Identifying good visitor management practices
November 2018, Access Control & Identity Management, Asset Management, EAS, RFID
There are a number of factors that security managers need to consider when implementing visitor management and access control protocols. According to Excellent ID’s Riaan van den Berg, securing a device that eliminates the issues around traditional visitor logbooks entails careful due diligence and a request from suppliers that they provide a portfolio of success stories.
“Apart from the problem of highly inaccurate and often illegible information provided in paper-based visitor log books, visitors are often disinclined to write down their personal information in a medium which can be read by many people. By using an electronic device to capture and verify personal data, such as that found in a South African Driver’s Licence (SADL), visitors can be assured that the data is safe from prying eyes,” says van den Berg.
Additionally, with the exception of data that is contained in a blacklist database, captured data is generally kept for only a very short period of time. “Using an electronic device with its associated software means that one can also add specific people to the blacklist, thereby helping to build up a reliable database of known offenders. And because one can log into the system at any stage, real-time data is available for reporting purposes,” he adds.
The use of an electronic identity-scanning device does not obviate the need for rules of access. Security officers need to be well trained and versed in the systematic capture of visitor data and should be able to react quickly and efficiently when a person flagged on the blacklist tries to gain access. However, a lot of the decision making is taken out of the security officer’s hands since the verification of personal identity data is automated when using an SADL reader,” says van den Berg.
It is important when selecting an identification verification device to ensure that it complies with the PoPI Act. Van den Berg explains that EXID’s own back end software as well as the physical eSkan device work together with the responsible operations manager on site to guarantee that all data is collected in accordance with the PoPI Act.
The back end system for such a data collection device requires very little investment in terms of infrastructure. Typically the system would require a PC and a network and/or access to the cloud as the throughput speeds required are minimal compared to the capture of surveillance footage, for example.
“This, together with actual cost of the device and its accompanying software, means that the solution is extremely cost effective. For example, the overall cost of the solution for a single site with one entry/exit, one security officer, one scanner together with installation, training and Wi-Fi infrastructure (excluding a PC/server) could start at under R50 000. The benefits derived from capturing accurate, verifiable visitor data are apparent but security managers do need to do their homework in terms of aligning themselves with a reputable provider,” says Van den Berg.
For more information contact EXID, +27 12 548 0940, firstname.lastname@example.org, www.exid.co.za
- Directory of access and identity management suppliers 2019
November 2018, Access Control & Identity Management
- Open source identity initiative
November 2018, Access Control & Identity Management
Industry-first open source identity initiative promises to eliminate vendor lock-in and reduce costs for governments around the world.
- Significant differences in perceptions on state of digital trust
November 2018, CA Southern Africa, Access Control & Identity Management, Security Services & Risk Management
Nearly half of businesses admit to selling customer data, despite claiming data protection as paramount; consumer behaviour shows strong correlation between loss of business and lack of digital trust.
- Trust but continually verify
November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions, IT infrastructure
Hi-Tech Security Solutions looks at access and identity management and asks some industry players what ‘zero trust’ and ‘least privilege’ access means.
- The expanding role of IT in access control
November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, IT infrastructure
What role is IT playing in the world of physical access control and how far will its role expand in future?
- Taking augmented identity to the world
November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
Hi-Tech Security Solutions spoke to Gary Jones, VP Global Channel and Marketing biometric access and time solutions) at IDEMIA (formerly Morpho) about his career with the company and its new vision of Augmented Identity.
- A scan of fingerprint biometrics
November 2018, Technews Publishing, Access Control & Identity Management
Given the increase in the use of fingerprint technology in public and private organisations, as well as some recent announcements on the reliability or lack or reliability of certain types of sensors and algorithms in the fingerprint biometric market, Hi-Tech Security Solutions spoke to some of the leading fingerprint biometric vendors in the market to find out more about the state of this market.
- BIMS set to change identity management
November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions, IT infrastructure
Local biometrics integrator, Ideco Biometric Security Solutions, has announced that its Biometric Identity Management System (BIMS) has been launched to market.
- Tracking biometrics into a brave new digital world
November 2018, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
The industry is increasingly transitioning from unimodal to more integrated multimodal biometric solutions for more accurate identity verification and faster real-time results.
- Panasonic’s Face Recognition Server
November 2018, Panasonic South Africa, Access Control & Identity Management, CCTV, Surveillance & Remote Monitoring, Products
Panasonic has adopted deep learning technology in its face recognition products that overcomes the difficulties of conventional technologies.
- A better approach to fingerprint biometrics
November 2018, This Week's Editor's Pick, Access Control & Identity Management
Not all optical biometric fingerprint scanners are created equal. The type of sensor used has a powerful impact on speed, accuracy, reliability and portability.
- Your face tells a story
November 2018, Technews Publishing, Access Control & Identity Management, CCTV, Surveillance & Remote Monitoring, Government and Parastatal (Industry)
Facial recognition has advanced to the point where it can be rolled out over large areas and accuracy is no longer a hit-and-miss affair.