there *** **** ** get ******* *** *** without ********** ******** ****** you ***'* **** **.

** *****'* ****** **** people, * *** **. But * ***** *'* alone ** **** ***.

** *** **** ***** putting **** **** ** the **** ****** ** you ***** *****. * guess ***** *** ** many ***** ** **** as ***** *** ** the *********** ******.....

***** *** *********** *********** options, *** **** *** much **** ********* **** the ******* *******.

******, **** ******** ** the "** **" **** by ********* ** *********** readers. ** ***** **** touching, ******** *** ******* public ****** ****** *** be * *******.

*'* *** *****, ****** to ** ** *******. And *** **** * have ** *****, *** less * **** ** worry *****, *** *** longer ** **** ********* lasts...

*** ***** **** ***** to ****** *** ************.*********.********* *********** *******? * have ******** *** * client ******* **** *******. I ********* *** **** from *** *** ********** and ******** ***** **** have * ****** ***** record, *** **** ******* looks ***********. * ***** appreciate ** ******** "**** the *****" ****** ** you ****. *** ***** I ***** **** ** understand ** *** ***** accept *** ***** ****** rates.

**'** *** * ****** of ******** ** **** Stone ****. *'** ******* internally *****, *** *** upcoming ***** ** ********** testing (**** ****) **** likely ******* ***.

**** **** ****, ***** Stone **** ***** ** most *********** ** *******? The '***' ** '**'?

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

How To Troubleshoot Wiegand Reader Problems - Inverted Wiring on Jul 16, 2019
Wiegand is the dominant method of connecting access readers, but problems can arise for installers. In fact, one of the most difficult reader...
Nortek Blue Pass Mobile Access Reader Tested on Jul 11, 2019
Nortek claims BluePass mobile readers are a 'more secure and easy to use approach to access', but our testing uncovered security problems and...
Poor OSDP Usage Statistics 2019 on Jul 09, 2019
OSDP certainly offers advantages over decades-old Wiegand (see our OSDP Access Control Guide) but new IPVM statistics show that usage of OSDP, even...
First Video Surveillance GDPR Fine In France on Jul 08, 2019
The French government has imposed a sizeable fine on a small business for violating the GDPR after it constantly filmed employees without informing...
RaySharp Revealed - Major China OEM For Western Consumer Video Surveillance on Jul 02, 2019
RaySharp is mostly unknown, even among people in the video surveillance industry, though it is a major supplier of OEM surveillance equipment such...
Maglocks Usage Statistics 2019 on Jul 01, 2019
Maglocks divide access control specifiers perhaps more than any other component. Many are concerned about life safety codes, but others cite...
GDPR / ICO Complaint Filed Against Dahua on Jun 27, 2019
IPVM has filed a GDPR complaint against Dahua UK's facial recognition conducted at their booth during this year's IFSEC show.  In this post, we...
Axis Live Privacy Shield Analytics Tested on Jun 25, 2019
Privacy is becoming a bigger factor in video surveillance, driven both by increased public awareness and by GDPR. Now, Axis has released Live...
Directory of 59 Video Surveillance Startups on Jun 25, 2019
This directory provides a list of video surveillance startups to help you see and research what companies are new or not yet broadly known. 2019...
HID Mobile Tested on Jun 21, 2019
HID Global is one of the largest access brands, but their mobile access has had challenges. Indeed, the company has already restructured their...

Most Recent Industry Reports

Mobile Access Usage Statistics 2019 on Jul 18, 2019
The ability to use mobile phones as access credentials is one of the biggest trends in a market that historically has been slow in adopting new...
New GDPR Guidelines for Video Surveillance Examined on Jul 18, 2019
The highest-level EU data protection authority has issued a new series of provisional video surveillance guidelines. While GDPR has been in...
Anyvision Aims For 2022 Revenue of $1 Billion on Jul 17, 2019
Only 3 video surveillance manufacturers do a billion dollars or more in annual revenue - Hikvision, Dahua, and Axis. Now, Anyvision plans to join...
HD Analog vs IP Guide on Jul 16, 2019
For years, HD resolution and single cable signal/power were IP camera advantages, with analog cameras limited to much lower resolution and...
How To Troubleshoot Wiegand Reader Problems - Inverted Wiring on Jul 16, 2019
Wiegand is the dominant method of connecting access readers, but problems can arise for installers. In fact, one of the most difficult reader...
ZeroEyes Gun Detection Startup on Jul 16, 2019
A gun detection video analytics startup, ZeroEyes, is being led by a group of 6 former Navy SEALs, aiming to "save lives" by using AI to assist...
Motorola Acquires Watchguard, Adds to Vigilant And Avigilon on Jul 15, 2019
2 years ago, Motorola had no position nor relevancy to video surveillance. Now, they own major video surveillance, LPR and body camera providers...
Hikvision Global News Reports Directory on Jul 15, 2019
Hikvision has received the most global news reporting of any video surveillance company, ever, ranging from the WSJ, the Financial Times, Reuters,...
Vivotek Trend Micro Cyber Security Camera App Tested on Jul 15, 2019
Vivotek and Trend Micro are claiming five million blocked attacks on IP cameras, with their jointly developed app for Vivotek cameras. This new...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact