Quick guide

Security fit and planning priorities

Use this guide to compare security options, site constraints and deployment priorities before requesting a site assessment.

Where Face ID may fit

  • Office and controlled-entry environments
  • Sites prioritising identity-led access flow
  • Projects wanting a more streamlined user experience

Planning considerations

  • Entry-point layout and user approach path
  • User enrolment and permission management
  • How the system fits into the broader access-control strategy

How to decide

  • Review whether identity-led access really solves the site need
  • Check the day-to-day user workflow before deciding
  • Plan with door hardware, permissions and operations in mind

Service-fit guidance

Use this guide to plan service scope around real site conditions

  • Use this page to understand fit, use case and planning factors
  • Avoid treating a specialised page as a universal recommendation
  • Book a scope discussion once the site workflow and infrastructure conditions are clear

FAQ

Frequently asked questions

Need security scope advice?

Discuss security scope for your site requirements

Share your site details to get security-focused recommendations, practical implementation advice and a clear quotation path.