Deploying an integrated access control solution

Access & Identity Management Handbook 2019 Access Control & Identity Management, Integrated Solutions

At busy premises such as university campuses, residential estates, corporate offices or business parks, the volume of pedestrian traffic can be immense. The challenge of controlling access into these premises and then controlling where staff and visitors go within the premises is one that requires careful consideration and planning and the deployment of solutions that are suited to the specific requirements of the environment.

Gary Chalmers from iPulse Systems says that he continues to be amazed at the amount of money South Africans spend on security and knowing who their staff are, only to allow “arbitrary people onto their premises after they have scribbled some random information onto a piece of paper (the visitor log book). Visitors have been the most neglected aspect of office security for a long time, and given the access to information in South Africa, this is really not necessary.”

According to Chalmers, the key aspects to any good visitor system can be encapsulated into three areas:

At perimeter entrances: This is really about vehicles, and tracking the information about the car and the driver. Using one of the many scanners available, it is easy to scan a licence disc, scan a driver’s licence, and add some additional information, such as how many people are in the vehicle, or where they are going. Any good visitor system should cater for this, and allow the secure searching of that information to get data, such as ‘a white car in the morning containing three people’.

At the reception: This should allow quick, seamless identification, whereby a South African ID number can be verified against one of the many databases available, and for foreigners, a slightly more in-depth review and scan/copy of their identity document. Again, all this should be stored for later retrieval, in a manner which is compliant with the PoPI Act.

In remote areas: This should be handled through a centralised enrolment system, whereby visitors who wish to go to unsupervised or remote areas are first enrolled or added to a system, preferably biometrically, then granted access at a specific date/time by the system to an area through a biometric-controlled access system.

Mike Austen from Powell Tronics says that once the person enters the physical building, biometrics work best in this environment and a number of systems can be integrated into and managed from one single platform. “How secure the institution would like the areas to be would dictate the use of readers in and out of a door or the use of a push button to exit a door. These access control systems can then all be integrated with the CCTV system, alarm system and fire alarm for instance.”

Chalmers says that iPulse’s VisitorIQ.cloud is a cloud-based biometric access control system, which is completely integrated into IQSuite.cloud, the company’s access control system. This allows visitors to be enrolled once, and then ‘activated’ on the system for a period of time, on a specific sub set of biometric readers, to acquire full control of who goes where in the facilities.

“Most of the data centres in South Africa use this particular system to control access, as it allows clear control and reporting, whilst also providing an additional benefit of incorporating health and safety videos to validate that people have seen the information they need to see. Features like badge printing, integration with web-based portals and calendars add additional flexibility and control,” says Chalmers.

In terms of extending these systems to include access to logical assets like the network and business software assets, Austen believes that this would be dependent on how the ‘assets’ are to be monitored and if an integration is possible. “In other words, will the supplier provide a set of functions and procedures that allow the creation of applications which access the features or data of an operating system, application, or other service (APIs)?”

Chalmers says that with a full integration into Microsoft’s Active Directory, staff can be granted biometric access to their machines, based on their access rights to the building. Integration can go as far as forcing computers to log off when a person leaves the building, or reporting when a PC is being accessed when the PC’s operator is recorded as being off site.

Access control solution providers should be able to reassure clients that certain standards are adhered to in order to ensure their access and identity systems can be integrated with either new or even legacy systems. Chalmers says that in order to achieve this, one should always capture prints in multiple formats to ensure that clients can migrate their database in the future.

He points out that while iPulse uses its own Secugen algorithm for biometric extraction and matching, the system also records the ANSI standard to ensure that the enrolled database can be used by any other system in the future. “Furthermore, the platform uses a tightly controlled API for easy integration into any other system, such as CCTV, existing ticketing systems or almost any piece of hardware, such as breathalysers and tablets, to allow for a seamless view of data from any angle.”

Austen adds that once you have established which brands are commonly used on most platforms, you can then decide on the backend system. “It is far more cost effective in the long term to go with a well-known nationally supported brand that integrates and is compatible with most platforms. Some companies have their own in-house development teams that make this type of integration much easier for their clients.”

For more information contact

• Powell Tronics, 0861 784 357, [email protected], www.p-tron.co

• iPulse, 0860 IPULSE, [email protected], www.ipulse.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Gallagher Security releases OneLink
Gallagher Animal Management Products & Solutions Access Control & Identity Management
Gallagher Security has announced OneLink, a cloud-based solution that makes it faster, easier and more cost-effective to deploy security anywhere in the world, transforming how security can be delivered to remote sites and distributed infrastructure.

Read more...
From the editor's desk: Showtime for Securex
Technews Publishing News & Events
We have once again reached the time of year when the security industry focuses on Securex. This issue includes a short preview, with more coming online and via our special Securex Preview news briefs. ...

Read more...
Suprema unveils BioStar Air
Suprema neaMetrics News & Events Access Control & Identity Management Infrastructure
Suprema launches BioStar Air, the first cloud-based access control platform designed to natively support biometric authentication and feature true zero-on-premise architecture. BioStar Air simplifies deployment and scales effortlessly to secure SMBs, multi-branch companies, and mixed-use buildings.

Read more...
Continuous AML risk monitoring
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
AU10TIX, launched continuous risk monitoring as part of its advanced anti-money laundering (AML) solution, empowering businesses to detect behavioural anomalies and emerging threats as they arise.

Read more...
Digitising security solutions with AI and smart integration
Regal Security Distributors SA Technews Publishing Integrated Solutions
The Regal Projects Team’s decades of experience and commitment to integration have brought the digital security guard to life as a trusted force for safer, smarter living.

Read more...
Smart cities and the role of video security
Surveillance Integrated Solutions
As cities around the world continue to embrace smart technology, including IoT that not only connects to people, but also the surrounding activity, the integration of advanced video security systems is crucial to ensure safety and efficiency in environments.

Read more...
From the editor's desk: We’ve only just begun
Technews Publishing News & Events
The surveillance market has expanded far beyond the analogue days of just recording and/or monitoring screens. The capabilities of surveillance technology today extend to black screen monitoring with ...

Read more...
The future of the surveillance channel
Duxbury Networking Technews Publishing Elvey Security Technologies SMART Security Solutions Surveillance
The video surveillance market has evolved from camera-based specifications to integrated solutions that solve customers’ problems. Moreover, the growth of AI and cloud has changed the channel even more, with more to come.

Read more...
The benefits of offsite control rooms
Astrosec Surveillance Integrated Solutions
As the security landscape grows more intricate, control rooms – the crucial hub of security operations – need to adapt. With escalating costs, mounting threats, and a heightened demand for immediate responses, many organisations are reassessing the operations of their control rooms.

Read more...
AI means proactive surveillance
DeepAlert Technews Publishing SMART Security Solutions AI & Data Analytics Surveillance
SMART Security Solutionsasked DeepAlert for some insight into how AI is transforming video surveillance, even to the extent of it being taught to protect the privacy of those in the cameras’ view.

Read more...