All-mobile people management solution with facial recognition

Issue 4 2022 Editor's Choice, Integrated Solutions, Security Services & Risk Management, Products & Solutions

For years, businesses ranging from security firms, shopping centre management to cleaning services had a major problem – how to efficiently manage the ‘people’ component of services and incidents without a costly ERP or HR system.

The new, all mobile Incident Desk People Management platform with facial recognition by Solution House Software solves this by effortlessly combining identification data on suppliers, staff, sub-contractors and even people on watch lists, for far less than the cost of traditional service management tools.

The problem

Tiaan Janse van Rensburg, commercial director of the Cape Town-based Software-as-a-Service company, says efficient incident and service management relies on complex task and identity management protocols, previously the domain of top-heavy enterprise systems.

“A lot of small and medium companies think they’re doing an OK job of managing these inherently complex and information-intensive activities, and in a way they’re right – throwing people at the problem is marginally better than shelling out on a pricey business system. But in no way is it better than the real thing, if only the real thing wasn’t so expensive.”

Fortunately, Incident Desk’s modular, no-code architecture makes for a far more accessible and easily adaptable solution that can be rolled out quickly, Janse van Rensburg explains. “We saw an opportunity to develop a solution for the small and mid-sized enterprise market, where most of the managers and workers are mobile, and a diverse set of services and incidents are being managed, from ordering uniforms to COVID checks, contractor enrolment, fines and warnings,” he says.

Features and benefits

The Incident Desk People Management mobile solution consists of two modules:

1. Facial recognition-enabled enrolment, used for capturing an individual’s personal file, and

2.Service management, where incidents and service requests can be logged against an individual.

Janse van Rensburg explains the benefits in a range of scenarios.

•A manager can check if an employee has been enrolled in the system simply by taking a photo. Incident Desk People Management will check for a facial match and provide the options to view the personnel file or log a service. (The same goes for people on watch or exception lists.)

•If a match is not found, the manager can enrol the employee following an easy-to-use wizard and completing a questionnaire, which varies depending on the manager’s access rights and the employee’s role.

•Once enrolled, the manager can log incidents or service requests against the individual’s name from a pre-populated list, including a standard operating procedure check list.

•The service request will then be routed to the relevant person or department, depending on the request type and location. The user in question can respond to service requests using the smart phone app, upload documents and photos, and update the status of the request.

Janse van Rensburg says Incident Desk People Management adheres to a strict PoPIA compliancy process with a stored and auditable user policy acceptance, encryption, and restricted and pre-approved data sharing lists.

“Incident Desk People Management presents a complete, flexible, easy-to-use-and-adopt people management solution in the incident and service management space, at an affordable price point. We expect robust uptake across a range of verticals in the SME arena as organisations seek to improve their efficiency at competitive rates.”




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Understanding the Shared Responsibility Model
Infrastructure Security Services & Risk Management
While the cloud can certainly be a growth enabler in many ways, it can also introduce new security risks. Companies want to have a clear understanding of where their security duties end and where their cloud service provider’s begin.

Read more...
Data privacy best practices for physical security teams
Genetec Surveillance Integrated Solutions IoT & Automation
Physical security systems produce large amounts of information from video footage, access control records, and licence plate data. Recommendations assist organisations in safeguarding sensitive data, while ensuring effective security operations.

Read more...
Gallagher Security strengthens KwaZulu-Natal presence
Gallagher News & Events Integrated Solutions
Gallagher Security has reinforced its commitment to the KwaZulu-Natal region with its Command the Future event. The full-day event welcomed over 100 channel partners, end users, and consultants, marking Gallagher’s third major event in Durban.

Read more...
Surveillance & AI roundtable
DeepAlert Lytehouse Refraime SMART Security Solutions Technews Publishing Editor's Choice Surveillance Integrated Solutions AI & Data Analytics
SMART Security Solutions held an online roundtable with a few surveillance experts to explore the intersection of surveillance and AI, gaining insights into the market and how control rooms are evolving.

Read more...
“This Is Theft!” SASA slams Mafoko Security
News & Events Security Services & Risk Management Associations
The Security Association of South Africa (SASA) has issued a stark warning that the long-running Mafoko Security Patrols scandal is no longer an isolated case of employer misconduct, but evidence of a systemic failure in South Africa’s regulatory and governance structures.

Read more...
Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
Bringing fire safety closer to home
SafeQuip Fire & Safety Products & Solutions Smart Home Automation
SafeQuip’s latest product launch introduces two compact, disposable fire extinguishers for everyday use, one suitable for Class A, B, and C fires, the other rated for Class A, B and F fires.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.