0% found this document useful (0 votes)
3K views132 pages

Access and Identity Manegement PDF

This document provides an overview of the authoritative Hi-Tech Security Solutions publication for the physical and converged security industry. It offers complete information through print magazines, email news briefs, a website, and digital magazines. The publication covers trends in open source identity initiatives, differences in perceptions of digital trust, and managing identities through concepts like zero trust and least privilege. It also discusses topics like cyber security, the expanding role of IT in access control, biometrics, and the convergence of physical and logical security systems. The document promotes Hi-Tech Security Solutions as a resource for decision makers working in today's security challenges.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3K views132 pages

Access and Identity Manegement PDF

This document provides an overview of the authoritative Hi-Tech Security Solutions publication for the physical and converged security industry. It offers complete information through print magazines, email news briefs, a website, and digital magazines. The publication covers trends in open source identity initiatives, differences in perceptions of digital trust, and managing identities through concepts like zero trust and least privilege. It also discusses topics like cyber security, the expanding role of IT in access control, biometrics, and the convergence of physical and logical security systems. The document promotes Hi-Tech Security Solutions as a resource for decision makers working in today's security challenges.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 132

The authoritative resource for physical and converged security

hi-tech

security
PRINT

NEWS BRIEFS
solutions
Forbatt_Sep-cover 2018-Final4.pdf 1 15/8/2018 17:18

WEBSITE
VOLUME 24 NO 10 | NOVEMBER 2018 R25 (INCL VAT)

RESIDENTIAL ESTATE
business directory 2019
SECURITY
Handbook 2018
The journal for decision makers who solve today’s security challenges
The directory for decision makers who solve today’s security challenges

CM

MY

CY

CMY

ONLINE Frictionless access everywhere

MorphoWave Compact
TM

BY IDEMIA

Published by
HI-TECH SECURITY SOLUTIONS

Complete information offering to suit your needs


The Print Magazines
Annual subscription includes10 monthly magazines from February to November plus our
four annuals – The CCTV Handbook, The Access & Identity Management Handbook,
The Residential Estate Security Handbook and the Hi-Tech Security Business Directory.

Email News Briefs


Twice a week our News Briefs cover the latest news and views. Fast, to the point and direct to
your inbox, they are the ideal way for professionals to stay in touch with what matters to them.

The Hi-Tech Security Solutions website


www.securitysa.com
The place where professionals search for products, services and suppliers. With access to every
article we have published since 2002, this is the ultimate security reference site.

The Digital Magazines


This is the most convenient way to stay in the know if you’re on the go. You can view the e-book
version of any of the magazines online or download them as a PDF.

Contact us to order your free* subscription


+27 11 543 5800 or [email protected]
*The publisher has the right to refuse a free application if the respondant does not qualify in terms of our target audience.

Hi-Tech Security Solutions


The journal for decision makers who solve today’s security challenges
www.securitysa.com Access & Identity Management Handbook 2019 1
contents
Editor’s note................................................................................................... 4 Cyber security
Trends Managing who, what and why..............................................16
Today’s access control isn’t only concerned with who has access,
Open source identity initiative................................................6 but also what has access, why they need it and what they are
Industry-first open source identity initiative promises to eliminate doing with it.
vendor lock-in and reduce costs for governments around the
world. Convergence
Significant differences in perceptions on state Physical/logical convergence................................................20
of digital trust...........................................................................8 The convergence between physical and logical (or cyber) security
Nearly half of businesses admit to selling customer data, despite will be a game changer because it will change the way we do
claiming data protection as paramount; consumer behaviour everything.
shows strong correlation between loss of business and lack of
digital trust. Physical and logical convergence is a fact............................22
Convergence, the next buzzword? A dated buzzword? Is
Managing identities convergence merely integration on steroids? What is convergence?

Trust but continually verify...................................................10 The expanding role of IT in access control...........................26


Hi-Tech Security Solutions looks at access and identity management What role is IT playing in the world of physical access control and
and asks some industry players what ‘zero trust’ and how far will its role expand in future?
‘least privilege’ means.
Biometrics

Taking augmented identity to the world..............................30


Hi-Tech Security Solutions spoke to IDEMIA’s Gary Jones about his
career with the company and its new vision of Augmented Identity.

A scan of fingerprint biometrics............................................32


Hi-Tech Security Solutions spoke to some of the leading fingerprint
biometric vendors to find out more about the state of this market.

BIMS set to change identity management...........................43


Ideco has announced that its Biometric Identity Management
System (BIMS) is now available to the market.

Tracking biometrics into a brave new digital world............44


Integrated multimodal biometric solutions are increasingly popular
for more accurate identity verification and faster real-time results.

Panasonic’s Face Recognition Server....................................47


Deep learning allows for partial face recognition and
Best Shot selection.

A better approach to fingerprint biometrics........................48


LES optical direct imaging sensors claim to offer a smarter
alternative to prism-based scanners.

Your face tells a story.............................................................50


Facial recognition has advanced to the point where it can be rolled
out over large areas and accuracy is no longer a hit-and-miss affair.

2 Access & Identity Management Handbook 2019 www.securitysa.com


Access selection guide................................. 52 Visitor management

Biometrics selection guide.......................... 66 Video-based parking management................................... 100


Using surveillance video for vehicle counting improves parking
Access control management at an attractive cost.

Key components of access control........................................76 Deploying an integrated access control solution............. 104
What are the key components in a modern access control system? Integration is core to effective visitor management from the point
of entry to the point of exit.
The right access decisions......................................................78
Making the right access control decision depends on what you Identifying good visitor management practices.............. 105
want secured and how secure it should be. The SA driver’s licence is a good source of accurate information
about visitors.
IP is no stranger to access control.........................................82
IP communications takes your access control system beyond Reliability a fundamental in visitor management............ 106
simply opening the door. Make sure your visitor management hardware and software meet
the requirements of your environment.
Applying the SaaS model to access control..........................84
The software-as-a-service model has proven transformative to Digital identity
many organisations, and even entire industries.
Digital channels and the evolution of ID........................... 108
Access in the cloud While the concept of identity (ID) remains unchanged, the rapid
evolution of digital technology has dramatically extended both its
Cloud-based access control...................................................89 application and form factor.
Running your access control through a cloud service has made
people nervous in the past, but today’s solutions are hard to beat. Using tomorrow’s tools to solve today’s
security problems................................................................ 111
Controlling access in the cloud..............................................90 The criminals have a security roadmap in place, do you?
In the access control arena, the adoption of cloud-based access
control continues to grow as companies become more open to Case studies
the idea of relying on it to perform such a vital function.
Fingerprints protect privacy for AIDS testing.....................112
Video-based access High-speed door solutions are cool.........................................113
Integrated security and event management......................114
They sure don’t make them like they used to......................92 Aesthetics and access........................................................................115
A doorbell used to be a simple thing. Today, however, they offer Accessing Toyota..................................................................................116
two-way communications and even video. Behave or buy new tyres.................................................................116
Fruity, insulated access......................................................................117
Workforce management Security, convenience and comfort..........................................119
Seamless access to multiple doors............................................120
Integrating access with OHS and operations.......................96 Trendy access control........................................................................121
Veracitech has developed access control plug-ins to add Eliminating tailgating at Wits........................................................121
certifications and key management decision-making to traditional Hospital adopts integrated solution.........................................122
access control.

Questions on workforce management.................................97 Directory of access and identity


Paul Chari talks about workforce management in modern
organisations.
management suppliers........ 123

43 years of workforce optimisation......................................98


SACO has evolved into much more than just a workforce
management platform.

www.securitysa.com Access & Identity Management Handbook 2019 3


from the editor’s desk

Converging access control


The Access & Identity
Management Handbook 2019
is published by

Welcome to the Access & Identity


Management Handbook 2019. We’re
solutions
publishing this in January as opposed to
our traditional end-of-year publishing www.securitysa.com
schedule to make sure you have some bed-
time reading for the start of the year. If you
Published by
have the physical magazine in your hands,
Technews Publishing (Pty) Ltd
you’ll be glad to know it was designed to 1st Floor Stabilitas, 265 Kent Avenue,
operate during rolling blackouts (or ‘load Randburg
shedding’ to be politically correct). Box 385, Pinegowrie 2123
Tel: +27 11 543 5800
Last year was a tough one for most
Fax: +27 11 787 8052
of the security industry in Africa, and
the world for that matter, so let’s hope ISSN 1562-952X
2019 sees an about-turn in the budget
Editor
restrictions we have become accustomed
Andrew Seldon: [email protected]
to, although Eskom seems hell-bent on
making sure the South African economy Deputy Editor
hits the bottom and starts digging. This is, Brett van den Bosch: [email protected]
however, a good time to be in the candle
business. Contributors
Pine Pienaar
This year’s handbook contains articles Mark Paynter
covering a variety of topics, but there is one Allyson Koekhoven
in physical access control decisions, even to
common thread among almost all of them,
the point of specifying equipment, so we Business Manager
the way in which the IT industry is now
are not merely hyping the convergence idea Vivienne Dorrington:
a part of physical access control and will [email protected]
because it sounds trendy. We also cover the
play a greater role going forward. Whether
whole concept of the full convergence of
it’s access based on the IP protocol, cloud Advertising sales
physical and logical access, something most Tracy Wolter: [email protected]
and hosted technologies, cyber security or
people see as a given for the future, but one Laura van der Merwe: [email protected]
the greater role of IT personnel in access
which nobody seems to know exactly how
control decisions, IT has moved in and Subscription Services
to accomplish as your traditional physical
traditional physical access control is very To subscribe to Hi-Tech Security Solutions
security people are a different species from including the
much a converged industry today.
your traditional IT people. It’s been said they Access & Identity Management Handbook
That is not to say there is no future for Contact: [email protected]
don’t actually speak the same language.
the physical access control manufacturers,
Nonetheless, convergence will happen as
integrators and installers, far from it. The Design and layout:
more security risks involve physical security Technews Production Department
society we live in requires securely controlled
products and installations as an easy way to
access from the home to business and
get into the corporate network (not that IT All rights reserved. No part of this publication may be
even restricted government and national reproduced, adapted, stored in a retrieval system or
departments have anything to boast about
­transmitted in any form or by any means, electronic,
utility installations – not that anyone wants
when it comes to security). Perhaps a new ­mechanical, photocopying, recording or otherwise,
to steal any outdated Eskom equipment, ­without the prior written permission of Technews
breed of converged access control specialists
­Publishing (Pty) Ltd,
but the concept remains. The difference is
will emerge to change the industry for Reg No. 2005/034598/07
these systems need to be integrated and
the better, or we can all rely on Eskom to
interoperate with the digital world, hence Disclaimer
ensure that cyber risks are nullified (because
the need for IT skills. And I think the need for While every effort has been made to ensure the
computers don’t work on candle power), but accuracy of the information contained
cyber security skills is a given in whatever herein, the publisher and its agents cannot be held
then we will still need physical access experts
industry you are in these days. responsible for any errors contained, or any loss incurred
to control the flow of people. as a result. Articles published do not necessarily reflect
In one of our articles we cover a webinar the views of the publishers. The editor reserves the right
HID Global broadcast in which it showed to alter or cut copy. Articles submitted are deemed
to have been cleared for publication.
how IT departments are getting involved Andrew Advertisements, inserts and company contact details are
printed as provided by the advertiser. Technews Publishing
(Pty) Ltd cannot be held responsible for the accuracy or
veracity of supplied material.
LETTERS TO THE ­EDITOR
Letters to the Editor should be addressed to Andrew Seldon at [email protected].
­Sending material to this publication will be considered automatic permission to use in full
or in part in our Letters column. Be sure to include your name, e-mail address, city and
postal code. We reserve the right to edit all letters.

4 Access & Identity Management Handbook 2019 www.securitysa.com


A bespoke systems engineering house providing high-end security, video and access automation
systems in the industrial, mining, corporate and national key-point sectors across southern Africa.

DESIGN | SUPPLY | INSTALL | SUPPORT | MAINTAIN


Access automation Key management systems

Video surveillance systems Time management & attendance systems

People management systems Biometric identification systems

Perimeter intrusion detection High-level integration between systems

Representing global-leading security

a Motorola Solutions Company

Authorised OEM partner A direct channel partner An accredited partner/ Authorised system Integration solutions
for Avigilon video systems channel for Gallagher integration partner. partner for Sagem and
Veracitech is a direct partner and
expert-recognised systems house with direct engineering security systems. Morpho products.
for Autec Babylon in southern and procurement to
Africa. Our executives introduced Avigilon HQ in Canada.
Autec Babylon to the southern
Africa market in the early 1990s
and have built up an unparalleled
experience and knowledge base
in system design and integration
with Autec Babylon.
Veracitech
30 years of successful high-end security solutions.
+27 11 888 7251
[email protected]
www.veracitech.co.za

www.securitysa.com Access & Identity Management Handbook 2019 5


TRENDS

Open source identity initiative


Industry-first open source identity initiative promises to eliminate vendor lock-in
and reduce costs for governments around the world.
In a move that promises to accelerate the of existing systems while evolving their implementing bodies must be free to select
development of national identity schemes environments without the fear of vendor the most appropriate solutions without
across the world, the Secure Identity lock-in. This will ensure that governments are commercial or technical restrictions. The SIA’s
Alliance has announced its Open Source API able to confirm citizens are the same person Open Source API is a key enabler and a major
(Application Program Interface) initiative. across various registries and issuing agencies, step towards harmonising identity schemes
Directly addressing the high-cost and that an individual’s data – or attributes across Africa.”
problems of vendor lock-in and the lack – are up-to-date. Doing so protects the Launching the initiative, Debora Comparin,
of standardisation within today’s identity individual against the risk of identity theft and who leads the Open Source API for the SIA,
ecosystem, this new Open Source API state agencies against fraud. comments: “This initiative is all about making a
project will deliver technical interoperability The Open Source API has been difference for governments and implementing
between civil registration registries and civil shared on Github (https://github.com/ bodies across the world. It not only reflects
identification registries. SecureIdentityAlliance) and anyone wishing to how fast the identity market is maturing, but
Developed within the SIA and endorsed by contribute is welcome. also the commitment of its major players to
the world’s leading identity system vendors, The Secure Identity Alliance is dedicated solving legacy proprietary challenges through
this initiative demonstrates an industry-wide to supporting the provision of legal, trusted ever deeper levels of collaboration and
commitment to breaking down the technical identity for all, and to drive the development openness. The publication of the Open Source
barriers to achieving the United Nations goal of inclusive digital services necessary for API on GitHub is the first step and we welcome
of establishing a legal identity for every citizen. sustainable, worldwide economic growth and contributions from all players in the identity
By allowing multiple identity registries prosperity. It believes legal, trusted identity value chain.”
and systems to ‘talk’ to one another – is the cornerstone of rights protection, social Frédéric Trojani, chairman of the Board
independent of technology, solution inclusion and digital economic development of the SIA, comments: “While the abundance
architecture or vendor – the Open Source – and the access point to a wide range of of proprietary technology is the natural
API will solve the interoperability challenges essential public and private services. consequence of the lack of recognised
that have hampered the evolution of national Welcoming the announcement, Dr Joseph standards, we feel the industry must play a role
identity systems. By delivering technical J. Atick, executive chairman of the ID4Africa in redressing the imbalance. As a not-for-profit
interoperability, governments can maximise Movement, said: “The importance of initiatives association supported by the world’s leading
the value of their existing identity systems of this type cannot be underestimated. A identity providers, SIA is uniquely positioned
and infrastructure, and invest in new solutions poll of delegates during the recent annual to drive this openness agenda through our
without integration problems or single vendor meeting of the ID4Africa Movement identified experience, technical expertise and global
dependency. vendor lock-in as the biggest concern for those influence.”
In other words, governments can invest tasked with delivering national ID schemes. More information is available at www.
with confidence, preserving the value As the ID market matures, governments and secureidentityalliance.org.

6 Access & Identity Management Handbook 2019 www.securitysa.com


www.securitysa.com Access & Identity Management Handbook 2019 7
TRENDS

Significant differences in ­perceptions


on state of digital trust
Nearly half of businesses admit to selling customer data, despite claiming data
­protection as paramount; consumer behaviour shows strong correlation between
loss of business and lack of digital trust.
CA Southern Africa announced that CA Amidst a continuous stream of headlines consumer or you run a business that handles
Technologies revealed the results of an about major data breaches in enterprise consumer data – when it comes to maintaining
extensive global survey of consumers, and government agencies, the degree to data privacy. Respect for consumer privacy
cybersecurity professionals and business which consumers have placed their trust must become an ethical pillar for any business
executives about their views on digital trust. in organisations to protect their personally that collects user data.”
Conducted by analyst firm Frost & identifiable information (PII) online has never Responses to the survey showed that the
Sullivan, the inaugural report, titled ‘Global been more relevant. In 2017 alone, the number Digital Trust Index for 2018 is 61 points out of
State of Digital Trust Survey and Index 2018,’ of confirmed data breaches globally was 100, a score that indicates flagging faith from
highlights how consumers perceive and staggering. Against this backdrop, it is crucial the consumers surveyed as it pertains to the
trust organisations to protect their digital for business leaders to understand worldwide ability or desire of organisations to fully protect
data. It also includes significant data about public sentiment concerning the sharing of user data. The index was calculated based on
how business leaders and cybersecurity information online, and the impact of data and a number of different metrics that measure
professionals at organisations view their privacy breaches on the company’s bottom line. key factors around the concept of digital trust,
responsibilities of data stewardship, the including how willing consumers are to share
licensing of consumer data to third-parties and A price to pay personal data with organisations and how well
the technologies they are implementing to “We are at a crossroads in the information they think organisations protect that data.
protect data and customer privacy. age, as more companies are being pulled into Key findings from the report include:
This report comes at a critical time, as the spotlight for failing to protect the data • Nearly half (48 percent) of consumers report
consumers are increasingly transacting online they hold, so with this research, we sought that they currently use, or have used in the past,
– whether for work, leisure or play – providing to understand how consumers feel about services of organisations that were involved in a
organisations with access to vast amounts of putting data in organisations’ hands and publicly disclosed data breach and, of those, 48
data, from consumer profiles and personal how those organisations view their duty of percent have stopped using the services of an
information to user behaviour and habits. With care to protect that data,” said Jarad Carleton, organisation because of a breach.
that increasing store of data also comes greater industry principal, Cybersecurity at Frost & • There is a 14-point gap between the Digital
responsibility to protect it against abuse from Sullivan. “What the survey found is that there Trust Index of consumers (61 percent) and
external and internal sources. is certainly a price to pay – whether you’re a the perceptions by business decision-makers

8 Access & Identity Management Handbook 2019 www.securitysa.com


TRENDS

and cybersecurity professionals (75 percent),


signifying mismatched perceptions among “78% of consumers responded that it is very
these audiences in a measurement of
perceived consumer trust versus actual
important or crucial that their PII (personally
consumer trust. identifiable information) be protected online.”
• Only half of consumers surveyed (49 percent)
are willing to provide their personal data in
Sullivan in March and April 2018. The survey’s Download the infographic at https://www.
exchange for digital services.
respondents assume senior business and IT ca.com/content/dam/ca/us/files/infographic/
• 90 percent of organisations claim that they
positions at public and private enterprises the-true-state-of-digital-trust.pdf (short URL:
are very good at protecting consumer data,
across nine industry sectors. www.securitysa.com/*CAinfog).
showing a high level of self-confidence,
Download the full report at https://www.
despite the fact that nearly half (48 percent)
ca.com/content/dam/ca/us/files/white-paper/ For more information, contact CA Southern
of business executives admitted that their
the-global-state-of-online-digital-trust.pdf Africa, +27 11 417 8594, heidi.ziegelmeier@
organisation has been involved in a publicly
(short URL: www.securitysa.com/*CAreport). caafrica.co.za.
disclosed consumer data breach in the last
year.
• 43 percent of business executives admit
to selling consumer data that includes
personally identifiable information, while
only 15 percent of cybersecurity professionals
surveyed knew that their company was
selling data containing PII.
These results point to a significant
gap between how organisations view
their responsibilities on data stewardship
and consumer expectations around how
organisations protect consumer data. In the
application economy where data is king,
organisations must prioritise data privacy
and security or risk serious ramifications.
Organisations can mitigate these risks by
taking a proactive stance on security, such as
Digital trust in a zero-trust online world
narrowing their policies for sharing user data, In a blog post related to the above report, CA’s David Duncan addresses digital trust. Below are
reducing privileged user access, implementing some highlights of his article. To read the full post, go to https://blog.security.com/does-digital-
continuous user authentication technologies, trust-matter-in-a-zero-trust-online-world/ (short URL: www.securitysa.com/*cazero).
and adopting better cybersecurity and privacy • So, what is digital trust and what does it mean? Frost & Sullivan’s Principal Cybersecurity
controls to stop hackers. Analyst Jarad Carleton, in the 2018 Global State of Online Digital Trust Report, defines it as:
“In today’s digital world, consumers expect Digital trust is the confidence placed in an organisation to collect, store and use the digital
security and privacy to go hand-in-hand with information of others in a manner that benefits and protects those to whom the information
a great user experience. The study clearly pertains.
shows that trust is fleeting if organisations • In parsing this sentence, a few keywords stand out: CONFIDENCE, PROTECT, BENEFIT. Think for
don’t do their due diligence to protect just a minute about all of the online apps and web services you use during the course of an
consumer data from getting into the wrong average digital day, all of the privacy permissions you have granted to apps on your mobile
hands,” said Mordecai Rosen, general manager, devices, the extended network of health care providers and financial organisations that have
Security at CA Technologies. “Now, more than access to your most sensitive personal information, and online shopping sites that store your
ever, organisations need to understand that credit card information and corroborating personal details. Do you have confidence that they
success in the digital economy requires that will protect your information in a way that benefits you?
they embrace a security-first mindset – a key • A loss of trust can be an ‘Extinction Level Event’ for organisations and their executives. Size,
tenet in our Modern Software Factory model. scope, public awareness and availability of other alternatives or choices for consumers are all
A loss of digital trust has implications on all factors that determine if the impact to an organisation is short-term and moderate, or if it is
aspects of a business and brand perception, long-term and significant.
so organisations owe it to their customers and • How are organisations responding? A strategy recently being adopted in the cybersecurity
shareholders to get it right.” industry is to implement a ‘Zero-Trust’ authentication operating model and technical
infrastructure to reduce the risk of a data breach. The Zero-Trust operating model enforces a
Survey methodology model of mandatory authentication and discretionary access control by requiring that anyone
The global online survey of 990 consumers, or anything inside or outside an organisation’s network perimeters prove that they (or it) are
336 security professionals and 324 business who they say they are, before granting access, and that the user’s rights to access the apps,
executives across 10 countries was sponsored services or data is evaluated and restricted in scope based on a concept of ‘least privilege.’
by CA Technologies and conducted by Frost &

www.securitysa.com Access & Identity Management Handbook 2019 9


MANAGING IDENTITIES

Trust but continually verify


By Andrew Seldon.

