Deploying an integrated access control solution

Access & Identity Management Handbook 2019 Access Control & Identity Management, Integrated Solutions

At busy premises such as university campuses, residential estates, corporate offices or business parks, the volume of pedestrian traffic can be immense. The challenge of controlling access into these premises and then controlling where staff and visitors go within the premises is one that requires careful consideration and planning and the deployment of solutions that are suited to the specific requirements of the environment.

Gary Chalmers from iPulse Systems says that he continues to be amazed at the amount of money South Africans spend on security and knowing who their staff are, only to allow “arbitrary people onto their premises after they have scribbled some random information onto a piece of paper (the visitor log book). Visitors have been the most neglected aspect of office security for a long time, and given the access to information in South Africa, this is really not necessary.”

According to Chalmers, the key aspects to any good visitor system can be encapsulated into three areas:

At perimeter entrances: This is really about vehicles, and tracking the information about the car and the driver. Using one of the many scanners available, it is easy to scan a licence disc, scan a driver’s licence, and add some additional information, such as how many people are in the vehicle, or where they are going. Any good visitor system should cater for this, and allow the secure searching of that information to get data, such as ‘a white car in the morning containing three people’.

At the reception: This should allow quick, seamless identification, whereby a South African ID number can be verified against one of the many databases available, and for foreigners, a slightly more in-depth review and scan/copy of their identity document. Again, all this should be stored for later retrieval, in a manner which is compliant with the PoPI Act.

In remote areas: This should be handled through a centralised enrolment system, whereby visitors who wish to go to unsupervised or remote areas are first enrolled or added to a system, preferably biometrically, then granted access at a specific date/time by the system to an area through a biometric-controlled access system.

Mike Austen from Powell Tronics says that once the person enters the physical building, biometrics work best in this environment and a number of systems can be integrated into and managed from one single platform. “How secure the institution would like the areas to be would dictate the use of readers in and out of a door or the use of a push button to exit a door. These access control systems can then all be integrated with the CCTV system, alarm system and fire alarm for instance.”

Chalmers says that iPulse’s VisitorIQ.cloud is a cloud-based biometric access control system, which is completely integrated into IQSuite.cloud, the company’s access control system. This allows visitors to be enrolled once, and then ‘activated’ on the system for a period of time, on a specific sub set of biometric readers, to acquire full control of who goes where in the facilities.

“Most of the data centres in South Africa use this particular system to control access, as it allows clear control and reporting, whilst also providing an additional benefit of incorporating health and safety videos to validate that people have seen the information they need to see. Features like badge printing, integration with web-based portals and calendars add additional flexibility and control,” says Chalmers.

In terms of extending these systems to include access to logical assets like the network and business software assets, Austen believes that this would be dependent on how the ‘assets’ are to be monitored and if an integration is possible. “In other words, will the supplier provide a set of functions and procedures that allow the creation of applications which access the features or data of an operating system, application, or other service (APIs)?”

Chalmers says that with a full integration into Microsoft’s Active Directory, staff can be granted biometric access to their machines, based on their access rights to the building. Integration can go as far as forcing computers to log off when a person leaves the building, or reporting when a PC is being accessed when the PC’s operator is recorded as being off site.

Access control solution providers should be able to reassure clients that certain standards are adhered to in order to ensure their access and identity systems can be integrated with either new or even legacy systems. Chalmers says that in order to achieve this, one should always capture prints in multiple formats to ensure that clients can migrate their database in the future.

He points out that while iPulse uses its own Secugen algorithm for biometric extraction and matching, the system also records the ANSI standard to ensure that the enrolled database can be used by any other system in the future. “Furthermore, the platform uses a tightly controlled API for easy integration into any other system, such as CCTV, existing ticketing systems or almost any piece of hardware, such as breathalysers and tablets, to allow for a seamless view of data from any angle.”

Austen adds that once you have established which brands are commonly used on most platforms, you can then decide on the backend system. “It is far more cost effective in the long term to go with a well-known nationally supported brand that integrates and is compatible with most platforms. Some companies have their own in-house development teams that make this type of integration much easier for their clients.”

For more information contact

• Powell Tronics, 0861 784 357, [email protected], www.p-tron.co

• iPulse, 0860 IPULSE, [email protected], www.ipulse.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

SMART and secure estates in Cape Town
Technews Publishing Axis Communications SA Gallagher DeepAlert Nemtek Electric Fencing Products Editor's Choice
In February 2024, SMART Security Solutions emigrated to the Western Cape to host its first SMART Estate Security Conference in the region in many years. For the day, we took over the prestigious D’Aria Wine Estate.

Read more...
Integrated, mobile access control
SA Technologies Entry Pro Technews Publishing Access Control & Identity Management
SMART Security Solutions spoke to SA Technologies to learn more about what is happening in the estate access world and what the company offers the residential estate market.

Read more...
New ransomware using BitLocker to encrypt data
Technews Publishing Information Security Residential Estate (Industry)
Kaspersky has identified ransomware attacks using Microsoft’s BitLocker to attempt encryption of corporate files. It can detect specific Windows versions and enable BitLocker according to those versions.

Read more...
Bespoke access for prime office space
Paxton Access Control & Identity Management Residential Estate (Industry)
Nicol Corner is home to a six-star fitness club, prime office space, and an award-winning rooftop restaurant. It is also the first building in South Africa to have its glass façade fully incorporate fritted glazing, saving 35% on energy consumption.

Read more...
SMART Estate Security returns to KZN
Nemtek Electric Fencing Products Technews Publishing Axis Communications SA OneSpace Editor's Choice News & Events Integrated Solutions IoT & Automation
The second SMART Estate Security Conference of 2024 was held in May in KwaZulu-Natal at the Mount Edgecombe Estate Conference Centre, which is located on the Estate’s pristine golf course.

Read more...
Next-generation facial recognition access control system
Enkulu Technologies Products & Solutions Access Control & Identity Management Residential Estate (Industry)
With a modern and innovative design, iDFace is the ideal device for monitoring and controlling people entering and exiting a building using facial recognition technology, including liveness detection, for enhanced security.

Read more...
Long-distance vehicle identification
Products & Solutions Access Control & Identity Management Residential Estate (Industry)
The STid SPECTRE reader can identify vehicles up to 14 metres away, across four traffic lanes, ensuring secure access to an estate without disrupting the traffic flow.

Read more...
Multi-modal access control solutions
Suprema neaMetrics Products & Solutions Access Control & Identity Management Residential Estate (Industry)
Suprema’s latest multi-modal access terminals are top-of-the-range, highly secure, easy to install, and easy to use. They feature biometrics, mobile access, and RFID and are both PoPIA and GDPR compliant.

Read more...
Battery-powered video doorbells
Ring Products & Solutions Access Control & Identity Management Residential Estate (Industry)
Ring has announced the latest addition to its line of video doorbells. The Battery Video Doorbell Pro builds on the capabilities of its predecessor, providing greater value and convenience for homeowners.

Read more...
Tackling estate entrance challenges
Turnstar Systems Products & Solutions Access Control & Identity Management Residential Estate (Industry)
The Velocity Raptor’s retractable spikes deter criminals from entering estate premises; equipped with LED lights, it provides visibility during the day and night, and in adverse conditions.

Read more...