Securing vanishing stock

March 2011 Access Control & Identity Management

Cabinator catches sticky fingers in the cabinet door.

In a country where theft from your employer is considered a perk of any job, preventing pilfering has become a full time occupation for those tasked with security.

Stock losses from cabinets and cupboards are a problem in many markets, especially in the medical industry where valuable drugs placed on consignment are a sought-after item. Sticky-fingered employees often help themselves to stock in hospitals, resulting in a conflict between the supplier and the customer as to what consignment stock was delivered, what was sold and what vanished without trace. In many instances, without proper stock management, the supplier ends up carrying the loss while the stolen goods are sold for a fortune on the black market. This is a common issue in government hospitals.

Beyond Wireless, a local provider of machine-to-machine communication technology and services intends to resolve this problem and has entered the security market with a new product called The Cabinator.

Ian Lester, MD of Beyond Wireless explains that the Cabinator is a standard metal cabinet that manages stock levels remotely. “An RFID reader is installed in the cabinet, which is matched to the stock held in the cabinet on which is an RFID tag. Every time the cabinet is opened, the event is logged along with the product removed and the change in stock levels noted on a remote server at the supplier’s head office.”

Each cabinet also has an IP camera installed, which records an image of the person opening the door. This ensures those responsible for removing stock cannot claim they were not involved. It also adds a psychological aspect to the process of removing something, knowing you will be photographed and the whole procedure will be audited.

Managers can download reports as required to monitor their stock levels and act on any losses.

A further benefit of the Cabinator is a panic button on the cabinet itself. In quiet locations, staff are often vulnerable to attack. The panic button will allow them to call for help in case of an emergency. The IP camera is also equipped with audio capabilities should it be required.

Security as a service

Instead of buying the physical components of the solution, the customers’ fees cover the hardware, software and services involved in running and monitoring the Cabinator. Clients, such as medical suppliers, can concentrate on their core businesses while Beyond Wireless provides the cabinet and associated technology and monitoring services on a rental basis. This makes managing stock simpler and more accurate, reducing losses due to crime.

Lester adds that the mining industry is also showing interest in the Cabinator. Mines carry costly spare parts which are a target for criminals. Theft of parts is usually only discovered when parts are needed and requested, resulting in unnecessary delays in repairing the systems. And in the mining industry, idle systems means losing substantial revenues. The Cabinator solution addresses this issue by accurately establishing which parts are in stock and which need to be ordered.

He adds that any industry with high-value products that are easy prey for criminals can benefit from the Cabinator. Beyond Wireless currently monitors the temperatures of blood stock for the South African National Blood Service. The Cabinator will be able to assist the organisation in keeping tabs on its stock levels to ensure blood types that are running low are replenished.

The Cabinator is a locally developed solution and is available now.

For more information contact Beyond Wireless Technology, +27 (0)11 243 2960, [email protected], www.beyondwireless.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Read more...
Access Selection Guide 2024
Access Control & Identity Management
The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.

Read more...
Biometrics Selection Guide 2024
Access Control & Identity Management
The Biometrics Selection Guide 2024 incorporates a number of hardware and software biometric identification systems aimed at the access and identity management market of today.

Read more...
Smart intercoms for Sky House Projects
Nology Access Control & Identity Management Residential Estate (Industry)
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app.

Read more...
Authentic identity
HID Global Access Control & Identity Management
As the world has become global and digital, traditional means for confirming authentic identity, and understanding what is real and what is fake have become impractical.

Read more...
Research labs secured with STid Mobile ID
Access Control & Identity Management
When NTT opened its research centre in Silicon Valley, it was looking for a high-security expert capable of protecting the company’s sensitive data. STid readers and mobile ID solutions formed part of the solution.

Read more...
Is voice biometrics in banking secure enough?
Access Control & Identity Management AI & Data Analytics
As incidents of banking fraud grow exponentially and become increasingly sophisticated, it is time to question whether voice banking is a safe option for consumers.

Read more...
Unlocking efficiency and convenience
OPTEX Access Control & Identity Management Transport (Industry)
The OVS-02GT vehicle detection sensor is the newest member of Optex’s vehicle sensor range, also known as ‘virtual loop’, and offers reliable motion detection of cars, trucks, vans, and other motorised vehicles using microwave technology.

Read more...
Protecting our most vulnerable
NEC XON Access Control & Identity Management Products & Solutions
In a nation grappling with the distressing rise in child kidnappings, the need for innovative solutions to protect our infants has never been more critical. South Africa finds itself in the throes of a child abduction pandemic.

Read more...
Understanding the power of digital identity
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
The way we perceive business flourishing is undergoing a paradigm shift, as digital identity and consumer consent redefine the dynamics of transactions, says Shanaaz Trethewey.

Read more...