Hi-Tech Security Solutions looks at access and identity management and asks some
industry players what ‘zero trust’ and ‘least privilege’ access means.
The concepts of zero trust and least privilege implement a least privilege model to allow the managing and mitigating risks in their data
access and identity management are gaining right people to access only the areas and data environments, whether it is on-premise, in
a lot of airtime these days. While not new, in that is pertinent to them. the cloud or via edge devices, especially with
organisations’ attempts to control all forms Mayleen Bywater, senior product manager legislation such as GDPR and PoPIA in mind.
of access and manage the cyber threats to for cloud security solutions at Vox, explains Sagan Pillay, CA Southern Africa security
systems and data, these concepts are seen as that the terms least privilege and zero trust solution strategist, adds that least privilege
more important. In the physical security world, refer to the understanding a business has of and zero trust are part of the defence-in-depth
these ideas are also not new, but they have who has access to what information, when strategy organisations apply to ensure the
often taken a back seat to traditional physical and how. “The business has to ensure that right access is provided to the right person
security issues. users have the correct access to the right data or people at the right time. It’s basically
However, as physical and logical security at any given time. When IoT is brought into understanding what is happening in every
increasingly converge (and even when the environment, where it connects various transaction, from a simple exchange of data to
the two are separated, there is always a networks, people and devices, the business complex financial transactions.
connection between them), access and needs to ensure that it knows who or what is In most organisations, this is decided by the
identity management has become a critical connecting, to where or what, and who has individual’s job. Person X needs to do certain
issue. In this article, Hi-Tech Security Solutions access to the data and analytics.” things and is therefore granted rights to access
looks at access and identity management and She adds that this is a crucial area the places, applications and data to fulfil that
asks some industry players what zero trust and for companies to control in terms of function. Unfortunately, many organisations
least privilege access means and how it can be have become lazy and when people move to a
rolled out to incorporate the converged world new position or even leave the company, their
of security. historical rights remain in place.
Starting out, we asked what the terms ‘least For example, someone may take over
privilege’ and ‘zero trust’ mean in the world of a job and the routine solution would be to
access and identity management. And looking give them the same access rights as their
at the world around us, what do they mean as predecessor. Too often, the predecessor’s
we move into an IoT (Internet of Things) world rights are not modified to change or remove
where connected things are as important as their access and neither are the new person’s
connected people, and devices on the edge old access rights modified to remove access to
send continuous streams of data to servers and what they required in their previous roles. This
data centres? is, obviously, a security risk.
With the sheer number of people and The idea of zero trust can also be
devices that are able to connect to our aligned to the concept of zero tolerance,
networks today, there are an almost infinite says Pillay. This implies strong control of all
number of possible connections that will access and a demand that systems trust an
want access, legitimate or not. Therefore, identity completely before any transaction
Kurt Burger, sales manager at Altron Bytes is permitted. “Strictly enforced, this binds a
System Integration, says organisations must Mayleen Bywater. Continued on page 12

10 Access & Identity Management Handbook 2019 www.securitysa.com


www.securitysa.com Access & Identity Management Handbook 2019 11
MANAGING IDENTITIES

Continued from page 10 for example) or an unknown device, the


physical identity to a logical identity by various system will automatically realise something
means, such as the physical location, biometric is different and, depending on what is being
authentication or even the device used in accessed, request further authentication – or
requesting access. The organisation takes deny access altogether. A similar process can
these factors and more into account and builds apply when an individual is accessing systems
a trusted profile that can grant seamless access and data from their work computer over the
when all the trust boxes are ticked, or create work network, but because the organisation
more ‘friction’ when something is amiss.” has combined physical and logical identities
He provides the following example. When and access control, the system knows they
someone wants remote access to certain haven’t entered the premises that day and can
applications and data, the system may allow therefore safely block access.
quick and seamless access because, over Similarly, Burger says the zero-trust idea
time, it has learned that this individual often basically means “never trust, always verify”.
accesses these areas after hours (from home, Even when a known person connects from a
for example). The system already knows the known device and network, there needs to be
home network, so that is a box ticked; it also something that verifies that it is a legitimate
knows the device used, such as a work laptop, connection. This can be done through some form
which is another box ticked; the individual of token or credential (such as a certificate on
is using a work VPN and has logged into the their device), or we can also now use behavioural
system using their authorised username biometrics to determine who is typing on a
and password, another box ticked. They will keyboard or swiping on a mobile device.
therefore be allowed in without creating more When something wrong is detected, the
authentication friction. system can escalate the abnormality and set
If the same person requests access from procedures can be initiated to confirm that
an unknown network (Wi-Fi at the airport, someone is using a stolen device or perhaps all
is well but the individual has hurt themselves
and is not using their systems as normal.

Overcoming user resistance


When it comes to access control, physical
or logical, the question of user resistance
is always an issue. Users want to get things
done as quickly as possible with the least
hassle, leading to shared passwords, tailgating
and even choosing the dumbest passwords Sagan Pillay.
possible. And while the trade-off between passwords across multiple applications
security and convenience has become and creates a best practice policy for the
somewhat of a cliché today, it is something business around passwords. It is important for
administrators need to always be aware of and companies to enforce these policies as hackers
try to prevent. know how to exploit security vulnerabilities
Bywater believes the best way to manage such as weak passwords.”
this is to set rules or have parameters in place Pillay agrees, but adds that passwords are
where users can’t use the word ‘password’ or only one level of security. We currently need
‘123’ as a password. The business can also set passwords as a base-layer for access and
up a rule that users can’t re-use a password authentication, but organisations must also
they have used before. This will ensure that have other authentication means over the
users do not use their pets’ names or the same layers of security they have in place protecting
details every month. Companies should also more sensitive systems and data. Certificate or
enforce policies such as regular password token-based authentication can create these
changes to ensure effective access control. additional layers, often without user input.
She adds that users often use the same For example, if you have been granted access
password in multiple scenarios in order to via your mobile device, a certificate can be
make it easier to remember, which is a severe installed on the device that tells the privileged
security risk. “The key is to create a single access management system that the device is
sign-on identity management system that links considered secure – although there are various
different systems into one. This enables users layers and processes to consider. This process
to change one password on a regular basis can also be applied to IoT access.
and it will pull across systems and applications. Burger is a believer in biometrics for
It alleviates the pain point of changing identity authentication. He says the idea of

12 Access & Identity Management Handbook 2019 www.securitysa.com


MANAGING IDENTITIES

Privileges for things


In the IoT age, companies can amass an
Access and identity management insights
enormous amount of information from
Dragan Petkovic, security product leader ECEMEA at Oracle, offers some quick insights into things, whether simple sensors or complex
access and identity management in business today. surveillance cameras. There are great benefits
in the autonomous transmission, collection
The business needs behind AIM tools and solutions and collation (analysis) of data, but there are
The question of whether you need access and identity management (AIM) or not should also risks as this data is often sent to servers
not even be asked. Practicing minimum privileges and periodically reviewing access should that you wouldn’t want open for general
be part of any organisation’s policy. access. It seems too easy these days for
Identity management needs to be tightly integrated with other functions such as the someone to add malware to the data stream
security operations centre as well as mobile and network security. It is also more important and to receive unauthorised data via the same.
than ever due to regulatory requirements on the one side and nexus forces on the other. It Pillay advocates a privileged access
is the foundation of transformational forces, including mobility, big data, IoT and cloud. management approach to securing the IoT,
Identity management should not be just another silo, it should work in unison with which would see these systems only being
other security solutions. able to access organisational devices within
specific criteria and with set authorisations
Protection from the inside out in terms of what can and can’t be done. This
Protecting corporate assets from outside threats is a good starting point, but when would be supported by gateway monitoring
someone brings a threat inside the business, the results can be catastrophic. This becomes and authentication as an added security
particularly problematic when dealing with employees who are privy to sensitive protocol to ensure nothing unusual comes
information and who may have high-level decision-making powers. through.
Most privacy frameworks give a clear mandate that access to personal/private data “The business must ensure that these
should be given to a limited number of individuals within the organisation. Access devices are set up with the right rules and
restriction, practicing minimum privileges, being able to periodically review it and with alerts built in,” notes Bywater. “As much
demonstrate it is a clear case for identity governance and access control. as we want systems to be automated and
autonomous every step of the way, it is still
Deciding who has access necessary for an individual or for want of a
Access to data is fundamental for most organisations and we’re seeing that physical and better word, a human, to interrogate the data
logical entitlements are converging. When implementing identity management it is and mitigate an incident. Checkpoints should
paramount to align security controls to the value of the data. be in place across the network to make sure
Secondly, more organisations are moving their workloads to the cloud, which is often that current threats are mitigated and that
overlooked when it comes to identity and access governance. Cloud can be vulnerable an administrator builds rules to protect the
when it comes to identity management as very often it is managed by line-of-business environment on an ongoing basis.
and security functions do not have control over it. Not having control can lead to all kinds “For example, if someone tries to bypass
of problems such as administrator account proliferation or dormant accounts. Cloud the system or gain access to the network, an
deployment should be done in a considered manner and when done in such a way it can be automated system can probably pick this up,
more secure than on-premise models limiting restrictions to company data. but if someone does manage to hack into the
system and override rule sets, the business
How access fits in with the overall security should have an administrator that can identify,
Access to data is fundamental for most organisations and we’re seeing that physical and verify and address the issue. It is key for the
logical entitlements are converging. When implementing identity management it is business to understand who has changed what
paramount to align security controls to the value of the data. at all times and to have an audit trail.”
Access management is a journey. Getting your directions right the first time is essential. Again, Burger highlights the ability to
Having realistic and achievable milestones mapped to direct business benefits is the most install digital certificates on devices as a means
important part of the journey. The management usually has high expectations, but loses of automatic authentication.
interest quickly, so those realistic milestones keep them engaged.
Secure access control and the cloud
For more information, contact Oracle, +27 11 319 4753, www.oracle.co.za. Cloud services are quickly becoming as normal
as having servers on-site for many companies,
and many organisations have already
outsourced most of their server computing
being hacked is no longer a possibility but but, depending on the environment and requirements to remote servers. We have
will happen at some stage. Tools exist that can situation, multifactor biometric authentication also seen many companies opting for access
even predict when these breaches are likely should become the norm. In this way, even if control solutions that are cloud-based, putting
to happen, allowing organisations to prepare. your password is compromised, there is another the administrative tasks of access control as
However, he says prevention is a better course layer of protection in the form of biometrics, well as the maintenance and hosting functions
of action and advises that, as noted above, which are much harder to fake – assuming the in a service provider’s hands.
nobody should rely on passwords alone. technology chosen includes liveness detection Pillay explains that cloud-based access is a
Not only does he recommend biometrics, and other defence against fakes. Continued on page 14

www.securitysa.com Access & Identity Management Handbook 2019 13


MANAGING IDENTITIES

Continued from page 13 they are protecting. Accessing the parking log into a PC in the building. This should raise
reality today and will grow along with general lot and the canteen could easily be a cloud a flag. And as noted above, for remote access,
cloud services, and that there are many options service, but accessing the vault would require a depending on where the person is logging
as to how companies can make use of access bit more thought. in from and the device they are using will
systems based in the cloud. The maturity and He also highlights the benefits of determine if they are allowed access, and if so,
reliability of cloud services is rising and we will integrating your physical access control with how much.
see many traditionally in-house applications your logical access. He says this adds another No matter what solution you select, Burger
being made available as cloud services in future. layer to your authentication security by noting says, you need to design a system that works
“Cloud services are growing exponentially the physical location of the individual and the for what you need and then look for the
and if your business is not on board it leaves relevance of him/her accessing a server from technology that will make it work, not decide
you behind from a technology and digital there. An example often used is if someone has on the technology and then see how you can
transformation perspective,” adds Bywater. not entered the office building and is trying to jam it into your organisation.
“Cloud is simplifying services for businesses, Access and identity management is
making it easier for them to access and common in every organisation and even at
use a whole host of services. It also brings home, it is just the complexity of the processes
down the cost of managing and maintaining that vary. In the business world, authentication
infrastructure. is more crucial than ever in a world where
“A business’s data is its number one asset. cyber criminals seem to have almost no
With cloud, the business has an audit trail of restrictions. Controlling access to company
who has access to which systems and services resources, logical and physical, on-site and in
and what was updated or not updated. The the cloud, is therefore a critical aspect in your
cloud is a realistic and reliable option for access security arsenal, and combining the two into
and identity management as security is top of a collaborative effort to protect the enterprise,
mind for cloud service providers. its people and assets is no longer an idea that
“It is always a good idea to ask the cloud could happen one day, it needs to happen
service provider about the security measures now. The catch, as discussed elsewhere in
that are in place and whether it is necessary this publication, is getting the physical and
for the business to add its own measures,” she IT disciplines on the same wavelength and
advises. capitalising on the areas of speciality of both.
Burger agrees that cloud is the way to go,
but also advises that there is not a one-size- For more information, contact:
fits-all solution that can be applied to every Heidi Ziegelmeier, CA Southern Africa, +27 11
company like a template. Every organisation 417 8594, [email protected].
needs to take the time to determine what form Mayleen Bywater, Vox, +27 87 805 0000,
of cloud services would best suit them, even [email protected],
adjusting the solution depending on the areas Dragan Petkovic. www.vox.co.za.

14 Access & Identity Management Handbook 2019 www.securitysa.com


www.securitysa.com Access & Identity Management Handbook 2019 15
CYBERSECURITY

Managing who, what and why


By Andrew Seldon.

Today’s access control isn’t only concerned with who has access, but also what has
access, why they need it and what they are doing with it.
The access and identity market is no stranger reports from the system is a possible danger to TCP/IP communication is protected through
to cybersecurity and all the implications of the access of information.” encryption technologies such as TLS. On the
losing control over your physical and logical Protection can be achieved by ensuring server side, you want a system that has strong
assets. However, in the past the physical side of the database is on an independent computer. user permissions, and from which you can view
this industry has been a laggard in protecting This should also not have attachments comprehensive audit logs and easily manage
its customers and products from cyber risks. to the existing network infrastructure or expiration of personal data.
This lack has become more of a problem Internet. If there is a need for connections, He adds that these technologies also
over the past few years as we have seen physical he says encryption of data as well as the struggle to stand alone, “there is no point in
access and time and attendance products using connection should be ensured. Additionally, all locking the doors of your car but you leave the
IP communications as well as being integrated information, apart from the temporary cache, windows open, a comprehensive system needs
with other business systems. Today, allowing should exist on a central machine and not on to be employed.”
strangers to access and control a physical individual devices that are easily accessible.
access point can also give them a foot in the He adds that people and access Securing the database
door of your organisation’s complete identity permissions are also extremely important as David Corder from Saflec Systems says a good
management system and, if not properly this is where breaches happen in most cases. start is to ensure that the permissions on the
protected, other sensitive corporate systems. Limiting access to very few key personnel database are set up sufficiently in order to limit
It is therefore critical for physical security should, therefore, be standard practice. access to only the people who should have
decision-makers to make sure their systems Elvey’s Chris Lelicanin adds that at each access. You then limit the personal data that
are protected from cyber attack, no matter exposure point there should be technology- is captured to what is strictly necessary for
how unlikely it may seem that something like driven solutions in place that protect the the business processes used within the access
a simple reader on the door could be used to organisation, users and their data. In a scenario control setup. This is necessary for parts of the
compromise the company. where the user badges on a secure access PoPI act anyway, so it is becoming a necessity
Marco della Peruta from Sensor Security, control device, we should use encrypted for database administrators to keep in mind.
explains that the most vulnerable information secure card credentials, which can take the SQL Server databases use TDE (Transparent
in an access installation is the organisation’s form of a wearable, smart device, physical Data Encryption) on the actual data files which
database of people, and following that, the access card or similar. The user’s fingerprint can protects the data on the hard drive or external
time and attendance logs and the payroll also be used as a secure credential. There are backups. In any event, all communications
information. “Too often we keep payroll also physical means along the lines of anti- between the database and any software
information highly confidential, but the path tamper features which erase secure data on package that reads from or writes to the
from database to payroll could often be edge devices and door controllers. database needs to be configured to use the
intercepted or investigated by the software When looking at the transaction point highest level of encryption available – this is
installation team, for example. between device and controller, he says OSDP currently Transport Layer Security (TLS) 1.2
“The key here would be to ensure that this is a secure protocol to prevent any tapping with 256-bit AES encryption. This protects
database, and the ensuing path, are protected of information between the device and door the data in transit between data reader and
and managed correctly. Even the pulling of controller, as well as to the central server where Continued on page 18

16 Access & Identity Management Handbook 2019 www.securitysa.com


www.securitysa.com Access & Identity Management Handbook 2019 17
CYBERSECURITY

Continued from page 16 the areas where people are given access. It communications immediately come to mind”.
database, however what is typically done is tends to be when there is an issue of theft that (See more in the article: The advantages of
that there is an additional business layer that they then start trying to work out who has OSDP, www.securitysa.com/60145n).
ensures that the person looking at the data been given access where and by whom. However, he says the greatest advantage
is only seeing the information that has been “This trend is starting to change and as is the Secure Channel, which is the encryption
made available to them on a user-rights basis. time goes by people are more concerned with between third-party devices and controllers.
ensuring that the data is accurate and security Unfortunately, even some of the big players
Making it reality auditors are starting to push for proof that the out there have only basic implementations of
As can be seen above, effectively securing system is secure (only authorised people are OSDP and don’t support Secure Channel yet.
your access systems is not a simple task, being given access to certain areas),” Corder “We are working with various companies to
although there are products out there that notes. “As for cyber risks like hacking, I think try and increase the up-take of the protocol,
make the process of securing the full access that the industry is starting to care more, but especially the optional cybersecurity.”
control chain simpler and automated. As with it’s considered an ‘outside risk’. ” The benefits of OSDP are installation
all security issues, complexity is the enemy of and security related, says Della Peruta.
security as most people opt for ease-of-use Should we all OSDP? “Cybersecurity is not always espionage
and convenience to be able to get the job While it is easy to place physical access control over the Internet, but any stage where
done as fast as possible. products and installers/integrators in the box electronic information is intercepted and
If personal data protection wasn’t a relevant of not being aware of cybersecurity, that is understood. OSDP becomes important here
issue for users, we wouldn’t be hearing of not really true. One of the solutions devised as the communication medium might still
class action suits and settlements against to improve the security of data transferred in be accessible, but the high levels of data
major tech companies for user data breaches, access control transactions is Open Supervised encryption remove the risk of listening or
says Lelicanin, and regulations and acts such Device Protocol (OSDP), an access control talking down the line.”
as GDPR and PoPI would be non-existent. communications standard developed by the Lelicanin adds that the good news is
One of the big challenges is that so many Security Industry Association to improve that forward thinking manufacturers have
organisations are of the mindset that we’re ‘not interoperability among access control incorporated and integrated both technologies
in the firing line’ or ‘it won’t happen to us’, but and security products (see more at www. into their products, this lets legacy sites stagger
the reality is that all of us are at risk from cyber securityindustry.org/industry-standards/open- their security requirements and balance them
threats. It’s a serious issue and there are huge supervised-device-protocol). OSDP is touted with their existing upgrade budgets.
ramifications for organisations willing to play as a Wiegand replacement because of the
footloose with user data. additional security built into the protocol. Integrating to everything?
Della Peruta says most people will talk Adding to the conversation, Lelicanin Controlling who or what has access to who
the correct language about security, but the states, “Wiegand has been around for close or what is what access control is all about,
implementation does not always exist. “We on 35 years and is a standard in the industry; whether in the physical or logical world.
are sometimes called to do a recovery on a the problem is it hasn’t kept up with user and As we move into the age of the Internet of
database and find it is often far too easy to get organisational data security needs. Weigand Things (IoT), the question of controlling access
access to it, such as with a TeamViewer link. is unmonitored, easy to hack and suffers from between millions or even billions of devices
“I hear about ransomware that still hits interference and cable length is limited, to will become something the access industry
systems, which is indicative of a lack of security name a few disadvantages. OSDP is an open needs to take note of and prepare for. In this
and easy access from the Internet, LAN or standard so there is interoperability between scenario, the question of why also becomes
even a USB. There are a few customers that hardware of different manufacturers. It also an issue. There may be acceptable access to or
really do in-depth protection, but many do has greater support for biometrics due to from a device or server, but we need to know
not. Education about technology and what is the increased bandwidth and supports why the access is happening, is it a legitimate
happening in the real world, such as IoT and bi-directional communication. “ exchange of data or has someone hijacked
security breaches, should be a key component Corder explains that OSDP has several a device and is trying to install malware on a
of the system integrator’s service.” advantages over Wiegand: “generally fewer server? Is the access control industry ready
Corder’s experience is that traditionally the wiring cores, longer run distances, multi-drop and are the management capabilities for such
people in charge of the access control have rather than star, multiple different devices dispersed systems available?
been more worried about ensuring that people on one network line, less hard-coded ways There is no question that we are moving
have access to the building than locking down of interpreting the data and bi-directional towards a more inclusive integrated

