classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2018


Deploying an integrated access control solution
November 2018, Access Control & Identity Management, Integrated Solutions

At busy premises such as university campuses, residential estates, corporate offices or business parks, the volume of pedestrian traffic can be immense. The challenge of controlling access into these premises and then controlling where staff and visitors go within the premises is one that requires careful consideration and planning and the deployment of solutions that are suited to the specific requirements of the environment.

Gary Chalmers from iPulse Systems says that he continues to be amazed at the amount of money South Africans spend on security and knowing who their staff are, only to allow “arbitrary people onto their premises after they have scribbled some random information onto a piece of paper (the visitor log book). Visitors have been the most neglected aspect of office security for a long time, and given the access to information in South Africa, this is really not necessary.”

According to Chalmers, the key aspects to any good visitor system can be encapsulated into three areas:

At perimeter entrances: This is really about vehicles, and tracking the information about the car and the driver. Using one of the many scanners available, it is easy to scan a licence disc, scan a driver’s licence, and add some additional information, such as how many people are in the vehicle, or where they are going. Any good visitor system should cater for this, and allow the secure searching of that information to get data, such as ‘a white car in the morning containing three people’.

At the reception: This should allow quick, seamless identification, whereby a South African ID number can be verified against one of the many databases available, and for foreigners, a slightly more in-depth review and scan/copy of their identity document. Again, all this should be stored for later retrieval, in a manner which is compliant with the PoPI Act.

In remote areas: This should be handled through a centralised enrolment system, whereby visitors who wish to go to unsupervised or remote areas are first enrolled or added to a system, preferably biometrically, then granted access at a specific date/time by the system to an area through a biometric-controlled access system.

Mike Austen from Powell Tronics says that once the person enters the physical building, biometrics work best in this environment and a number of systems can be integrated into and managed from one single platform. “How secure the institution would like the areas to be would dictate the use of readers in and out of a door or the use of a push button to exit a door. These access control systems can then all be integrated with the CCTV system, alarm system and fire alarm for instance.”

Chalmers says that iPulse’s VisitorIQ.cloud is a cloud-based biometric access control system, which is completely integrated into IQSuite.cloud, the company’s access control system. This allows visitors to be enrolled once, and then ‘activated’ on the system for a period of time, on a specific sub set of biometric readers, to acquire full control of who goes where in the facilities.

“Most of the data centres in South Africa use this particular system to control access, as it allows clear control and reporting, whilst also providing an additional benefit of incorporating health and safety videos to validate that people have seen the information they need to see. Features like badge printing, integration with web-based portals and calendars add additional flexibility and control,” says Chalmers.

In terms of extending these systems to include access to logical assets like the network and business software assets, Austen believes that this would be dependent on how the ‘assets’ are to be monitored and if an integration is possible. “In other words, will the supplier provide a set of functions and procedures that allow the creation of applications which access the features or data of an operating system, application, or other service (APIs)?”

Chalmers says that with a full integration into Microsoft’s Active Directory, staff can be granted biometric access to their machines, based on their access rights to the building. Integration can go as far as forcing computers to log off when a person leaves the building, or reporting when a PC is being accessed when the PC’s operator is recorded as being off site.

Access control solution providers should be able to reassure clients that certain standards are adhered to in order to ensure their access and identity systems can be integrated with either new or even legacy systems. Chalmers says that in order to achieve this, one should always capture prints in multiple formats to ensure that clients can migrate their database in the future.

He points out that while iPulse uses its own Secugen algorithm for biometric extraction and matching, the system also records the ANSI standard to ensure that the enrolled database can be used by any other system in the future. “Furthermore, the platform uses a tightly controlled API for easy integration into any other system, such as CCTV, existing ticketing systems or almost any piece of hardware, such as breathalysers and tablets, to allow for a seamless view of data from any angle.”

Austen adds that once you have established which brands are commonly used on most platforms, you can then decide on the backend system. “It is far more cost effective in the long term to go with a well-known nationally supported brand that integrates and is compatible with most platforms. Some companies have their own in-house development teams that make this type of integration much easier for their clients.”

For more information contact

• Powell Tronics, 0861 784 357, marketing@powelltronics.com, www.p-tron.co

• iPulse, 0860 IPULSE, info@ipulse.co.za, www.ipulse.co.za


Credit(s)
  Share via Twitter   Share via LinkedIn      

Further reading:

  • Directory of access and identity management suppliers 2019
    November 2018, Access Control & Identity Management

  • From the editor’s desk: Converging access control
    November 2018, Technews Publishing, News
    Welcome to the Access & Identity Management Handbook 2019. We’re publishing this in January as opposed to our traditional end-of-year publishing schedule to make sure you have some bed-time reading for ...
  • Open source identity initiative
    November 2018, Access Control & Identity Management
    Industry-first open source identity initiative promises to eliminate vendor lock-in and reduce costs for governments around the world.
  • Significant differences in ­perceptions on state of digital trust
    November 2018, CA Southern Africa, Access Control & Identity Management, Security Services & Risk Management
    Nearly half of businesses admit to selling customer data, despite claiming data ­protection as paramount; consumer behaviour shows strong correlation between loss of business and lack of digital trust.
  • Trust but continually verify
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Hi-Tech Security Solutions looks at access and identity management and asks some industry players what ‘zero trust’ and ‘least privilege’ access means.
  • Managing who, what and why
    November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security
    Today’s access control isn’t only concerned with who has access, but also what has access, why they need it and what they are doing with it.
  • Physical/logical convergence
    November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Integrated Solutions, IT infrastructure
    The convergence between physical and logical (or cyber) security will be a game-changer because it will change the way we do everything, from planning to design and all the way to installation and maintenance.
  • Physical and logical convergence is a fact
    November 2018, This Week's Editor's Pick, Integrated Solutions, IT infrastructure
    Convergence, the next buzzword? A dated buzzword? Is convergence ­merely ­integration on steroids? What is convergence?
  • The expanding role of IT in access control
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, IT infrastructure
    What role is IT playing in the world of physical access control and how far will its role expand in future?
  • Taking augmented identity to the world
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    Hi-Tech Security Solutions spoke to Gary Jones, VP Global Channel and Marketing biometric access and time solutions) at IDEMIA (formerly Morpho) about his career with the company and its new vision of Augmented Identity.
  • A scan of fingerprint biometrics
    November 2018, Technews Publishing, Access Control & Identity Management
    Given the increase in the use of fingerprint technology in public and private organisations, as well as some recent announcements on the reliability or lack or reliability of certain types of sensors and algorithms in the fingerprint biometric market, Hi-Tech Security Solutions spoke to some of the leading fingerprint biometric vendors in the market to find out more about the state of this market.
  • BIMS set to change identity ­management
    November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Local biometrics integrator, Ideco Biometric Security Solutions, has announced that its Biometric Identity Management System (BIMS) has been launched to market.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.