Next-gen access control in hospitality

1 April 2019 Access Control & Identity Management, Entertainment and Hospitality (Industry)

With its high customer volume, the cash- and labour-intensive hospitality industry needs advanced security technology to ensure a safe environment. The typical environment is generally characterised by many access points, often manned by security personnel who oversee ‘stop-and-check’ stations – effective for security, but vulnerable because of having multiple points of entry.

That is why it has become necessary to integrate technology that offers an holistic view in order to effectively scan and monitor the entire environment say IT security and access control experts at dormakaba.

Paul Chari, principal consultant EDC Solutions at dormakaba, says accessibility is a must for hospitality facilities and venues, but this increases the risk factor. “For easy access, many entrance points are needed and employed. This means the sources and escape route for someone with ill intent becomes difficult to monitor.”

Fortunately, security has kept up with market requirements and demands, particularly within the access control he says. He refers to access control for large crowds as an example. Multi-sensor cameras and facial recognition biometric solutions enables security personnel to instantly and automatically verify personal identities.

“Visitors can be profiled and any red flags can be set to have security personnel react to double check an area/person. The automatic enrolment can eliminate need for barriers across entry points.”

Data gathered through these access control points and biometric-based systems can be quickly gathered, assimilated and correlated to provide an accurate database that can be referenced immediately to bolster security control and enforcement.

Video analytics, big data and robotics are beginning to filter through to security and access control strategies – specifically within the hospitality industry. Chari says: “The ability to flag repeat offenders relieves operators from having to remember or identify faces without support. New operators benefit from gathered intelligence and can immediately be more effective than previously possible. Analytics can also count volumes and be matched to max numbers allowed in an area. A reaction can be solicited before a problem arises.”

Unified communications and integrated systems offer real -time automation and seamless interaction between back-end functions and front-end/customer-facing applications. Centralised smart infrastructure dominates surveillance and security control rooms, and these connect via mobile and wireless networks to allow resources to be deployed quickly and effectively.

Chari explains that control rooms form the hub of any surveillance system. “These allow for controlled deployment of personnel to various points - security, medical or general personnel. Beyond security, hospitality matters can be informed by surveillance issues.”



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...
T&A in South Africa’s retail sector
ERS Biometrics Access Control & Identity Management
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Paxton opens second experience centre
Paxton News & Events Access Control & Identity Management
Security technology manufacturer, Paxton, has opened a new experience centre in Cape Town on 12 February in partnership with its exclusive distributors, Reditron and Regal Security.

Read more...
DoorBell with built-in AI
Ajax Systems Access Control & Identity Management Products & Solutions Smart Home Automation
Ajax Systems has announced the release of Ajax DoorBell, which features built-in AI, an IR sensor, and app control, seamlessly integrating into the Ajax ecosystem to ensure efficiency and security confidence.

Read more...
Physical security evolving beyond security teams
ATG Digital Access Control & Identity Management
The landscape of physical security is undergoing a major shift. Traditionally, selecting access control and visitor management solutions fell squarely on the shoulders of security professionals, but today includes legal, IT, technical operations and more.

Read more...
A passwordless future?
Access Control & Identity Management
The digital landscape is evolving rapidly, and with it comes the urgent need for more secure authentication methods. Passwords, once the cornerstone of online security, are now easy targets for cybercriminals.

Read more...