18 Access & Identity Management Handbook 2019 www.securitysa.com


CYBERSECURITY

environment, according to Della Peruta. technology? Are they an ethical moral group? cloud services, are modular and scale to
The past of discrete packages where access, The realm of integration such as this goes address the client’s specific needs, have
intrusion, video and building management are beyond ONVIF, and more the direction of PSIM integrated and complete solutions that
different brands and disconnected are over. software systems.” incorporate your access, CCTV, fire and
“I believe there are a few directions on this intrusion and take the hassle out of security.
the industry needs to become comfortable Accessing the IoT So, while we still focus on securing
with, such as threat management, business Access control can already be considered part readers, devices, data and servers within our
efficiency management and marketing of the IoT, most systems already connect to organisations, the future security concerns
­analysis. We are not just using the individual the Internet and many are pioneers in IoT, says of the access industry will have to include far
components anymore, but collectively for Corder. IT networks themselves are becoming more ‘things’ that are requesting and sending
much greater functionality. We no longer more secure and are starting to require access or data. Even though most of these are
purchase devices for a simple function, but the authentication to the network itself, using simple sensors that deal in small bits of data
devices exist as a means to a greater solution.” something like 802.1x. Access control products that are generally necessary for analysis, but
Some examples he provides include: will soon have to support this in order to be not a security threat, unfortunately the data
• Monitor water usage and linking that with allowed on the networks themselves – and this pathways will be a tempting target for those
access control and video. is a good thing in that it provides an extra layer intent on getting into your network. Access
• Have a more accurate understanding of hotel of security. administrators will therefore need to make
guests to cater better and improve on food “I think the way the industry is heading sure they secure their networks from direct and
and maintenance costs while simultaneously will be that all access control devices will be indirect attack. If it is not already, cybersecurity
making the venue more appealing. Internet-enabled devices that are configured will soon be a core component of the access
• Collective security information to understand using IT systems like Active Directory. Personal control industry.
if a high security site could have a vulner­ mobile devices are also increasingly being
ability through a perimeter system fault. used as the access token using Bluetooth For more information contact:
“Naturally, such a level of integration Low Energy, NFC or similar technologies with Elvey, +27 11 401 6700, [email protected],
does become dangerous in terms of all the ability to report back or do biometric www.elvey.co.za.
the equipment that needs to interact authentication using Internet or LAN services.” Saflec Systems, +27 11 477 4760,
with a common platform. Who operates Similarly, Lelicanin also believes we are [email protected], www.safsys.co.za.
and configures such a platform? Are they there already. “Personally, I think the most Sensor Security, +27 11 314 9419, info@
experienced in the type of industry and successful platforms will be ones that offer sensorsecurity.co.za, www.sensorsecurity.co.za.

www.securitysa.com Access & Identity Management Handbook 2019 19


CONVERGENCE

Physical/logical convergence
By Andrew Seldon.

The convergence between physical and logical (or cyber) security will be a game
changer because it will change the way we do everything.
The question of convergence is nothing new getting physical and logical security people (and hence losing money) due to a cyber-
to the physical security industry. It wasn’t and departments to work together and speak attack. Truebody adds that the point of
too long ago that surveillance technologies the same language. At the NEC XON summit contention in almost all discussions is not
converging onto the IP platform was the at Sun City this year, Bertus Marais, divisional technical or skills related, but cultural.
thing everyone was talking about and we GM of XON Safety & Security, noted that the The ‘IT guys’ and the ‘security guys’
have since seen a massive shift from analogue convergence of physical and cybersecurity have different priorities, personalities and
surveillance to IP-based surveillance – is already a reality in many organisations. He challenges, and very different working
although analogue is far from dead. Similarly, noted that companies today are demanding a cultures – even those working in the same
we have seen almost all the areas of the holistic view of their security operations and company. Overcoming these differences is
physical security industry moving to IP as a if the two worlds are separate, that simply where the hard work starts.
way to better control connected systems and leaves a gap in your security posture. Mark Walker, associate vice president:
integrate with other products. sub-Saharan Africa at IDC Middle East, Africa
Today, however, we are seeing a new Everyone is involved & Turkey, agrees, noting that the current
convergence game in town, one that will Roger Truebody also notes that physical/ allocation of duties among the physical and
have a far greater impact than IP convergence logical convergence is a discussion more logical teams are still very much in their silos
ever had. One of the reasons for this is people are having, but he says, it is a very and the teams have a singular view of their
that nothing in this industry will remain difficult topic to deal with as a generality. tasks and roles in the organisation. He says
unaffected. The convergence between The discussion is definitely growing, but the it is also a question of turf, especially among
physical and logical (or cyber) security will be level of the discussions vary from industry senior people who are worried what may
a game changer, not simply as a result of new to industry, and in some cases, company to happen to their position if the silos converge.
technologies available and new skills those in company. What’s needed from both sides is a
the industry will have to learn, but because Those who see security as important broader view of the business, adds Walker.
it will change the way we do everything, to their future business success are further Security personnel should start looking at
from planning to design and all the way to ahead of the curve due to various pressures security from a business and user point of
installation and maintenance. they find themselves under, as well as past view, expanding their concept of security
Another enormous challenge will be experiences of losing access to their systems to incorporate the whole business. To use

20 Access & Identity Management Handbook 2019 www.securitysa.com


CONVERGENCE

a familiar term, he says they need to look is going to be the boss of the converged sitting in front of it. This combination of
at integrating all their security systems and security department. physical and cyber is simple, but it can
platforms into a holistic enterprise solution. Walker echoes these sentiments, noting prevent unknown people using your
This will include everything, from data and that getting the two cultures working from computer, prevent ‘over-the-shoulder’
network perimeter protection, through to the same scorecard is the first challenge that password stealing and even be integrated
facilities management and surveillance, and has to be overcome. The parties need to get with physical access control in order
all the way to integrating the latest artificial talking and raise general awareness at the to prevent you from logging onto your
intelligence (AI) solutions – such as predictive top about the enterprise’s holistic security computer if you haven’t entered the building
and/or behavioural analytics. challenges. (or a trusted location). Similarly, if it notices
The next step is to continue the you have left the building or your area of
Starting the process communications while also acknowledging work without logging off, it can do so for you.
No matter the challenges, the convergence the scope of the task ahead. Then comes the Vernon Fryer, CISO and GM Cyber
process is not one that will go away and strategy to converge the security function Security at NEC XON, provides an example
companies that delay starting will only into one and the challenge of putting it all of convergence happening in some Cyber
see their people, assets and systems more under one executive – a chief security officer Defence Operation Centres (CDOC) NEC XON
vulnerable and more targeted by more (CSO) or someone with authority to speak to runs in South Africa and further up on the
sophisticated attacks – because they are the board. continent.
easier targets. Truebody says the starting Walker also recommends that automating These CDOCs are examples of
point is to first sit down, talk to each other, as much of the converged security function as convergence in that one of their functions
and develop the will to make convergence possible is critical in terms of getting the best is to monitor IoT devices, which includes
happen. results, as well as streamlining integration security systems, such as surveillance cameras
Once you know that it is going to happen challenges. and other electronic readers or sensors. The
and have buy-in from everyone concerned, central server automatically monitors any
you can then start with a risk analysis that Small wins number of devices over time and creates a
does a full audit of your physical, logical and While the convergence of physical and logical base line of various data points. Should any of
business security risks. In a nutshell, Truebody security is a complex operation and the chore these standard readings change, the control
says that once identified, you can then go of getting people from different cultures centre is immediately alerted that something
further with impact analysis and so forth, to work together is enormous, companies has changed and operators can investigate.
developing integrated prevention, protection can also go for smaller wins to prove its The readings under scrutiny include
and recovery strategies. effectiveness. almost anything, and range from a simple
However, he warns that while it may As an example, Marais said this change in state (from on to off, for example),
look good on paper, if the will and buy-in is convergence can simply be an application through to changes in the firmware (in case
­missing, it will not happen as convergence is that logs your computer off, or activates a malware is installed as happened in the
a significant clash of culture and ego – who screen lock when it sees you are no longer Mirai botnet attack), to changes in a device’s
configuration or if a device is accessed from a
strange IP address.
Any changes are noted and investigated
by the CDOC personnel, thereby ensuring the
cybersecurity of physical security devices and
other IoT systems. This relieves pressure on
the operators and makes sure these devices
remain in working order over the long term.
Another integration Fryer says the CDOCs can
perform is to integrate social media feeds to
pick up trends, as well as to identify people
caught on camera from pictures on their
social media feeds.
One article can’t cover the full scope of the
convergence between physical and logical
security, but it is clear that this is a task we
need to get to grips with. Physical security
experts have to adapt to the IT world and all
that entails, including learning the language
and customs of what can be a completely
foreign culture in the office next door. The
result of this convergence will be a complete
security strategy that protects organisations
on all fronts from threats that are only
Mark Walker. Roger Truebody. increasing in size, scope and sophistication.

www.securitysa.com Access & Identity Management Handbook 2019 21


CONVERGENCE

Physical and logical convergence is a fact


By Mark Paynter.

Convergence, the next buzzword? A dated buzzword? Is convergence ­merely


­integration on steroids? What is convergence?
Most electronic physical security solutions are movements of sensitive or high-risk subjects a basic Google search to find hundreds of
now network-based and incorporate multiple and assets being maliciously and silently examples online of attacks on key components
IoT (Internet of Things) devices. This means accessed by criminals. Safe? Definitely not. and facilities.
that they should be logically protected against By 2020, over 25% of identified attacks in In 2015, a couple determined they could
exploits and vulnerabilities which could quickly enterprises will involve IoT, even though IoT hack a ‘smart’ sniper rifle and change its
escalate to far more serious system wide or will account for less than 10% of ICT security target. A few months later, the FDA issued an
even domain-wide risk. If you are serious budgets¹. A worrying statistic, especially when alert about a connected hospital medicine
about minimising risk for your customers and one researches the devastating potential of pump that could be compromised and have
protecting your clients’ assets, then logical- cyber attacks via exposed or vulnerable IoT its dosage changed. Earlier that same year a
physical convergence is a necessary step for all devices. Furthermore, Gartner predicts the cyber attack on a German steel mill left a blast
Internet and network connected systems. number of connected things will reach 6.4 furnace running with no perceived means of
Many electronic security companies claim billion this year, hitting 20.8 billion by 2020 shutting it down.²
to be experts in electronic security yet often and IDC predicts that the global IoT market will The Internet of Things (IoT) has the
their major nerve centre appliances and have grown to $1.7 trillion by then. Are you potential to create numerous benefits for
servers are accessible using the default web seeing where this is going? The IoT industry businesses and consumers in terms of big
interface on port 80 and the default OEM user is mushrooming and in the quest for revenue data and new levels of automation, but it also
name and password via their guest Wi-Fi. Is and marketshare we appear to be forgetting creates new vectors for cyber attacks.
this really true security? Do security industry basic cyber risk mitigation and the fact that These days, objects as innocuous as your
captains understand the above three lines? these devices are potentially creating gaping toaster or alarm clock can be collecting, using,
If not, then we have a serious problem and black holes in the Internet. or sending data. This creates a whole new
questions need to be asked around why are world for hackers to exploit, and you’d better
they not costing and planning in expert ICT New vectors for attack believe they’re doing just that.
security specialist advice? Top cyber-trend analysts go as far as saying If you are not convinced, simply type “IoT
Is being competent in terms of selling that the next world war will be fought on the attack sewage treatment plant” into Google. The
electronic security solutions but failing to Internet, and leading cybersecurity thought results will leave you viewing IoT differently.
secure these systems against cyber attacks not leaders believe that nation-sponsored malware
ultimately opening more rabbit holes of risk? and backdoors have already been built into Crosstalk between industries
Dark web mining risk, privacy invasion risk, many OEM components at chip, processor and Ten years ago, while working with an ICT
intelligence gathering for malicious intent, to MCB level and are just waiting for the right company which was attempting to penetrate
name but a few. time when the infamous button is pushed. the physical security and intelligent building
Imagine surveillance cameras that cover the While this may sound far-fetched, it only takes Continued on page 24

22 Access & Identity Management Handbook 2019 www.securitysa.com


www.securitysa.com Access & Identity Management Handbook 2019 23
For dealer enquiries: 0861 PT SALE
CONVERGENCE

Continued from page 22


market, I realised how much terminology
is shared between the ICT and the security
industries.
Intrusion detection was the first word
which I stumbled on which overlapped and
had dual meaning. In the security industry
I came from, the words ‘intrusion detection’
had always referred to burglar alarms and
peripheral components, such as detectors,
contact relays and seismic sensors and the
word ‘intruder’ had referred to a trespassing
criminal who was gaining access to a private
property without consent and with malicious To be honest, there were many other
Examples of what happens when
intent. In the ICT industry, however, an examples which I stumbled on. Words such
logical security is not present in
intrusion detection system is an intelligent as switches, access control, access tokens and
IP camera systems
ecosystem of software, algorithms, devices and keypads to name but a few which have a dual
applications which monitor ICT networks and meaning. • https://www.youtube.com/
computer systems for policy violations and One of my then colleagues within the watch?v=Fa5r_9-M2Fw
malicious network activity. group, a great guy by the name of Jonathan • https://www.youtube.com/
The next was the word ‘firewall’. Where I Kropf, was heading up the computer hardware watch?v=njZnD7QjC4I
came from, a firewall was something the fire division. Jonathan was sharp as razors and • https://www.youtube.com/
system techies discussed with the builders extremely humble despite having a few million watch?v=cBXSt624ofU
during construction site visits and project ZAR of specialists in his downstream reporting
meetings and it had to do with delaying or structure. He used to help me out whenever etc. This has gone so far that The US House of
preventing the spread of a fire. In the ICT world I was battling with a personal PEBKAC issue Representatives has passed H.R. 5515, a bill
I soon learnt that a firewall was a network (Problem Exists Between Keyboard And Chair). I that includes a ban on the US government’s
security system with intricate inbound and would call him and say, “Hey Jono – The guys are use of Dahua, Huawei and Hikvision. This
outbound traffic rules (not the spiet kop talking about a VPN certificate for the instance? follows growing US awareness that Hikvision
type of traffic), application filtering (not a We don’t have a certificate for VPN competency. is controlled by the Chinese government
Google Play Store type of application), port What is that? Is it like a CPO for a VIP?” (https://ipvm.com/reports/heres-what-really-
blocking (not the ship type), MAC address He would normally laugh patiently and talk sets-hikvision-apart, https://ipvm.com/reports/
filtering (not the Apple one) and all sorts of me through opening my Internet browser and hikvision-influence), plus last year’s disclosure of
other interesting propeller-head talk (above typing in www.google.com and then typing in Dahua and Hikvision security vulnerabilities.
average IQ engineers whose conversation is the question I was asking him, and say “there we The technology and innovation curve of
so intellectually advanced that it flies straight go Mark, next time remember Google is free”. convergence between logical and physical
over my head). Jonathan introduced me to their ICT security security systems has grown evermore vertical
team who were tasked with the network and and the symbiotic relationship between IoT and
appliance security for their sizeable national physical security intensifies daily.
client base. The ICT security team’s vocabulary Some of the most interesting examples of
was a whole new language. When I heard them logical and physical security convergence are
discussing smurf attacks, grey nets, phishing, found around identity management, policy
vishing and “Dee Dos” teardrop attacks, I gave management, BYOD frameworks and intelligent
up trying to understand for the time being and traffic management. As data leaks become
I glided quietly back to my safe zone of PIRs, a daily occurrence and data privacy is being
NVRs, CCTV, RFID and PTZs. discussed in every major technology company,
I began to grasp, however, that there was an encryption policies and methods also begin to
uncomfortable but sizeable and distinct overlap overlap and converge with physical security.
between ICT and traditional physical security. A few examples of this obvious overlap are:
I realised that cameras, DVRs, NVRs, intrusion • JFK airport in the US has been testing
alarms, fire alarms and access control readers fully autonomous ‘Patrolling Robots’ from
were all forming part of what was becoming Knightscope Technologies (https://www.
known as the IoT or Internet of Things.³ knightscope.com). These robots have
extensive IoT capabilities for biometric
You can’t separate them facial recognition, gas detection sensors,
Fast forward to 2018 (more than a decade later). noise detection sensors for gunshots or
IoT becomes a very real core part of the physical distress screams, surveillance sensors and
security industry, experts are asking what will cameras, thermal vision, odour detectors and
be done to plug the gaping logical security scanners, and the ability to broadcast recorded
Mark Paynter. vulnerabilities around cameras, access readers and live messages in the event of an incident.

24 Access & Identity Management Handbook 2019 www.securitysa.com


CONVERGENCE

The main role of these Knightscope robots periodically at quiet times. Ensure device
is to register any suspicious activity and alert redundancy/failover is present if the device
the person responsible on duty. When they are is a key component to the security system.
on duty, they are moving around according to Rebooting will often get rid of malware already
the GPS and lasers, which helps them measure installed, however, in most cases it will remain
and calculate distances and also LIDAR – light therefore this should be merely one weapon in
image detection and ranging. A robotic your arsenal.
security guard. Operator login is managed by • Understand the DMZ portion of your network
password and user name or biometrics. and use it wisely to keep possible non-
• Drones/UAVs from SAPS airwing linked to shot essential IoT culprits off the safe side of your
spotter technology which enables high altitude network. If necessary, tier the firewalls with a
UAVs to be dispatched to the location of a double router configuration.
gunshot and track the perpetrators using GPS • Close ALL unused ports. If there is no option
technology along with thermal and standard for this, consider implementing a secondary
video feeds which stream live to ground router/switch to manage this. For example, if
support units and policing operations centres. you do not use Telnet (port TCP:23) to connect
• Biometric and smartcard login systems for to the router then it is a good idea to disable
networks and workstations – A UID token it so as to close off a potential loophole to
management system which integrates with intruders.
packages such as Microsoft Active Directory • One of the safest and most foolproof weapons
makes passwords a thing of the past and against cyber attacks is to blacklist all MAC⁴
instead forces all passwords through a addresses except those of devices which are
biometric fingerprint reader and manages authorised and allowed access to the system.
the backend password cycling and updating • Always change the manufacturer passwords
automatically using maximum security at initial setup even if the device does not
policies. People cannot share, lose, forget or prompt you to do so. If you are running an
steal them. They simply sign on with a smart intelligent system wide password cycling tool
card or their biometrics. At the same time, a such as SuperSign, then integrate this into as
system like this prevents and deters fraud by many IoT endpoints as possible.
creating Identity Chains that link users to their • Ensure you use complex passwords of at least
transactions, compiling an audit trail of who eight characters long, including numbers,
did what, where and when. special characters, upper and lower-case letters.
• An increasing amount of physical-security • Check often for new firmware versions and
systems are IP-enabled, offering a way to patches and install as soon as possible. If
merge with existing networks, or establish a feasible, set up an auto-script configuration to
separate IP network. run update alerts from the OEMs listings.
• A converged employee badge for physical • Don’t allow external network access to the
access to buildings and access to computers device unless absolutely necessary.
is possible and sets a course in establishing a Electronic security appliances and
common identity-management system. components are IoT devices and need to
• Businesses, especially in retailing be more strictly regulated. This will put the
environments, can benefit from advanced onus on OEMs to ship IoT products which are
IP-based video surveillance that allows for designed around cybersecurity instead of
integration of findings about shopper traffic, purely around usability and revenue.
displays and relative effectiveness of sales
when combined with business data. For more information, contact Terpay Group,
+27 74 566 3663, [email protected],
Advice for system integrators and www.terpaygroup.com.
installers
Some basic logical tips to help minimise the risk 1. IoT-OT and IT Security Convergence - Ruggero
of smart device infection: Contu - Research Director Gartner.
• Physical security systems are becoming 2. Conner Forrest for ZDNet – Internet of Things. The
technically sophisticated and it is wise to Security Challenge.
involve the IT department in their installation 3. IoT– A term first mentioned by Kevin Ashton, of
and management. Information gathered MIT during a RFID presentation he made to Procter &
from physical security systems can often be Gamble (P&G) in 1999.
merged as risk and threat factors with logical 4. Media Access Control address (MAC address) of
IT security. a device is a unique identifier (UID) assigned to a
• Reboot devices periodically – especially network interface controller (NIC) for addresses. Not
routers – and if viable, set the device to reboot to be confused with an Apple MAC or a MacBook.

www.securitysa.com Access & Identity Management Handbook 2019 25


CONVERGENCE

The expanding role of IT in access control


By Andrew Seldon.

