Deploying an integrated access control solution

Access & Identity Management Handbook 2019 Access Control & Identity Management, Integrated Solutions

At busy premises such as university campuses, residential estates, corporate offices or business parks, the volume of pedestrian traffic can be immense. The challenge of controlling access into these premises and then controlling where staff and visitors go within the premises is one that requires careful consideration and planning and the deployment of solutions that are suited to the specific requirements of the environment.

Gary Chalmers from iPulse Systems says that he continues to be amazed at the amount of money South Africans spend on security and knowing who their staff are, only to allow “arbitrary people onto their premises after they have scribbled some random information onto a piece of paper (the visitor log book). Visitors have been the most neglected aspect of office security for a long time, and given the access to information in South Africa, this is really not necessary.”

According to Chalmers, the key aspects to any good visitor system can be encapsulated into three areas:

At perimeter entrances: This is really about vehicles, and tracking the information about the car and the driver. Using one of the many scanners available, it is easy to scan a licence disc, scan a driver’s licence, and add some additional information, such as how many people are in the vehicle, or where they are going. Any good visitor system should cater for this, and allow the secure searching of that information to get data, such as ‘a white car in the morning containing three people’.

At the reception: This should allow quick, seamless identification, whereby a South African ID number can be verified against one of the many databases available, and for foreigners, a slightly more in-depth review and scan/copy of their identity document. Again, all this should be stored for later retrieval, in a manner which is compliant with the PoPI Act.

In remote areas: This should be handled through a centralised enrolment system, whereby visitors who wish to go to unsupervised or remote areas are first enrolled or added to a system, preferably biometrically, then granted access at a specific date/time by the system to an area through a biometric-controlled access system.

Mike Austen from Powell Tronics says that once the person enters the physical building, biometrics work best in this environment and a number of systems can be integrated into and managed from one single platform. “How secure the institution would like the areas to be would dictate the use of readers in and out of a door or the use of a push button to exit a door. These access control systems can then all be integrated with the CCTV system, alarm system and fire alarm for instance.”

Chalmers says that iPulse’s VisitorIQ.cloud is a cloud-based biometric access control system, which is completely integrated into IQSuite.cloud, the company’s access control system. This allows visitors to be enrolled once, and then ‘activated’ on the system for a period of time, on a specific sub set of biometric readers, to acquire full control of who goes where in the facilities.

“Most of the data centres in South Africa use this particular system to control access, as it allows clear control and reporting, whilst also providing an additional benefit of incorporating health and safety videos to validate that people have seen the information they need to see. Features like badge printing, integration with web-based portals and calendars add additional flexibility and control,” says Chalmers.

In terms of extending these systems to include access to logical assets like the network and business software assets, Austen believes that this would be dependent on how the ‘assets’ are to be monitored and if an integration is possible. “In other words, will the supplier provide a set of functions and procedures that allow the creation of applications which access the features or data of an operating system, application, or other service (APIs)?”

Chalmers says that with a full integration into Microsoft’s Active Directory, staff can be granted biometric access to their machines, based on their access rights to the building. Integration can go as far as forcing computers to log off when a person leaves the building, or reporting when a PC is being accessed when the PC’s operator is recorded as being off site.

Access control solution providers should be able to reassure clients that certain standards are adhered to in order to ensure their access and identity systems can be integrated with either new or even legacy systems. Chalmers says that in order to achieve this, one should always capture prints in multiple formats to ensure that clients can migrate their database in the future.

He points out that while iPulse uses its own Secugen algorithm for biometric extraction and matching, the system also records the ANSI standard to ensure that the enrolled database can be used by any other system in the future. “Furthermore, the platform uses a tightly controlled API for easy integration into any other system, such as CCTV, existing ticketing systems or almost any piece of hardware, such as breathalysers and tablets, to allow for a seamless view of data from any angle.”

Austen adds that once you have established which brands are commonly used on most platforms, you can then decide on the backend system. “It is far more cost effective in the long term to go with a well-known nationally supported brand that integrates and is compatible with most platforms. Some companies have their own in-house development teams that make this type of integration much easier for their clients.”

For more information contact

• Powell Tronics, 0861 784 357, [email protected], www.p-tron.co

• iPulse, 0860 IPULSE, [email protected], www.ipulse.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

From the editor's desk: We’ve only just begun
Technews Publishing News & Events
The surveillance market has expanded far beyond the analogue days of just recording and/or monitoring screens. The capabilities of surveillance technology today extend to black screen monitoring with ...

Read more...
The future of the surveillance channel
Duxbury Networking Technews Publishing Elvey Security Technologies SMART Security Solutions Surveillance
The video surveillance market has evolved from camera-based specifications to integrated solutions that solve customers’ problems. Moreover, the growth of AI and cloud has changed the channel even more, with more to come.

Read more...
The benefits of offsite control rooms
Astrosec Surveillance Integrated Solutions
As the security landscape grows more intricate, control rooms – the crucial hub of security operations – need to adapt. With escalating costs, mounting threats, and a heightened demand for immediate responses, many organisations are reassessing the operations of their control rooms.

Read more...
AI means proactive surveillance
DeepAlert Technews Publishing SMART Security Solutions AI & Data Analytics Surveillance
SMART Security Solutionsasked DeepAlert for some insight into how AI is transforming video surveillance, even to the extent of it being taught to protect the privacy of those in the cameras’ view.

Read more...
edgE:Tower video analytics integrated with SEON
Surveillance Integrated Solutions AI & Data Analytics
Sentronics has announced a new integration between its edgE:Tower advanced AI-driven video analytics solution and SEON, a Central Monitoring Software (CMS) platform. This integration enhances real-time situational awareness and automated threat detection for control rooms.

Read more...
The state of the VMS market
Arteco Global Africa Milestone Systems Cathexis Technologies Technews Publishing Surveillance
SMART Security Solutions asked three platform vendors in South Africa, one that is developed and maintained in the country with an international market, for their views on the state of the VMS market and where it is headed.

Read more...
Amendments to the Private Security Industry Regulations
Technews Publishing Agriculture (Industry) News & Events Associations
SANSEA, SASA, National Security Forum, CEO, TAPSOSA, and LASA oppose recently published Amendments to the Private Security Industry Regulations regarding firearms.

Read more...
The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Local is a lekker challenge
Secutel Technologies Technews Publishing AI & Data Analytics
There are a number of companies focused on producing solutions locally, primarily in the software arena, but we still have hardware producers churning out products, many doing business locally and internationally.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...