You keep on knocking but you can’t come in

Access & Identity Management Handbook 2014 Access Control & Identity Management

What are companies using to control the access of people within their facilities? Are proximity cards still in fashion or has biometric fingerprint technology taken the lead? Hi-Tech Security Solutions spoke to four industry players about current trends.

According to Robbie Truter, area sales manager for HID Global Sub Saharan Africa, the choice of technology largely depends on the client. “Companies typically select technology based on their risk profile and the needs of their employees. With the latest solutions on the market, customers no longer need to use multiple credentials for physical and logical access; now a single smart card can serve as the credential for accessing buildings as well as IT resources. This can result in greater security across multiple platforms and has a cost-saving component as well.”

John Powell, MD of Powell Tronics believes that ultimately, cost will determine the technology selected. “Any in-building access technology is geared towards controlling the movement of people within the building. Biometric technology is great for employees, but is more complicated to institute for visitors as enrolling them can be time consuming and inconvenient for the visitor. Hybrid systems that employ a combination of proximity card readers and biometric readers are therefore gaining popularity.”

Linda Glieman, GM, Africa for Impro Technologies added: “Knowing the true identity of a person entering the premises is the driving force behind the adoption of biometric technology.”

Matt De Araujo, head of products at IDS explained that the company recently made a firm move into the access control arena through its purchase of GSC Systems. “Sales of proximity RFID technology remain very strong and alive, while there has been a significant growth in fingerprint reader technology as the price of fingerprint readers start to come down.

“However, through our exports division we find that proximity ID cards and tags are still the primary means of access control. We have a rather unique problem in South Africa with buddy clocking, hence the ready adoption of fingerprint readers. We also see a trend in Mifare card readers which can be used for multiple purposes including access control, bus ticketing and library credits,” he continued.

Convenience, security and interoperability

“When making decisions on access control, cost plays a significant role and more companies are looking for solutions that deliver greater convenience, higher security, and interoperability so they can future-proof themselves. This translates into solutions that work not only with their existing systems, but also are interoperable with future technologies, making sure organisations get the most out of their investments. Convenience, interoperability and higher security together are possible, but require collaboration among various role players in the company, especially the physical security and IT managers,” continued Truter.

“Our R&D team continually work towards time and cost saving solutions. Installation, troubleshooting and system management costs are expensive. Our target is to produce products that are easy to install, that are intuitive, and are totally reliable for our harsh African conditions,” said De Araujo.

Both Glieman and De Araujo agree that cost is always a concern as access control will always be perceived as a grudge purchase to organisations. “Understanding a company’s current risks and creating an effective return on investment will assist decision makers in choosing the correct solution. This is not just the cheapest solution. Biometric technology is more expensive than card technology and this is where risk and convenience come into play,” Glieman elaborated.

Powell added that convenience and workability of the system go hand in glove and can swing a decision in favour of biometrics. “Coupled with this is the ability of the supplier or systems integrator to supply excellent service.”

All interviewees recommend securing the services of either a ­reputable security consultant or system integrator with a proven track record of similar projects. “It is critical to ask for references for projects that have been successfully deployed, with due consideration given to the specific risks identified and associated with each individual company. Once that has been done, the service provider needs to select technologies and processes to mitigate against these risks,” said Truter.

Glieman added: “It is important to agree on the outcome the customer is be looking for. One should take the following into consideration when evaluating a solution:

* Robustness of the hardware, warranty, local backup and support.

* Integration capability with other systems in the organisation – HR, Active Directory, CCTV, alarm arming and disarming, energy efficiency systems, weighbridge applications.

* How the system is required to handle the different types of people requiring access to the premises in terms of employees, contractors, tenants and visitors.

* Redundancy levels and dependency on networks and database.

* Is the biometrics unit suited to the environment?”