What role is IT playing in the world of physical access control and how far will
its role expand in future?
It is a fact that IT is becoming more involved in education (19%), information (16%), organisations where IT is not involved in access
the physical security world. In a small minority government (11%), manufacturing (8%), health control, 36% of the respondents said it will be
of companies, these two departments are services (8%), and security, professional and within the next five years.
actually merging, although this is a mammoth business services (8%). Of the respondents, For those organisations where access
task fraught with problems, not only in terms 35% were IT managers, 26% were IT directors, control responsibilities are shared, 47% of
of technology, but primarily in terms of culture. 13% were IT staff, 8% were CIO/CTO, and the respondents report it had been shared
In the access control world, one could say 3% were VPs of technology. The survey also within the past five years. Similarly, where IT
it’s normal for IT to be involved in networking spanned companies of different sizes, with owns the responsibility, 42% of the companies
(assuming the access systems make use of the 24% having less than 100 employees, 22% say they were given this task within the last
corporate network and/or the IP protocol), but 101-500 employees, 11% have 501-1000 five years. Once again we see that IT/physical
the scope of IT has slowly been creeping into employees, 17% have 1001-5000, 6% have security convergence in the access world is an
more of the access control functions. In smaller 5001-9999, and 6% have 10 000-24 999 expanding reality.
companies, for example, it’s not unusual for the employees. The results therefore cover a broad We mentioned IT’s influence in access
service provider responsible for the company’s spectrum of companies and industries. control above in terms of the networking
IT to also take the responsibilities of physical of access systems, however, this is an old
security. The numbers tell a story function. The webinar showed that both
So how far has IT made inroads into the The research offers a significant amount of data IT professionals as well as physical security
access control world in general? HID Global about the role of IT in access control, however professionals see IT being involved in all areas
broadcast a webinar in October 2018 in the webinar brought out a few pertinent facts of access control. When it comes to physical
which it revealed some new research into the (a link to the white paper written by HID from security professionals:
increasing role IT departments and personnel the research is at the end of this article). When • 66% of physical security professionals see IT
are playing in the physical access control asking the organisations being surveyed “Who involved in influencing the decision-making
world. The webinar was hosted by HID Global’s is primarily responsible for physical access process.
Brandon Arcement and Matt Winn. After control in your organisation”, the responses • 48% see IT’s involvement in integrating access
discussing the findings of the research, they were as follows: and other systems.
went on to advise physical security operators • 29% said both IT and physical security. • 37% see IT involved in implementation.
as to how they can embrace their IT colleagues • 26% said IT only. • 22% see IT involved in managing the systems.
further, with the goal of improving the holistic • 25% said facility management handles the From the other side of the table, IT
security posture of their organisations. job. professionals have a similar view:
The survey was conducted by The 05 • 12% said physical security only. • 76% expect to influence decision making.
Group, sponsored by HID and was completed • 8% said the property management company • 72% will be involved in integration.
in March 2018. As the title of this article notes, was tasked with access control. • 59% will be involved in implementation.
the research found that IT departments are With a quarter of the respondents already • 39% expect to be involved in managing
now more involved than ever in organisations’ saying IT is responsible for access control, and systems.
physical access control decisions and a further 29% saying it is shared between the
implementation, and that trend is set to two departments, it’s clear that the divide Not all wine and roses
increase. between IT and physical security is rapidly Of course, as these different cultures work
The 05 Group surveyed 1 576 individuals vanishing – and in some cases, altogether together, there are bound to be some issues.
from more than a dozen industries, including gone. And this is a trend that will continue; in Continued on page 28

26 Access & Identity Management Handbook 2019 www.securitysa.com


www.securitysa.com Access & Identity Management Handbook 2019 27
CONVERGENCE

Continued from page 26 updated to the latest versions, using strong


It is in the field of integration where IT sees passwords and encrypting communication
problems. Half of the IT people surveyed have between controllers and hosts (and using
issues with the lack of integration of access OSDP – Open Supervised Device Protocol
systems with other IT systems. This is an area – for encrypted reader communications).
in which the access control industry could Find out more about OSDP in the article ‘The
make significant changes in the short-term advantages of OSDP’ at www.securitysa.
to ensure their software and hardware can be com/60145n.
more easily integrated with existing business Another strong warning was to take care
management and security systems. when selecting access credentials as many
When it comes to new access control of the card and fob technologies available
systems, the IT school has a few things it are easy to replicate, making it simple for
wants to see on the vendors’ to-do list. They the wrong people to easily gain access.
want improved ease of use (71%), the ability There are secure card technologies out there
to support or add new technologies (68%), and these should be used as a standard. A
mobile access (59%), and integration with business benefit of these more advanced
existing security platforms (54%). credentials is that they can also be used for
It’s also clear from the survey that IT additional business functions, such as secure
is not all that comfortable with access printing, vending machines and network
control technology. Areas such as credential logon.
management, decision making with respect The webinar presenters also touched
to access control systems, how system on the benefits of using users’ mobile
components work and also individual features devices as credential holders. These can
within access systems can cause a bit of offer higher levels of authentication, easier
nervousness among the IT folk. These are administration and more user convenience
areas in which physical security professionals that does not come at the expense of the
can make their mark, as they are more skilled company’s security.
in dealing with these issues as well as others physical security having a role in preventing Whether you are on the IT or physical
unique to their industry. unauthorised access in general, and 49% say security side, the most important part
they can help in achieving compliance. In of the research (depending on your
Helping IT in access order to streamline collaboration, the HID biases) can be seen in the answer to the
The driver behind this convergence is not a webinar suggests, among other issues, that question “Do you believe that increased
technical issue, but is itself a convergence of both sides need to work on aligning project collaboration between physical security and
a number of separate drivers. HID notes the priorities and determining responsibilities, IT can improve the overall security of your
primary drivers are: and balancing the technical acumen of organisation?” An overwhelming 95% of all
• Converged threats that impact both physical IT when it comes to access products and the respondents said “yes”.
and logical infrastructure. If you have a management. While the full convergence of physical
physical vulnerability it puts your logical and logical security is still some way off,
systems at risk, and vice versa. A converged example people in the access control sector obviously
• Proliferation of networked devices in the The webinar went on to provide an example understand that IT and physical security
age of IoT (the Internet of Things) which all of how the two divisions could work together working together is critical to develop a
require both physical and logical security. in an access control installation. When it successful security defence strategy for their
Interestingly, the webinar held its own real- comes to the physical access control host, HID organisations. In the access control industry
time survey of the attendees and this topic advises organisations to integrate physical this may be easier to achieve, but as noted
was selected as having the biggest impact access control systems (PACS) with an IT in the introduction, it is often a question of
on access control’s shift to IT with half of the source of identity such as LDAP. Furthermore, culture (or ego, to be blunt) that prevents
audience selecting it. administrators should ensure there is a set collaboration and results in organisations
• Compliance to new regulations, which again policy around regular software updates being vulnerable to the ever-increasing
rely on both sides of the table. and patches, while they should also take threats they face from well-organised
• Budget consolidation, which we are all advantage of IT’s experience (and equipment) criminal syndicates, as well as unhappy
suffering through. to ensure high availability. teenagers with too much time on their
• A shift in reporting structures as executives When it comes to the controller, HID hands.
try to get a handle on the seemingly endless advises organisations to settle some of the The full paper from the research can be
threats companies face on all fronts. issues raised above by requiring an open found at https://www.hidglobal.com/doclib/
When it comes to the role of physical controller platform that can be integrated files/resource_files/the_rising_role_of_it_in_
security professionals and how they can assist with other technologies and other vendors’ physical_access_control_-_final.pdf.
in the convergence between the two sides products. Preventing vendor lock-in is a
and help improve organisational security, costly lesson IT departments have learned. For more information contact HID Global,
80% of the respondents said they play a role It also suggests considering an ‘IP-at-the- +27 60 988 2282, [email protected],
in establishing best practices, while 50% see door’ topology, keeping controller firmware www.hidglobal.com.

28 Access & Identity Management Handbook 2019 www.securitysa.com


www.securitysa.com Access & Identity Management Handbook 2019 29
BIOMETRICS

Taking augmented identity to the world


By Andrew Seldon.

Hi-Tech Security Solutions spoke to IDEMIA’s Gary Jones about his career with the
company and its new vision of Augmented Identity.
In the early 2000s, a company named Ideco, in only have we been a major contributor to this Augmented Identity, as Jones explains it, is
close partnership with IDEMIA, was a driver in growth in acceptance of biometrics, thanks to a reliable identity authentication mechanism
bringing biometric technology to the South the performance of our technology, but we that fits in with whatever we are doing,
African market. In fact, this company was so have achieved the market leading position for providing the convenience, while also ensuring
successful that South Africa became a world biometric access and time solutions in North trust to guarantee secure, authenticated and
leader in biometric adoption for a number of America” verifiable transactions.
years. With the coming together of Oberthur The MorphoWave Tower was the first
The first employee, and eventually and Morpho, the company is now known as product aimed at this market in the biometric
managing director of Ideco Biometric Security IDEMIA. access and time space. It allows people
Solutions, was Gary Jones; he developed a Jones is now IDEMIA’s VP of Global to authenticate their identities simply by
successful channel model which proved so Channel and Marketing for biometric access scanning (or waving) their fingerprints over a
successful that Morpho quickly became the and time solutions, and is tasked with scanner while on the move – without having to
leading fingerprint biometric technology in broadening the company’s market share and touch a sensor. The Tower has done extremely
South Africa. share of mind globally. This is happening at well in the US market due to its convenience
Jones then moved to the USA in 2009 to a good time as IDEMIA is now focused on as well as the security it offers (its sensor
join Morpho and lead the restructuring of the Augmented Identity. technology is also certified by the FBI).
channel in that region, which includes most of As you wave your fingers over the scanner
the world’s largest and leading manufacturers Augmented Identity on the MorphoWave, it scans all four fingers
of access control and time and attendance Far from just being another marketing slogan, at 78 fps (frames per second) and it does a
systems. Augmented Identity has a basis in reality, 3D scan. This is like putting your fingers on a
“Reaching the US market was no small task specifically when it comes to security in our traditional sensor 78 times in a second. This
as any change takes a long time due to the daily business and personal lives. Jones says naturally collects high resolution data which
market’s size.” Jones says it took a good three there has always been a trade-off between increases the matching rate and hence the
to four years to see results in the world’s largest security and convenience in the real world. security of the fingerprint biometrics.
economy. But, over the years, biometrics have If you wanted security, you had to accept Additionally, because people don’t actually
become accepted in this market, and in many complexity; if you wanted convenience, it was touch anything, the hygiene factor is increased
instances are a mandatory requirement. “Not security that was compromised. and more people can be scanned faster. Jones

30 Access & Identity Management Handbook 2019 www.securitysa.com


BIOMETRICS

says it’s possible to authenticate 45 people per minute as they walk


down a passage or through an entrance, with a single device.

A cost-conscious Wave
To cater for a wider diversity of installations, as well as more cost-
conscious markets like South Africa, IDEMIA recently launched the
MorphoWave Compact, which offers the same authentication facility at
a lower cost. He says IDEMIA’s partners in the region were very excited
about the Compact and were selling it before it even landed in Africa. Of
course, the company has a number of other products, including facial
recognition solutions to supplement the MorphoWave in its pursuit of
its Augmented Identity ideal.
With trips to South Africa a regular part of his job these days, Jones
says South Africa and Africa are key markets for IDEMIA, partially due to
the country’s history of biometric adoption, as well as the willingness of
the market to push the boundaries.
The market in South Africa today is different from the one
in which the former company Morpho and Ideco were able to
establish fingerprint biometrics as a reliable and trustworthy identity
authentication mechanism all those years ago. There are more
companies active in the market and more competition, but Jones
believes IDEMIA is in a good position to take the market to the next level
as both businesses and individuals embrace the ease and convenience, For more information contact IDEMIA, +27 11 286 5800,
as well as the improved security in a world of Augmented Identity. [email protected], www.idemia.com.

www.securitysa.com Access & Identity Management Handbook 2019 31


BIOMETRICS

A scan of fingerprint biometrics


By Andrew Seldon.

Given the increase in the use of fingerprint • Claude Langley for HID Global, and Here I must add that it depends on
technology in public and private organisations, • Gary Jones for IDEMIA. what the application is. Level 1 and Level 2
as well as some recent announcements on the scanners are for commercial use, i.e. access
reliability or lack or reliability of certain types ViRDI Distribution SA, Deon control and time and attendance and have no
of sensors and algorithms in the fingerprint van Rensburg need for images to be kept in the database.
biometric market, Hi-Tech Security Solutions ViRDI is a biometric brand from Level 3 scanners are for governmental, law
spoke to some of the leading fingerprint UnionCommunity Co. in South Korea. The enforcement and banking use for identity
biometric vendors in the market to find out company is active in over 120 countries, management purposes and do keep images
more about the state of this market. including in South Africa and the rest of Africa, in the database. Level 3 systems also compare
To cover the scope of what fingerprint and offers a range of biometrics devices, from these fingerprint images to central databases
biometrics offer, we started by asking how fingerprint to facial recognition. Deon van such as HANIS or AFIS.
fingerprint biometric readers work and what Rensburg represents the ViRDI office in South The process for extracting, matching and
and how they store the data they collect, Africa and up into Africa. authentication is complex.
how reliable they are and then moved into • The user presents their finger to the platen on
the usage thereof. And finally, we asked our the optical scanner of the biometric terminal.
interviewees how end users should make the • The optical scanner then extracts a number of
decision as to what fingerprint biometrics they images of the fingerprint in digital format.
should look at purchasing for their particular • The extraction portion of the algorithm then
needs. extracts unique identifiable features from the
Often when looking for input on an article digital image. We call these unique features
like this, one has to dig around to get the minutiae points.
information one can use. In this case, we • Once these minutiae points have been
received such a large amount of information identified and extracted, the system discards
we had to cut out a significant amount of data. the physical images and everything is
Our information providers have put the effort converted into a complex hexadecimal string
in to take readers on a learning experience that is unique to every vendor.
of what goes into fingerprint biometrics • This hexadecimal string is called a template.
and what are the issues you, the buyer and • The template is then compared via the
user need to look out for when considering matching portion of the algorithm to the
Deon van Rensburg. template that resides within the database.
fingerprint biometrics for access and identity
management. Hi-Tech Security Solutions Although fingerprint biometric scanners • Dependent on the results, the user is then
appreciates their time and effort in supplying use imaging technology (in the form of CCD either verified, identified or rejected.
the below information. Our interviewees are: or CMOS) to capture images of the fingerprint, • The ViRDI system is unique in that it extracts
• Deon van Rensburg for ViRDI, most biometric vendors do not keep images of two templates per fingerprint and then
• Walter Rautenbach for Suprema, the fingerprint in the database. compares to two templates of the same

32 Access & Identity Management Handbook 2019 www.securitysa.com


BIOMETRICS

fingerprint in the database. This provides hack this encryption and was able to unearth It comes down to reliability, safety, security,
us with faster and more secure transaction the base hexadecimal string (template) and durability, speed of use and the extra features
times. was able to reverse engineer the extraction required to provide the solution the user
algorithm, all he or she would find was requires.
International standards for the location of a few minutiae points on a
fingerprint biometrics fingerprint since we do not extract any other Recommended technology
There are two international standards available details, such as ridge flows (i.e. loops, whorls, I would advise that South Africa pays more
for commercial systems. ANSI / NIST-ITL-1-2011 arches, tented arches), ridge patterns or any attention to LFD technology since fingerprint
(updated 2013 & 2015 and includes ANSI 378 & such data required to reconstruct a fingerprint. fraud from users is one of the biggest issues
ANSI 381) and ISO / IEC 19794 (includes parts 4 Think of it as GPS coordinates with no map. affecting us now, especially in the time and
& 8:2006). These standards indicate minimum attendance vertical. If the system can also
requirements for greyscale, dpi, platen size, Specific scanning technology perform Multispectral Response Imaging it
output format etc., as well as interoperability ViRDI uses patented LFD scanning technology. would be an added bonus. There is probably
between different fingerprint biometric This is a multi-step process. First, the platen is only a handful of Tier 1 manufacturers
systems. According to the NIST website these manufactured from Sapphire Crystal to make available in SA (and when I say available, I
standards “…supports the proliferation of low- it scratch resistant for longer life span, and also don’t only mean available for sale, but also
cost commercial fingerprint sensors with limited to reduce the risk of transfer of bacteria. The having technical support, repairs, distributed
coverage, dynamic range, or resolution”. scanning process is subject to a live fingerprint points of presence etc.) and if the end-user has
However, they are minimum standards and being placed on the platen. Until a live finger is a larger system they need to stay with these
most Tier-1 vendors use proprietary algorithms placed on the platen, the complete fingerprint manufacturers.
that far exceed these minimum standards as scanning module remains in low power state. When looking at the deployment of the
well as proprietary scanning systems (what Once the scanning process activates, the system, the end-user must decide whether
we call the fingerprint scanning module) fingerprint module bombards the fingerprint they want the TATA or the BMW. If it is a simple
that includes LED lighting technology, platen with multi-coloured LED light. By using one- or two-door deployment, the TATA may
construction, lenses and optical devices. this light source, we are able to achieve be just the device (for a simple application),
The PIV/AFIS systems used by governments, Multispectral Response Imaging, i.e. we do not but it won’t be able to handle 30 or 40 doors
law enforcement and banking have the MINEX solely use the epidermis of the fingerprint and on one system – it will fall over.
standard since they compare, verify or identify the scanning process is subject to a number Continued on page 34
fingerprints from a centralised database such of factors inside the dermis that needs to be
as HANIS or AFIS and all images must comply within acceptable parameters. Only once these
to one set of standards since a fingerprint have been complied with does the system
taken with a Level 3 PIV/AFIS scanner in South begin taking images of the fingerprint.
Africa must be exactly the same as one taken This is also not a straightforward process as
in the USA or Europe. the lenses inside the fingerprint module have
been specifically designed – and patented – by
Safety, security and privacy ViRDI for the best possible image to reach the
Reputable biometric vendors have been image sensor. Once the images have been
cognisant of the possibility of reverse captured, the algorithm extracts two separate
engineering fingerprints and templates for at templates of the minutiae points and converts
least a decade and they spend huge amounts it into a template which is then encrypted
of money on R&D specifically to prevent using our proprietary encryption. Matching
any form of fraud or reverse engineering. can either take place on the terminal or on the
Governing the usage and storage of biometric server, or at both locations.
data are subject to various standards and even The ViRDI algorithm is currently the highest
legislation. ISO 27001, for instance, provides rated commercially available for embedded
minimum standards on storage and encryption devices with an EER (Equal Error Rate, which is
of such data. a combination of FAR and FRR) of 0.234%, FRR
Speaking from the ViRDI point of view on of 0.1% and FAR of 0.0001%. Our algorithm
how we prevent reverse engineering: when complies with (and exceeds) ANSI / NIST and
our algorithm extracts the minutiae points ISO as well as some more obscure standards
from the fingerprint, we only include the such as WQL.
data relating specifically to those minutiae The question of whether it is worth paying
points in the algorithmic hexadecimal string more for our device than some cheap-and-
(or template). We then encrypt the template nasty device is similar to the question asking
with a proprietary encryption that exceeds why buy a luxury BMW as opposed to a TATA.
ISO 27001, very similar to a standard 512-bit Both have bodies, both have seating, both
encryption. have wheels, both have engines, both have
When data flows between terminal and transmissions and both have the same basic
database, the data is also encrypted using this function – transporting people from one point
proprietary encryption. If a ‘hacker’ was able to to another. So why buy one over the other?

www.securitysa.com Access & Identity Management Handbook 2019 33


BIOMETRICS

Continued from page 33 process of matching a fingerprint against a


This is where the BMW comes in. It was previously recorded enrolment. Although
designed for SMME and enterprise systems, loosely referred to as biometric identification,
with all the bells and whistles required (i.e. the matching can really be classified as
access control, T&A, meal management, either authentication or identification.
integration with PSIM systems, integration with Authentication, also known as verification,
logical access control, compliance with fire is where biometrics of a known person are
bylaws, ability to easily integrate with third- captured, template extraction is performed
party management software solutions etc.). and then matched against the person it claims
Currently ViRDI has the largest commercial to be from on the database. Typical samples
biometric deployment in the world with more of authentication are when you supply your
than 300 000 enrolled users, more than 4000 ID, card, user name or some personal data to
terminals and more than 1 000 000 transactions enable retrieval of your record, and where
per day on a single system. The TATA will never you need to confirm you are who you say you
be able to handle this type of deployment. are (i.e. applying for a passport, authorising a
financial transaction or in some cases where
Biometric technology advice you log into your PC or mobile device).
Stay away from anything that looks and The process of identification is then
smells cheap because invariably they are and different from authentication because during
the end-user is going to spend money on identification, a specific identity is not claimed
this technology only for it to fail and quite and confirmed, but rather a biometric template
possibly result in them renouncing biometric is extracted and used to find a person on a
technology as a failure. Ensure the product is database with many enrolments to establish
available from multiple sources, that technical who the person is. When the police find your
support is available all through the value chain, fingerprints at a crime scene, they do not know
that repairs can be done in country and most who you are and the latent fingerprints found
importantly, if the company that supplied the at the scene are scanned against the database
device originally is unable to provide further to see if it can find a person on the system due
support, service and maintenance, that another to previous crimes. Identification is also used
supplier can step in easily to assist them. Walter Rautenbach. as a form of convenience, for example with
Look for devices that have IP ratings – access control, to avoid the inconvenience of
Africa is harsh on electronic devices and you such as NIST (National Institute for Science presenting a card or entering an ID – just place
don’t want a device that will fail at the drop of & Technology) Image Quality Standards, your finger to see if you exist and have access.
a hat because of our environment. Lastly, look abbreviated as IQS, as well as specific FBI The main differentiator between fingerprint
for a biometric system that can easily integrate standards come into play. identity systems is whether the fingerprint
with other software packages, such as T&A or These standards normally confirm that image or only the extracted fingerprint
software management suites. the image the fingerprint scanner returns is template is stored. General consumer-based
classified as a true representation of the actual systems, such as access control and T&A,
For more information contact ViRDI finger. One might ask why are we comparing it only store the fingerprint templates. The
Distribution, +27 11 454 6006, to paper impressions, is that not outdated? The main motivators for only storing templates
[email protected], www.virditech.co.za. simple answer is that a very large portion of is that it is more secure (if someone steals
fingerprint data stored on current Automated your fingerprint image it is almost as good as
Suprema Africa, Walter Fingerprint Identification Systems (AFIS) chopping off your finger).
Rautenbach originates from paper records. Although living Templates are also much smaller in size
Suprema is another South Korean biometric in the age of digitisation, records originating making it faster to transmit them, as well as
company that is present in around 133 from paper records will still be here for many easier to store a lot of people on a small device.
countries around the world. It was the first years due to historical records, lack and cost Unfortunately, some systems need to store the
biometrics company listed on Korea’s stock of digital infrastructure, and because paper image and the reason for that is so that it can
market and is represented in Africa by Suprema records are still actively used in the process of be visually confirmed by a fingerprint expert
Africa, a distribution division of neaMetrics. crime scene data collection. in a court of law, or on a large AFIS system
neaMetrics CEO, Walter Rautenbach answers A functional fingerprint system always that can possibly return multiple matches or
our questions on fingerprint biometrics. includes two elements, enrolment and HIT candidates. It is with these systems where
The purpose of a fingerprint scanner is matching. Enrolment is the process where the the importance of the fingerprint image
to capture a fingerprint image. Basically, it is fingerprint is captured, fingerprint template truly representing the actual finger, and the
a replacement for the old way of putting ink extraction is performed (although this can be associated certifications relating to this, plays
on your finger and then placing it on a piece done at a later time) and where either or both a vital role.
of paper. The closer it gets to what it actually the fingerprint image and template is stored
looks like on paper is a big part of how good on a database. Looking at standards
the fingerprint sensor is and that is where The second function, and really the main Institutions such as NIST and the FBI are
international certifications of image quality purpose of a biometric identity system, is the Continued on page 36

