T&A sorted

Access & Identity Management Handbook 2005 Access Control & Identity Management

Project scope

Staff 1500; 500 visitors and delivery people; 34 Sagem fingerprint readers; Take-on station: one reader; Sagem integration program: CWExport; Access control system: Impro IXP400; T&A software: Kronos; Integration manager program: VIM

The history

Patensie Sitrus Beperk packages and exports citrus. Farmers deliver fruit to the company by tractors and trucks to then be washed, sorted and packed.

There were problems with lost, forgotten, stolen and broken proximity cards which caused bad clockings, making proof of identification very difficult. 'Buddy-clocking' cost the company salaries and wages paid but not earned. Free access by non-employees had to be controlled. The replacement and upgrade resulted in there being more effective cost control.

The solution

The existing Improx system was retained as the access control backbone, and all card readers were replaced by Sagem fingerprint readers linked into the Improx terminals. At the same time the company upgraded the T&A to a Kronos system and installed the VIM integration manager.

The hope was that buddy-clocking would be a thing of the past, and also that employees' movements between sites could be tracked. Effective cost control was a major objective. There would be cost savings and improved access control of unauthorised personnel. Turn-around times of farmers' tractors, for the benefit of the farmer, could be monitored. Interface programs should cut manpower hours compared to data manually entered in each program.

The result

Stricter access control. Stricter workstation control. Cost control. Fewer bad clockings. Due to sequence clocking members are forced to back track when blocked at access and time points. Bad clockings are a thing of the past. What is now done differently is that the IT department was involved and still plays a major role with the HR department in the maintenance of hardware and software.

Fact file

Control Instruments Eastern Cape, Ian Gibbs, 041 453 1811

Sagem reader integration: Timewatch Systems, Dani Taback, 011 640 1850.

VIM integration, Cleararrow Consulting, Paul Wenborn, 083 400 9990.

Patensie Sitrus Beperk, Stewart Scott, 042 283 0303, stewarts@gamnet.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Simple steps to protect yourself against identity theft
November 2019 , Access Control & Identity Management
Are you doing enough to reduce the risk of having your identity stolen?

Read more...
Looking ahead with mobile access technologies
Access & Identity Management Handbook 2020, Technews Publishing, HID Global, dormakaba South Africa, Salto Systems Africa, Suprema, Gallagher , Access Control & Identity Management, Integrated Solutions
Given the broad use of smartphones around the world and the numerous technologies packed into these devices, it was only a matter of time before the access control industry developed technology that would ...

Read more...
Mobile access is more secure than card systems
Access & Identity Management Handbook 2020 , Access Control & Identity Management
The ability to use mobile phones as access credentials is one of the biggest trends in a market that historically has been slow in adopting new technology.

Read more...
This is the future. This is what we do.
Access & Identity Management Handbook 2020, ZKTeco , Access Control & Identity Management
ZKTeco has created a unique range of visible light facial recognition products combined with a flexible Android platform.

Read more...
The security of biometrics
Access & Identity Management Handbook 2020, ViRDI Distribution SA, IDEMIA , Technews Publishing, Suprema , Access Control & Identity Management
Hi-Tech Security Solutions asks whether your personal biometric data is safe from prying eyes.

Read more...
A picture spoofs a thousand cameras
Access & Identity Management Handbook 2020, NEC XON, Hikvision South Africa, Technews Publishing , Access Control & Identity Management
Hi-Tech Security Solutions looks into the reliability and effectiveness of facial biometrics as well as the concerns about privacy.

Read more...
IoT and behavioural authentication
Access & Identity Management Handbook 2020, CA Southern Africa , Access Control & Identity Management
IoT represents an increasing security risk to individuals in the form of pervasive, always-on monitoring of your personal activity with a potential compromise of your most personal security credentials.

Read more...
Border crossing and national identification
Access & Identity Management Handbook 2020 , Access Control & Identity Management
Amidst a choice of technologies, diversity of policy frameworks, and emergent priorities, countries that intend to upgrade their identification systems today find themselves drawn into a complex vortex.

Read more...
T&A by biometrics in the cloud
Access & Identity Management Handbook 2020 , Access Control & Identity Management
Time and attendance solutions have evolved from punch cards to cost-effective and more accurate cloud-based biometric systems.

Read more...
Scalable access solution
Access & Identity Management Handbook 2020 , Access Control & Identity Management, Integrated Solutions
Bosch Building Technologies makes access management simple, scalable and always available with Access Management System 2.0.

Read more...