Identifying good visitor management practices

Access & Identity Management Handbook 2019 Access Control & Identity Management, Asset Management

There are a number of factors that security managers need to consider when implementing visitor management and access control protocols. According to Excellent ID’s Riaan van den Berg, securing a device that eliminates the issues around traditional visitor logbooks entails careful due diligence and a request from suppliers that they provide a portfolio of success stories.

“Apart from the problem of highly inaccurate and often illegible information provided in paper-based visitor log books, visitors are often disinclined to write down their personal information in a medium which can be read by many people. By using an electronic device to capture and verify personal data, such as that found in a South African Driver’s Licence (SADL), visitors can be assured that the data is safe from prying eyes,” says van den Berg.

Additionally, with the exception of data that is contained in a blacklist database, captured data is generally kept for only a very short period of time. “Using an electronic device with its associated software means that one can also add specific people to the blacklist, thereby helping to build up a reliable database of known offenders. And because one can log into the system at any stage, real-time data is available for reporting purposes,” he adds.

The use of an electronic identity-scanning device does not obviate the need for rules of access. Security officers need to be well trained and versed in the systematic capture of visitor data and should be able to react quickly and efficiently when a person flagged on the blacklist tries to gain access. However, a lot of the decision making is taken out of the security officer’s hands since the verification of personal identity data is automated when using an SADL reader,” says van den Berg.

It is important when selecting an identification verification device to ensure that it complies with the PoPI Act. Van den Berg explains that EXID’s own back end software as well as the physical eSkan device work together with the responsible operations manager on site to guarantee that all data is collected in accordance with the PoPI Act.

The back end system for such a data collection device requires very little investment in terms of infrastructure. Typically the system would require a PC and a network and/or access to the cloud as the throughput speeds required are minimal compared to the capture of surveillance footage, for example.

“This, together with actual cost of the device and its accompanying software, means that the solution is extremely cost effective. For example, the overall cost of the solution for a single site with one entry/exit, one security officer, one scanner together with installation, training and Wi-Fi infrastructure (excluding a PC/server) could start at under R50 000. The benefits derived from capturing accurate, verifiable visitor data are apparent but security managers do need to do their homework in terms of aligning themselves with a reputable provider,” says Van den Berg.

For more information contact EXID, +27 12 548 0940, [email protected],


Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Access Selection Guide 2024
Access Control & Identity Management
The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.

Biometrics Selection Guide 2024
Access Control & Identity Management
The Biometrics Selection Guide 2024 incorporates a number of hardware and software biometric identification systems aimed at the access and identity management market of today.

Smart intercoms for Sky House Projects
Nology Access Control & Identity Management Residential Estate (Industry)
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app.

Authentic identity
HID Global Access Control & Identity Management
As the world has become global and digital, traditional means for confirming authentic identity, and understanding what is real and what is fake have become impractical.

Research labs secured with STid Mobile ID
Access Control & Identity Management
When NTT opened its research centre in Silicon Valley, it was looking for a high-security expert capable of protecting the company’s sensitive data. STid readers and mobile ID solutions formed part of the solution.

Is voice biometrics in banking secure enough?
Access Control & Identity Management AI & Data Analytics
As incidents of banking fraud grow exponentially and become increasingly sophisticated, it is time to question whether voice banking is a safe option for consumers.

Unlocking efficiency and convenience
OPTEX Access Control & Identity Management Transport (Industry)
The OVS-02GT vehicle detection sensor is the newest member of Optex’s vehicle sensor range, also known as ‘virtual loop’, and offers reliable motion detection of cars, trucks, vans, and other motorised vehicles using microwave technology.

Protecting our most vulnerable
NEC XON Access Control & Identity Management Products & Solutions
In a nation grappling with the distressing rise in child kidnappings, the need for innovative solutions to protect our infants has never been more critical. South Africa finds itself in the throes of a child abduction pandemic.

Understanding the power of digital identity
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
The way we perceive business flourishing is undergoing a paradigm shift, as digital identity and consumer consent redefine the dynamics of transactions, says Shanaaz Trethewey.