34 Access & Identity Management Handbook 2019 www.securitysa.com


www.securitysa.com Access & Identity Management Handbook 2019 35
BIOMETRICS

Continued from page 34 bifurcations and ridge endings on the image to principles and who is willing to openly and
forerunners of standards and benchmarking verify the accuracy. honestly consult. To not obfuscate or avoid
systems. This can broadly be subdivided It is for this reason that NIST, in answering the question with some usefulness,
into two categories: the fingerprint image collaboration with the fingerprint the following are some of the deterrents at
produced by the fingerprint scanner on the community, started MINEX, short for Minutia hand:
one hand, and fingerprint algorithms on the Interoperability Exchange. There are various Liveness detection: Perhaps the simplest
other. MINEX standards all focusing on cross solution is using fingerprint hardware as well
When looking at fingerprint images, the vendor interoperability. Here vendors get as algorithms that detect fake fingers. We have
FBI certifications Appendix F/G, PIV, FAP and the opportunity to do fingerprint template to continue monitoring what defines ‘live’,
more exist, basically prescribing the quality extraction (extracting minutia) from a especially with 3D technology venturing into
and size a fingerprint scanner should produce. given data set and then to benchmark their organ production.
Quality, in layman’s terms, refers to how well matching algorithm, or other open standard Data protection: All solutions
it represents the actual fingerprint, and size, algorithms, using open standard fingerprint should ensure to encrypt both data
which does matter because the more of the templates against a large and given fingerprint being communicated and stored using
fingerprint that can be captured, the more test data set. Vendors that participate in internationally recognised and current
data that can be used by the algorithms that these tests get a performance ranking across encryption standards. It is not uncommon
process the images. other vendors, but remember that rankings for solution providers to apply proprietary
Fingerprint algorithms, or at least the good change on a daily basis as vendors rework their obfuscation over and above recognised
ones, normally offer two types of extraction, algorithms to deliver better results. I consider encryption since continuous efforts are
one that produces proprietary templates, of the impact of MINEX as exceptional, not only being applied on a daily basis by ethical
which the content and structure is unknown because it focuses on interoperability, but and unethical parties to break recognised
and only usable by the manufacturer’s system, also because it drives vendors to continuously encryption standards through mathematical
and then the second being the production improve. and brute force mechanisms. Although this
of an open standard, normally ISO/ANSI Looking specifically at the matching does complicate things for hackers, it also
compliant fingerprint templates. Where ISO/ capabilities of proprietary fingerprint creates a ‘proprietary’ threat to the vendor who
ANSI templates are produced, they can be used algorithms, not using open standards, then might be vulnerable to lock down. The benefits
by any vendor supporting these standardised FVC (Fingerprint Verification Competition) and downfalls of each need to be evaluated on
templates, and since the structure is open, is a well-known benchmark. It started as a a case-by-case basis.
the core finger data being extracted can be competition every second year, but the last Biographic and biometric data
evaluated by a fingerprint expert by plotting was in 2006 after which they progressed to separation and fragmentation: Separating
FVC-onGoing, allowing participants to do the biometric and biographic information across
test again at any time. This means a vendor can infrastructure helps protect data. For example,
tweak, test, tweak – instead of waiting for two should a hacker gain access to a server with
years, which once again is great for algorithm biometric data, where no personal data or
improvement. identifiers exist, the usefulness of the data
Buyers must ensure their selected deteriorates. In other words, if I get access
vendor does not boast about their algorithm to all biometric data for Bank X, but I do not
improvements based on internal results, but know whom they belong to, how would I use
use internationally recognised test benches this data to do fraudulent authentication? As a
and standards such as MINEX, FVC-onGoing hacker, I would now have to hack into another
and others recommended or prescribed by infrastructure stack and identify how these two
institutions such as NIST, FBI and ISO biometric data sets are linked.
workgroups.
Suprema’s technology
Security and privacy Suprema’s range of enrolment and
Fingerprint images are more hackable than authentication finger sensors, and selected
fingerprint templates, but in both cases, with access and T&A range complies with various
today’s technology, rebuilding a modelled FBI regulations. These include PIV, Mobile
3D image of a finger is not impossible and ID, FAP and Appendix F, designed to ensure
most likely is already being done. Even if an compliance to image quality and size
un-hackable fingerprint image or template was regulations. It is important to note that the
available, and I really wanted your fingerprint nature of the certifications do not allow all
image, why would I not just find a way to lift fingerprint readers to have all certifications. For
your latent print off an object you touched and example, due to its size, a slap or palm scanner
then use the same to recreate that modelled does not fall into the Mobile ID certification
fingerprint? range and Appendix F is designed for FAP45
Deterrence of unethical access and use of (FAP relates to specific sizes) and up.
biometric identity data can only be achieved Most of Suprema’s fingerprint scanners
through continuous change and a vendor and/ also include liveness detection, some in the
or solution provider that follows the same form of hardware components and some

36 Access & Identity Management Handbook 2019 www.securitysa.com


BIOMETRICS

using software based or machine learning techniques to detect


fabricated fingerprints. This technology is referred to as Suprema’s
Liveness Detection Engine (LDE) and more information can be
found at https://www.youtube.com/watch?v=1MTkGWXgfQg,
or at http://kb.supremainc.com/knowledge/doku.
php?id=en:tc_whitepaper_suprema_live_finger_detection.
A big challenge in the past was the capturing of dry and
deteriorated fingerprint images, so some vendors introduced
multispectral imaging technology that overcame these challenges
and gained huge popularity, including the South African market
due to a large part of the identity population’s involvement in hard
labour, as well as old age (pensioners).
Multispectral technology performance is exceptional, but not
100% understood. Multispectral imaging technology produces
an image that can even detect subdermal traits, meaning worn
fingerprints can function normally. The downfall of this technology
is that it does not produce an image that looks 100% like the
original and for this reason, FBI certification is not possible.
In instances where these images are being used for
authentication, against systems where AFIS data population is
done by means of paper scans and FBI certified optical technology,
the results will not be as accurate as when using good certified
optical hardware. One must keep in mind that a multispectral
image in its original form does not look like a normal fingerprint
image. Image processing is performed to produce a compliant 500
dpi greyscale image and since subdermal elements are not present
in standard optical or paper records, these can influence match
results.
Suprema developed its own patented technology referred to
as Multi-dynamic Range (MDR) technology, now implemented
on all its new fingerprint authentication and access and
T&A terminals with exceptional results. The technology can
be compared to the changes from High Definition (HD)
television to Ultra High Definition (UHD) or even 4K when
comparing the results. More can be read here about this
technology at http://kb.supremainc.com/knowledge/doku.
php?id=en:tc_technology_multi_dynamic_range_technology.
Suprema’s fingerprint algorithms are ISO/ANSI compliant and
involvement in and with top results at FVC-onGoing and MINEX
illustrates involvement in industry benchmarking as well as the
quality of the results it delivers. The top MINEX results further
show that Suprema algorithms do not only perform well in its
proprietary systems, but also where open standards are used in
biometric identity.

Advice to buyers
Different use cases can be based on needs and purpose. In all
cases, we expect biometric technology to positively confirm or
identify a person, with tolerances only accepted based on the
limitation of the science of fingerprint mathematics. In summary to
the previously provided data:
• Determine if your system requires you to store fingerprint images
or only the templates. If images are required, then do ensure your
fingerprint scanner complies with known certifications (i.e. FBI
and NIST quality standards).
• Enrolment vs authentication. Keep in mind that initial enrolment,
or reference data collection, is the most important part of a
biometric identity solution. A bad enrolment will result in poor
matching performance.
Continued on page 38

www.securitysa.com Access & Identity Management Handbook 2019 37


BIOMETRICS

Continued from page 37 standards are WSQ, ISO/IEC 19794-4:2005 and


• Difficult fingers. Not all fingerprint hardware ANSI/INCITS 381-2004. Common template
is the same. Make sure to test your interoperability standards are ANSI 378
considered vendor hardware on people that and MINEX III all of which are supported by
have experienced problems with their fingers multispectral sensors.
in the past ‘No Match’ or ‘False Reject’ errors can
• Liveness detection. Does your vendor provide happen for a variety of reasons, most of which
liveness detection options? are not related to the image format, but rather
• Does your vendor have a large-scale to the quality of the information received. If an
international track record? image is used, then it’s necessary to capture
• Have the algorithms, that you use, been and distinguish real fingerprint minutia from
benchmarked? Various international dirt particles, water, dry skin, etc. If poor
benchmarking platforms/bodies exist (NIST/ information is captured, only from the surface
FBI/FVC/MINEX). Investigate this before you of the skin, then this information will also not
purchase. suffice to provide the expected match.
• Is your vendor compliant with open
standards? The privacy question
• How will the data on your system be The use of templates does create a layer of
protected? Is data encrypted and are obfuscation that will make it more difficult
internationally accepted encryption for a ‘hacker’ to reverse engineer a fingerprint
standards used? Does your vendor adhere minutia template to a full fingerprint. However,
to data protection regulations such as PoPIA the danger does exist. This reinforces the point
and GDPR? that fingerprint sensors should include a highly
The above are some questions that need to sophisticated liveness model to ensure that
be asked before initiating a fingerprint identity the data being matched is not only correct, but
system. There are many more considerations to it is confirmed to be generated from a living
be evaluated on a case-by-case basis. The most person. If liveness is utilised in conjunction
important question is if you have a reliable with the fingerprint information, the fear of
partner, with extensive experience in the Claude Langley. identity theft can be reduced, if not removed
field, that can offer you good advice from the when an individual places their finger on the altogether.
beginning, guide you through the lifetime of sensor platen, yet not all technologies provide Secondly, fingerprints are not private. While
your biometric identity system and who keeps equivalent results. Once the image has been they are unique, we leave them everywhere
abreast with daily technology developments to captured, either the sensor or the back-end we go, on glasses at restaurants, tables, door
ensure your system remains an asset and does biometric system extracts specific unique handles, walls, elevator buttons, etc. To obtain
not turn into a liability. characteristics of a fingerprint from the image, someone’s surface fingerprint data, one does
called minutia, to create a unique template. not need to hack a database and reverse-
For more information contact: Depending on the architecture of the engineer a fingerprint template. They just need
• neaMetrics, +27 11 784 3952, biometric system, a fingerprint sensor can do to pull a fingerprint like is done at a crime
[email protected], www.neametrics.com. either of the processes below: scene. The combination of liveness plus high
• Suprema, +27 11 784 3952, • Take an image and send it to the database to performance is what creates the true value of
[email protected], www.suprema.co.za. conduct the minutia extraction and one-to- fingerprint biometric sensors.
one (1:1) or one-to-few (1:N) match on the
HID Global Lumidigm: server. HID’s fingerprint technology
Claude Langley • Take an image and conduct the minutia HID biometrics uses a patented technology
Part of ASSA ABLOY, HID Global focuses on extraction and template generation on the called multispectral imaging which was
trusted identities that make it possible for sensor, sending only a binary data string specifically developed to overcome the
people to transact, work and travel. The (template) to the database to perform a 1:1 or fingerprint-capture problems that have
company absorbed Lumidigm a few years 1:N match on the server. plagued conventional fingerprint sensors
go and the company now functions as a • Take an image and conduct the minutia when they are used in the real world – outside
biometric division of HID. Claude Langley is the extraction and template generation on the the lab.
biometrics business development manager for sensor, then request the template linked to Multispectral imaging utilises multiple
Africa at HID Global – Lumidigm. that individual from the server or a smart card spectrums of light and advanced polarisation
The three most common technologies used to conduct a 1:1 match on the sensor. techniques to extract unique fingerprint
for fingerprint sensors are multispectral (HID), • Take an image and conduct the minutia characteristics from both the surface and
optical and capacitive. Each technology varies extraction and template generation on the subsurface of the skin and to determine
in its ability to capture an image, determine sensor, then perform a 1:1 or 1:N match to relevant fingerprint data. Subsurface capability
its liveness and match against the stored template(s) stored on the device. is important because the fingerprint ridges
information. There are various international standards seen on the surface of the finger have their
Fingerprint sensors essentially all take to regulate how fingerprints are scanned, foundation beneath the surface of the skin
an image of a fingerprint, which is captured processed and stored. Common image format Continued on page 40

38 Access & Identity Management Handbook 2019 www.securitysa.com


www.securitysa.com Access & Identity Management Handbook 2019 39
BIOMETRICS

Continued from page 38 they are protecting. There are over 35 000
in the capillary beds and other sub-dermal different materials which can be used to
structures. make fake fingers and hundreds of videos
Unlike surface fingerprint characteristics, on the Internet on how to make them.
which can be obscured during imaging by Government entities, banks and factories
moisture, dirt or wear, the ‘inner fingerprint’ must all consider the diversity of finger
lies undisturbed and unaltered beneath the types in their user population and base their
surface. When surface fingerprint information requirements for biometric technology on
is combined with subsurface fingerprint these factors. HID’s multispectral imaging
information and reassembled in an intelligent technology captures details below the
and integrated manner, the results are more surface of the finger and therefore performs
consistent, more inclusive and more tamper capture, liveness detection and matching on
resistant. The use of multispectral imaging also all the most difficult finger types.
contributes to our industry-leading liveness
detection. Purchase considerations
As of the printing of this article, HID V There are many considerations when
series multispectral imaging sensor is the only making a buying decision on biometric
sensor to achieve a perfect 100% detection of technology. The three most important
fake finger attacks during the ISO/IEC 30107-3 include:
Presentation Attack Detection (PAD) standard • Capture: How effectively does the sensor Gary Jones.
certification testing process. (See more at match my authorised individuals on a
supplied by a tier-1 MINEX III certified
https://www.hidglobal.com/press-releases/hid- consistent basis over time in the real-world
algorithm for fingerprint templates, including
global-lumidigmr-multispectral-fingerprint- setting? This is covered by the metrics
ANSI 378 and ISO 19794-2 MINEX templates
technology-earns-first-perfect-score.) related to the ability to capture usable
supplied by a Tier-1 fingerprint algorithm
Many of HID Global’s Lumidigm sensors biometric data on the first attempt for
partner, independently tested and validated
also offer the use of the Innovatrics MINEX every user. Ability to capture is the most
by the U.S. National Institute of Standards
III algorithm. As published by NIST on the essential performance consideration
and Technology (NIST).
12th of November 2015, HID became the in commercial biometric applications.
first vendor to achieve full PIV compliance in Consumers expect ‘100/100’ capture
For more information contact Claude Langley,
MINEX III while also ranking first in most of the performance, even in challenging
HID Biometrics, +27 83 321 2922,
main accuracy and interoperability criteria. environmental conditions and for diverse
[email protected].
The Innovatrics template generator is one of populations.
the most accurate out of all vendors and the • Liveness: How effectively does the
Innovatrics template matcher performed the fingerprint sensor determine whether
IDEMIA: Gary Jones
The combination of Oberthur Technologies
best in the native one-finger ranking where it the fingerprint is real or is a fake?
(OT) and Safran I&S (Morpho) resulted in
was placed first among all submissions. Liveness detection refers to the ability to
IDEMIA, a company that has coined the term
The bottom line is that HID’s multispectral confirm that the captured finger image
Augmented Identity. Gary Jones is the VP for
sensors offer the best performing sensor for is legitimate and from a live finger by
channels and marketing at IDEMIA (see more
image quality combined with the best liveness comparing complex optical characteristics
in the article “Taking augmented identity to
detection available. If matching is required of the material presented against known
the world” on page 30).
on the sensor, we offer a top-ranked minutia characteristics of living skin. This unique
The first stage of fingerprinting is referred
extraction and matching algorithm. ability of multispectral imaging provides
to as ‘acquisition’ because the sensor acquires
accurate fingerprint liveness detection and
an image of the fingerprint, which is a pattern
Recommended technology for eliminates the perception that fingerprint
of ridges and valleys.
Africa images must be kept secret to be trusted
Next comes the feature extraction phase
The fingerprint sensor should match the use for user authentication. Fingerprint images
during which the unique features of the print
case, yet in most cases where fingerprint are not secrets.
(referred to as minutia, are detected and
biometrics is used, the goal is to properly • Match: How effectively does the minutia
extracted). Minutiae are the points where
validate the identity of an individual. extraction and matching occur? Is the
ridges start or end (terminations), or where
Typically, performance matters and adoption data interoperable or am I locked into
they split from one into two (bifurcations), as
of the technology is hindered if authorised a proprietary template format that
well as various combinations thereof.
individuals are not matched quickly. Liveness requires me to purchase only a certain
should matter as the true value of biometrics is type of sensor? To prevent vendor
only realised when it is used. lock-in and to provide choice for users of
The potential impact of poor accuracy to commercial biometric systems, fingerprint
a government or a banking application can authentication solutions should use
be significant compared to a factory time and interoperable and independently tested
attendance application. Organisations need to global fingerprint minutia standards. HID
understand the level of attack sophistication, Global’s fingerprint matching technology
frequency of attack and the value of what uses existing ISO 19794-2 templates

