The benefits of electronic visitor management

Residential Estate Security Handbook 2019 Access Control & Identity Management, Residential Estate (Industry)

Access control is as critical an aspect of estate security as the perimeter as it represents the controls put in place to restrict entry (and possibly exit) along the outer boundary of the location. And while many estates are comfortable using the old visitors book in the mistaken belief that this represents secure access control, most have advanced to the level where electronic systems are used to log entry and exit, as well as accurate details of people as they come and go, from residents to visitors to contractors.

John Powell

Hi-Tech Security Solutions asked John Powell, CEO of Powell Tronics, a company with a range of integrated solutions, imported and home-grown, for some insights into the current state of visitor management technology for estates

Hi-Tech Security Solutions: Are you finding that estates are paying more attention to visitor management in their security plans than before?

Powell: Yes, mainly because of the accuracy around data capturing of visitors allowing for razor-sharp reporting and history of transactions. The site is also able to enjoy faster data access if information is required, depending on the scenario.

HSS: Why are more people opting for electronic visitor management solutions rather than traditional visitor books etc.?

Powell: The ease of accessing data relevant to the site is enhanced. If the site is using a pre-authorisation system, such as Powell Tronics’ PT-GUEST, this will allow for shorter queueing times and better flow of traffic in and out of the estate.

HSS: Apart from recording a name and telephone number, what can modern visitor management systems record about visitors?

Powell: Depending on the system in place, visitor management systems such as PT-GUEST can capture biographical data in the form of driver’s licence information and licence registrations from the licence disc. In certain instances an image of the visitor can be captured, along with manual capturing of the details of a visitor that arrives on site with a foreign driver’s licence.

HSS: Do these applications take additional data into account when recording new visitor information – such as a legally licensed car or a suspicious number plate etc.?

Powell: Very much so. PT-GUEST can pick up on expired driver’s licences and expired vehicle licenses. Suspicious number plates can be scanned against the number plate affixed to the respective vehicle. Powell Tronics is also looking into ways of building a database of suspicious vehicles.

HSS: What can be done to use technology to ensure that visitors who enter during a day all leave before the end of the day?

Powell: Usually an estate will place a ‘cap’ on contractors who require access for deliveries or who are completing work on a resident’s house. This typically expires at 19:00. A 24-hour cap can be placed on all visitors who may be staying past midnight or who require additional flexibility. All access rights will be removed when the visitor leaves.

HSS: What does the visitor management solution you provide include and accomplish for estates? Can you scale your system for different size locations and different requirements?

Powell: Visitor management has become a key priority for all sites, whether it’s convenience or high security that you require. Through the knowledge base that has been developed by Powell Tronics over the past five years since releasing its first visitor management solution, the company’s PT-GUEST can assist with simple stand-alone systems up to the most complex requirements.

Driver’s licence and vehicle disc scanning via portable scanners is fully supported using the latest decryption technology on Android devices and ios. Powell Tronics’ latest versions of both platforms were made available at the end of April 2019.

PT-GUEST allows authorised tenants or residents to request a Personal Access Code (PAC), via SMS or a Web interface, for their visitors to use on keypad readers at key entry points on entry. These PAC codes are valid for a specified time period to cater for pre-scheduled visits, but will only be valid for a single entry and exit. The visitor details and PAC numbers are automatically entered into the local database for transactional history reporting.

Once the visitor has entered the facility, an SMS, email or push notification on the app is sent to the tenant to notify them that their visitor is on site. As soon as the visitor exits the estate with their assigned code, PT-GUEST removes the PAC number from the PT-GUEST visitor system ensuring that it cannot be used again. The solution assists in improving coordination between the visitor, security guard at the entrance and the residents.

HSS: How do you protect the data you collect – which would obviously be sensitive data such as ID numbers etc.?

Powell: The data stream is encrypted and the database is encrypted. The information collected remains the property of the site/estate. The database and software is installed on a dedicated desktop. The database is accessible by the estate and any entity the estate has authorised. In terms of protection of the information, one can utilise password protection measures to ensure that access to sensitive information is protected.


Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Suprema ranks first in survey
Issue 2 2021, Suprema, neaMetrics , News, Access Control & Identity Management
In a recent survey conducted in Korea, Suprema was chosen as the top brand for access control management software and mobile access solutions.

Suprema integrated with Nedap
Issue 2 2021, Suprema , Access Control & Identity Management, News
Suprema recently announced that it has integrated its latest facial recognition devices into Nedap's access control system, AEOS, to enable organisations to manage their access control by making use of Suprema’s latest facial recognition technology.

Continual electric fence monitoring
Issue 2 2021 , Perimeter Security, Alarms & Intruder Detection, Residential Estate (Industry)
In today’s security conscious world, one of the top priorities of residential estate living is ensuring that the electric fence is always operational.

Single bollard stops and destroys simulated bomb truck
Issue 2 2021 , Access Control & Identity Management
Delta Scientific announced the successful testing of its Model DSC635, a single shallow foundation bollard design that stops and destroys a 6804 kg test truck with less than 0.6 m of static penetration and 1.87 m of dynamic penetration.

Size of OSDP-verified list is underappreciated
Issue 2 2021 , Access Control & Identity Management
Farpointe Data announced that, at first glance, it appears that there are just 25 devices from seven different vendors listed as OSDP Verified. Although that doesn't seem like a lot, it really is.

Mail.Ru selects HID Global
Issue 2 2021, HID Global , Access Control & Identity Management
HID Global announced that Mail.Ru has chosen its HID Mobile Access solution for secure and convenient access control using smartphones and other mobile devices.

Paxton hires top talent in South Africa
Issue 1 2021, Paxton , News, Access Control & Identity Management
The international access control and video surveillance manufacturer, Paxton, announced it will continue to invest in new talent to accelerate expansion into the South African market.

Gallagher achieves UK cybersecurity standard
Issue 1 2021, Gallagher , Access Control & Identity Management, Cyber Security, Government and Parastatal (Industry)
The Gallagher UK CPNI CAPSS High Security System features compliances to the Cyber Assurance for Physical Security Systems (CAPSS) standard, and the Centre for the Protection of National Infrastructure (CPNI) Readers and Tokens standards.

OSDP verified readers/credentials preferred
Issue 1 2021 , Access Control & Identity Management, News
Farpointe is among the first three manufacturers to have earned the SIA’s new OSDP Verified mark on its mobile, contactless smartcard and proximity solutions, while simultaneously finding that OSDP is specified more than ever before.

Three key areas for zero-trust access
Issue 1 2021, Cyber Security South Africa , Editor's Choice, Access Control & Identity Management, Cyber Security
Protecting the network with this zero-trust access (ZTA) approach means that all users, all devices and all web applications from the cloud must be trusted, authenticated, and have the correct amount of access privilege (and no more).