classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn

Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2018

Involve users in design
November 2017, Access Control & Identity Management

One of the biggest obstacles to the successful operation of an access control system is the end user not being involved in the design of the solution. This is especially significant given the current trend towards adopting an IoT (Internet of Things) approach to technology deployment.

Ingo Mutinelli.
Ingo Mutinelli.

“It’s all very well being able to go online for ease of use across a platform that integrates solutions, but without the know-how to leverage all the features of the technology and to use it correctly, it will quickly become a liability rather than an asset,” says Ingo Mutinelli, business development director at Elvey. “After commissioning the system, the installer leaves site and the end user is then faced with actually implementing the access control system. Increasing frustration by end users when trying to use access control systems may result in the system being deferred.”

The first step in the process is naturally a risk assessment and this should be a collaborative effort between the installer/integrator and the end user. Subsequently, the end user, for example, security manager, estate manager or facility manager, needs to set up authority rights to ensure that the correct people are using the system and that the right technology is being used in the right places.

“If you want to use a T&A (time & attendance) system to increase efficiencies and reduce time ‘stolen’ by employees, then it is important for the end user to consider the main entry and exit points, the areas of congregation, the high-risk areas, and the areas where easy access is necessary to improve ­traffic flow. It is important that, when attempting to mitigate security risk, one does not implement a system that aggravates bottlenecks in specific high-traffic areas. This will simply lead to employee frustration and furthermore could have serious health and safety implications in the event of emergencies and evacuation procedures,” says Mutinelli.

Most installers will impress on the end user that they need to implement certain changes in their daily lives to accommodate the new access control system. Resistance may be found when end users realise that the system, because it is geared around either increasing security or providing a T&A service, will no doubt result in stricter control around entry and exit points.

End users are often suspicious around technology adoption, regarding it as invasive and a hindrance. A mindset and behavioural change is therefore required to ensure that the system is used to its full potential. The system user needs to be comfortable with using the system and this can be ensured through thorough training on the use of the system, by both the employees and the people responsible for the enrolment process.

“On this note, while in many business environments the human resources department may be the obvious choice for capturing personnel fingerprints, I strongly advise that the enrolment process be undertaken in conjunction with guidance from either the company’s technical team or security division. Successfully capturing the employee’s fingerprint credentials becomes an exercise in bridging that gap of disconnect,” says Mutinelli.

Hand-in-glove with this is the importance of deploying a system that is fit for purpose. Mutinelli cites an office environment where access using biometric fingerprint readers and RFID cards is generally quite straightforward. However, if one considers an industrial environment where employees often have dirty hands or there is lots of dust present, then one needs to use suitable solutions that can overcome the issues experienced with the higher rejection rates typically experienced here.

Mutinelli advises that regardless of why an end user is using access control technology, they must prioritise selecting tried and tested biometrics brands which are developed to suit specific environments. An example here would be the ruggedised units designed to withstand arduous conditions on construction and mining sites. In addition, all solutions should be configured and customised to the end user’s needs, taking into consideration how people move through the building, relative to those areas where technology is required to protect high security areas.”

  Share via Twitter   Share via LinkedIn      

Further reading:

  • More than locking the door
    April 2019, Technews Publishing, Salto Systems Africa, ZKTeco, Entertainment and Hospitality (Industry), Access Control & Identity Management, Asset Management, EAS, RFID
    Electronic locks offer hotels far more than simply a more convenient way to manage doors, they can be integrated into a host of other systems and services.
  • Wide-area surveillance on estates, farms and other large properties
    April 2019, Protoclea Advanced Image Engineering, Access Control & Identity Management, Integrated Solutions
    Using the right solution to protect large, open areas can be accomplished with the right technology and planning.
  • Visible light facial recognition
    April 2019, ZKTeco, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    ZKTeco recently expanded its reach in the facial recognition market with the launch of its new series of visible light facial recognition (VLFR) products.
  • Split design hotel door
    April 2019, ZKTeco, Products, Access Control & Identity Management
    LH7500 hotel door locks are the latest models from ZKTeco’s Smart Lock series with elegant designs and support for Mifare cards and the EU standard mortise.
  • Slim hotel door lock
    April 2019, ZKTeco, Products, Access Control & Identity Management
    The LH7000 hotel door lock is the latest from the ZKTeco Smart lock series, supporting Mifare cards and the EU standard mortise.
  • People Mobility Management solution
    April 2019, Secutel Technologies, Access Control & Identity Management
    Secutel launches the latest Matrix COSEC time and attendance, and people mobility management solution.
  • Optimise cost by mixing and matching
    April 2019, Suprema, Access Control & Identity Management
    By combining different Suprema readers based on their individual benefits, greater flexibility is provided for meeting the demand for cost effectiveness and quality.
  • Alastair McPhail joins Jarrison
    April 2019, Jarrison Systems, News, Access Control & Identity Management
    Alastair McPhail has taken the position of national marketing manager at time and attendance manufacturers, Jarrison Systems.
  • Increased monetisation and enhanced security
    April 2019, Elvey Security Technologies , CCTV, Surveillance & Remote Monitoring, Integrated Solutions
    The deployment of various products in the control room space have allowed installers and service providers to monetise their products and services, and increase their overall offerings to the industry.
    April 2019, ASSA ABLOY South Africa, Access Control & Identity Management, Products
    ASSA ABLOY South Africa has announced the launch of the new ExiSAFE panic and emergency exit hardware from the UNION brand.
  • Kyalami Estate uses Boomgate barriers
    April 2019, BoomGate Systems, Access Control & Identity Management, Products
    Kyalami Estates install Boomgate barriers for streamlined entrance and exit to the estate.
  • Access in the mobile era
    April 2019, Suprema, Products, Access Control & Identity Management
    BioStar 2 Mobile Card offers convenience to end-users by storing biometric information, to function as a credential, in their own smartphones.

Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Terms & conditions of use, including privacy policy
PAIA Manual
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.