ViRDI expands its focus

April 2016 Editor's Choice, Access Control & Identity Management, News & Events

ViRDI Distribution South Africa held a launch function in Midrand in March to announce a number of new products and an expanded focus for the group. Hi-Tech Security Solutions was in attendance.

Deon Janse van Rensburg hosted the event and introduced various speakers. First off, Jonathan Kahn explained that ViRDI was changing focus to provide full solutions to customers that would be managed from a single platform. To facilitate this, ViRDI equipment will use the OSDP protocol as a standard for communications.

Open Supervised Device Protocol (OSDP) is a communication protocol that expands the functionality of the widely used Wiegand standard and adds functionality such as bi-directional communication. This means new ViRDI controllers will be connected by 4-core RS-485 cables able to transmit data in the form of transactions and templates, as well as power. The latest controller can manage up to four doors with eight readers, as well as an eight alarm zone.

The new controller is also TCP/IP capable and has an onboard web server which allows for direct management from a web browser and not only from the ViRDI management platform.

ViRDI is also making its own branded DVRs available under the Tron brand. This will allow users to manage their compatible surveillance cameras from UNIS, ViRDI’s management platform – reinforcing the single solution approach the company is taking.

New management platform

ViRDI has also updated its UNIS management platform to include a new, more user-friendly interface and now allows for biometric as well as username logons. An additional 26 administrative tasks have been included in the software to broaden the scope of operations and include more functions that users required. In addition, users can now install different language packs on ViRDI machines if required.

In UNIS 4, the data management capabilities have been expanded to allow for customised reporting, and batch editing is also available that allows settings to be assigned to groups of people instead of having to do it one user at a time. The system’s time and attendance and meal management functions have also been expanded with a broader range of reports available.

ViRDI UNIS 4.0.
ViRDI UNIS 4.0.

ViRDI has also ensured rules wizards are available in UNIS 4, which guide users through setting up rules, ensuring that every rule is properly defined and accurate before it can be enacted.

UNIS 4 has also updated its duress finger functionality. Users can enrol 10 fingers and select one as a duress finger. When the user scans this finger, entrance will be granted as normal, but an alert will be raised to indicate there is a problem.

To cater for CCTV footage, UNIS also allows access information to be overlaid onto mapping software which will zoom in on areas where a transaction or event occurred. By clicking on an event, the operator will be shown the footage around that event, time and date stamped in case the footage needs to be used as evidence.

A new web-based version of UNIS is also being introduced. This provides users with the functionality of UNIS, but via a web interface. Companies can purchase the system and host it on their own infrastructure, or it can be hosted at an ISP. Users can also access it via a mobile web browser. There is no limit to the number of clients that can connect to Web UNIS.

Janse van Rensburg notes that while five of the most popular browsers are supported, enrolment can only be done via Internet Explorer 9 and above.

New devices

ViRDI also announced a range of new products, some available now and others in the pipeline.

The AC7000 is ViRDI’s newest high-end biometric terminal. This is a multi-modal device that supports both fingerprint and facial biometrics. It also supports smartcards (Mifare and RFID) and PIN entry, or a combination of these authentication methods. It is also voice over IP (VoIP) capable, supports up to 250 000 users and is FBI FIV certified.

The AC7000 sports a colour camera and an IR camera. The colour camera is used in displaying the person requesting access while the IR device is used for facial recognition. To speed the process of facial authentication, the IR camera starts lining up the user’s face from about three metres away so that access can be granted as soon as the individual is in front of the device.

The AC2200 is an IP65-rated outdoor fingerprint reader with a camera built in to allow the system to take a picture of people as they authenticate. It also supports smartcards and RFID, and is available in two versions supporting either 1000 or 5000 users. It also supports IMKey access.

The FMD10 is a standalone, Bluetooth-enabled fingerprint and smartcard reader that has no network connection, although it is OSDP capable. The system is managed via UNIS-B, an Android-only management platform that supports up to 1000 users, 1000 templates and 10 000 transactions.

All ViRDI fingerprint readers are equipped with the company’s fake finger detection technology, which detects both fake fingerprints and ‘liveness’.

IMKey is a smartphone-based access credential that can be provisioned and deprovisioned over the Internet. It uses Bluetooth to communicate with terminals to grant access to individuals when they press a button on the application when close to a terminal. Because the control is hosted on a server and controlled by UNIS, visitors can also be granted access (if they have downloaded the application) on a temporary basis and there is no concern (or cost) when people walk off with an access card. IMKey will be launched at the end of 2016 and works on all Bluetooth-enabled ViRDI terminals.

ViRDI will also be launching a new card terminal which supports IMKey. The terminal has a camera and flash built in and offers face detection (not recognition). This means that even if a user has the right access credential, they will only be granted access if the system detects their face in front of the terminal. It also offers VoIP support for making IP phone calls or to use as an intercom.

Finally, 2017 will see a new door lock from ViRDI. This is a keyless lock that runs off four AA batteries and can be accessed via a PIN/password or IMKey. The device puts itself to sleep when not in use to conserve the battery, but wakes up immediately when touched.

For more information contact ViRDI Distribution, +27 (0)11 454 6006, deon@virditech.co.za, www.virditech.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Smarter access, stronger defence
Secutel Technologies Security Services & Risk Management Access Control & Identity Management Retail (Industry)
The holiday season brings excitement, increased foot traffic and, unfortunately, a spike in criminal activity targeting retail environments. Taking a proactive approach to security is essential in ensuring staff and assets remain safe.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Toxic combinations
Editor's Choice
According to Panaseer’s latest research, 70% of major breaches are caused by toxic combinations: overlapping risks that compound and amplify each other, forming a critical vulnerability to be exploited.

Read more...
Global Threat Intelligence Report for October 2025
Information Security News & Events
Africa was pipped to the post as the most attacked region by Latin America, which averaged 2966 attacks per organisation per week (+16% YoY). Africa followed with (2782, – 15%) and APAC (2703, – 8%).

Read more...
Is your entrance security secure?
SMART Security Solutions Centurion Systems Technews Publishing News & Events Access Control & Identity Management Smart Home Automation
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security.

Read more...
Continuum launches centralised access and identity management
Editor's Choice Access Control & Identity Management Integrated Solutions Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...
Workflow and asset management solutions
Asset Management News & Events
Zamatrack’s innovative workflow and asset management solutions feature the Worxit platform. This all-in-one solution allows businesses to streamline operations with real-time tracking, GPS data, and custom reports.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.