Involve users in design
November 2017, Access Control & Identity Management
One of the biggest obstacles to the successful operation of an access control system is the end user not being involved in the design of the solution. This is especially significant given the current trend towards adopting an IoT (Internet of Things) approach to technology deployment.
“It’s all very well being able to go online for ease of use across a platform that integrates solutions, but without the know-how to leverage all the features of the technology and to use it correctly, it will quickly become a liability rather than an asset,” says Ingo Mutinelli, business development director at Elvey. “After commissioning the system, the installer leaves site and the end user is then faced with actually implementing the access control system. Increasing frustration by end users when trying to use access control systems may result in the system being deferred.”
The first step in the process is naturally a risk assessment and this should be a collaborative effort between the installer/integrator and the end user. Subsequently, the end user, for example, security manager, estate manager or facility manager, needs to set up authority rights to ensure that the correct people are using the system and that the right technology is being used in the right places.
“If you want to use a T&A (time & attendance) system to increase efficiencies and reduce time ‘stolen’ by employees, then it is important for the end user to consider the main entry and exit points, the areas of congregation, the high-risk areas, and the areas where easy access is necessary to improve traffic flow. It is important that, when attempting to mitigate security risk, one does not implement a system that aggravates bottlenecks in specific high-traffic areas. This will simply lead to employee frustration and furthermore could have serious health and safety implications in the event of emergencies and evacuation procedures,” says Mutinelli.
Most installers will impress on the end user that they need to implement certain changes in their daily lives to accommodate the new access control system. Resistance may be found when end users realise that the system, because it is geared around either increasing security or providing a T&A service, will no doubt result in stricter control around entry and exit points.
End users are often suspicious around technology adoption, regarding it as invasive and a hindrance. A mindset and behavioural change is therefore required to ensure that the system is used to its full potential. The system user needs to be comfortable with using the system and this can be ensured through thorough training on the use of the system, by both the employees and the people responsible for the enrolment process.
“On this note, while in many business environments the human resources department may be the obvious choice for capturing personnel fingerprints, I strongly advise that the enrolment process be undertaken in conjunction with guidance from either the company’s technical team or security division. Successfully capturing the employee’s fingerprint credentials becomes an exercise in bridging that gap of disconnect,” says Mutinelli.
Hand-in-glove with this is the importance of deploying a system that is fit for purpose. Mutinelli cites an office environment where access using biometric fingerprint readers and RFID cards is generally quite straightforward. However, if one considers an industrial environment where employees often have dirty hands or there is lots of dust present, then one needs to use suitable solutions that can overcome the issues experienced with the higher rejection rates typically experienced here.
Mutinelli advises that regardless of why an end user is using access control technology, they must prioritise selecting tried and tested biometrics brands which are developed to suit specific environments. An example here would be the ruggedised units designed to withstand arduous conditions on construction and mining sites. In addition, all solutions should be configured and customised to the end user’s needs, taking into consideration how people move through the building, relative to those areas where technology is required to protect high security areas.”
- Matrix Comsec
Securex 2018 Preview, CCTV, Surveillance & Remote Monitoring, Access Control & Identity Management, Perimeter Security, Alarms & Intruder Detection
Matrix offers telecom and security solutions designed, engineered, and built specifically for growing enterprises. At Securex it will showcase futuristic technologies from the security domain. Matrix ...
- Lowe & Fletcher
Securex 2018 Preview, Access Control & Identity Management
The digital and electronic locks Lowe & Fletcher offer eliminate the need for user keys and so vastly reduce associated costs. The wide range of functionality these locks offer means users have increased ...
- Powell Tronics
Securex 2018 Preview, Powell Tronics, Access Control & Identity Management
The Powell Tronics stand at Securex will offer the latest in advanced access control solutions. The company will be highlighting and demonstrating all its customised developments to a diverse collection ...
Securex 2018 Preview, Suprema, Access Control & Identity Management
Suprema will once again be at Securex with a host of options on display. Of the many products and solutions visitors can see, here are some you can’t miss:
• The BioEntry P2 is a comprehensive access ...
- HISSCO International
Securex 2018 Preview, Hissco, Access Control & Identity Management, Asset Management, EAS, RFID, Security Services & Risk Management
HISSCO International will be showcasing its range of security X-ray and detection systems at this year’s Securex. The company is currently seeking potential partners, distributors and representatives ...
Securex 2018 Preview, Turnstar Systems, Perimeter Security, Alarms & Intruder Detection, Access Control & Identity Management, Security Services & Risk Management
Africa’s largest manufacturer of physical access control products, Turnstar, is excited about its return to Securex this year. Craig Sacks, MD of Turnstar, says that the company will use the Securex platform ...
- ZKTeco South Africa
Securex 2018 Preview, ZKTeco, Access Control & Identity Management, Perimeter Security, Alarms & Intruder Detection, Security Services & Risk Management, Products
Solutions is what ZKTeco is all about for Securex 2018. ZKTeco South Africa will be offering clients an insight into how its products can be integrated into any platform and provide them with a solution ...
Securex 2018 Preview, Access Control & Identity Management
IDEMIA will be displaying a number of technologies at Securex, as well as hosting a customer cocktail meet and greet on the 22nd of May at its stand. It will also be giving away a prize: a smart watch ...
- Duxbury Networking
Securex 2018 Preview, Duxbury Networking, Access Control & Identity Management, CCTV, Surveillance & Remote Monitoring, Products
Duxbury Networking will showcase a range of interactive security solutions at the Securex 2018 exhibition. Visitors to the Duxbury stand will be able to examine the most recent global advances in technologies ...
- Digital ID Technologies
Securex 2018 Preview, Digital ID Technologies, Access Control & Identity Management, Products
Digital ID Technologies’ national ID credentials provide the company with the needed access to stay and prosper within the country’s borders. The same model is implemented daily at facilities where access ...
- Aventura Technologies
Securex 2018 Preview, Access Control & Identity Management, Security Services & Risk Management, Products
The Aventura Technologies scanner products have been developed to detect threats in real time. In an ever-changing security landscape, it is essential to have a well-rounded detection/prevention system ...
- Technology supports fraud prevention
May 2018, ZKTeco, Access Control & Identity Management, Security Services & Risk Management
Recent surveys confirm that internal fraud is growing and threatens overall company profitability and company policies need to be implemented to prevent such from happening.