Eliminate the visitor book

Access & Identity Management Handbook 2018 Access Control & Identity Management

It is common knowledge that the typical archaic visitor book just does not fit the bill as far as reliable visitor and contractor data gathering is concerned. Exid has locally developed and manufactured a solution that obviates the inaccuracies inherent to visitor books.

The eSkan barcode scanner is a robust and cost-effective alternative that allows security officers to quickly and easily validate the owner of the driver’s licence card and link them to the vehicle in which they have entered business parks and residential estates. Not only does this provide enhanced security of premises, but furthermore the superior reporting features allow the end user to determine trends in terms of traffic flow to specific areas as well as identify busy time periods, thereby allowing measures to be implemented that decrease bottlenecks.

Exid’s Shaun van Tonder says that the company has worked closely with Access Track, a company that specialises in capturing and managing visitor and contractor data, to develop a customised solution that collects accurate information directly from barcoded driver’s licence cards and vehicle registration discs.

The customised software developed by Exid is used in Access Track’s workflow solution which allows users to set up steps that the security guards need to follow when using the eSkan reader.

Once data is captured by the reader, cloud-based servers at Access Track are used to interrogate a number of interfaces to check criminal and community policing databases. This allows Access Track to quickly notify security providers of potential suspect vehicles while providing visibility of such sightings to law enforcement agencies. Van Tonder points out that since implementation of the system, reaction by security providers based on such sightings has resulted in the successful arrest of suspects.

Deployed at a number of business and residential estates, this access control solution is able to gather information on people and vehicles entering and exiting premises in real time.

Van Tonder explains that the eSkan may be used to automatically check that the vehicle used by a specific driver when entering the premises is the same vehicle in which the driver exits the property. By linking the vehicle to the driver at the outset, an alarm will automatically be activated should a driver try to exit the property in an unlinked vehicle. While different protocols are used on different sites, in general the guard is then prompted to disallow the exit of the driver and further action can then be taken, thereby dissuading criminality.

eSkan lets end users pinpoint exactly where on the premises a visitor is going and allows the setting up of a log specifically for contractor management. This forces all contractors to provide a valid identification for entry into the premises. The system also allows end users to blacklist people and vehicles, further enhancing the scope of the integrated criminal databases.

Applications where eSkan is proving popular include:

• Traffic fine management at car and trailer rental operations;

• Asset control;

• Logistics companies, where one can scan drivers on exit and re-entry and provide information on the times the driver left the facilities and then returned; and

• OHS, whereby one can determine in real time exactly how many visitors and contractors are on site, thus allowing one to quickly see if anybody is missing at a muster point, should an emergency occur.

Because the eSkan hardware is designed and manufactured locally, it is able to cope with the demanding conditions found in South Africa. Furthermore, a large technical support facility, extended warranties and the availability of parts and consumables, means that customers receive a fast turnaround on any technical queries and issues they may have.

“Aftermarket support is one of our big differentiators, coupled with the reliability, longevity and user friendliness of the eSkan unit. Installation is expedited with ease by the end user and licence fees are included in the purchase price, so no further costs are incurred. A rental option is available on request for those end users preferring not to purchase outright. While we have developed a number of standard backend solutions, we are also able to customise solutions that fit the end user’s specific requirements,” says Van Tonder.

For more information, contact Exid, +27 (0)12 548 0940, shaun@exid.co.za, www.exid.co.za

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Effective access control
Flow Systems Access Control & Identity Management Products & Solutions
Flow Systems has introduced its new Extra Heavy Duty Industrial Rising Vehicle Barrier, which provides a high level of protection. It is a traditional-looking control barrier with the benefits of high-level physical protection.

Newport Aquarium replaces traditional locks and keys
Paxton Access Control & Identity Management Entertainment and Hospitality (Industry)
Newport Aquarium wanted to replace its old security system with an easy-to-use and high-security access control solution to keep the animals, visitors, and staff safe. The solution was Net2, a PC-based access control system that offers centralised administration.

Protecting our most vulnerable
Access Control & Identity Management
In a nation grappling with the distressing rise in child kidnappings, the need for innovative solutions to protect our infants has never been more critical. South Africa finds itself in the throes of a child abduction pandemic.

New generation of cyber-focused controllers
Gallagher News & Events Access Control & Identity Management Products & Solutions
The C7000 gives users an opportunity to leverage their hardware and firmware to build a platform designed to catapult their organisation into the future, with cybersecurity baked in from inception.

New T&A terminal features revolutionary AI technology
Suprema News & Events Access Control & Identity Management AI & Data Analytics
Suprema has launched BioStation 2a, the world’s first deep learning-based fingerprint recognition solution, providing powerful access control features and an improved ability to extract templates from low-quality fingerprints.

Unlocking efficiency and convenience
OPTEX Access Control & Identity Management
The OVS-02GT vehicle detection sensor is the newest member of OPTEX’s vehicle sensor range, also known as ‘virtual loop’, and offers reliable motion detection of cars, trucks, vans, and other motorised vehicles using microwave technology.

Access to data centre secured
Suprema Access Control & Identity Management Infrastructure
GBM required a modern access control system to increase the security of its facilities in a productive environment without affecting the operation of the offices and the data centre, which are carried out 24/7/365.

Enhanced security at Xanadu Nature Estate
Turnstar Systems Access Control & Identity Management Products & Solutions
Turnstar Systems recently installed two bicycle turnstiles at the 240-hectare Xanadu Nature Estate, set in the Magaliesberg, the perfect location for secure communal living catering to the lifestyle of residents.

Digital identity verification checks to pass 70 billion in 2024
Access Control & Identity Management News & Events
A new study from Juniper Research has found that the number of digital identity verification checks will surpass 70 billion in 2024, growing 16% on the previous year’s number of 61 billion.

Reliable access management for famous film location
Paxton Access Control & Identity Management Residential Estate (Industry)
The Royal Connaught Park features a private swimming pool, health and fitness suite, outdoor tennis court and onsite parking, with over 100 residents coming and going every day.