Next-gen access control in hospitality

1 April 2019 Access Control & Identity Management, Entertainment and Hospitality (Industry)

With its high customer volume, the cash- and labour-intensive hospitality industry needs advanced security technology to ensure a safe environment. The typical environment is generally characterised by many access points, often manned by security personnel who oversee ‘stop-and-check’ stations – effective for security, but vulnerable because of having multiple points of entry.

That is why it has become necessary to integrate technology that offers an holistic view in order to effectively scan and monitor the entire environment say IT security and access control experts at dormakaba.

Paul Chari, principal consultant EDC Solutions at dormakaba, says accessibility is a must for hospitality facilities and venues, but this increases the risk factor. “For easy access, many entrance points are needed and employed. This means the sources and escape route for someone with ill intent becomes difficult to monitor.”

Fortunately, security has kept up with market requirements and demands, particularly within the access control he says. He refers to access control for large crowds as an example. Multi-sensor cameras and facial recognition biometric solutions enables security personnel to instantly and automatically verify personal identities.

“Visitors can be profiled and any red flags can be set to have security personnel react to double check an area/person. The automatic enrolment can eliminate need for barriers across entry points.”

Data gathered through these access control points and biometric-based systems can be quickly gathered, assimilated and correlated to provide an accurate database that can be referenced immediately to bolster security control and enforcement.

Video analytics, big data and robotics are beginning to filter through to security and access control strategies – specifically within the hospitality industry. Chari says: “The ability to flag repeat offenders relieves operators from having to remember or identify faces without support. New operators benefit from gathered intelligence and can immediately be more effective than previously possible. Analytics can also count volumes and be matched to max numbers allowed in an area. A reaction can be solicited before a problem arises.”

Unified communications and integrated systems offer real -time automation and seamless interaction between back-end functions and front-end/customer-facing applications. Centralised smart infrastructure dominates surveillance and security control rooms, and these connect via mobile and wireless networks to allow resources to be deployed quickly and effectively.

Chari explains that control rooms form the hub of any surveillance system. “These allow for controlled deployment of personnel to various points - security, medical or general personnel. Beyond security, hospitality matters can be informed by surveillance issues.”



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Read more...
Access Selection Guide 2024
Access Control & Identity Management
The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.

Read more...
Biometrics Selection Guide 2024
Access Control & Identity Management
The Biometrics Selection Guide 2024 incorporates a number of hardware and software biometric identification systems aimed at the access and identity management market of today.

Read more...
Smart intercoms for Sky House Projects
Nology Access Control & Identity Management Residential Estate (Industry)
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app.

Read more...
Authentic identity
HID Global Access Control & Identity Management
As the world has become global and digital, traditional means for confirming authentic identity, and understanding what is real and what is fake have become impractical.

Read more...
Research labs secured with STid Mobile ID
Access Control & Identity Management
When NTT opened its research centre in Silicon Valley, it was looking for a high-security expert capable of protecting the company’s sensitive data. STid readers and mobile ID solutions formed part of the solution.

Read more...
Is voice biometrics in banking secure enough?
Access Control & Identity Management AI & Data Analytics
As incidents of banking fraud grow exponentially and become increasingly sophisticated, it is time to question whether voice banking is a safe option for consumers.

Read more...
Unlocking efficiency and convenience
OPTEX Access Control & Identity Management Transport (Industry)
The OVS-02GT vehicle detection sensor is the newest member of Optex’s vehicle sensor range, also known as ‘virtual loop’, and offers reliable motion detection of cars, trucks, vans, and other motorised vehicles using microwave technology.

Read more...
Protecting our most vulnerable
NEC XON Access Control & Identity Management Products & Solutions
In a nation grappling with the distressing rise in child kidnappings, the need for innovative solutions to protect our infants has never been more critical. South Africa finds itself in the throes of a child abduction pandemic.

Read more...
Understanding the power of digital identity
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
The way we perceive business flourishing is undergoing a paradigm shift, as digital identity and consumer consent redefine the dynamics of transactions, says Shanaaz Trethewey.

Read more...