Slow and steady wins the access race

Issue 1 2020 Editor's Choice, Commercial (Industry)

There seems to be absolutely no good news about the South African economy these days. Nevertheless, while the political shenanigans continue, the rest of us need to do what we can to keep companies afloat and protect people and assets against the growing criminal scourge.

In the commercial sector, while it would be ideal to implement security protocols to keep the unwanted elements away, businesses need to allow the right people to access premises with as little inconvenience as possible. Hi-Tech Security Solutions asked two industry leaders for their input on securing commercial spaces, specifically with respect to the various access control options available today.

When a company owns or rents an entire premises, it can control all the access according to its own policies and processes. However, access control is somewhat more complex in multi-tenant environments; one company may take security seriously, but another may not pay any attention to it. This makes it difficult to implement the more modern access solutions, such as facial recognition, which could streamline access and prevent delays.

ZKTeco SA’s CEO, Hendrik Combrinck, says the reality today is that most access control installations are still based on fingerprint and card systems. “Facial recognition, mobile and electronic lock technologies have grown in leaps and bounds, but because of price and logistical challenges per site we still see that card-based and fingerprint systems are the first choice for access control.”

Nashua provides a number of access systems and services to clients. The company’s CEO, Mark Taylor, adds that the company partners with vendors such as ZKTeco, Hikvision, Virdi and Iqtech. These companies offer a range of solutions, from facial to palm and fingerprint readers. “With Iqtech we offer customised cloud and mobile solutions to cater for each customer’s needs.”

Does the cloud mean cost savings?

Using cloud services for security and almost any technology requirements has become more popular due to the reduction in technical challenges users will face as well as the potential reduction in costs. At the same time, there are also concerns regarding the cybersecurity of the systems and the perceived risks – what happens if Internet connectivity and power is lost?

Taylor supports the cloud approach, noting, “Cloud is the preferred method for hosting access control and time and attendance services. This eliminates the hardware cost of an in-house server for the client, and simplifies the support component of a solution.”

In Nashua’s case, he says all access control and time and attendance devices store the transactions locally and send updates to the cloud server periodically. In the event of power failure or an Internet glitch, updates will occur as soon as the service has been restored. Moreover, devices are always installed with a UPS backup.

Combrinck admits that cloud-based access control is gaining popularity internationally, but says it is still a rare commodity because of the perceived cyber risk involved. “Most of the cloud-based systems offer offline technology that is built into the hardware, so the sites can still function even if the Internet is not available. Some of the online features will not be available, but the sites will still be able to function in an offline state.”

However, he adds, “From our sales and experience in South Africa, we see that 90% of the hardware bought from us is still installed on a local area network per site.”

What about new technologies?

Readers of the Access & Identity Management Handbook 2020 will have noticed that facial recognition and access via mobile devices received a fair amount of attention and are slated for good growth. (If you haven’t seen the handbook, the publication is available in various formats at www.securitysa.com/aim20.)

Addressing facial recognition technologies, as far as Combrinck is concerned “there is no doubt that facial recognition technology will be taking over the biometrics market very soon. This is mainly due to the fact that more companies are capable of doing facial recognition as compared to fingerprint recognition because it is camera based instead of sensor based. Another big factor is that the testing samples are much bigger than fingerprints because it is much easier to snap a photo of a face than to get a fingerprint.”

Combrinck also notes that the last and most important point in favour of facial recognition technologies is that facial recognition is touchless and less intrusive than other biometric technologies. “As for the reliability, we can only talk about what we experience in the market. Since we launched our new Visible Light Facial Recognition devices in October last year, we have not received one complaint that a face of any colour, race or gender can’t be recognised.”

Taylor is also positive about facial technology. “Facial recognition has been a reality and widely used in South Africa for a number of years. In fact, we use it in the Nashua building. The latest readers also offer deep learning algorithms, which means the system learns and adapts every time it scans your face.

A simple example Taylor provides is when someone grows a beard. He was initially enrolled without a beard, but the device will learn and adapt the algorithm to recognise the face with a beard. In addition, he explains.

