Securing the best level of access control for your business

1 June 2013 Access Control & Identity Management

Continuous research into and development of access control solutions means businesses can take advantage of a wider selection of low-cost technology. This technology is designed to offer complete security and empower decision makers with control over the environment.

In a market that is more aware of the need to protect physical assets of businesses and also regulate disciplines such as time and attendance and access control, HR and payroll experts at Accsys offers sound advice about what technology is available and how it can add value.

Decision makers must consider which areas of the business requires protection and to what extent should they be protected. “Access control is not only about regulating who enters and exits the business premises, or managing where employees are at any given time, it is also about monitoring who has access to a system, when, where and for what reason this access is used,” says Teryl Schroenn, CEO of Accsys.

She points out that high-risk areas, such as data centres, corporate networks, stock rooms and administration systems, require specific attention in terms of access control. Once the core requirements have been identified, the next step is to identify what hardware would best suit the environment.

Solutions available today are engineered and designed to facilitate real-time communications, to automatically update systems and issue instant reports. For example, operations within the retail and manufacturing industries need robust infrastructure that can withstand heavy-duty conditions and high-impact use, Schroenn adds.

The system should also correlate and support control mechanisms that may be in place, such as turnstiles, booms, booths, CCTV and other forms of access control. Innovation and advances in technology enable companies to control access and time and attendance systems remotely.

While decision makers have a choice in what type of solutions to put in place, there can be no compromise on what the technology should do. Infrastructure must ensure accurate, timely reading of data and reporting functionality to the system, allowing decision makers to focus on core strategy instead of having to spend time on ensuring processes and procedures take place.

There must be a level of control in place to combat issues such as buddy clocking, unauthorised access and time theft. According to the company biometric solutions continue to gain popularity in the market, with fingerprint identification being the most prominent form of application and interface.

At the same time there is growing interest in deeper levels of identification, including voice/facial recognition (using identification of the iris, for example). Biometric technology is gaining popularity within the access control space because it is manageable, accurate, quick and cost-effective claims Schroenn.

She says that as long as there are threats to businesses, be they internal or external, innovative time and attendance and access control hardware will remain relevant – and the space competitive.

* Continuous research and development into access control solutions means businesses can take advantage of a wider selection of low-cost technology.

* It is important for decision makers to consider which areas of the business require protection and to what extent they should be protected.

* When reviewing potential access control hardware, it is important to consider which areas of the business require protection and to what extent should they be protected.

* Solutions available today are engineered and designed to facilitate real-time communication, to automatically update systems and issue instant reports.

* High risk areas like data centres, corporate networks, stock rooms and administration systems require specific attention in terms of access control.

* Biometric solutions continue to gain popularity in the market, with fingerprint identification being the most prominent form of application and interface.

For more information contact Accsys, +27 (0)11 719 8000, pr@accsys.co.za, www.accsys.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Read more...
Access Selection Guide 2024
Access Control & Identity Management
The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.

Read more...
Biometrics Selection Guide 2024
Access Control & Identity Management
The Biometrics Selection Guide 2024 incorporates a number of hardware and software biometric identification systems aimed at the access and identity management market of today.

Read more...
Smart intercoms for Sky House Projects
Nology Access Control & Identity Management Residential Estate (Industry)
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app.

Read more...
Authentic identity
HID Global Access Control & Identity Management
As the world has become global and digital, traditional means for confirming authentic identity, and understanding what is real and what is fake have become impractical.

Read more...
Research labs secured with STid Mobile ID
Access Control & Identity Management
When NTT opened its research centre in Silicon Valley, it was looking for a high-security expert capable of protecting the company’s sensitive data. STid readers and mobile ID solutions formed part of the solution.

Read more...
Is voice biometrics in banking secure enough?
Access Control & Identity Management AI & Data Analytics
As incidents of banking fraud grow exponentially and become increasingly sophisticated, it is time to question whether voice banking is a safe option for consumers.

Read more...
Unlocking efficiency and convenience
OPTEX Access Control & Identity Management Transport (Industry)
The OVS-02GT vehicle detection sensor is the newest member of Optex’s vehicle sensor range, also known as ‘virtual loop’, and offers reliable motion detection of cars, trucks, vans, and other motorised vehicles using microwave technology.

Read more...
Protecting our most vulnerable
NEC XON Access Control & Identity Management Products & Solutions
In a nation grappling with the distressing rise in child kidnappings, the need for innovative solutions to protect our infants has never been more critical. South Africa finds itself in the throes of a child abduction pandemic.

Read more...
Understanding the power of digital identity
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
The way we perceive business flourishing is undergoing a paradigm shift, as digital identity and consumer consent redefine the dynamics of transactions, says Shanaaz Trethewey.

Read more...