Reliability a fundamental in visitor management

Access & Identity Management Handbook 2019 Access Control & Identity Management, Integrated Solutions, Security Services & Risk Management

With the rapid evolution of biometric technology, there are many options available in the marketplace that promise varying levels of performance. This can create a quagmire of choices for security decision makers. The most important elements for consideration in our demanding South African environment and to satisfy the need for maximised security, would be reliability with limited downtime.

With the need for reliability it is wise to link the security system to the source data, in this case the institution’s enterprise software or an estates management software. “The most successful implementations, where data reliability is optimised, can be found in projects where there is a deep integration between the source/host data and the access control solution. This also contributes in many cases to the elimination of manual entries by operators and security,” says John Powell, CEO of Powell Tronics.

On the physical access side and due to the often-harsh outdoor installation requirements, the technology performing the identification function must be robust and be rated for outdoor use. Choosing a product that is well tested in your particular vertical market with a solid track record in South Africa is vital.

Some of the new technology that is available focuses on contactless biometric terminals that use either face (still susceptible to ideal environments) or wave technology (extremely forgiving and fast).

The most challenging user group for these sites is effectively managing visitors as this is often the most vulnerable point, with many unique site complexities to manage. Again, a visitor solution that is fully integrated with the source data, access control and visitor management removes various pitfalls that occur when these various systems are not operated in a unified manner.

Optimal reporting is all about the quality, integrity and availability of the data that is being reported on. Where there are large numbers of users with complex access requirements it is essential that the reporting is done based on individual requirements.

If the access control system and, for instance the visitor management system, are not fully linked there will be no way of reporting on a visitor’s entry or exit through the access control system.

With a fully integrated solution you would be able to take advantage of the ability to schedule an automated report that will provide vital data such as contractors remaining on site after a particular time or those visitors who are on site in the event of an emergency. Often sites have internal access points that allow limited authorised access, which requires specific management and reporting.

Through deep integration, if the source data is coming from the site’s membership, enterprise or estate software, elimination of data entry by security can be drastically reduced and ensures accuracy and improved performance with added reliability. By instituting features like pre-authorisation through host validation one can eliminate the security officer from the equation in terms of decision making, thereby allowing security to focus on the security aspect of the entry and exit points.

Compliance is key

The PoPI Act is based around the principles of consent and purpose. This is not a South African phenomenon as can be seen globally through EU legislation around GDPR. Security companies and other organisations may only collect personal information from a visitor (data subject) with their consent and for the specific purpose of visiting the premises. Further to this, the manner in which information is stored and collected needs to be conducted in line with the PoPI Act. It is important that appropriate and reasonable organisational and technical measures should be implemented.

Cybersecurity protection practices such as the use of encryption on computers or tablets and smartphones demonstrates responsibility taken by the estate, thus ensuring appropriate data privacy action steps are being taken. This will include password-protected databases which are hosted and under the security umbrella of the site’s network where an SLA should be in place to cover the responsible disposal of data collected.

The PoPI Act does not place emphasis on the duration of time personal information can be kept, rather that personal information should not be kept longer than is reasonably necessary. The principle that should be applied is that when the validity of the purpose for which personal data is being stored is no longer applicable it should no longer be kept. It is permissible to keep it longer for reasonable business purposes but this must be defined in an approved retention policy.

Powell believes that one should first establish the site requirements before installing a backend system. This leads to critical emphasis on the infrastructure required and focuses on aspects such as visitor management, access control, CCTV and even the logistical considerations for contractors who require access to the site, since there may be a need for separate entrances.

“Due care must be given to areas such as ease of access or convenience, and what level of security the site needs in order to keep occupants safe and enhance the flow of traffic in and out of the estate or premises. Foresight must be given to the growing demands and future-proofing that may be required in order for the site to function optimally. Scalability and budgeting components will also need to come under the spotlight in comparison to the value proposition sought by respective stakeholders,” says Powell.

For more information contact Powell Tronics, 0861 784 357, marketing@powelltronics.com, www.p-tron.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

“This Is Theft!” SASA slams Mafoko Security
News & Events Security Services & Risk Management Associations
The Security Association of South Africa (SASA) has issued a stark warning that the long-running Mafoko Security Patrols scandal is no longer an isolated case of employer misconduct, but evidence of a systemic failure in South Africa’s regulatory and governance structures.

Read more...
Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
Protecting citizens’ identities: a shared responsibility
Access Control & Identity Management
A blind spot in identity authentication today is still physical identity documents. Identity cards, passports, and driver’s licences, biometric or not, are broken, forged, or misused, fueling global trafficking networks and undermining public trust in institutions.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.