Solving the identity management puzzle in real time

February 2014 Access Control & Identity Management

Global populations are not only growing, they are concentrating in ever-larger urban conglomerations. These large concentrations of people create many challenges, many of which can only be solved with the help of new and flexible ways to establish identity securely.

“The obvious challenge is the need to police these large and heterogeneous populations effectively,” says Nick Perkins, divisional director of Bytes System Integration Identity Management. “Law enforcement agencies need a way to establish rapidly who a particular individual is, and what pertinent information their systems have on that person.”

Perkins notes that law enforcement is just one instance of the role that identity-management solutions play in today’s world. The need to provide security at public events, especially given the threat of terrorism, is also a real challenge for authorities.

“When you’re dealing with large groups of people, often perhaps in situations where there is little time available, portable and rugged devices that can offer a range of functionality are coming into their own,” he says. “Biometrics, photographs and cards are all inputs that can be used to identify an individual with a high degree of certainty, and thus the appropriate action can be chosen. The point is that the identification has to occur where the people are in real time.”

The need to establish identity securely is also a key requirement in a range of the services that citizens, employees and customers have come to expect. “Depending on context, people have different expectations and needs and, again, mobile and secure identity management solutions are vital,” explains Perkins.

For example, a citizen might need to be identified as the correct person to receive a government grant, or to vote – something that’s very much on people’s minds as elections tick closer.

In the health care sector, the ability to link a specific individual with database records has the potential to revolutionise the quality of care that patients receive, particularly in primary care or rural facilities where access to records could be problematic. In this instance, dedicated portable identity management devices offer a way to provide patient care that is more consistent, and gives patients access to all the benefits to which they are entitled.

This type of identity management is obviously also vital when it comes to any financial transaction.

“Identity management frequently doesn’t take place in a controlled environment – what many clients need is a solution that is both robust and mobile so it can be used out there, on the ground, where the people are,” Perkins says. “Having understood the requirements of this type of identity management, Bytes has gone out to find the right partners to provide the enabling technology. In this area, one of the best is the Pradotec range of rugged handheld devices.”

The Pradotec HRT 500, for example, has fingerprint and barcode scanners, as well as a contact and contactless card reader and a 5-megapixel camera. This means that it can handle all the main types of identity input, while 3,5G connectivity gives it powerful connectivity back to source databases.

Perhaps as important, it’s designed to withstand tough conditions and is both water and dust resistant. There’s also a developers’ toolkit to enable the creation of a customised solution that integrates with the organisation’s back-end systems and business processes.

“Identity management is one of the key enablers for so much of today’s emerging global society – but it’s not possible without the right device at the point of contact,” concludes Perkins.

For more information contact Lise West, Bytes Systems Integration, +27 (0)11 205 7000, lise.west@bytes.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Paxton set to launch game-changing new system
Paxton Access Control & Identity Management News & Events
Access control is evolving fast. Installers and end users are looking for systems that are simple to install, easy to manage remotely, and flexible enough to scale. In response, Paxton is exploring how emerging technologies can reshape access control.

Read more...
NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...
Cloud security in visitor management and access control
SA Technologies Access Control & Identity Management Infrastructure Residential Estate (Industry) Commercial (Industry)
Cloud has become the default platform for modern security operations, from visitor management portals and remote access control to incident logging, reporting, analytics, and integrations. But “in the cloud” does not mean “someone else is securing it for us”.

Read more...
Centurion raises the bar at HomeSec Expo
Centurion Systems News & Events Access Control & Identity Management Residential Estate (Industry) Smart Home Automation Commercial (Industry)
Centurion Systems unveiled its latest product lines at HomeSec Expo 2026, introducing SMART+, a simpler way for installers and end users to manage their Centurion installations - as well as a few new products.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
Protecting citizens’ identities: a shared responsibility
Access Control & Identity Management
A blind spot in identity authentication today is still physical identity documents. Identity cards, passports, and driver’s licences, biometric or not, are broken, forged, or misused, fueling global trafficking networks and undermining public trust in institutions.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.