classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2018


Secure vehicle access
September 2018, Asset Management, EAS, RFID, Integrated Solutions

Nedap’s long-range RFID optimised secure vehicle access solutions provide organisations with the ability to protect employees and vehicles through the deployment of technology that controls access. The individual long-range readers can be deployed directly onto existing or new Impro access systems.

John Powell, CEO of Powell Tronics says there a number of instances where Nedap systems have been deployed to ensure secure vehicle access. Capital Plaza is a modern multi-tenant business centre located in Moscow. Capital Group requested the integration of an access control system and the Nedap long-range RFID system for automatic driver-based vehicle access to the car park.

In order to optimise vehicle access control at the entrances and exits of the parking facility, Nedap’s TRANSIT readers were installed. This long-range RFID reader identifies vehicles and its drivers up to 10 metres away. TRANSIT supports simultaneous identification of both the vehicle and driver.

In addition, within the transport sector, one of the more significant technological developments is the way that transportation fleets can be monitored from a distance. Nedap systems automatically conduct error-free data gathering pertaining to vehicle and vehicle related activities. Companies are provided with detailed information about their fleet, which enables them to plan and schedule vehicles in the most efficient way.

“Vehicle identification ensures that equipment such as loading docks, weighing platforms and refuelling stations can be utilised more efficiently by facilitating process automation. As a result, more transactions can be handled during the same time period. This results in less equipment being needed and decreased capital costs,” says Powell.

By identifying vehicles at several strategic locations in a vehicle depot, fleet managers can obtain detailed information about vehicle readiness. Based on this, real-time information vehicle utilisation can also be increased, thus potentially leading to reduced new vehicle requirements.

“We invite installers and integrators seeking long-range RFID access control and secure vehicle access systems to contact us so we can devise a solution to fit their exact requirements. In addition to the Nedap long-range RFID readers and cards we have a number of bespoke software solutions to complement the hardware components,” says Powell.


Credit(s)
  Share via Twitter   Share via LinkedIn      

Further reading:

  • Trust but continually verify
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Hi-Tech Security Solutions looks at access and identity management and asks some industry players what ‘zero trust’ and ‘least privilege’ access means.
  • Physical/logical convergence
    November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Integrated Solutions, IT infrastructure
    The convergence between physical and logical (or cyber) security will be a game-changer because it will change the way we do everything, from planning to design and all the way to installation and maintenance.
  • Physical and logical convergence is a fact
    November 2018, This Week's Editor's Pick, Integrated Solutions, IT infrastructure
    Convergence, the next buzzword? A dated buzzword? Is convergence ­merely ­integration on steroids? What is convergence?
  • Taking augmented identity to the world
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    Hi-Tech Security Solutions spoke to Gary Jones, VP Global Channel and Marketing biometric access and time solutions) at IDEMIA (formerly Morpho) about his career with the company and its new vision of Augmented Identity.
  • BIMS set to change identity ­management
    November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Local biometrics integrator, Ideco Biometric Security Solutions, has announced that its Biometric Identity Management System (BIMS) has been launched to market.
  • Tracking biometrics into a brave new digital world
    November 2018, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    The industry is increasingly transitioning from unimodal to more integrated multimodal biometric solutions for more accurate identity verification and faster real-time results.
  • Key components of access control
    November 2018, Paxton Access, Access Control & Identity Management, Integrated Solutions
    Dan Drayton speaks to Hi-Tech Security Solutions about what the key components in modern access control systems are.
  • IP is no stranger to access control
    November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Just as the surveillance market made the move to IP-based communications, the access control market is also moving to IP (or some say it already has).
  • Applying the SaaS model to access control
    November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions
    The software-as-a-service model has proven transformative to many organisations, and even entire industries. The benefits it can offer are undeniable, but in the security sector which is risk-averse by necessity, we wanted to hear the views of some local experts in access control as a service (ACaaS) to find out what some of the pros and cons are.
  • Cloud-based access control
    November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions
    Running your access control through a cloud service has made people nervous in the past, but today’s solutions are hard to beat.
  • Controlling access in the cloud
    November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions
    In the access control arena, hosted or managed services have been around for a few years, and the adoption of cloud-based access control only continues to grow as companies become more and more open to the idea of relying on it to perform such a vital function within their business.
  • They sure don’t make them like they used to
    November 2018, Technews Publishing, Access Control & Identity Management, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
    The latest offerings in the market with respect to doorbells and intercoms, and what functionality they offer.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.