Visiting visitor management

Access & Identity Management Handbook 2014 Asset Management, Access Control & Identity Management

As visitor management becomes more important to control who enters a building or business park, we’re seeing more technology being adopted to allow management companies to better control access. While there are still far too many businesses using the guard at the gate with a tattered visitor’s book, systems such as driver’s licence scanners or biometric readers are becoming more important.

Hi-Tech Security Solutions spoke to Luke Dunstan, director of Bartrans to understand the latest developments in the visitor management industry.

Hi-Tech Security Solutions: How has visitor management changed over the past year or two?

Luke Dunstan: With the Protection of Personal Information Act (PoPI) due to be in full force by 2014, we’re seeing a huge move towards mobile devices replacing the traditional visitor books. Bartrans imports the Honeywell scanning and mobility range of enterprise-ready mobile devices running WEH6.5 and Android operating systems. We then add value to these devices by enabling them to connect to various visitor management solutions, thus enabling systems integrators to offer a service to their customers.

HSS: What, in your opinion, is the best solution to visitor management?

Luke Dunstan: By using the camera on the mobile device to scan the number plate on the vehicle using ANPR (automatic number plate recognition) and then using the embedded 2D imager to scan the round licence disk, we’re able to compare what is physically on the vehicle to what the licence disk says is on the vehicle. Using these mobile devices, we’re now able to also scan and decode the national driver’s licences thus linking the driver to the vehicle quickly and efficiently. The addition of a biometric fingerprint module serves as acceptance of the visitor to the terms and condition of entry or they can sign on screen.

HSS: Some companies use technology to manage their visitors, but the question is always raised as to what happens to the visitor’s information?

Luke Dunstan: The responsibility for the management and integrity of the data within the system relies on the service provider and the stakeholder, thus the visitor should be allowed the option to have their information removed from any database.

By managing the data captured responsibly and ensuring that PoPI is not breached, the information relating to a visit can be securely stored either on or off site. The trick in the security industry will be how long this data is kept, since if an incident is reported, the user of the system will need to interrogate the database and check the history.

A good way to handle this is to encrypt all data, thus preventing it falling into the wrong hands or being of any use to a third party.

HSS: How does your company handle visitors management and the information it collects?

Luke Dunstan: We leave this task up to the system integrator, as there are many different policies and solutions in place. We prefer a securely hosted environment with encryption, but every customer tends to have their own policies in place. PoPI will guide the industry in terms of this. As in most mobile solutions there is a client application running on the mobile device and a host applications to which it connects.

Whether the data is collected online using WiFi/GSM or in a batch mode when systems are down, the data needs to be protected in case of loss or theft of the mobile device. By encrypting all the data on a local file store, like an SD card for example, you ensure that the information collected is of no use to another party.

HSS: Everyone is talking about cloud computing. Would it be possible/desirable (or does it already exist) to have a single database of identities through which the identities of visitors could be verified?

Luke Dunstan: In an ideal world there would be one central database, but currently this is not feasible. Identifying your own subset and hosting that database or adding to it seems far more realistic. Automated Biometric Bureaus (ABB) containing fingerprint and other biometric data are certainly the way of the future.

Cloud-based visitor management systems certainly do exist and these are especially useful in situations where staff have to enter multiple sites that may be separated by vast geographical distances. Tying their visit into the company’s IT policy by enabling their corporate laptop to connect to the intranet using a MAC address and IP address for example is also a good use of such technology.

For more information, contact Luke Dunstan, Bartrans, +27 (0)11 552 8245, luke@bartrans.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
Factories, grids, and finance: Critical infrastructure cyber lessons of 2025
Asset Management Information Security Industrial (Industry)
Africa has seen an accelerated, large-scale digitisation of our overall industrial base, and this rapid convergence of IT and OT is happening on a foundation that, in essence, was not designed to be cybersecure.

Read more...
2026 Industry Trends Report calls out security’s next opportunity
Integrated Solutions Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Gallagher Security has released its 2026 Security Industry Trends Report, drawing on insights from end users, channel partners, consultants, and technology stakeholders; highlighting a growing opportunity for security to play a more strategic, value-driven role across organisations worldwide.

Read more...
Smarter access, stronger defence
Secutel Technologies Security Services & Risk Management Access Control & Identity Management Retail (Industry)
The holiday season brings excitement, increased foot traffic and, unfortunately, a spike in criminal activity targeting retail environments. Taking a proactive approach to security is essential in ensuring staff and assets remain safe.

Read more...
Visual Intelligence for driver and vehicle safety
News & Events Asset Management Transport (Industry)
Webfleet, Bridgestone’s fleet management solution, and Peregrine.ai, a Berlin-based startup transforming mobility through AI-powered vision systems, announced the launch of a next-generation driver assistance solution.

Read more...
Global hub for predictive road safety intelligence
News & Events Asset Management Transport (Industry)
One year since its formation, Netstar’s advanced Global Fleet Bureau is more than an operational facility for international fleet management, it has become a big-data nerve centre delivering unprecedented value to clients.

Read more...
Cyber attack surface expanding
Asset Management Information Security Logistics (Industry)
Despite the increasing number of attacks, analysis of Allianz Commercial cyber claims shows that severity is down by 50% and large-claim frequency by 30% in H1 2025, driven by larger companies’ enhanced detection and response capabilities.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.