Suppliers of CPNI Assured Biometric Access Control Readers

Suppliers of CPNI Assured Biometric Access Control Readers

Here at ievo, we are suppliers of CPNI assured biometric systems. What does this mean? Well, it means that our ievo Ultimate readers are assured by the Centre for the Protection of National Infrastructure to deliver vastly improved door security levels and give you full access control over any area or over any system.

What is the CPNI?

The CPNI is accountable to the Director General of MI5 and work with key, official partners that are the best in the business to identify risks to, and reduce the vulnerability of the national infrastructure, but focus particularly on critical national infrastructure (CNI).


These partnerships span both Government departments, academic institutions, the police, businesses and other security specialists and advice delivery partners.


Ultimately, the role of the CPNI is to protect national security by making national infrastructure to reduce the risk of security threats.

What is CPNI Certification?

The ievo Ultimate™ range of biometric readers have been assured by the CPNI. This means that our ultimate fingerprint readers are compliant with CPNI security standards and are approved by the CPNI to be installed and used throughout key Government buildings.

Storage of biometric data (data security) – why is CPNI Certification Important?


The security of biometric data has never been more important. With some biometric readers, each user’s data is stored in a server, cloud or database and is re-called by the device when a user requests access to an area in order to verify their identity. The storage of this fingerprint data comes with a high risk, as it means that it is possible for all fingerprints registered on the system to be hacked, and the data stolen by criminal or unauthorised sources.

The CPNI recognises this risk. Unlike these devices, ievo devices never store a user’s fingerprint. Instead, the fingerprint of each user is coded into an algorithm. This means no user’s data is at risk of being taken from the reader.



Vulnerabilities of alternative access restriction systems


If you’re measuring up the pros and cons of alternative access restriction systems, such as facial recognition or more basic fingerprint readers, then we have listed some potential security limitations that can come with other systems:

Facial recognition:

Can take longer to grant access, resulting in lost time

Unsophisticated systems may be able to be tricked with masks and prosthetics

Can not always accurately distinguish between identical twins

Very unsophisticated systems can be manipulated using pictures and photographs

Fingerprint scanners:

Some scanners will not work if the reader is impaired (such as by dust / debris on the finger) - ievo readers can correctly read a fingerprint through levels of dust, debris and sweat

Some scanners store fingerprint data, leaving it at risk of hack - ievo readers store fingerprints as algorithms which cannot be recalled and leaves all data safe

Not all scanners can vary access levels - ievo readers can work with certain access control systems to limit access by each individual staff member, or groups of staff members. If your access control system allows, then access can be limited by certain criteria. For example, some access control systems enable ievo readers to grant and deny access depending on name, job title, or team designation. When using a sophisticated access control system, access may also be limited by working hours and can easily be amended when staff leave or are promoted - making security risks from disgruntled ex-employees a thing of the past. One of our experts will be able to advise you on the capabilities of your current or preferred access control system.

Unsophisticated readers can be tricked by fingerprint moulds and other trickory - ievo readers come with the optional function of liveness detection, so it instinctively knows whether the fingerprint used is that of the correct living human.

ievo systems have the capability and sophistication to counteract these vulnerabilities. Get in touch with us for more information about how biometric technology can enhance your business’s security.

Contact Us

Customise levels of access


ievo readers can integrate with a wide range of very sophisticated access control systems and some of these systems will allow you to customise levels of access. This works as each ievo reader is able to ‘talk’ to your access control system of choice and will limit access levels according to the rules set up within your main system. If your access control system allows, then this means that only the authorised people will be granted access to specific areas where others may be prohibited, and at the right times too. Access has the potential to be fully-customised in the following ways (you can select a combination of the below for added peace of mind, and these limitations can be made specific to each reader):

By job role

By department

By working hours / days / weeks / months (or limited hours)

By employee ‘type’ – e.g. zero-hours contract workers

By seniority / status / responsibilities

The extensive ability to customise access to areas based on a whole host of criteria means that your areas have never been safer, so choosing the right access control system to work alongside your ievo readers is a must. Better still, a sophisticated system will allow access criteria to be easily and instantly adjusted if and when needed. This means if you decide that an individual or team’s access needs to be restricted, then this can be done without hesitation. Get in touch with a member of our team to find out more about the capabilities of your access control system with our ievo readers.




Want to know more? Simply read one of our many case studies to find out how ievo readers have improved the security of our customers.

Find out how we can help
- Enter Your Location -
- or -