Controlled access for sub-contractors

Access & Identity Management Handbook 2012 Access Control & Identity Management, Industrial (Industry)

ievo ensures management of large numbers of contractors in a dusty environment.

Based on a site in Middlesborough in north-east England, the Beverley Tollesby School is a modern district school constructed by Willmot Dixon for children with autistic and behavioural needs.

Willmot Dixon employs over 2500 people and decided in January 2010 to specify a biometric system which complements existing CCTV and manned guard security on site. The company’s decision to follow this route was due to problems with proximity cards and pin code systems it was currently using.

Vanguard Security Systems of Yorkshire won the contract for the installation of the biometric turnstile and other security services. Vanguard specified the ievo biometric reader because of its reliability and use of a multispectral imaging fingerprint sensor.

The reader is able to scan through dirt, dust, high ambient light, water and some types of latex gloves. This makes it ideal for contractors on site who often have degraded fingerprints due to occupational damage or dirt.

The ievo reader is fully IP rated and has a strong, robust and ergonomic design, making it easy for staff to use on site. The reader was integrated with Paxton’s Net2 ACU and software, which Willmot Dixon and Vanguard use regularly.

The biometric system comprises a double turnstile positioned in a cabin at the front of the site. An ievo reader is placed on both sides of the turnstile.

“Using the ievo biometric system on site eradicates the need for cards which can be costly to replace if lost. It also means users can be easily added to the system from a remote location and can be deleted even if they are not present. Cost was also a significant factor so ievo’s cost effectiveness was a big plus for Willmot Dixon,” said GM of Vanguard, Chris Fields.

Sue Robinson, site secretary for Willmot Dixon said she believes the main advantage of ievo and Net2 is how easy it is to use. “Despite the fact that there are a large number of contractors, ievo is simple and user friendly because of the intuitive nature of the software. The Windows interface means that training other staff to use ievo takes less than 30 minutes.

“Being able to monitor the events of when staff come onto site is really useful, especially with sub-contracted workers. In this way we can see which companies have been on site, how many of their staff and which trades. This ensures correct pay rates are used and that any disputes with time on site are quickly resolved because the biometric evidence is irrefutable,” she added.

“We also use the anti-passback facility on the software which means that the system will not allow personnel to scan out unless they have first scanned in and vice versa. This is critical for health and safety because we know exactly who is on site. When we run a fire drill we can compare the software report to actual people on site,” said Robinson.

It is estimated that the system will have more than 800 people registered on it. It will be on site at Beverley Tollesby School for 85 weeks and then be moved onto a new Willmot Dixon site.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...
T&A in South Africa’s retail sector
ERS Biometrics Access Control & Identity Management
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Paxton opens second experience centre
Paxton News & Events Access Control & Identity Management
Security technology manufacturer, Paxton, has opened a new experience centre in Cape Town on 12 February in partnership with its exclusive distributors, Reditron and Regal Security.

Read more...
DoorBell with built-in AI
Ajax Systems Access Control & Identity Management Products & Solutions Smart Home Automation
Ajax Systems has announced the release of Ajax DoorBell, which features built-in AI, an IR sensor, and app control, seamlessly integrating into the Ajax ecosystem to ensure efficiency and security confidence.

Read more...
Physical security evolving beyond security teams
ATG Digital Access Control & Identity Management
The landscape of physical security is undergoing a major shift. Traditionally, selecting access control and visitor management solutions fell squarely on the shoulders of security professionals, but today includes legal, IT, technical operations and more.

Read more...
A passwordless future?
Access Control & Identity Management
The digital landscape is evolving rapidly, and with it comes the urgent need for more secure authentication methods. Passwords, once the cornerstone of online security, are now easy targets for cybercriminals.

Read more...