Visiting visitor management

Access & Identity Management Handbook 2014 Asset Management, Access Control & Identity Management

As visitor management becomes more important to control who enters a building or business park, we’re seeing more technology being adopted to allow management companies to better control access. While there are still far too many businesses using the guard at the gate with a tattered visitor’s book, systems such as driver’s licence scanners or biometric readers are becoming more important.

Hi-Tech Security Solutions spoke to Luke Dunstan, director of Bartrans to understand the latest developments in the visitor management industry.

Hi-Tech Security Solutions: How has visitor management changed over the past year or two?

Luke Dunstan: With the Protection of Personal Information Act (PoPI) due to be in full force by 2014, we’re seeing a huge move towards mobile devices replacing the traditional visitor books. Bartrans imports the Honeywell scanning and mobility range of enterprise-ready mobile devices running WEH6.5 and Android operating systems. We then add value to these devices by enabling them to connect to various visitor management solutions, thus enabling systems integrators to offer a service to their customers.

HSS: What, in your opinion, is the best solution to visitor management?

Luke Dunstan: By using the camera on the mobile device to scan the number plate on the vehicle using ANPR (automatic number plate recognition) and then using the embedded 2D imager to scan the round licence disk, we’re able to compare what is physically on the vehicle to what the licence disk says is on the vehicle. Using these mobile devices, we’re now able to also scan and decode the national driver’s licences thus linking the driver to the vehicle quickly and efficiently. The addition of a biometric fingerprint module serves as acceptance of the visitor to the terms and condition of entry or they can sign on screen.

HSS: Some companies use technology to manage their visitors, but the question is always raised as to what happens to the visitor’s information?

Luke Dunstan: The responsibility for the management and integrity of the data within the system relies on the service provider and the stakeholder, thus the visitor should be allowed the option to have their information removed from any database.

By managing the data captured responsibly and ensuring that PoPI is not breached, the information relating to a visit can be securely stored either on or off site. The trick in the security industry will be how long this data is kept, since if an incident is reported, the user of the system will need to interrogate the database and check the history.

A good way to handle this is to encrypt all data, thus preventing it falling into the wrong hands or being of any use to a third party.

HSS: How does your company handle visitors management and the information it collects?

Luke Dunstan: We leave this task up to the system integrator, as there are many different policies and solutions in place. We prefer a securely hosted environment with encryption, but every customer tends to have their own policies in place. PoPI will guide the industry in terms of this. As in most mobile solutions there is a client application running on the mobile device and a host applications to which it connects.

Whether the data is collected online using WiFi/GSM or in a batch mode when systems are down, the data needs to be protected in case of loss or theft of the mobile device. By encrypting all the data on a local file store, like an SD card for example, you ensure that the information collected is of no use to another party.

HSS: Everyone is talking about cloud computing. Would it be possible/desirable (or does it already exist) to have a single database of identities through which the identities of visitors could be verified?

Luke Dunstan: In an ideal world there would be one central database, but currently this is not feasible. Identifying your own subset and hosting that database or adding to it seems far more realistic. Automated Biometric Bureaus (ABB) containing fingerprint and other biometric data are certainly the way of the future.

Cloud-based visitor management systems certainly do exist and these are especially useful in situations where staff have to enter multiple sites that may be separated by vast geographical distances. Tying their visit into the company’s IT policy by enabling their corporate laptop to connect to the intranet using a MAC address and IP address for example is also a good use of such technology.

For more information, contact Luke Dunstan, Bartrans, +27 (0)11 552 8245, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Continuum launches centralised access and identity management
News & Events Access Control & Identity Management Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...
Putting security in gear
Asset Management Products & Solutions
The inaugural Securex Cape Town 2025 will showcase a number of companies focused on vehicle and fleet security on South Africa’s dangerous and often crime-infested roads.

Read more...
Managing assets and clear communication
Asset Management Products & Solutions
Communication is essential for security management as well as efficient asset control. A few companies at Securex Cape Town 2025 might have the solution you are looking for.

Read more...
Workflow and asset management solutions
Asset Management News & Events
Zamatrack’s innovative workflow and asset management solutions feature the Worxit platform. This all-in-one solution allows businesses to streamline operations with real-time tracking, GPS data, and custom reports.

Read more...
Smarter security for safer estate living
neaMetrics Suprema Integrated Solutions Surveillance Access Control & Identity Management Residential Estate (Industry)
The expansion of residential estates has led to many communities being constructed with security as an afterthought. Unfortunately, fencing, cameras, and a guard at the gate only create a false sense of safety, which vanishes after the first incident.

Read more...
Know where your asset is - not was
IoT & Automation Asset Management
To properly prevent loss of movable assets, companies need an early warning system, traceability throughout the chain of custody, and intelligence on parameters such as temperature, humidity, and impact.

Read more...
Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...
250 000 connected vehicles in Africa
Asset Management Transport (Industry) Logistics (Industry) IoT & Automation
Wialon, the global fleet digitalisation platform created by software developer Gurtam, announced it has reached a record number of 250 000 fleet vehicles and assets connected in Africa.

Read more...
Nice unveils MyNice Smartgo
News & Events Access Control & Identity Management
Nice SA has announced the release of MyNice Smartgo, a compact access automation solution, designed specifically for the South African market, combining an easy-to-install device with a user-friendly smartphone application.friendly smartphone application.

Read more...
Managing stock efficiently and cost-effectively
Editor's Choice Asset Management Infrastructure Logistics (Industry)
Rina Redelinghuys, customer services executive at Cquential, a member of the Argility Technology Group, examines stock management across various industries, including retail, fast-moving consumer goods, food and dairy, automotive, apparel, industrial, accessories, paint and chemicals, and pharmaceuticals.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.