Solutions fit for purpose

“It is important to source service providers who offer solutions, rather than just products. In addition, any products used should be reputable and certified to meet international standards, to ensure suitability and longevity. In addition, product solutions should be geared around the ability to interface or integrate with other business systems,” said Powell.

De Araujo said that while biometric technology is appealing for end customers, it is not always the best solution for applications for the following reasons: they are generally high value items that are susceptible to vandalism in outdoor environments, their read times are generally slower than proximity readers and can cause frustration in organisations where there are a number of staff entering and exiting at a similar time, and they are typically expensive, can be bulky and not always preferred by architects.

“Multi-factor authentication using a combination of cards and biometrics have been used for some time and gives the end-user a higher level of security by having the user provide something he/she has [a card] and something he/she is [biometric],” said Truter.

Glieman added: “A combination of technologies is being sought after; ensuring cost effectiveness with the various levels of risk being adequately addressed. Combinations include cards, biometrics, long range readers reading both passive (UHF) and active (2,4 GHz) tags, door locks which include tag reader technology.”

“Another example is cashless vending where customers would utilise biometrics with a card and a PIN number. On big databases, one could have biometric information embedded into the card with one on one verification rather than one on many verification. Hybrid solutions mean that biometrics can be used at high-security keypoints and cards at mass entry points,” said Powell.

De Araujo added that all buildings that require access control in this day and age have video surveillance systems that would provide verification to proximity RFID technology, thus keeping the cost per door down.

To integrate or not

“The degree of integration required will depend largely on the type of customer and the information they would like to have access to from a single seat of control. Most enterprise solutions allow for third-party integrations. The trick is to evaluate which of the solutions best fit the client’s needs,” said Truter.

“Examples of integration range from CCTV – creating a single GUI to view both access and CCTV alarms – to alarm arming and disarming, Active Directory for password management, thus allowing people on the premises to only access the company network while they are on site, then logging them out when they exit the premises. Integration into weighbridge applications ensures the correct credentials of the truck and driver. HR and contract management systems ensure stricter control on employee and contractor access. These solutions are a lot easier to integrate in the age of IP,” said Glieman.

De Araujo said that integration is becoming easier as the access controller systems have the available features and add-on modules, such as I/Os that can be used for lift control, triggering of surveillance systems and systems energy management. However, integration requires a different technical skills set for installers, specifically IP skills and understanding. In addition, the systems integrator or installer must understand the specific requirements and intentions of the client.

How’s business?

Truter believes that the growth in biometric technology and the fierce competition in the market have had a positive impact. “We have seen some of the larger and local manufacturers implement our reader technology in their biometric terminals, giving us more flexibility than we have had before.”

Glieman on the other hand stated that this has not had a great impact on their business. “We provide three different biometrics solutions to address different environments and market sectors. One has to educate end users on the correct biometric application for their environment. Purchase decisions where biometrics are concerned must not be based purely on price.”

De Araujo said: “We have identified good growth opportunities as a South African manufacturer for both our local and international markets, and have excellent experience and track record in manufacturing and distributing product that is robust, intuitive, easy to install and well supported. This being said, local manufacturers are under pressure from cheap security and access control products that continue to flood our markets from the East.”

Powell is adamant that the leaders in the field are those who provide value added services, such as consulting and assisting in the development of applications specifications. “The ability to offer a needs analysis, complemented by commissioning assistance and the requisite system training is a major differentiator. In addition, the ability to customise applications for integration into, for instance, Active Directory, CCTV, cashless vending, HR and T&A is a major positive.”

Profit centres

Truter: “Our biggest verticals in South Africa are in the financial/corporate, education and mining/industrial sectors.”

De Araujo: “We have seen positive growth in network-enable products, with sales of non-IP products still receiving good attention.”

Glieman: “Sales are coming from a technology and product benefit perspective in all industries. Companies are looking for feature-rich well-architected solutions. Sales are across all levels of the market from entry level to enterprise applications.”

Powell: “A combination of proven product and technology across a number of industries is generating the sales for us. The ability to support and integrate across many different systems is a big sales driver.”