40 Access & Identity Management Handbook 2019 www.securitysa.com


BIOMETRICS

The image below shows the process including an advanced method Additionally, there are four key aspects needed to prevent against
of enrolment using multiple acquisitions of the same finger which are identity theft risks:
compared/matched against each other, and then consolidated to create
a more complete and reliable template. The nature of data stored.
• One key reason biometric systems discard the image is to make the
process of reverse engineering as complex or improbable as possible.
Even if we assume a hacker somehow gets hold of a template, a reverse
engineering process will always result in differences from the original
image (as it will be a synthetic/generated image from a much smaller
subset of data).
• This is analogous to a children’s join-the-dots drawing. You can join
the dots in the correct order millions of times, but depending on how
the lines flow, every resultant picture can look slightly different, and
even small differences can have a significantly negative impact when
matching fingerprints.
International biometric standards • Irrespective, the process of reverse engineering is a very complex one
Biometric sensor standards govern both the image size and quality and typically not worthwhile for reasons described below.
produced by a sensor. They define parameters such as resolution (ppi),
distortion, illumination consistency as well as image dimensions. FBI System security architecture
PIV IQS is the standard most commonly relied upon for sensors used in At a high level, this includes:
access control and/or time and attendance. • Hardware/software architecture and resultant robustness against
There are also standards for biometric template generation, such as physical and network penetration,
the ANSI INCITS 378 format, which is designed as a common template • Defining access roles and privileges, and
format which can be used by any vendor. This resultant interoperability • How the data is encrypted at rest and during transmission.
allows templates generated by a system from manufacturer A, to be
compatible with a system from manufacturer B, and so on. Spoof detection
Most major biometric vendors submit their algorithms to NIST This is a key line of defence in biometric systems. Today’s leading
(National Institute of Standards & Technology) for independent technologies employ complex mechanisms to determine if the
benchmarking. These benchmarks are heavily relied upon by major biometric being presented is genuine or some kind of 2D or 3D spoof
users of biometrics, but equally present a valuable resource for smaller attack (such as a fake finger or hand). This drastically reduces the risk or
customers to determine the robustness and performance of a given threat posed by stolen or hacked biometrics
vendor’s biometric algorithms, now and over an extended period as the
benchmarks have been running for multiple years. Multi-modal or multi-factor authentication
This can help determine how long a vendor has demonstrated • By incorporating two biometric factors (e.g. face and fingerprint),
leading performance, how consistent their solutions are over time, and the security of a system can be increased even further. Similarly, by
how much they invest in R&D to ensure continuous improvement of scanning more than one finger on a hand the accuracy is increased
their products over time. whilst also increasing the complexity of spoof attacks.
NIST conducts benchmarks for both proprietary and interoperable • Incorporating a card and/or PIN in addition to the biometric (or any
template formats, and it is important to select a vendor with strong combination thereof ) can also be used to further strengthen the
performance in both domains to ensure robustness and future proofing robustness of a system against attack
of the enrolment data and solution. o Something you know
o Something you have
Preventing identity theft o Something you are
This also ties back to the encoding process mentioned above. Continued on page 42

www.securitysa.com Access & Identity Management Handbook 2019 41


BIOMETRICS

Continued from page 41 validated by the large number of customers simple examples can be used to illustrate the
No system is 100% bulletproof, but one can who are still using Morpho readers installed importance of accuracy and its impact on cost:
design a system to make the level of effort far almost 20 years ago, which are still performing • In a time and attendance system, every false
outweigh either the reward, or alternate means better than many new entrants on the market clocking (either because a fingerprint did not
of achieving the same goal. today. Our sensors and algorithms are proven match, or worse, matched incorrectly) leads to
in the harshest industries and environments, downstream payroll errors that require human
Technology from IDEMIA and comply with major industry standards. intervention to correct. This has a direct labour,
As the global leader in biometrics for over four Our most advance offerings, MorphoWave time and financial cost, which over only a
decades, IDEMIA manufactures a wide range of Compact and MorphoWave Tower, are few months can exceed the cost differential
FBI PIV IQS-certified optical sensor technology in a league of their own. The 3D imaging between a cheap biometric system and an
for access control and time and attendance technology is able to acquire up to 30% more industry-leading biometric solution.
markets. These include: data from each finger and scan all four fingers • In an access control application, a company
• High-speed touchless 3D fingerprint sensors multiple times in 3D during a single wave. This with 1000 employees transiting through
(MorphoWave) which scan all four fingers is faster than many competing readers can a conservative five access points per day,
with a simple wave of the hand. scan one finger in 2D. may have over 1 million access transactions
• Large area contact-based single fingerprint With in-motion matching, users do not per year. We often see cheaper biometric
sensors used in our MorphoSmart and need to stop or pause at the reader, resulting in systems being configured with low matching
MorphoAccess Sigma readers. throughput exceeding 45 people per minute. thresholds such as 1 in 1000 False Accept
In addition, IDEMIA’s fingerprint algorithms A major breakthrough with this technology Rate (FAR) in order to avoid high levels of
are consistently ranked #1 on NIST benchmarks is that both security and convenience are inconvenience due to False Rejection Rate
and are trusted by the world’s largest users increased simultaneously, therefore requiring (FRR). This would result in approximately 1000
of biometrics. Due to the strength of our no compromises. incorrect false authorisations per year, leading
algorithms we are able to offer customers to a high risk or fraudulent access and making
the ability to configure a security threshold User and technology the system audit highly questionable.
(assurance level) that is strictly enforced by recommendations In addition to potential theft or malicious
our readers irrespective of the database size. We regularly see some important attack related losses, implementing an
Cheaper biometric products typically suffer fundamentals being overlooked in the insecure system opens the organisation to
from performance/accuracy degradation as commercial sector. Clients often choose to significant liability risk.
the user population grows. buy cheaper technology because they don’t South African organisations should look
Unlike many cheaper alternatives, our think of themselves as having the same closely at the total cost of ownership when
technology is designed and built to last, and accuracy requirements as a major government selecting a biometric system. Referencing major
therefore ensures the highest ROI. This is organisation, for example. However, a few benchmarks such as NIST and researching
which technologies are trusted by major
organisations such as Interpol and the FBI, who
rely heavily on biometrics, is a reliable indicator
of which technology is thoroughly proven, can
scale well, and ultimately can be trusted.
Factors such as local support from the
manufacturer in conjunction with a well-
established channel network of resellers
and installers in the region should also be
considered. Another factor is how long the
vendor/manufacturer has been present in
the market. A biometric system should be
looked at as an investment that should
last a minimum of 5 years but typically
10+ years is common for industry
leaders.
In other words, never
compromise. A more accurate,
proven solution will pay for itself
within months when compared
to cheaper alternatives.

For more information contact


IDEMIA, +27 11 286 5800,
[email protected],
www.idemia.com.

42 Access & Identity Management Handbook 2019 www.securitysa.com


BIOMETRICS

BIMS set to change identity ­management


By Andrew Seldon.

Ideco has announced that its Biometric Identity Management System


(BIMS) is a­ vailable to the market.
Local biometrics integrator, Ideco Biometric facial biometrics. When the device is started, it
Security Solutions, has announced that its communicates with the server and downloads
Biometric Identity Management System (BIMS) the correct configuration file and sets the
has finally received all the accreditations it system up accordingly. This allows companies
requires to be used for capturing and confirming to use the device for a range of tasks, simply
identities via a number of modalities. setting up the configuration files specifying
The BIMS hardware and software was what the next job will be.
designed and built in South Africa by Ideco The system consists of two touchscreens;
(at a cost of over R20 million in R&D), with the the operator works on one side while the
support of the Department of Trade and Industry person submitting their biometrics sits
(DTI) as well as the Department of Science and opposite them facing their own screen.
Technology. Now that the system is being taken Because BIMS captures biometrics
to market, the DTI has recommended it for use according to accepted international standards,
in government departments and has provided it is ideal for governments looking to capture
a letter of recommendation for potential a range of biometrics for citizen identification.
international customers. For example, South Africa’s Home Affairs could
BIMS is a portable biometric enrolment use a single device to capture fingerprints,
solution that is able to run on battery power faces and even signatures from people
Marius Coetzee.
for up to 12 hours. It can capture six different applying for passports – from a single device.
biometric modalities: fingerprints, palm vein, • Signatures are captured on a digital signature It can also be used in banking and retail
face, iris, voice and signature. Ideco’s CEO, pad that records 4D coordinates (X, Y, environments to register new accounts and
Marius Coetzee, says that while the device is a pressure and time). ensure that people are who they claim to be.
complex piece of technology, it was designed BIMS is also equipped with a range of Coetzee explains, “The need for secure and
to be easy to use while capturing biometric connectivity options, including Bluetooth, authentic identity management has reached
readings that meet international standards: Wi-Fi, 3G, GPS and LAN. When an individual’s crisis proportions globally, with demand for
• Fingerprints are captured by dual LES biometrics are captured, the resulting advanced, agile and multi-modal biometric
­technology scanners which are FBI Appendix templates are compressed and encrypted identity management. Until now, no one could
F certified. before being sent to a secure server where deliver six modalities in a single portable
• Faces are captured by 5-megapixel cameras they are stored in the cloud. No matter which device, which can be used in any configuration
that are ICAO compliant. biometrics the customer may require, the for multiple levels of identification, as well as
• Iris capture is according to NIST- resulting identification templates are secure integrating into existing enterprise systems
recommended image quality. and only accessible to authorised people. quickly and easily.”
• Palm vein biometrics uses the near-infrared Each BIMS device is configurable to the
PalmSecure sensors. needs of each customer. A configuration file For more information contact Ideco
• Voice is captured by an integrated on the server is set up for specific tasks, for Biometric Security Solutions, 086 104 3326,
omnidirectional audio recorder. example to capture people’s fingerprints and [email protected], www.ideco.co.za.

www.securitysa.com Access & Identity Management Handbook 2019 43


BIOMETRICS

Tracking biometrics into a brave


new digital world
By Pine Pienaar, MD, Afiswitch.

Integrated multimodal biometric solutions are increasingly popular


for more accurate identity verification and faster real-time results.
The concept of using of biometrics – measuring some of the milestones that defined how we in 1903, the methodology of the Bertillon
an individual’s unique physical and behavioural understand and use biometrics today include: System is still pursued in biometrics and
characteristics or traits – to confirm a • 18232 – Dr J. E. Purkinje, a professor of forensic science today.
person’s identity, was conceived thousands anatomy at the University of Breslau was the • 19364 – The concept of using iris patterns
of years ago. For instance, since the dawn of first to publish an essay on the varied ridge as a means of recognising and verifying an
time people relied on facial recognition to patterns of fingerprints and classified them individual’s identity was first introduced.
distinguish between people they did or did into pattern types. • 19605 – Face recognition becomes semi-
not know. The use of fingerprinting can also • 18802 – Discussions first commenced on the use automated, and later the first model of acoustic
be dated as far back as 500 BC1, whereby these of fingerprints for accurately verifying personal speech for identification was proposed.
unique markers were recorded on tablets as identification. This followed an article by • 19803 – The first computer database of
part of verifying the identities of parties to a Dr Henry Faulds, a Scottish doctor in Tokyo, fingerprints was developed, which came
transaction. Japan, that was published in the scientific to be known as the Automated Fingerprint
Whilst society of that time didn’t recognise journal Nature, in which he observed the Identification System, (AFIS).
the full potential and value of biometrics, the wide diversity in fingerprints between ° The AFIS was introduced in South Africa in
solutions we use today are still embedded in individuals and that these markings the 1990s, though this system and other
the authenticity of these origins. Where the remained unchanged throughout life. versions that came after it weren’t very
science behind biometrics really started to • 18823 – The Bertillon System was introduced. successful and by 1995 this system was
evolve during the 19th and 20th centuries (to Although use of the Bertillon System as a disbanded. However, efforts continued
read more on the chronological developments standalone method to verify an individual’s to create a system that was optimised
in the 19th and 20th centuries to modern identity, saw a dramatic decline following and effective, and a new system was
biometrics, please see the ‘Detect and protect’ the case of William West and Will West at re-introduced in the country in 2002.
series of articles on my LinkedIn profile.) and a Federal Prison in Leavenworth, Kansas, Continued on page 46

44 Access & Identity Management Handbook 2019 www.securitysa.com


BIOMETRICS

Continued from page 44 being implemented and tested globally. Going


° Research6 indicates that the AFIS market forward, we expect that mainstream adoption
will continue to experience solid growth of biometrics will impact how employers,
and the market is expected to be worth US$ service providers and technology companies
8.49 billion by 2020. provide end-users with access to these devices,
It is interesting to note that most of these applications and services in the future.
developments centred around physiological However, the biggest challenge for the
traits and unimodal biometric systems. In fact, industry and for the public and private entities
much of the focus during the 20th century was that want to adopt biometric solutions as
on building devices, back-end databases and part of their identity verification and security
systems that could correctly capture and store protocols, is to obtain user (consumer) buy-
fingerprints so that these records could later in. There are concerns over how and where
be used to make an accurate and automated biometric data will be captured and stored
comparison when a ‘one-to-one’ or a ‘one-to- – and how secure the information will be.
many’ request was entered into the system. Though these concerns can be easily allayed as
For that time period, it was strongly it is possible to securely capture, encrypt and
believed that fingerprints alone would be the store biometric data, and the research by IBM7
universal identifier that could be used for a shows that consumers are ready and willing
number of applications for authenticating and to make use of biometric solutions. The onus
verifying a person’s identity, but it was soon Pine Pienaar. is now on the industry and organisations to
realised that other systems could be built on solutions are able to take live measurements make use of flexible identity platforms that
top of this, including verification for security, of more than one biometric identifier and provide users with accuracy, security, speed
access control, or verifying personal and/or check them against multiple systems based on and convenience – which makes the identity
criminal records, for example. approved integration which presents results verification process a positive user experience.
For the most part, automated fingerprint in real-time – this process reduces the risk of In today’s fast-paced lifestyles, knowing
identification systems still form the basis of the spoofing or hacking, which inherently who you are dealing with is critical in order to
most biometric solutions today. However, also increases the level of security. (Spoofing manage personal, business and even s­ ocietal
following the advent of the Internet and given refers to a person attempting to cheat or trick a risks on a macro level. The fundamental
the pervasiveness of fake documents – linked biometric system by using a copy or imitation attribute of biometrics remains as the ability to
to fake identities or identity theft – as well as of the biometric identifier of the authentic verify an individual’s identity, which continues
major world events such as 9/11, it was realised subject. For example, someone trying to use a to become ever more prevalent in the digital
that a standalone biometric identifier is not copy of another person’s fingerprint.) age. Therefore, with the added benefits of
suitable to meet all the security requirements While unimodal fingerprint systems agility and scalability offered by digital and
of various applications. As a result, the industry will continue to have a place in the market, mobile biometric solutions, mainstream
is increasingly transitioning from unimodal multimodal biometric solutions are certainly adoption is only a matter of time.
to more integrated multimodal biometric more robust and reliable. But, the real value of
solutions for more accurate identity verifications these solutions is in the diverse applications in For more information contact Afiswitch,
and to deliver faster results in real-time. which they can be used, across any sector or +27 12 679 2900, [email protected],
As an emerging trend, multimodal industry, to better protect personal information www.afiswitch.com.
biometric solutions can take input from – and to detect and protect against fraud and/or
a single, or multiple devices, capturing other illicit or criminal acts. References
two or more different physiological or As we leap forward to the current brave 1. https://www.biometricupdate.com/201802/
behavioural traits for identity authentication new digital age, due to the ongoing waves of history-of-biometrics-2
and verification – depending on the digital transformation, biometric solutions are 2. https://books.google.co.za/books?id=kN
application and security measures required. dubbed to go mainstream as the foundation to yPkc2ADTsC&pg=PA13&lpg=PA13&dq=
The combinations for a specific application managing identity authentication and digital 1680+fingerprinting+history&source=bl
can vary and may include any number of security. In fact, an IBM Security Report7 found &ots=w_lCfgQ6AEwDHoECAUQAQ#v=o
identifiers from fingerprints to iris, face or that while 67% of respondents said they are nepage&q=1680%20fingerprinting%20
voice recognition, or a person’s signature – comfortable using biometric authentication history&f=false
even a person’s gait signature (distinguishing today, 87% say they’ll be comfortable with it in 3. http://www.crimescene-forensics.com/
someone by the way they walk, although less the future. Crime_Scene_Forensics/History_of_
known). These biometric identifiers may be As the digital play in biometrics rapidly Fingerprints.html
used in combination with any other unique evolves, these solutions include fingerprints, 4. https://www.biometricupdate.com/201206/
traits to identify an individual. facial recognition and even iris or retina explainer-iris-recognition
For consumers, businesses, government scanners on mobile devices, at ATMs and self-­ 5. https://www.biometricupdate.com/201601/
services and even national and global security service check-in counters at airports. Devices explainer-facial-recognition
on a macro level, these solutions offer and solutions will be designed and built 6. https://www.marketsandmarkets.com/
increased recognition rates and as a result specifically to address the need application PressReleases/automated-fingerprint-
improved accuracy in verifying the authenticity and the fluidity of this modern world. In fact, identification-system.asp
of an individual’s identity. Additionally, these there are already examples of such applications 7. IBM, Future of Identity Study, 2018

46 Access & Identity Management Handbook 2019 www.securitysa.com


BIOMETRICS

Panasonic’s Face Recognition Server


Deep learning allows for partial face recognition and Best Shot selection.
Panasonic has adopted deep learning installed with the ‘Best Shot License Key’ that that suppresses errors enables recognition in
technology in its face recognition products. comes bundled with the software, only the situations that were difficult with conventional
This has led to the successful development ‘Best Shots’ will be sent to the server for face face recognition technology.
and commercialisation of the face recognition recognition. The combination of Panasonic iA function and Best Shot: The iA function
technology that overcomes the difficulties of core devices and the face recognition software enables cameras to automatically detect the
conventional technologies, such as recognising maximises the performance of the software’s scene and automatically optimise the settings
faces when they are tilted, changed by ageing, core engine to achieve high-precision accordingly to improve the detectability of
or partially hidden with sunglasses. Panasonic recognition. The company plans to add a the video images. The camera automatically
will offer this product as a personal recognition function to recognise faces partially covered detects the moving objects, movement
solution for video security in various situations, with a surgical mask, which is difficult with speed, faces, and light intensity (day/night/
such as the monitoring of public facilities and conventional systems. headlights) found in video that are usually
entry management. Cameras equipped with the iA function hard to see due to subject movement and
The new software features a core enables image analysis to be performed on the backlight, and optimises the settings in
engine that boasts the world’s highest face camera and then send only the best images real-time and capture more optimal video of
recognition performance. The product to the server. This will result in reducing server the subject.
achieved the highest level of face recognition and network loads, which leads to overall Performing facial recognition on the server
performance in the world in a comparison test system cost reductions. In the case of 10 or using the Best Shot images reduces server load
(IJB-A Face Verification Challenge Performance more network cameras connected to the and hard drive capacity requirements as well
Report/IJB -A Face Identification Challenge system, the costs can be reduced by about 40% as permitting up to 20 network cameras to be
Performance Report) of NIST (the National to 50% compared to conventional systems that connected to a single server. (The number of
Institute of Standards and Technology) of the do not use the Best Shot function. cameras that can be connected depends on
United States. the number of people passing by the camera
This high-precision face recognition Software features and the retention period for face images.)
software can identify faces that are difficult High precision: The deep learning technology System expandability: Simple batch
to recognise with conventional technologies, used in the new software was jointly registration of a maximum of 10 000 faces is
including faces at an angle of up to 45 degrees developed with the National University of possible with the standard Face Recognition
to the left or right or 30 degrees up or down, Singapore and improves face recognition Server Software. The optional Face Registration
and those partially hidden by sunglasses. performance by up to 500% compared to Expansion Kit enables registration of up to
In addition, the new software features conventional systems. (The rejection rate 30 000 faces at large-scale facilities.
the ‘iA (intelligent Auto) mode’ that reduced to 20% when the wrong person
automatically adjusts settings for the camera acceptance rate is set to 0.01 with the IJB-A For more information, contact Franz Kersten,
to shoot optimal images best suited for face face image dataset.) Panasonic South Africa, +27 11 312 7015,
recognition. When it is used with Panasonic’s A unique algorithm that combines deep [email protected],
i-PRO EXTREME series network cameras learning with a similarity calculation method www.panasonic.com.

www.securitysa.com Access & Identity Management Handbook 2019 47


BIOMETRICS

A better approach to
fingerprint biometrics
An Integrated Biometrics White Paper.

LES optical direct imaging sensors: a smarter


alternative to prism-based scanners.
Not all optical biometric fingerprint scanners are created equal.
The type of sensor used has a powerful impact on speed, accuracy,
reliability and portability. Most scanners rely on fragile, heavy
prism assemblies to generate high-quality images. This whitepaper
introduces Integrated Biometrics’ Light Emitting Sensor (LES)
optical technology and demonstrates how it creates faster, more
reliable results than any other fingerprint scanning system currently
available.

The LES optical scanning advantage


Integrated Biometrics sensors use LES film – a patented
electroluminescent polymer – rather than prisms to generate
exceptionally high-resolution scans when touched by one or more Unlike glass-based sensor systems that require significant
fingers. The conductive properties of a finger energise particles amounts of light to create a scan, LES sensors need only a small
of dielectric phosphor suspended in the thin film substrate. The amount of energy, plus the conductive properties of a human
luminescent glow of the phosphors produces an exact image of the finger placed on the sensor’s bezel and platen, to excite the
fingerprint. phosphor particles in the film. The result is an image so detailed
LES sensors are optical devices that fully meet the standards that even sweat pores are evident within a fingertip’s ridges and
for electro-luminescent (EL) optical imaging, as determined by the valleys. High-speed digital cameras capture these high-resolution
United States National Institute of Standards and Technology (NIST). images. Either a CMOS camera with a traditional glass lens or thin
Page 14 of NIST Special Publication 500-280v2 defines the EL optical film transistor (TFT) camera, depending on the intended use of the
direct imaging used in LES as: A contact technology in which the scanner.
ridges and an Alternating Current (AC) signal cause an EL panel to Since LES sensors rely upon conductivity from the bezel across
emit light which is captured by an imaging system. the finger to the platen to generate an image, LES scanners
The LES sensor generates the light needed for the scan, rather automatically position fingers for optimal scanning and maximum
than a complicated assembly of platen, light source, and prism. The surface area. Any attempt at spoofing using non-conductive
resulting image is captured using digital camera optics. LES sensors materials is automatically rejected, since no image can result
require far less power than prism-based systems. They are thinner (Figure 2).
and lighter, making LES the ideal medium for portable scanning Image files transfer to host PCs, tablets or smartphones using
systems. LES is unaffected by oils from previous fingerprints, dirt, an ordinary USB interface. This connection also acts as the sensor’s
heat, or cold. Operators can use LES sensors in a wider range of power source, removing the need for a separate wired connection
operating conditions, without having to clean the sensor between
scans.
This superior performance generates high-resolution optical The FBI chooses Integrated Biometrics
scans that are FBI-certified (Appendix F and PIV), ensuring products The United States Federal Bureau of Investigation (FBI) is one of
that meet or exceed this ‘gold standard’ for biometric fingerprint many law enforcement agencies that recognise the advantages that
validation. LES delivers these scans extremely rapidly, with built-in come from LES-based fingerprint scanners. The FBI recently selected
testing to eliminate spoofing and other attempts at fraudulent Integrated Biometrics’ Kojak scanner as the sole source for a major
validation. purchase. The reason, according to the FBI, was that:
“No other fingerprint scanners were found capable of meeting
How LES technology works the weight, size, and power requirements, as well as meet the
Integrated Biometrics’ LES-based sensors generate high-resolution requirement of being FBI certified.”
fingerprint scans by using energy to excite phosphorus particles When performance and portability are critical, LES optical
suspended across a thin film substrate. The electroluminescent fingerprint sensors are clearly the superior choice.
particles’ light emission varies, based on a finger’s ridges and valleys. Source: Federal Bureau of Investigation. Requisition Number
Contact with the sensor therefore produces an accurate, high- DJF-16-0100-PR-0002913, December 2015
resolution image of the fingerprint (Figure 1).

