Access from afar

Access & Identity Management Handbook 2018 Access Control & Identity Management, Asset Management

It’s more than a little frustrating when you have to go the extra mile to gain access to a building or facility. How many times have we seen people getting out of their vehicles to press a button on an intercom or scan a card at a reader to get through a gate? How many people stretch and jump to get their card close enough to a reader (because they are too lazy to take it out of their pocket) to allow them through an office door?

Access readers, be they card or some kind of tag, are hampered by requiring the device and the card to be very close to each other, from as much as 10 cm away to touching before they work. This may be an inconvenience, but it is also more secure and power friendly. The good news is that in certain scenarios, the option for longer range access technologies to verify someone’s access credentials is readily available.

The obvious location for these long-range readers is in environments where vehicles need fast, yet secure access through booms and gates. A tag in the cab can connect over a few metres to a reader and verify the vehicle, driver or both, allowing for streamlined entry and exit. For added security, these readers can be combined with licence plate readers.

ZKTeco’s Hendrik Combrinck says the market for long-range access control solutions has grown significantly in the last two years because of advances in the licence plate recognition and long-range wireless technologies. These solutions make it more convenient and faster to recognise a vehicle and give it access to a certain area.

Apart from licence plate recognition, Dan Drayton, Paxton’s country manager for South Africa, says RFID or UHF solutions are generally the technologies of choice. “RFID is more cost effective in the reader technology and UHF more cost effective in terms of tokens.”

While the market is growing in estates and business parks, among other areas, the long-range market is still one which can produce significant growth. Lawrence Mosadi from Geovision believes this may be due to the fact the few people know about the options. He says, “We are getting more requests about it from end users, but not installers.”

A few of the benefits Mosadi says long-range technology offers include:

• A more controlled parking environment with less human errors, e.g. guards sleeping at night and not opening the gate on time.

• Better traffic flow during office peak hours.

• Restricting vehicles from entering or accessing unauthorised areas.

• Vehicle counting and parking space sharing.

• Tracking suspicious activity.

• No more putting your hand out in the rain to tag. All is atomised by the RF antenna.

Drayton continues that the products in this market operate in a similar manner to normal proximity readers, communicating the token details over networks with a Wiegand protocol. This makes them quite simple to integrate into an existing or new system where the technology works with Wiegand readers.

Basically, is like using E-Tolls, says Mosadi. The tag will be on the left or right side of the vehicle’s windshield, depending on which side the RF antenna is mounted. The access control system will then ascertain which vehicle is approaching and check with a local or remote database to see if it is allowed to enter.

Most of the time, these technologies are just used to ensure the vehicle can access a certain area, however, Combrinck says that he has recently started seeing end users asking for dual verification for both the vehicle and the driver.

What’s on offer?

Despite the market still being somewhat limited, all three companies provide a range of solutions for long-range access. ZK’s long-range UHF readers were launched in South Africa at the beginning of this year and have proven a success. Combrinck says, “Our two models UHF2-5 and UHF2-10 can respectively read up to 6 and 12 metres. These models can also be used by any third-party controller that can receive a Wiegand input.”

Geovision’s long-range RFID solutions can operate at a distance of between 2 and 10 metres. Mosadi says they are ideal for parking lots, gated communities and employee parking.

Drayton says Paxton’s solutions centre on its Net2 product range, using RFID long-range readers and active tokens as it is the most cost effective and secure way of deploying the technology in the small to mid-market.

“Used in combination with our wired and wireless access control solutions, our clients can benefit from a flexible access control solution backed with our 5-year swap out warranty.”

For more information, contact:

• GeoVision SA: +27 (0)12 664 0411, [email protected], www.geovisionsa.co.za

• Paxton, +27 (0)21 427 6691, [email protected], www.paxtonaccess.co.za

• ZKTeco (SA), +27 (0)12 259 1047, [email protected], www.zkteco.co.za



Credit(s)





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...
T&A in South Africa’s retail sector
ERS Biometrics Access Control & Identity Management
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Paxton opens second experience centre
Paxton News & Events Access Control & Identity Management
Security technology manufacturer, Paxton, has opened a new experience centre in Cape Town on 12 February in partnership with its exclusive distributors, Reditron and Regal Security.

Read more...
DoorBell with built-in AI
Ajax Systems Access Control & Identity Management Products & Solutions Smart Home Automation
Ajax Systems has announced the release of Ajax DoorBell, which features built-in AI, an IR sensor, and app control, seamlessly integrating into the Ajax ecosystem to ensure efficiency and security confidence.

Read more...
Physical security evolving beyond security teams
ATG Digital Access Control & Identity Management
The landscape of physical security is undergoing a major shift. Traditionally, selecting access control and visitor management solutions fell squarely on the shoulders of security professionals, but today includes legal, IT, technical operations and more.

Read more...
A passwordless future?
Access Control & Identity Management
The digital landscape is evolving rapidly, and with it comes the urgent need for more secure authentication methods. Passwords, once the cornerstone of online security, are now easy targets for cybercriminals.

Read more...