What’s hot?

Glieman: “Fully Web-enabled access control solutions that are accessible from mobile devices like tablets and cellphones”.

Powell: “Vein and facial recognition as high-end solutions. Also, acquiring data directly from driver’s licences and inputting this

automatically into the access control software. This is less time consuming and more accurate than manually writing down or typing in data. RF asset tagging is growing. Rapid biometric enrolment of visitors is now enabled through products like PT Guest.”

De Araujo: “Systems that can be accessed over LAN/WAN and 3G networks such as our ProxnetPro system, providing users and

installers the ability to manage and maintain all information remotely, from adding new user’s information through to remote support. In addition, there is a trend towards full connectivity between centralised control rooms for multi-national companies.”

Contacts

Robbie Truter, www.hidglobal.com, [email protected]

John Powell, www.powelltronics.com, [email protected]

Linda Glieman, www.impro.net, [email protected]

Matt De Araujo, www.idsprotect.com, [email protected]



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Who has access to your face?
Access Control & Identity Management Residential Estate (Industry) AI & Data Analytics
While you may be adjusting your privacy settings on social media or thinking twice about who is recording you at public events, the reality is that your facial features may be used in other contexts,

Read more...
From the editor's desk: Can it be October already?
Technews Publishing News & Events
Welcome to the final SMART Handbook of the year. In this issue, we focus on residential estate security, from the fence to the gate and beyond. We also review our Durban SMART Estate Security Conference, ...

Read more...
Smarter security for safer estate living
neaMetrics Suprema Integrated Solutions Surveillance Access Control & Identity Management Residential Estate (Industry)
The expansion of residential estates has led to many communities being constructed with security as an afterthought. Unfortunately, fencing, cameras, and a guard at the gate only create a false sense of safety, which vanishes after the first incident.

Read more...
Private fire services becoming the norm?
Technews Publishing SMART Security Solutions Editor's Choice
As the infrastructure and service delivery in many of South Africa’s major cities decline, with a few, limited exceptions, more of the work that should be done by the state has fallen to private companies.

Read more...
View from the trenches
Technews Publishing SMART Security Solutions Editor's Choice Integrated Solutions Security Services & Risk Management Residential Estate (Industry)
There are many great options available to estates for effectively managing their security and operations, but those in the trenches are often limited by body corporate/HOA budget restrictions and misunderstandings.

Read more...
Visitor management views
Entry Pro ATG Digital Technews Publishing SMART Security Solutions Access Control & Identity Management Residential Estate (Industry)
Visitor management is always changing, taking technology and legislation into account. SMART Security Solutions examines the latest trends with input from ATG Digital and Entry Pro.

Read more...
Securing your estate beyond the gate
ATG Digital Access Control & Identity Management Residential Estate (Industry) AI & Data Analytics
Protecting gated communities and lifestyle estates requires a modern, intelligent approach. A truly intelligent system protects both physical and digital perimeters, it must be a fully integrated ecosystem.

Read more...
Reliability, innovation and flexibility
Entry Pro Access Control & Identity Management Residential Estate (Industry) Products & Solutions
Through constant innovation and advancement in technology and systems, Entry Pro strives to provide its clients with not only the most suitable, but also the most advanced solution.

Read more...
Smarter security with automated visitor management
LD Africa Access Control & Identity Management Residential Estate (Industry) Products & Solutions
Automated visitor management solutions, like LD Access, are transforming this process by reducing human workload, while enhancing security and efficiency.

Read more...
SMART Estate Security Conference KZN 2025
Arteco Global Africa OneSpace Technologies SMART Security Solutions Technews Publishing Editor's Choice Integrated Solutions Security Services & Risk Management Residential Estate (Industry)
May 2025 saw the SMART Security Solutions team heading off to Durban for our annual Estate Security Conference, once again hosted at the Mount Edgecombe Country Club.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.