48 Access & Identity Management Handbook 2019 www.securitysa.com


BIOMETRICS

Why is LES technology better than


traditional prism-based scanners?
While LES technology is optical, it does differ
in positive ways from traditional technologies
that employ a clear glass platen and prism.
Traditional optical sensors only ‘see’ the surface
topography of the finger (or fake finger)
presented on the glass. This technology is
susceptible to image spoofing. LES sensors
inherently guard against spoofing as they
require the friction ridge of the finger to
contact the film while simultaneously
contacting the device’s bezel. The connection
Figure 1. between LES film and bezel complete a circuit
and create the fingerprint image. Without the
conductivity properties of the human finger,
fake fingers will not work. Additionally, the
oils, latent prints, and dirt that are often left
behind and ruin images on a traditional glass
platen, are simply not ‘visible’ when using the
LES sensor. This simple difference between
LES and prism-based sensors means no more
cleaning the platen after every single use – LES
technology excels in unattended applications.

FBI standards for biometric


fingerprint identity validation
There are two standards currently in use for
Figure 2. fingerprints: Appendix F and PIV-071006.
• Appendix F has stringent image quality
or battery pack. LES scanners can operate film rather than heavy, fragile glass surfaces conditions, focusing on the human
for hours using a cellphone battery without and complicated prism assemblies and light fingerprint comparison and facilitating
additional auxiliary power, making this sources, fingerprint scanners using LES work large-scale machine many-to-many
technology ideal for field operations using in extremes of temperature, dirt, glare, and matching operation.
smartphones and tablets. humidity where other technologies cannot. • PIV-071006 is a lower level standard
The scanning surface itself is resistant to designed to support one-to-one
A smarter approach for biometric minor abrasions, and there are no light fingerprint verification. Certification is
fingerprint scanning sources to burn out and replace. available for devices intended for use in
Integrated Biometrics’ LES sensors deliver Low energy consumption makes LES the FIPS 201 PIV programme.
reliable, 500ppi FBI-certified optical sensors ideal for portable applications, Integrated Biometrics’ LES optical
fingerprint scans in compact devices that drawing power through the USB connection scanners meet both standards, using LES
are more portable than any other scanners of a typical smartphone or tablet. sensors to deliver a lighter, more robust
currently available. Integrated Biometrics’ Integrated Biometrics is the first, and scanner that requires far less power than
sensors automatically enforce proper the only provider of FBI-certified optical traditional prism-based systems.
scanning position for the maximum surface fingerprint sensors using LES technology. Its Source: FBI Biometric Centre for Excellence
area across one or more fingerprints. They superior performance, durability, light weight
enrol or scan multiple fingers quickly (2fp and and low power requirements have made it
442fp), without requiring the surface to be the obvious choice for federal, state and local The full paper can be downloaded
cleaned between scans. law enforcement and border control agencies, at https://integratedbiometrics.com/
LES sensors recognise the topography of as well as handheld device manufacturers wp-content/uploads/2017/05/INB-WP-LES-
a finger using the conductivity properties of seeking a better solution for biometric Smarter.pdf
human skin, rather than the surface image identity validation. Today’s heightened
generated by backlit glass platens and prisms. security concerns and performance For more information, contact
This difference in functionality helps detect requirements demand a smarter approach Robert Jones, Integrated
and reject spoofing and other attempts at to optical fingerprint scanning. Integrated Biometrics, +27 60 503 7077,
evasion. Biometrics’ LES-based sensors meet that [email protected],
Since LES sensors use a thin polymer requirement. www.integratedbiometrics.com.

www.securitysa.com Access & Identity Management Handbook 2019 49


BIOMETRICS

Your face tells a story


By Andrew Seldon.

Facial recognition has advanced to the point where it can be rolled out over large
areas and accuracy is no longer a hit-and-miss affair.
There are many companies offering facial face deviates from perfect, or the bigger the
recognition today, most of them incorporating age gap becomes, the lower the match scores.
some form of artificial intelligence into their A weak algorithm will deviate widely between
identification and authentication offerings. good and poor quality images, while a strong
Unfortunately, facial recognition has not algorithm’s accuracy will tail off, but with a
gained the best reputation over the years, gradual and predictable drop.”
although there are some success stories in When a face is enrolled into the NEC facial
controlled environments. biometric system, he says the AI-enabled
NEC XON held its seventh annual summit technology automatically simulates how the
at Sun City in October and mixed in with face would look, not only in ideal conditions,
the various discussions on Industry 4.0, safe but also in a variety of lighting conditions and
cities and artificial intelligence (among other angles. Additionally, the technology does not
topics), facial recognition gathered more than Bertus Marais need to see all of the face to get a good match.
a few mentions as a non-intrusive and reliable Ageing does impact the match scores, but
identification mechanism of the future. algorithms that work behind the scenes to the tail-off is very predictable; we have many
Following the summit, Hi-Tech Security interpret the data they receive. examples of a 30+ year age gap still yielding
Solutions spoke to Bertus Marais, GM, public successful results. “As a general rule, if a human
safety and security at NEC XON about facial Indirect and old views could identify someone from the facial picture,
recognition and NEC’s work in this regard. The issue of lighting and whether the subject our algorithm is highly likely to as well; this
When considering the previous lack of is looking directly at the camera, or if he/ usually translates to about 70% of the face being
reliability of facial recognition, due in large she is wearing sunglasses or a cap (and even visible. Unlike a human, the algorithms can do
part to issues such as uncontrolled lighting or ageing) is no longer as big a hindrance to facial this against many thousands of faces in real-time.”
people not looking directly at the camera, or biometrics. Marais says NEC has made huge
wearing caps and other clothing that hides inroads in this regard. Privacy and facial biometrics
part of the face, Marais says environmental “Performance will always be best if you If we assume that facial biometrics work well, the
difficulties have always played a role and will have a fully visible and well-lit frontal image privacy issues of using it in public spaces needs
continue to do so. and an image pair within five to 10 years of to be addressed as there will be nothing to stop
However, he adds that the algorithms each other, for example a passport and source anyone from identifying you anywhere if there
behind facial recognition have improved so that are maximum 10 years apart. However, the are no rules to manage the use of the technology.
remarkably that things like the angle of a real world does not always work like that. Facial recognition offers a unique platform
person’s face or the lighting make much less “In the real world people wear hats and that can help in many areas of society, notes
difference today. The camera hardware has glasses, their faces are often partially obscured, Marais, from providing benefits such as
also improved and continues to do so, but often at an angle and presented in various national security, law enforcement, and more.
the biggest improvements have been in the lighting conditions. The more the image of the Other examples include speeding up and

50 Access & Identity Management Handbook 2019 www.securitysa.com


BIOMETRICS

streamlining a traveller’s airport experience, Facial biometrics closer to home? Real-world usage
to reducing fraud in the financial sector, Most of the concepts of facial recognition we Facial biometrics are being used worldwide
to ensuring that aid reaches the intended hear about are in a safe-city scenario or being for a number of applications, at ports of entry
recipient after a disaster, to ensuring that a self- used in airports or public transport, but what and exit they are used to scan hundreds of
registered problem gambler can get the help about identity authentication in the workplace thousands of faces daily. They are used for
they need, all the way through to hospitality, or even at home? Could your laptop’s webcam public surveillance, such as is the case with
VIP solutions and beyond. All of these areas act as a touchless authentication mechanism an African authority that runs it across urban
offer a unique opportunity to provide benefits to make online shopping or logging into your CCTV networks. They use it for safety and
to society, but each has a very different context corporate network as simple as a glance? incident management. The same technology
and use-case. These must be addresses with a Liveness detection is a crucial issue in will be used for safety, monitoring, and
privacy model appropriate to the use-case. this regard, adds Marais. Some specialised management at the upcoming Olympics to be
“The key to this question is, “What is the webcams have depth of field sensing, which held in Japan. It’s already being used to help
context of the use-case?” It is reasonable to is crucial to liveliness detection, but the control hooliganism at soccer matches across
assume that a national security agency acting on technology is not widely adopted because it Europe and it is being used for border control
firm intelligence responding to a potential life- is expensive and not as mature as we would at several locations across Africa.
endangering scenario will take a very different like for tasks such as identity-based access “NEC’s NeoFace Watch facial recognition
view to a local retail outlet using the technology privileges to physical and virtual environments. software is now so advanced that it is scanning
to provide a VIP customer experience,” states “Your average laptop camera or webcam tens of thousands of faces in minutes, with
Marais. “Different use-cases will take different is essentially a 2D view of the world. You can many successful frames per face to record a
approaches to areas such as where the cameras trick most of those into facial recognition match. That’s how fast it is,” Marais says. “But it
are placed, what they are used for, who is with a good quality photograph or video of a obviously requires the right infrastructure to
captured, what records are stored, what records person. The camera has no way of knowing if support it, which many cities and facilities now
are enrolled, data retention periods, encryption it’s looking at a live human being. already have.
and security, alerting mechanisms, audit, etc. “Current high-end camera technology “You have to network all the cameras, feed the
“As with all technologies, robust regulatory that gets a real 3D view of the world is far data to servers in a properly maintained data centre,
frameworks and policies should be encouraged better and cannot be so easily tricked. But it’s analyse the huge volumes of data intelligently,
to drive ethical and responsible adoption,” expensive so it’s unusual to deploy it today. return usable results with high accuracy for
he continues. “The public, governments, We prefer not to position facial biometrics for processing by humans so they can respond – and
corporations and customers have a role to play access control, but rather for surveillance.” all of that in real time. It’s sophisticated, accurate,
in this area. From a technological standpoint, He continues, “we prefer to use a different, and dependable and organisations, from countries
the system is taking the exact same data as a two-factor system for access control. For to cities, installations, structures and public venues
regular CCTV camera; in fact, it is storing less example, if the facial recognition system sees can definitely use existing technologies such as
information as most facial recognition systems me walking past the restrooms it knows I’m not CCTV and networks. They only add what’s missing
tend not to store the entire video, but rather at my desk. It can check my laptop or desktop from the total picture.”
just the faces. The underlying point is that use system and, if it’s still active, lock it down so
of any facial recognition system should be nobody can access it. Or we use a fingerprint For more information contact Mark Harris,
subject to an appropriate level of control; this and a face check, or a normal magnetic access NEC XON, +27 11 237-4500,
comes down to context of the use case and the card combined with fingerprints or facial [email protected],
governing frameworks.” recognition.” www.nec.xon.co.za.

www.securitysa.com Access & Identity Management Handbook 2019 51


ACCESS SELECTION GUIDE
Access and Beyond Access and Beyond

Device/solution: Access Portal S-Series


Manufacturer/brand name: Impro
Device/solution: uPass Reach (Region 1) Long Range Reader Unit Distributors: Access and Beyond
Manufacturer/brand name: NEDAP Product description: The new S-Series range of access control is all
Distributors: Access and Beyond about making things simpler and quicker, with true plug-and-play
Product description: The uPASS Reach offers long-range vehicle hardware that quickly clips together for rapid expansion – no additional
identification up to 5 metres using the latest UHF technology. Based on wiring needed. Readers can be installed up to 150 m from the cluster and
battery-free, passive technology, the uPASS Reach reader is a cost module for greater flexibility without masses of additional hardware. Cost
effective and enduring solution for parking access. savings are possible by being able to use one cluster, with one module to
Typical applications: Vehicle access control for security areas, manage 8 readers (1+1=8), and time on site is reduced.
residential estates and industrial areas Typical applications: Access control expansion
Contact details: Christo Myburgh, [email protected], Contact details: Christo Myburgh, [email protected],
+27 31 263 1487, www.accessandbeyond.com +27 31 263 1487, www.accessandbeyond.com

ASSA ABLOY ASSA ABLOY SA

Device/solution: Aperio Wireless Access Control


Manufacturer/brand name: Aperio
Distributors: ASSA ABLOY
Product description: Quick and easy to install, Aperio locks can be
operated with the same access cards used on existing access control
systems. With a wide range of high-security, certified battery-powered Device/solution: SMARTair Access Control
locks, Aperio cuts energy costs and reduces maintenance costs. Aperio Manufacturer/brand name: ASSA ABLOY
has locks for various applications, including data centre management Product description: SMARTair is a powerful access control system
solutions. that offers an intelligent, simple step up from keys. It is easy to install
Typical applications: Access control, server locks and access rights are stored in the door device - independent, robust,
Integration support: Access control systems minimising communication problems. It’s easy to add and update user
Contact details: Pieter Geyser, [email protected], rights, and simple to update locks. The locks are battery powered for
+27 11 761 5000, www.assaabloy.co.za easy installation.
Typical applications: Access control
Contact details: Pieter Geyser, [email protected],
+27 11 761 5000, www.assaabloy.co.za

52 Access & Identity Management Handbook 2019 www.securitysa.com


ACCESS SELECTION GUIDE

Boomgate Systems CEM Systems

Device/solution: CEM emerald Intelligent Access Terminal


Device/solution: Genius Rapid Vehicle Barrier Manufacturer/brand name: CEM Systems
Manufacturer/brand name: Boomgate Systems Distributors: Tyco Security Products
Distributors: Boomgate Systems Product description: emerald is an advanced, intelligent IP access
Product description: The Genius Rapid BGST–D107 barrier is designed terminal revolutionising the security industry. A powerful reader and
to handle a high volume of traffic and has a 100% duty cycle, opening controller in one terminal, emerald features an LCD touchscreen, fully
speed of 1,5 seconds, and life expectancy of 3 million operations. Left integrated VoIP intercom, fingerprint reader (biometric variant) and a
and right-hand barriers are available requiring minimum maintenance. range of remote apps and door modes that provide operational benefits
A battery backup option is available and comes standard with an LED beyond access control.
robot on the cabinet. Typical applications: Indoor and outdoor access terminal, intercom,
Typical applications: Vehicle access control room booking, time and attendance
Integration support: Can integrate with any access control system on Integration support: Designed for use with CEM’s AC2000 security
the market management system
Contact details: Andre Rossouw, [email protected], Contact details: Ernest Mallet, [email protected],
+27 11 674 4441, www.boomgatesystems.co.za +44 2890 456 767, www.cemsys.com

CEM Systems CEM Systems

Device/solution: CEM AC2000 Security Management System


Manufacturer/brand name: CEM Systems Device/solution: CEM S700 Intelligent Card Reader/Controller
Distributors: Tyco Security Products Manufacturer/brand name: CEM Systems
Product description: AC2000 is an enterprise access control and Distributors: Tyco Security Products
integrated security management system that is highly flexible to meet Product description: The S700 is a next generation, fully integrated
unique project needs. Acting as the security management system, card reader and combined controller. It is IP65 rated with a capacitive
AC2000 provides a powerful command and control front-end for light-touch keypad, graphical display and multi-colour LED light bar.
alarm management of multiple systems including access control, The S700 is a versatile device with a range of door modes for
video, intrusion, fire and perimeter detection. controlling access to restricted areas, and offers operational benefits
Typical applications: Transportation, healthcare, education, that go beyond security.
corporate, oil and gas Typical applications: Indoor and outdoor access terminal
Integration support: CCTV, intrusion, perimeter detection, Integration support: Designed for use with CEM’s AC2000 security
fire and more management system
Contact details: Ernest Mallet, [email protected], Contact details: Ernest Mallet, [email protected],
+44 2890 456 767, www.cemsys.com +44 2890 456767, www.cemsys.com

www.securitysa.com Access & Identity Management Handbook 2019 53


ACCESS SELECTION GUIDE

Dahua Technology South Africa Dahua Technology South Africa


Device/solution: ASI1212D
Manufacturer/brand name:
Zhejiang Dahua Technology
Distributors: Elvey, Reditron,
Inhep Digital Security, Security
Warehouse
Product description: The
Dahua access control solution
integrates door control, user
management, real-time video
push, time and attendance, and
E-map. The all-in-one system is
customised to meet the needs of
all managed buildings.
Typical applications:
Device/solution: ASA1222E Waterproof fingerprint
Manufacturer/brand name: Zhejiang Dahua Technology standalone, anti pass-back,
Distributors: Elvey, Reditron, Inhep Digital Security, Security Warehouse access control, network access,
Product description: The Dahua access control solution integrates door alarm
control, user management, real-time video push, time and attendance, Integration support:
and E-map. The all-in-one system is customised to meet the needs of all Developer API
managed buildings. Contact details: Fritz Wang,
Typical applications: Standalone time and attendance [email protected],
Integration support: Developer API +27 72 628 6810,
Contact details: Fritz Wang, [email protected], www.dahuasecurity.com
+27 72 628 6810, www.dahuasecurity.com

Dahua Technology South Africa Doculam

Device/solution: ASC1204B-S
Manufacturer/brand name: Zhejiang Dahua Technology Device/solution: Magicard PVC Card Printers
Distributors: Elvey, Reditron, Inhep Digital Security, Security Warehouse Manufacturer/brand name: Magicard
Product description: The Dahua access control solution integrates door Distributors: Doculam
control, user management, real-time video push, time and attendance, Product description: Magicard ID card printers are a superior brand of
and E-map. The all-in-one system is customised to meet the needs of all printer backed by the industry’s best warranties. The printers’ ability to
managed buildings. support field upgrades to transform them from single side printers to
Typical applications: Four door access controller, anti pass-back, alarm double side printers allows for flexibility to adapt to clients’ changing
function, user management requirements. The additional card security features that come with the
Integration support: Developer API Magicard Rio range of printers helps the brand stand out against its
Contact details: Fritz Wang, [email protected], competitors.
+27 72 628 6810, www.dahuasecurity.com Typical applications: Access control, student cards, driver’s licences,
loyalty cards
Contact details: Shaun Stanley, [email protected],
+27 21 557 0666, www.doculam.co.za

54 Access & Identity Management Handbook 2019 www.securitysa.com


ACCESS SELECTION GUIDE

Doculam Doculam
Device/
solution: Alcohol
Breathalysers
Manufacturer/
brand name:
Alcovisor
Distributors:
Doculam
Product
description: The
Alcovisor range
of breathalysers
Device/solution: Metal detectors
carry a selection
Manufacturer/brand name: Garrett
of specifications
Distributors: Doculam
suited to each access screening application. The range
Product description: Garrett metal detection products form an
is made up of the Mark X, Mercury and Alcofind units. As alcohol
essential part of threat detection for a number of different sectors in the
screening forms part of an organisation’s health and safety regulations,
security industry. The walkthrough units come with 36 zones of
this is normally performed at a company’s ingress and egress points. The
detection and are superior in their class. Normally used in conjunction
Alcovisor range has been performing exceptionally well over the past
with the Garrett walkthrough units are the Garrett handheld super
12 years since its introduction to South Africa and continues to win the
scanners which professionals in the security industry trust as being
market’s trust.
reliable and having stood the test of time.
Typical applications: Access control, screening, industry,
Typical applications: Access control, security at checkpoints in airports,
law-enforcement
government facilities, entertainment and transportation venues, to
Contact details: Shaun Stanley, [email protected],
mention a few
+27 21 557 0666, www.doculam.co.za
Contact details: Shaun Stanley, [email protected],
+27 21 557 0666, www.doculam.co.za

ET Nice ET Nice

Device/solution: WIDE Vehicle Barriers Device/solution: Gate and garage door operators
Manufacturer/brand name: ET Nice Manufacturer/brand name: ET Nice
Distributors: Regal Distributors, Elvey, Stafix, IDS Distributors: Regal Distributors, Elvey, Stafix, IDS
Product description: WIDE manual and automated boom pole systems Product description: A world without barriers. Automated gates and
for vehicle traffic access control, including optional extras, accessories garage doors created for residential and high-traffic areas. Available
and spares. Proudly designed, manufactured and supported in South with a full range of accessories proudly designed, manufactured and
Africa. supported in South Africa.
Typical applications: Access automation Typical applications: Access automation
Integration support: Electronic technology Integration support: Electronic technology
Contact details: Gerald Kirsten, [email protected], +27 21 404 8000, Contact details: Gerald Kirsten, [email protected], +27 21 404 8000,
www.niceforyou.com/za www.niceforyou.com/za

www.securitysa.com Access & Identity Management Handbook 2019 55


ACCESS SELECTION GUIDE

ET Nice iMAT Manufacturing


Device/solution:
iMAT Full-Height
Turnstile with Guide
Manufacturer/
brand name: iMAT
Distributors: iMAT
Product
description:
Built to last, iMAT
Manufacturing’s
range of full height
turnstiles offers
excellent security
no matter the
application.
Device/solution: ET Blu Mix transmitters and receivers
Typical
Manufacturer/brand name: ET Nice
applications: Physical
Distributors: Regal Distributors, Elvey, Stafix, IDS
access control
Product description: The most cost-effective, simple solution to take
Integration support:
control of your world. Transmission range of up to 750 m. South Africa’s
Biometrics, payroll
favourite and safest solution with its unhackable code and longest
Contact details:
range. Lifetime warranty on all transmitters.
iMAT, [email protected],
Typical applications: Access automation
+27 21 556 3866,
Integration support: Electronic technology/system integrator
www.imat.co.za
Contact details: Gerald Kirsten, [email protected] +27 21 404 8000,
www.niceforyou.com/za

Impro Technologies Impro Technologies

Device/solution: Access portal management software


Manufacturer/brand name: Impro Technologies
Distributors: Powell Tronics, Elvey, Access & Beyond
Device/solution: Access in a Box Product description: Access control management software providing
Manufacturer/brand name: Impro Technologies advanced functionality, packaged within a simple to use interface,
Distributors: Powell Tronics, Elvey, Access & Beyond whilst ensuring easy maintenance. The software provides all the tools
Product description: One of the most cost effective solutions needed to securely manage access control – whether a small business
available, Access in a Box comprises everything needed to manage or a large enterprise operation, the system scales with the user’s
up to eight doors, securely housed in a metal enclosure. Installation time needs. Free software, along with Pro and Enterprise versions are
and cost is reduced through the use of three-core cable and users can available.
access their system 24/7 with their smartphone, tablet or PC, around the Typical applications: Access control, web-based solution
world. Integration support: Comprehensive API, 24-hour technical support
Typical applications: Access control, door entry, web-based solution centre, integration with CCTV, elevator control, T&A and more
Contact details: Mike Kidson, [email protected], +27 11 469 5568, Contact details: Mike Kidson, [email protected], +27 11 469 5568,
www.impro.net www.impro.net

