Integrated biometric access

Access & Identity Management Handbook 2017 Access Control & Identity Management, Integrated Solutions, Education (Industry), Security by Industry Sector

The John Roan School is a secondary comprehensive in Greenwich, south-east London. Founded in 1677, it is one of the oldest state schools in the country. With a brand new, state-of-the art building at Westcombe Park, and a fully redeveloped facility at Maze Hill, John Roan required an improved and upgraded access control solution.

The John Roan School contracted Ideal Security to provide a solution that would enable the school security administrators to manage and control the movement of people across the school grounds. The students at the school had got into the habit of sharing access tokens and PIN numbers, in order to take advantage of restricted areas on the premises. John Roan required a solution that would prevent this practice.

Biometric solution

Russell Webb, of Ideal Security recommended integrating the school’s existing Net2 system with Suprema BioConnect’s identity management platform, to provide a simple end-to-end system for the school security administrators.

Net2 is a user-friendly, flexible networked access control system, designed to make the management of any site straightforward. The ease with which an additional identity management system can be integrated into the Net2 software, meant it provided the ideal framework to meet the school’s growing requirements.

The installation of 31 BioLite Net Readers was initially used to manage the movement of the 300 members of staff across the two school sites. With the completed BioConnect and Net2 software integration, the new system is nowfully operational, managing the flow of over 1600 students and the 300 staff across the school grounds.

The multi-factor authentication required by the BioLite Net readers; PIN, fingerprint, and token, enabled the users to continue using their existing PINs and tokens, with the additional level of security and peace of mind from the biometric authentication. The new system provides a unique record of who is on site, preventing any unauthorised persons from gaining access to restricted areas or from using a borrowed token. Utilising the existing means of identification, while integrating with the new readers has meant disruption to the staff and students was kept to a minimum.

Fast rollout

The simplicity of the Net2 software integration with the BioConnect platform means that John Roan has been able to roll the new system out to more users than anticipated, in a short period of time.

Russell said, “The John Roan School admin loved Net2 for its simplicity and flexibility both for reporting and integration options”. The Net2 and BioConnect platform integration has capitalised on the simplicity that Net2 is known for, to deliver a much improved solution and, most importantly for the John Roan School, a simple administration tool.

For more information contact Paxton, +27 (0)21 427 6691, support@paxtonaccess.co.za, www.paxtonaccess.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Simple steps to protect yourself against identity theft
November 2019 , Access Control & Identity Management
Are you doing enough to reduce the risk of having your identity stolen?

Read more...
Securing perimeters of secure locations
November 2019, Axis Communications SA, Modular Communications, Hikvision South Africa, Nemtek Electric Fencing Products, Technews Publishing, Stafix , Government and Parastatal (Industry), Perimeter Security, Alarms & Intruder Detection, Integrated Solutions
Hi-Tech Security Solutions asked a number of companies offering perimeter security solutions for their insights into protecting the boundaries of national key points.

Read more...
Intelligent analytics and the brains to match
September 2019, Bosch Building Technologies , CCTV, Surveillance & Remote Monitoring, Integrated Solutions
What if the brains behind our security cameras could be trained to improve their cognitive ability to pay attention, learn, and problem-solve according to specific rules and situations?

Read more...
AI-powered autonomous Drone-in-a-Box
September 2019 , CCTV, Surveillance & Remote Monitoring, Integrated Solutions
Organisations in the mining, energy and industrial, oil and gas, ports and terminals sectors can optimise security and business operations, whilst reducing risks and operational costs

Read more...
Looking ahead with mobile access technologies
Access & Identity Management Handbook 2020, Technews Publishing, HID Global, dormakaba South Africa, Salto Systems Africa, Suprema, Gallagher , Access Control & Identity Management, Integrated Solutions
Given the broad use of smartphones around the world and the numerous technologies packed into these devices, it was only a matter of time before the access control industry developed technology that would ...

Read more...
Mobile access is more secure than card systems
Access & Identity Management Handbook 2020 , Access Control & Identity Management
The ability to use mobile phones as access credentials is one of the biggest trends in a market that historically has been slow in adopting new technology.

Read more...
This is the future. This is what we do.
Access & Identity Management Handbook 2020, ZKTeco , Access Control & Identity Management
ZKTeco has created a unique range of visible light facial recognition products combined with a flexible Android platform.

Read more...
The security of biometrics
Access & Identity Management Handbook 2020, ViRDI Distribution SA, IDEMIA , Technews Publishing, Suprema , Access Control & Identity Management
Hi-Tech Security Solutions asks whether your personal biometric data is safe from prying eyes.

Read more...
A picture spoofs a thousand cameras
Access & Identity Management Handbook 2020, NEC XON, Hikvision South Africa, Technews Publishing , Access Control & Identity Management
Hi-Tech Security Solutions looks into the reliability and effectiveness of facial biometrics as well as the concerns about privacy.

Read more...
IoT and behavioural authentication
Access & Identity Management Handbook 2020, CA Southern Africa , Access Control & Identity Management
IoT represents an increasing security risk to individuals in the form of pervasive, always-on monitoring of your personal activity with a potential compromise of your most personal security credentials.

Read more...