classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2017


Out with the old, in with the new
March 2017, Retail (Industry), Access Control & Identity Management

As a keen observer of what different retail stores use for access control to the back-office, it always amuses me that the dominant technology in use here is a normal keypad where everyone uses the same password.

This very vulnerable technology is used almost in all retail stores as a means of keeping the general public out of the administration offices at the back of the store. On a few occasions, I have seen the password an employee uses to open the door, and then used it myself to prove to the stores that they are not using this type of technology safely. There is no operations log that can be checked if an incident occurs, to see who opened the door in that particular time, so no one can be held responsible.

The reason why the owners or planners of retail shops always opt for this low-end technology is a mystery, but it can be one of the following reasons:

• The retail shops use what they get from the shopfitting companies.

• Aesthetics is more important than security.

• Lack of security audits by the security managers of the retail groups.

• Lack of education of the security managers that have to do the audits.

• Cost might be a factor, but I don’t think this should be, if the door is protecting people.

My opinion is that people might be staying with what they are comfortable with, despite the fact of biometric systems becoming much more cost-effective and close to the cost of a normal keypad terminal. As with any other technology, biometrics becomes more advanced and cheaper every day.

Some biometric systems even have duress functions built in, so if someone does ask you to open the door under duress, you can use your allocated duress finger to open the door and at the same time create a silent alarm or notification to a central control room. The benefits of using biometrics at these vulnerable entrances makes sense, every time.

The retail industry must make the effort to attend security events and exhibitions, like Securex and other security roadshows, to see what is available, and to educate themselves on what the best strategy is to secure the back-office door.


Credit(s)
Supplied By: ZKTeco
Tel: +27 12 259 1047
Fax:
Email: hendrik@zkteco.co.za
www: www.zkteco.co.za
  Share via Twitter   Share via LinkedIn      

Further reading:

  • People on the move
    November 2017, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Sanjay Dharwadker looks at some of the changes that have been enacted to better manage Europe’s borders.
  • Access and identity: looking ahead
    November 2017, neaMetrics, ZKTeco, Powell Tronics, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    Access and identity is more important than ever with more options than ever for companies looking for solutions that go beyond mere entry and exit.
  • Trusting your privilege
    November 2017, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    Privileged access management is the starting point for effective enterprise identity and access management, whichever device you're logging in from.
  • The access edge
    November 2017, Johnson Controls, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions, Security Services & Risk Management
    With the common denominator of IP networks as their backbone, building automation, security and, in particular, access control systems are increasingly providing opportunities to both security integrators and building managers.
  • Home run for integrated security
    November 2017, Milestone Systems, Integrated Solutions, CCTV, Surveillance & Remote Monitoring, Access Control & Identity Management, IT infrastructure
    Axis Communications, Extreme, Lenel and Milestone team up to secure 2017 Little League Baseball Series.
  • Facing the future
    November 2017, neaMetrics, Virdi Distribution SA, This Week's Editor's Pick, Access Control & Identity Management, IT infrastructure
    Facial biometrics is coming into its own today, but is it a 100% reliable means of identity verification and authentication?
  • The growth of biometrics
    November 2017, ZKTeco, Access Control & Identity Management
    Biometric verification is the future, we live in a time where a person can be uniquely identified by evaluating one or more distinguishing biological traits.
  • Securing your access security
    November 2017, G4S South Africa, Impro Technologies, This Week's Editor's Pick, Access Control & Identity Management, Cyber Security
    While one may not consider access control solutions a prime hacking target, any connected device is a target in today’s world.
  • Ding dong, it’s IP
    November 2017, Elvey, TOA Electronics, Zhejiang Dahua Technology, CAME BPT South Africa, This Week's Editor's Pick, Access Control & Identity Management
    IP and open standards have taken the security technology world to a new level where proprietary systems and customer lock-in are no longer the global standard.
  • Access a mobile-first world
    November 2017, Axis Communications SA, This Week's Editor's Pick, Access Control & Identity Management, IT infrastructure
    Mobile access control enables mobile devices – such as smartphones and wearables – to function as credentials in providing access to secured buildings, rooms and areas.
  • Access at speed
    November 2017, Hikvision South Africa, Verifier, Cathexis Technologies, CCTV, Surveillance & Remote Monitoring, Access Control & Identity Management, Integrated Solutions
    Automated number plate recognition is finding traction in a number of vertical markets with specialised edge or server-based analytical software.
  • Access from afar
    November 2017, GeoVision SA, Paxton Access, ZKTeco, Access Control & Identity Management, Asset Management, EAS, RFID
    Long-range readers are popular due to their security and efficiency benefits.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.