classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2018


Integrating access with OHS and operations
November 2018, Access Control & Identity Management, Integrated Solutions

Occupational Health and Safety (OHS) controls have become as important as security controls when it comes to the control of access to a facility or restricted environments. Many clients today need to check and manage statutory accreditations and competency prerequisites prior to allowing personnel and visitors onto their premises or work areas.

Some of these requirements include legislative, HR, health and safety, and accreditation or competency (training and induction) prerequisites. This data is generally managed by the HR department and the security or access control systems merely block or unblock the user’s access manually from time to time when notified that the user’s ‘certification’ is valid or has expired.

Veracitech develops and deploys plug-ins on the Babylon platform for various active client applications; one such application is the Veracitech Babylon Certifications solution.

The plug-in comprises access control and automation, incorporating the certifications prerequisites listed above. These certifications can be defined and managed either directly in the Veracitech Babylon Certifications application or can be integrated with existing HR or other databases.

Various certifications and competencies can be defined in the system, which can then control access to certain areas based on whether the person requesting access meets corporate requirements and vetting. For example:

• Access can be determined by the security level/profile as well as if the user has a valid medical check-up or has been certified in a certain skill required for access to a specific area.

• Before allowing anyone to start a truck or machinery on a plant, the system may first check to ensure the individual’s licence is up to date and that they underwent a breathalyser test that morning before granting access to the truck or machinery.

Feedback to the user and an explanation for Access Denied can also be displayed on the Veracitech interactive touch display modules at the access points. These are fully integrated and managed from the Veracitech Babylon Certifications application.

Babylon Key & Locker Management

Many industrial clients use smart key and locker management systems, such the TRAKA system from ASSA ABLOY to manage who has access to certain keys. Again, here the client traditionally has to control the key management as a separate, standalone system from their access control, security or HR/OHS systems. With intelligent key systems, keys are available 24/7 to authorised staff only, and usage can be managed.

Veracitech has partnered with Traka and is the only authorised system integration partner on the Babylon platform for Traka systems. Veracitech again developed a plug-in for the Babylon platform, the Veracitech Babylon Key & Locker Management solution.

In this solution, high-level database integration with the Traka backend allows key and locker users to be managed seamlessly in the Babylon user database. Access level definitions ensure that full control and management of key and locker rights is centrally administered from the Babylon environment only. Through this high-level Babylon/Traka integration, the client can now incorporate access controls with key/locker controls, and even combine this with the certifications solution mentioned above.

• Access can be allowed / denied based on keys returned: e.g., users can be prevented from leaving the site without returning keys.

• Access rights to keys can be based on not just the key profile, but also the validity of the user’s certifications (users can only withdraw a vehicle or machine key if they have the prerequisite certification status, such as a valid driver’s or operator’s licence on record, or have passed the breathalyser test within the last hour, etc.).

• With the access automation features of XMP-Babylon, one can also control key or locker rights not just by access profile and certification prerequisites, but also by live status processing in the system. For example, a user can only withdraw a key if his manager is badged in and present at the time, or a user can only withdraw a key based on previously areas accessed (or not accessed) within a pre-set period.

• Key and locker alarms and events will also be reported and managed in the XMP-Babylon Alarm and Even Handling, alerting the administrator when keys are not returned on time etc.

There are numerous other applications and integrations Veracitech has developed on the Babylon. All told, Veracitech offers the design, installation, configuration and custom development and integration of multiple security and operational systems into the Babylon platform, which will allow clients to more efficiently manage their operations, even distributed operations, reliably from a central source. Veracitech is a bespoke system engineering house and direct authorised OEM partner for Autec XMP-Babylon systems. The company currently has a client list that includes companies like Anglo Platinum, De Beers, Petra Diamonds, Namdeb, Debmarine, Gemfields, South32, DTI, Transnet and others, including clients in Namibia, Botswana and Mozambique.

For more information, contact Veracitech, +27 11 888 7251, info@veracitech.co.za, www.veracitech.co.za


Credit(s)
  Share via Twitter   Share via LinkedIn      

Further reading:

  • Directory of access and identity management suppliers 2019
    November 2018, Access Control & Identity Management

  • Open source identity initiative
    November 2018, Access Control & Identity Management
    Industry-first open source identity initiative promises to eliminate vendor lock-in and reduce costs for governments around the world.
  • Significant differences in ­perceptions on state of digital trust
    November 2018, CA Southern Africa, Access Control & Identity Management, Security Services & Risk Management
    Nearly half of businesses admit to selling customer data, despite claiming data ­protection as paramount; consumer behaviour shows strong correlation between loss of business and lack of digital trust.
  • Trust but continually verify
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Hi-Tech Security Solutions looks at access and identity management and asks some industry players what ‘zero trust’ and ‘least privilege’ access means.
  • Physical/logical convergence
    November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Integrated Solutions, IT infrastructure
    The convergence between physical and logical (or cyber) security will be a game-changer because it will change the way we do everything, from planning to design and all the way to installation and maintenance.
  • Physical and logical convergence is a fact
    November 2018, This Week's Editor's Pick, Integrated Solutions, IT infrastructure
    Convergence, the next buzzword? A dated buzzword? Is convergence ­merely ­integration on steroids? What is convergence?
  • The expanding role of IT in access control
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, IT infrastructure
    What role is IT playing in the world of physical access control and how far will its role expand in future?
  • Taking augmented identity to the world
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    Hi-Tech Security Solutions spoke to Gary Jones, VP Global Channel and Marketing biometric access and time solutions) at IDEMIA (formerly Morpho) about his career with the company and its new vision of Augmented Identity.
  • A scan of fingerprint biometrics
    November 2018, Technews Publishing, Access Control & Identity Management
    Given the increase in the use of fingerprint technology in public and private organisations, as well as some recent announcements on the reliability or lack or reliability of certain types of sensors and algorithms in the fingerprint biometric market, Hi-Tech Security Solutions spoke to some of the leading fingerprint biometric vendors in the market to find out more about the state of this market.
  • BIMS set to change identity ­management
    November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Local biometrics integrator, Ideco Biometric Security Solutions, has announced that its Biometric Identity Management System (BIMS) has been launched to market.
  • Tracking biometrics into a brave new digital world
    November 2018, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    The industry is increasingly transitioning from unimodal to more integrated multimodal biometric solutions for more accurate identity verification and faster real-time results.
  • Panasonic’s Face Recognition Server
    November 2018, Panasonic South Africa, Access Control & Identity Management, CCTV, Surveillance & Remote Monitoring, Products
    Panasonic has adopted deep learning technology in its face recognition products that overcomes the difficulties of conventional technologies.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.