One of the most interesting is the ACTAtek Biometric Access Control System. The ACTAtek system is a standalone...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
biometric lock attached to a door. Unlike either a lock or a biometric device, however, it's also a computer, complete with built-in software. The device can be connected to a network with a standard Ethernet cable. Since it's actually a small computer, it doesn't require any additional hardware or software for operation.
Once hooked up to the network, the ACTAtek device can be controlled from a browser, either at a desktop inside the locked office or anywhere across the Web. The Web interface uses SSL encryption and allows for management of individual biometric data, including access logs and access level settings.
One thing to keep in mind -- since the management console can be accessed via the Web, you'll have to harden the server connected to the lock. The last thing you need is for someone to find the Web console through Google and then hack it, as has been done with online video surveillance cameras.
Two other products of note are the NAC-3000 Fingerprint Access Controller from Raviraj Technologies and the Adel Fingerprint Lock. The NAC-3000 can also be connected to a network but, unlike ACTAtek, can only be connected to LAN and not the Web. Its Access Manager software handles up to 255 devices per server. The Adel product can also be used as a standalone or on a network, but it doesn't have the remote access and control features of the other systems.
For more information:
Dig Deeper on Biometric Technology
Related Q&A from Joel Dubin
After a server room door has been compromised, finding a more secure solution is of utmost importance. Learn how to choose a server room door that ...continue reading
In the IAM world, what's the difference between access control and identity management. This IAM expert response explains how the two relate as well ...continue reading
When working with PeopleSoft and Unix, which single sign-on (SSO) vendors offer the most effective products? Learn how to choose an SSO product in ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.