Networking the scholar patrol

Access & Identity Management Handbook 2009 Access Control & Identity Management

The issue of security remains an area of concern for most companies and institutions – irrespective of size or core focus. Factors like access control as well as time and attendance have developed into a great deal more than mere operational considerations and technology is consistently regarded as imperative to any credible solution.

The fact is that physical security has emerged as a complex responsibility for decision makers. It is one that involves numerous dynamics from human behaviour right through to daily practical operation of systems, processes and procedures.

While there may be a credible, practiced and well-oiled mechanism in place at a location to cover the basics of security, its success and level of efficiency is still dependent on people and the consequence of any action.

Given the myriad of possible threats institutions are faced with today, from theft of property to physical harm of employees or students to corporate espionage, it is not surprising that companies and institutions consider the implications of acquiring biometric technology to entrench effective security.

Biometric technology is a key driving force behind the growth of the security solution development and application industry. It is based on the recognition and processing of genetic information to allow or deny access, to record and automatically report on time and attendance, and instil higher levels of control over resources.

This technology has been strongly associated with fingerprint scanning, but there are a number of other methodologies eg, retina and facial recognition. The cost to operate any venture, service or operation today warrants a closer inspection of systems that promote good governance, effective control and return on investment.

The concept of identity theft is now established and has paved the way for further crimes against persons such as abduction, orchestrated through the ability to bypass efforts to control and regulate access to buildings and people.

Access control for schools is not only about creating an efficient means of controlling who has access to school property, when, why and how – it is also about regulating all aspects of the environment. The technology can be interwoven into the very fabric of an academic institution.

For example it can be tweaked and customised to regulate who is in class, whether or not learners are writing an exam, if teachers have reported for duty or how often a particular learner has been absent, and a whole host of administrative functions that form part and parcel of a typical place of learning.

The key characteristics of biometric technology mean that it is a flexible, robust system that can be made to fit virtually any environment. It is certainly relevant and of value to operations focused on community and social services.

Teryl Schroenn, CEO, Accsys
Teryl Schroenn, CEO, Accsys





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Read more...
Access Selection Guide 2024
Access Control & Identity Management
The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.

Read more...
Biometrics Selection Guide 2024
Access Control & Identity Management
The Biometrics Selection Guide 2024 incorporates a number of hardware and software biometric identification systems aimed at the access and identity management market of today.

Read more...
Smart intercoms for Sky House Projects
Nology Access Control & Identity Management Residential Estate (Industry)
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app.

Read more...
Authentic identity
HID Global Access Control & Identity Management
As the world has become global and digital, traditional means for confirming authentic identity, and understanding what is real and what is fake have become impractical.

Read more...
Research labs secured with STid Mobile ID
Access Control & Identity Management
When NTT opened its research centre in Silicon Valley, it was looking for a high-security expert capable of protecting the company’s sensitive data. STid readers and mobile ID solutions formed part of the solution.

Read more...
Is voice biometrics in banking secure enough?
Access Control & Identity Management AI & Data Analytics
As incidents of banking fraud grow exponentially and become increasingly sophisticated, it is time to question whether voice banking is a safe option for consumers.

Read more...
Unlocking efficiency and convenience
OPTEX Access Control & Identity Management Transport (Industry)
The OVS-02GT vehicle detection sensor is the newest member of Optex’s vehicle sensor range, also known as ‘virtual loop’, and offers reliable motion detection of cars, trucks, vans, and other motorised vehicles using microwave technology.

Read more...
Protecting our most vulnerable
NEC XON Access Control & Identity Management Products & Solutions
In a nation grappling with the distressing rise in child kidnappings, the need for innovative solutions to protect our infants has never been more critical. South Africa finds itself in the throes of a child abduction pandemic.

Read more...
Understanding the power of digital identity
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
The way we perceive business flourishing is undergoing a paradigm shift, as digital identity and consumer consent redefine the dynamics of transactions, says Shanaaz Trethewey.

Read more...