Visiting visitor management

Access & Identity Management Handbook 2014 Asset Management, Access Control & Identity Management

As visitor management becomes more important to control who enters a building or business park, we’re seeing more technology being adopted to allow management companies to better control access. While there are still far too many businesses using the guard at the gate with a tattered visitor’s book, systems such as driver’s licence scanners or biometric readers are becoming more important.

Hi-Tech Security Solutions spoke to Luke Dunstan, director of Bartrans to understand the latest developments in the visitor management industry.

Hi-Tech Security Solutions: How has visitor management changed over the past year or two?

Luke Dunstan: With the Protection of Personal Information Act (PoPI) due to be in full force by 2014, we’re seeing a huge move towards mobile devices replacing the traditional visitor books. Bartrans imports the Honeywell scanning and mobility range of enterprise-ready mobile devices running WEH6.5 and Android operating systems. We then add value to these devices by enabling them to connect to various visitor management solutions, thus enabling systems integrators to offer a service to their customers.

HSS: What, in your opinion, is the best solution to visitor management?

Luke Dunstan: By using the camera on the mobile device to scan the number plate on the vehicle using ANPR (automatic number plate recognition) and then using the embedded 2D imager to scan the round licence disk, we’re able to compare what is physically on the vehicle to what the licence disk says is on the vehicle. Using these mobile devices, we’re now able to also scan and decode the national driver’s licences thus linking the driver to the vehicle quickly and efficiently. The addition of a biometric fingerprint module serves as acceptance of the visitor to the terms and condition of entry or they can sign on screen.

HSS: Some companies use technology to manage their visitors, but the question is always raised as to what happens to the visitor’s information?

Luke Dunstan: The responsibility for the management and integrity of the data within the system relies on the service provider and the stakeholder, thus the visitor should be allowed the option to have their information removed from any database.

By managing the data captured responsibly and ensuring that PoPI is not breached, the information relating to a visit can be securely stored either on or off site. The trick in the security industry will be how long this data is kept, since if an incident is reported, the user of the system will need to interrogate the database and check the history.

A good way to handle this is to encrypt all data, thus preventing it falling into the wrong hands or being of any use to a third party.

HSS: How does your company handle visitors management and the information it collects?

Luke Dunstan: We leave this task up to the system integrator, as there are many different policies and solutions in place. We prefer a securely hosted environment with encryption, but every customer tends to have their own policies in place. PoPI will guide the industry in terms of this. As in most mobile solutions there is a client application running on the mobile device and a host applications to which it connects.

Whether the data is collected online using WiFi/GSM or in a batch mode when systems are down, the data needs to be protected in case of loss or theft of the mobile device. By encrypting all the data on a local file store, like an SD card for example, you ensure that the information collected is of no use to another party.

HSS: Everyone is talking about cloud computing. Would it be possible/desirable (or does it already exist) to have a single database of identities through which the identities of visitors could be verified?

Luke Dunstan: In an ideal world there would be one central database, but currently this is not feasible. Identifying your own subset and hosting that database or adding to it seems far more realistic. Automated Biometric Bureaus (ABB) containing fingerprint and other biometric data are certainly the way of the future.

Cloud-based visitor management systems certainly do exist and these are especially useful in situations where staff have to enter multiple sites that may be separated by vast geographical distances. Tying their visit into the company’s IT policy by enabling their corporate laptop to connect to the intranet using a MAC address and IP address for example is also a good use of such technology.

For more information, contact Luke Dunstan, Bartrans, +27 (0)11 552 8245, luke@bartrans.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Access & identity expectations for 2024
Technews Publishing IDEMIA ZKTeco Gallagher Salto Systems Africa Regal Distributors SA Reditron Editor's Choice Access Control & Identity Management Information Security AI & Data Analytics
What does 2024 have in store for the access and identity industry? SMART Security Solutions asked several industry players for their brief thoughts on what they expect this year.

Read more...
Access and identity in 2024
Technews Publishing Gallagher HID Global IDEMIA Ideco Biometrics Enkulu Technologies neaMetrics Editor's Choice Access Control & Identity Management Integrated Solutions
SMART Security Solutions hosted a round table discussion with various players in the access and identity market, to find out what they experienced in the last year, as well as their expectations for 2024.

Read more...
The promise of mobile credentials
Technews Publishing Suprema neaMetrics HID Global Editor's Choice Access Control & Identity Management IoT & Automation
SMART Security Solutions examines the advantages and disadvantages of mobile credentials in a market dominated by cards and fobs, in which biometrics is viewed as a secure alternative.

Read more...
Prepare for cyber-physical attacks
Gallagher Information Security Access Control & Identity Management
As the security landscape continues to evolve, organisations must fortify their security solutions to embrace the changing needs of the security and technology industries. Nowhere is this more present than with regard to cybersecurity.

Read more...
Unleash the full potential of AI at the edge
Suprema AI & Data Analytics Access Control & Identity Management
Efficient AI algorithms, when embedded in edge access control devices, enable companies to optimise their use of AI and edge processing to deliver reliable and fast authentication.

Read more...
Paxton appoints Werner Geldenhuys as Country Sales Manager for South Africa
Paxton News & Events Access Control & Identity Management
Paxton has appointed Werner Geldenhuys as its new Country Sales Manager for South Africa; To lead the team to continue providing smart yet simple-to-use security systems in South Africa.

Read more...
Gallagher Security releases Command Centre v9
Gallagher News & Events Access Control & Identity Management Integrated Solutions
Richer features, greater integrations, with the release of Gallagher Security’s Command Centre v9 security site management software designed to integrate seamlessly with various systems and hardware.

Read more...
Lock down your access control with Alcatraz AI
C3 Shared Services Healthcare (Industry) Access Control & Identity Management AI & Data Analytics
Alcatraz AI, represented in South Africa by C3 Shared Services, changes access control by harnessing the power of artificial intelligence and analytics at the edge, where facial recognition becomes the essential credential autonomously.

Read more...
Simplify AARTO compliance for fleets
Guardian Eye IoT & Automation Asset Management Transport (Industry) Logistics (Industry)
While there are challenges around the management and implementation of the AARTO Amendment Act, there are also benefits that need to be understood today to ensure compliance and value tomorrow.

Read more...
New generation of cyber-focused controllers
Gallagher News & Events Access Control & Identity Management Products & Solutions
The C7000 gives users an opportunity to leverage their hardware and firmware to build a platform designed to catapult their organisation into the future, with cybersecurity baked in from inception.

Read more...