As far as mobile technology usage is concerned, Combrinck notes that this is not a new concept at all and the first versions of access control via mobile apps were already available in the early 2010s. “The new movement in the market for mobile is that a user is biometrically authenticated on the mobile app first before being able to gain access with a credential sent to the reader. The main aim of this technology is that it is supposed to be more convenient and user friendly, but the low sales prove the opposite.”

The market’s access demands

As noted above, the market may be aware of the latest technologies in the commercial access control space, but the majority of solutions bought and installed are still the ‘old faithfuls’.

Taylor says the biggest demand currently is still for biometric and NFC card readers (most readers can do both card and a PIN). He says facial recognition is mostly misunderstood, but is gaining acceptance.

Combrinck says ZKTeco’s main biometric seller in the market is fingerprint-based devices. “In the last few years, however, we have seen that facial recognition is picking up substantially and we do feel that this will definitely be our main biometric technology in the near future.”

For more information contact:

• Nashua, [email protected], www.nashua.co.za

• ZKTeco (SA), +27 12 259 1047, [email protected], www.zkteco.co.za


Credit(s)





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Autonomous construction site protection
Editor's Choice Perimeter Security, Alarms & Intruder Detection
Ajax provides an autonomous security solution for a German construction site that is easy and flexible to install. It provides security against intrusions and theft via a 360-degree view.

Read more...
SMART and secure estates in Cape Town
Technews Publishing Axis Communications SA Gallagher DeepAlert Nemtek Electric Fencing Products Editor's Choice
In February 2024, SMART Security Solutions emigrated to the Western Cape to host its first SMART Estate Security Conference in the region in many years. For the day, we took over the prestigious D’Aria Wine Estate.

Read more...
Integrated, mobile access control
SA Technologies Entry Pro Technews Publishing Access Control & Identity Management
SMART Security Solutions spoke to SA Technologies to learn more about what is happening in the estate access world and what the company offers the residential estate market.

Read more...
New ransomware using BitLocker to encrypt data
Technews Publishing Information Security Residential Estate (Industry)
Kaspersky has identified ransomware attacks using Microsoft’s BitLocker to attempt encryption of corporate files. It can detect specific Windows versions and enable BitLocker according to those versions.

Read more...
SMART Estate Security returns to KZN
Nemtek Electric Fencing Products Technews Publishing Axis Communications SA OneSpace Editor's Choice News & Events Integrated Solutions IoT & Automation
The second SMART Estate Security Conference of 2024 was held in May in KwaZulu-Natal at the Mount Edgecombe Estate Conference Centre, which is located on the Estate’s pristine golf course.

Read more...
Creating employment through entrepreneurship
Technews Publishing Marathon Consulting Editor's Choice Integrated Solutions Residential Estate (Industry)
Eduardo Takacs’s journey is a testament to bona fide entrepreneurial resilience, making him stand out in a country desperate for resilient businesses in the small and medium enterprise space that can create employment opportunities.

Read more...
From the editor's desk: Just gooi a cable
Technews Publishing News & Events
      Welcome to the 2024 edition of the SMART Estate Security Handbook. We focus on a host of topics, and this year’s issue also has a larger-than-normal Product Showcase section. Perhaps the vendors are ...

Read more...
Kaspersky finds 24 vulnerabilities in biometric access systems
Technews Publishing Information Security
Customers urged to update firmware. Kaspersky has identified numerous flaws in the hybrid biometric terminal produced by international manufacturer ZKTeco, allowing a nefarious actor to bypass the verification process and gain unauthorised access.

Read more...
2024 Southern Africa OSPAs winners announced
Editor's Choice
The 2024 Southern Africa Outstanding Security Performance Awards (OSPAs) winners were revealed on Tuesday, June 11th, at the Securex South Africa Seminar Theatre hosted by SMART Security Solutions.

Read more...
Resident management app shows significant growth
Editor's Choice
My Estate Life is a mobile app for residents and managers in housing estates and buildings. Its core aim is to be an easy gateway for residents to manage visitors and staff, and to communicate and administer general property in a simple interface.

Read more...