Taking control of visitor management

1 October 2014 Access Control & Identity Management

Residential estate and office park managers are becoming more discerning about the type of visitor management systems they require. The use of outdated and fallible manual visitor log books is minimal, specifically in larger estates and business parks. John Powell, MD of Powell Tronics, explains what options are available to accurately capture visitor data and to provide superior management reporting.

John Powell, MD of Powell Tronics.
John Powell, MD of Powell Tronics.

He says that most customers are requesting a number of features they expect as the minimum from their visitor management solution. Primarily, they require easy to use technology that accurately captures visitor information as well as linking the visitor directly to the host (resident or employee). This is achieved by using portable scanners and pre-registering the visitor on the visitor management system.

Detailed reporting on who visited the property, how many visitors each resident or tenant or employee receives every month and where popular zones are within an estate are rated as the second highest requirement. Powell Tronics identified this gap in the market and quickly developed turnkey solutions that could cater for the varying requirements of visitor management. The company has developed two solutions that use driver’s licence scanning as the basis of their visitor management systems. In both instances, the systems replace the manual visitor book.

The standalone solution, PT-Scan was designed to cater for sites that either had no access control or did not wish to integrate their visitor system to their existing access control infrastructure, while still wanting to accurately capture visitor details and transactions. Using a market related scanner, security guards scan the visitor’s South African driver’s licence, vehicle registration and select the destination and submit all the information which is uploaded over WiFi to PT-Scan’s own database.

The varied range of reports available in PT-Scan allow the client to accurately report on the number of visitors, most popular destinations and visitors on site. As PT-Scan is not integrated to any access control system, it is a cost effective yet comprehensive solution.

PT-Guest Enterprise uses market-established handheld scanners to scan and decrypt South African driver’s licences and then integrate the data captured with the ImproNet access control system. PT-Guest Enterprise allows for multiple forms of visitor entry, namely one time pin (PAC), proximity card issue and biometric enrolment, all of which are handled in a simple process by security at the main entry points of the site.

The full enterprise PT-GUEST solution also has the ability for pre-registration of guests through either the client’s intranet or via SMS. Preauthorisation can be accomplished for up to five days (configurable) before the date of visit and will be applicable for one entry and one exit only upon first use. These systems provide a secure option for hosts to control the access of their visitor into a specific area within the facility. This will allow the site to set up pre-determined common zones within a facility as well as authorised internal areas.

PT-GUEST Prox is a proximity tag that contains a barcode and works in conjunction with PT-GUEST by populating data on ImproNet. The visitor will give the PAC to the security guard upon arrival as verification of pre-authorisation. After their driver’s licence, vehicle disc and barcoded proximity card is scanned, the visitor will be handed the proximity card. The Prox card can be used to allow the visitor smooth passage through each initial entry point and within a facility, without having to rescan their driver’s licence each time.

One of the biggest challenges for customers has been the arrival and management of unexpected visitors. PT-GUEST and PT-Scan help to control this dynamic by providing efficient management with as little or as much information as the customer demands.

Feature-filled reporting is available with both PT-GUEST and PT-Scan and dramatically reduces security risks and allows customers to extrapolate data that can be used to provide valuable feedback on trends within the estate or business park. An example would be the use of data to monitor how many people visit an on-site restaurant or conference venue. Reports can be generated automatically in standard or customised formats.

Because these systems are electronic, they cannot be tampered with. Together with scanning in the visitor’s full name and ID number, the scanner also stores a photograph of the visitor on the database, so visual verification is provided. In addition, it saves money by eliminating the reprinting of the visitor’s access ticket at each checkpoint. Most importantly though, because systems are electronic and decrypted via the barcode, it eliminates the human error factor from the equation, since the security guard is not required to manually input the visitor’s name.

One further element that assists with visitor management is the use of licence plate recognition (LPR) systems. As a fully certified development partner of Milestone Systems, Powell Tronics has developed integration between the Milestone surveillance platform and ImproNet.

Visitors will press a button to dispense a tag when they reach the entrance or checkpoint booms and swipe this against the nearby proximity reader. At this point the tag will be paired with the vehicle’s number plate. On leaving the premises, the card will need to be placed in a drop box before exit is permitted. If the LPR camera identifies the vehicle registration as not being the correct one linked to the proximity tag, it will send out an alarm and disallow visitor exit. This eliminates the opportunity for motor vehicle theft.

Powell emphasises that a system is only as good as its users and the benefits which can be derived are relative to the amount of effort customers put into using both the system’s features as well as the data it produces. Customising a solution to a user’s needs and providing full training will contribute to increased functionality of the system.

For more information contact Powell Tronics, +27 (0)861 787 2537, marketing@­powelltronics.com, www.p-tron.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
Protecting citizens’ identities: a shared responsibility
Access Control & Identity Management
A blind spot in identity authentication today is still physical identity documents. Identity cards, passports, and driver’s licences, biometric or not, are broken, forged, or misused, fueling global trafficking networks and undermining public trust in institutions.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Luxury residential access
Access Control & Identity Management Residential Estate (Industry)
Clifftown Shore is an exclusive collection of 51 luxury 1, 2 and 3-bedroom seafront apartments and penthouses set within a protected conservation park area, served by CAME’s XiP system and door entry system.

Read more...
From identity to insight
neaMetrics Access Control & Identity Management
Identity outlives technology. When it is trusted, it becomes a foundation for insight and scale. When it is not, every system built on it inherits the risk. Identity quality matters, at both human and system levels, and getting it right is what allows security to endure.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.