56 Access & Identity Management Handbook 2019 www.securitysa.com


ACCESS SELECTION GUIDE

Impro Technologies iPulse Systems


Device/solution: iPB4 Biometric
and Multi-Class Card Reader
Manufacturer/brand name:
iPulse Systems
Distributors: iPulse Systems
Product description: The iPB4
is a competitively priced indoor
fingerprint-based biometric access
control unit with optional
smartcard support and a small
footprint, ideally suited to
corporate environments. A fully
programmable Wiegand interface
Device/solution: Access Portal makes the iPB4 a flexible, cost-
Manufacturer/brand name: Impro Technologies effective solution for new and
Distributors: Powell Tronics, Elvey, Access & Beyond existing security systems.
Product description: Access Portal is a highly scalable, simple to Typical applications: Access
use access control solution comprising all the hardware, software control, workforce management
and accessories to protect premises – whether a small business or Integration support: Full secured
multinational enterprise. Available in a plastic or secure metal housing, API framework
the solution scales with the user’s needs to manage a few people, or a Contact details: Sales team,
million people. [email protected], 0860 478 573,
Typical applications: Access control www.ipulsesystems.com
Integration support: Free 24-hour technical support centre, accredited
training and broad array of security integrations
Contact details: Mike Kidson, [email protected], +27 11 469 5568,
www.impro.net

iPulse Systems Paxton Access

Device/solution: IQSuite.cloud
Manufacturer/brand name: iPulse Systems
Distributors: iPulse Systems
Product description: Simple, secure and powerful: IQSuite.cloud
brings the as-a-service model to the access control and workforce
management space. Control and manage access to all your secure
areas, and track when and where team members use the system from
anywhere. Live clock events ensure that you know instantly who is using
what door, and what time they were there.
Typical applications: Access control, visitor management, workforce
management
Integration support: Full secured API framework Device/solution: PaxLock Pro
Contacts details: Sales team, [email protected], 0860 478 573, Manufacturer/brand name: Paxton Access
www.ipulsesystems.com Distributors: Regal Security, Reditron
Product description: PaxLock Pro is Paxton’s wireless networked access
control solution in a door handle. It communicates wirelessly to the
server PC via a Net2Air Bridge, reducing cabling and installation time.
Typical applications: Access control
Integration support: CCTV, fire alarm, intruder alarm, visitor
management
Contact details: Paxton, [email protected], +27 21 427 6691,
www.paxtonaccess.co.za

www.securitysa.com Access & Identity Management Handbook 2019 57


ACCESS SELECTION GUIDE

Paxton Access Paxton Access

Device/solution: Net2 access control


Manufacturer/brand name: Paxton Access
Distributors: Regal Security, Reditron Device/solution: Net2 Entry
Product description: Our networked access control system, Net2, is Manufacturer/brand name: Paxton Access
administered using one or more PCs and can be monitored and man- Distributors: Regal Security, Reditron
aged from a central location. Product description: Net2 Entry is a video door entry system that
• Up to 1 000 doors and 50 000 users. works standalone or alongside Paxton’s Net2 access control. Consisting
• Licence free software for life. of three components that auto-detect on setup – external panel, inte-
• 5 year swap-out warranty. rior monitor and door control unit – it is a plug-and-play solution that
• Simple to install, easy to use. comes with a range of panel options and is suitable for a wide variety
Typical applications: Access control for the mass market of sites.
Integration support: Biometrics, CCTV, fire alarm, intruder alarm, Typical applications: Video door entry
visitor management Integration support: Net2 access control from Paxton
Contact details: Paxton, [email protected], Contact details: Paxton, [email protected],
+27 21 427 6691, www.paxtonaccess.co.za +27 21 427 6691, www.paxtonaccess.co.za

Powell Tronics Reditron

Device/solution: PT-Guest Device/solution: PaxLock Pro


Manufacturer/brand name: Powell Tronics Manufacturer/brand name: Paxton Access
Distributors: Powell Tronics Distributors: Reditron
Product description: PT-Guest is a fully integrated visitor management Product description: PaxLock Pro is a wireless access control
solution for access control, locally developed and supported. It captures solution that can be installed in standalone mode or as part of a
visitor info using portable handheld wireless enabled devices, catering Net2 networked system, offering sites the flexibility to upgrade to a
for pre-authorised visitors via a web, SMS or app interface. Detailed networked solution as and when required. Two designs are available
management reporting gives both security and management control for internal and external facing doors, offering more versatility for your
of visitors. customers than ever before.
Typical applications: Visitor management Typical applications: Access control
Integration support: Impro, IXP (and portal), IDEMIA Integration support: Net2 range
Contact details: Mike Austen, [email protected], Contact details: Jacques Bester, [email protected], +27 87 802 2288,
0861 784 357, www.p-tron.com www.reditron.co.za

58 Access & Identity Management Handbook 2019 www.securitysa.com


ACCESS SELECTION GUIDE

Reditron Regal Distributors SA

Device/solution: MorphoWave Compact Device/solution: PaxLock Pro


Manufacturer/brand name: IDEMIA Manufacturer/brand name: Paxton Access
Distributors: Reditron Distributors: Regal Distributors SA
Product description: MorphoWave Compact by IDEMIA allows for ease Product description: PaxLock Pro is the latest addition to Paxton’s
of access and quick throughput, making it perfect for high-trafficked range of wireless access control solutions. The design is compatible with
areas like busy offices or industrial sites. Due to its cased, enclosed any DIN standard locks for a quick and simple installation. Its smart,
nature, the scanner also neutralises any external environmental compact appearance and standalone or networked operation means it
factors. Able to scan QR codes, it is perfect for temporal access and can be used in more applications than ever before.
visitor management. Typical applications: Standalone or networked wireless access control
Typical applications: Access control, time and attendance Integration support: Net2Pro (free), licence-free developer SDK
Integration support: Paxton access control Contact details: Andrew Levell-Smith,
Contact details: Jacques Bester, [email protected], +27 87 802 2288, [email protected], +27 11 553 3300,
www.reditron.co.za www.regalsecurity.co.za

SACO a division of Bidvest Protea Coin Saflec Systems

Device/solution: SACO Workforce Management, SACO Guest,


SACO Anywhere, SACO Workflow
Manufacturer/brand name: SACO a division of Bidvest Protea Coin
Device/solution: SSS-310 Software Solution Packages
Distributors: Bidvest Protea Coin
Manufacturer/brand name: Saflec Systems
Product description: SACO delivers products designed to optimise
Distributors: Saflec Systems
access control and workforce efficiencies and processes through a
Product description: SACS is a user-friendly program designed for the
variety of unified solutions from the SACO stable. Our products
initial configuration and day-to-day maintenance of a site. It has been
provide progressive business intelligence that simplifies decision-
designed with simplicity in mind, however it offers an abundance of
making, reduces turnaround times on operational activities and
features usually only associated with complex BMS solutions at a
improves profitability.
fraction of the cost. Deep integration is available with various biometric
Typical applications: Access control, time and attendance, health and
systems, including the latest fingerprint and facial recognition devices
safety management, asset protection
from IDEMIA, ViRDI and Suprema.
Integration support: Manufacturer proprietary technology, SAP,
Typical applications: Access control, security, time and attendance
Oracle, SAGE, IDEMIA
Integration support: Open database integration, software level
Contact details: Freddy Niehaus, [email protected],
integration on the server
086 123 7226, www.saco.co.za
Contact details: Saflec Systems, [email protected], +27 11 477 4760,
www.saflecsystems.co.za

www.securitysa.com Access & Identity Management Handbook 2019 59


ACCESS SELECTION GUIDE

Saflec Systems Saflec Systems

Device/solution: SDC-620 Multiple Door Controller Device/solution: SDC-650 Multiple Door Controller
Manufacturer/brand name: Saflec Systems Manufacturer/brand name: Saflec Systems
Distributors: Saflec Systems Distributors: Saflec Systems
Product description: The SDC-620 replaces the SDC-520 and brings Product description: The SDC-650 replaces the SDC-550 and brings
with it a host of new features and functionalities. It can control up to with it a host of new features and functionalities. It can control up to
eight doors and can be linked with up to 16 SDC door controllers eight doors and can be linked with up to 16 SDC door controllers
using a protected RS-485 network. The controller can store up to using a protected RS-485 network. The controller can store up to
1 million tags, 250 000 tag holders, more than 6 million access logs 1 million tags, 250 000 tag holders, more than 6 million access logs and
and 3 million system logs. It also offers 256 powerful offline event/ 3 million system logs. It also offers 256 powerful offline event/action
action combinations. combinations.
Typical applications: Access control, security, time and attendance Typical applications: Access control, security, time and attendance
Integration support: OSDP secure channel compatible, I/O integration, Integration support: OSDP secure channel compatible, I/O integration,
manufacturer proprietary technology, Wiegand, software level manufacturer proprietary technology, software level integration on the
integration on the server server
Contact details: Saflec Systems, [email protected], +27 11 477 4760, Contact details: Saflec Systems, [email protected], +27 11 477 4760,
www.saflecsystems.co.za www.saflecsystems.co.za

SALTO Systems SALTO Systems

Device/solution: Neo Electronic Cylinder


Manufacturer/brand name: SALTO Systems Device/solution: Danalock V3 Motorised Electronic Lock
Distributors: SALTO Systems, Intertrade Security Distributors Manufacturer/brand name: SALTO Systems
Product description: This all-weather electronic cylinder is fully mobile Distributors: SALTO Systems, Concept Store
capable, featuring Bluetooth Smart and NFC compatibility and permit- Product description: Danalock V3 fits virtually all existing doors.
ting operation through Android and Apple devices. The cylinder can be Installation is done in a few simple steps, without drilling or working on
enabled as an SVN-Flex card updater, allowing any door it is fitted on the door. The system is set up and managed via an app. Users can thus
to act as a card updater so credentials can be updated all the time and use a smartphone to control the door, residents and guests as well as
anywhere. the house. Communication is wireless and AES 256-bit encrypted.
Typical applications: Online, wireless online and offline access control Typical applications: Residential access control combined with mobile
on virtually any door combined with mobile access access
Integration support: Local and international support is provided Integration support: Local and international support is provided
(certified training, technical support, marketing material) (certified training, technical support, marketing material)
Contact details: Wouter du Toit, [email protected], Contact details: Wouter du Toit, [email protected],
+27 87 701 5858, www.saltosystems.com +27 87 701 5858, www.saltosystems.com

60 Access & Identity Management Handbook 2019 www.securitysa.com


ACCESS SELECTION GUIDE

SALTO Systems SALTO Systems

Device/solution: Keys as a Service (KS) Device/solution: SVN-Flex Technology


Manufacturer/brand name: SALTO Systems Manufacturer/brand name: SALTO Systems
Distributors: SALTO Systems, Concept Store Distributors: SALTO Systems, Intertrade Security Distributors
Product description: The Keys as a Service (KS) cloud-based solution Product description: SALTO’s SVN-Flex technology offers access
allows real-time access management on the go. Users do not have to management with increased security and more convenience. As
install any software, their system is always up to date and they can easily end users do not need extra components like wall readers or door
integrate with third-party systems via API. Mobile Key technology gives controllers, spending on hardware is lower. Users do not have to go to
the ability to open doors through Mobile Key in SALTO KS customers’ specific doors or locations to update their cards, as any wireless door
mobile app. can be activated as an SVN-Flex updater.
Typical applications: Enterprise quality access control for SMEs, retail, Typical applications: Online, wireless online and offline access control
rental properties and shared spaces on virtually any door combined with mobile access
Integration support: Local and international support is provided Integration support: Local and international support is provided
(certified training, technical support, marketing material) (certified training, technical support, marketing material)
Contact details: Wouter du Toit, [email protected], Contacts details: Wouter du Toit, [email protected],
+27 87 701 5858, www.saltosystems.com +27 87 701 5858, www.saltosystems.com

Secutel Technologies Suprema


Device/solution:
Xpass Series
Manufacturer/brand
name: Suprema
Distributors: neaMetrics,
ADI Global Distribution,
Elvey, EOH FSS, Gallagher
and various system
integrators
Product description: Ultra-
compact design with PoE
and BLE options. IP65/67
rated for in/outdoor instal-
Device/solution: Access Control Powered by Matrix COMSEC
lation, with IK08 vandal
Manufacturer/brand name: Secutel Technologies
resistance on the D2. S2 and D2 models operate from -35°C to 65°C and
Distributors: Secutel Technologies
feature multi-smartcard reading, including NFC. Mullion or gangbox
Product description: Secutel’s access control solution makes use of
options are available. S2 extras include expanded capacity to 50 000
Matrix COMSEC products to harness the latest technology to provide
user badges and 100 000 event logs.
powerful, easy to install and use solutions. This empowers Secutel
Typical applications: Card based access control, building manage-
to develop systems for the mid-market (education, healthcare, retail
ment systems, CCTV and VMS integration, home, office and production
and public sector) and provide solutions for a wide range of sites and
automation, smart IP door/boom controller
requirements.
Integration support: Developer API, software development integra-
Typical applications: Access control, time and attendance
tion support, open platform Wiegand, RS-485 (OSDP), integrated door
Integration support: Developer API
control, integrated with all major access control manufacturers
Contact details: Danny Pringle, [email protected], +27 10 015 1401,
Contact details: Suprema team, [email protected],
www.secutel.co.za
+27 11 784 3952, www.suprema.co.za

www.securitysa.com Access & Identity Management Handbook 2019 61


ACCESS SELECTION GUIDE

Suprema Turnstar Systems


Device/solution:
BioStar 2
Manufacturer/
brand name: Suprema
Distributors:
neaMetrics, ADI Global Device/solution: Velocity Traffic Barrier
Distribution, Elvey, EOH Manufacturer/brand name:
FSS, Gallagher and Turnstar Systems
various system Distributors: Turnstar Systems
integrators Product description: The Velocity Traffic
Product description: Barrier is an automatic high-speed vehicle
Cloud and web-based barrier fitted with the latest motor drive
open security platform. and control technology. The BLDC motor
Integrate with third- and planetary gearbox offer excellent
party systems, build new applications and functions into BioStar 2 with torque and speed curve characteristics,
web API, device SDK and web inlays. Features cloud implementation and a battery backup system ensures
and updates, auto user synchronisation, auto device discovery, uninterrupted operation in the event of a
anti-passback, fire alarm and BioStar Mobile for Android and iOS. power failure.
Typical applications: Access control, time and attendance, office and Typical applications: Parking lots,
business security shopping malls, office blocks, banks,
Integration support: RESTful web API, device SDK, customised web universities, road closures
inlays, software development integration support Contact details: Scott Davey,
Contact details: Suprema team, [email protected], [email protected], +27 11 786 1633,
+27 11 784 3952, www.suprema.co.za www.turnstar.co.za

Turnstar Systems Turnstar Systems


Device/solution: Citadel Device/solution: Pulse Automatic Special
Security Booth Needs Gate
Manufacturer/brand name: Manufacturer/brand name:
Turnstar Systems Turnstar Systems
Distributors: Turnstar Systems Distributors: Turnstar Systems
Product description: The Product description: The Pulse Automatic
Citadel booth offers a high- Special Needs gate is ideal for unassisted
security solution for any special needs and wheelchair access into
entrance. Fitted with 26 mm a building. The gate is fitted with a heavy
bullet resistant curved and duty BLDC motor and planetary gearbox
flat glass, it offers resistance to and is manufactured from 304 grade
any attempted armed entry. brushed stainless steel. 10 mm toughened
Each curved door is fitted with glass is used for the glass wing. In the
a geared motor which allows event of a collision, the
for access controlled entry and gate auto reverses.
a metal detector with various Typical applications:
sensitivity settings is embedded Office receptions,
in the frame. health clubs,
Typical applications: Banks, universities and
office blocks, data centres anywhere where
Contact details: Scott Davey, unassisted wheelchair
[email protected], access is required
+27 11 786 1633, Contact details: Scott Davey,
www.turnstar.co.za [email protected], +27 11 786 1633,
www.turnstar.co.za

62 Access & Identity Management Handbook 2019 www.securitysa.com


ACCESS SELECTION GUIDE

Veracitech Veracitech
Device/solution:
XMP-Babylon
Manufacturer/
brand name:
Autec (XMP-Babylon)
Distributors:
Veracitech, Veracitech
Systems Namibia,
Veracitech Engineering
Botswana
Product description:
Powerful, secure, flexible, enterprise level, multi-site access and Device/solution: Traka intelligent key cabinets and locker systems
automation control system. Stable, industrial, intelligent and Manufacturer/brand name: Traka
programmable hardware and software for card readers, door control Distributors: Veracitech, Veracitech Systems Namibia, Veracitech
units and hardware modules used in various applications, such as access Engineering Botswana
automation, time recording, people management, biometrics and Product description: Veracitech is an integration partner and value-
camera control. added reseller for Traka intelligent key cabinets and locker systems.
Typical applications: Access automation, time management, Veracitech has a fully integrated solution for managing Traka systems in
integration, security management the XMP-Bablyon platform, allowing full integration and control of keys
Integration support: Several integration and software/hardware and lockers together with access control and automation.
solutions Typical applications: Key management, lockers, key cabinets, asset
Contact details: Alvin Flaum, [email protected], +27 11 888 7251, lockers, access control, people management, biometrics.
www.veracitech.co.za Integration support: Integration partner for Traka key cabinets and
locker systems on the XMP-Babylon platform.
Contact details: Alvin Flaum, [email protected], +27 11 888 7251,
www.veracitech.co.za

Workforce Management Solutions Workforce Management Solutions


Device/solution:
Gatekeeper Visitor
Management Access
Control System
Manufacturer/brand
name: Workforce
Management Solutions
Distributors: Workforce
Management Solutions
Product description:
Gatekeeper Visitor
Management Access
Device/solution: Janus Keeper Biometric Access Control
Control is a complete
Manufacturer/brand name: Workforce Management Solutions
visitor access control
Distributors: Workforce Management Solutions
system able to integrate
Product description: Janus Keeper Access Control is a complete
with our Janus Keeper
access control system able to integrate with the Gatekeeper visitor
biometric access control
management solution. It includes video management of the access
solution.
control points and transactions, identity management of all people
Typical applications:
going through any controlled points, driver’s licence identification and
Visitor access
licence plate recognition.
control
Typical applications: Access control
Contact details:
Integration support: Integrates with Sigma biometric scanners;
Glenn van der Westhuizen, [email protected], +27 76 571 5944,
GSM based intercom systems
www.workforcemanagementsolutions.co.za
Contact details: Glenn van der Westhuizen, [email protected],
+27 76 571 5944, www.workforcemanagementsolutions.co.za

www.securitysa.com Access & Identity Management Handbook 2019 63


ACCESS SELECTION GUIDE

ZKTeco ZKTeco

Device/solution: ZK-VSCN100 Vehicle Inspection System


Device/solution: UHF 6Pro Manufacturer/brand name: ZKTeco
Manufacturer/brand name: ZKTeco Distributors: ZKTeco
Distributors: Regal Distributors SA, Security Warehouse Product description: ZK-VSCN100 is a portable under-vehicle
Product description: UHF 6Pro is a high-performance, long-distance inspection system, used to inspect a vehicle’s undercarriage. When a
RFID reader. It is configured with an Impinj R2000 chip and waterproof vehicle passes, the system can quickly recognise the licence plate and
casing. It has stable performance, long service life, minimised external generate a high definition image of its undercarriage, which will be
interference and upgraded long reading distance. Therefore, it can be recorded in the computer. The system can quickly and accurately
applied in many remote identification fields. identify suspicious objects.
Typical applications: Access control, entrance control Typical applications: Access control, entrance control
Integration support: Works with ZKBioSecurity Integration support: Standalone, works with ZKBioSecurity
Contact details: Brent Saaiman, [email protected], +27 12 259 1047, Contact details: Brent Saaiman, [email protected], +27 12 259 1047,
www.zkteco.co.za www.zkteco.co.za

ZKTeco ZKTeco
Device/solution: LPRS 2000 Hybrid
Identification Vehicle Management
Terminal
Manufacturer/brand name: ZKTeco
Distributors: Regal Distributors SA,
Security Warehouse
Product description: The LPRS2000
is a hybrid identification vehicle
management terminal that adopts
multiple recognition modes for
long-range RFID and licence plate
recognition. It combines the latest
developed high-performance UHF
reader to ensure that the capture rate
Device/solution: C5S-Series IP-based Door Access Control Panel and recognition accuracy of fixed
Manufacturer/brand name: ZKTeco vehicles are up to 100%.
Distributors: Regal Distributors SA, Security Warehouse Typical applications: Access control,
Product description: The C5S supports all card readers, such as the entrance control
ZK KR-series; Wiegand readers and RS-485 card readers; HID Prox, Integration support: Standalone,
iClass and XceedID multi-card technology. It offers users more than works with ZKBioSecurity
access control: After programming, auxiliary relays can interface with Contact details: Brent Saaiman,
lights, alarms and intrusion detection panels. There is a case protecting [email protected], +27 12 259 1047,
the C5S controller. www.zkteco.co.za
Typical applications: Access control, entrance control
Integration support: Works with ZKBioSecurity
Contact details: Brent Saaiman, [email protected], +27 12 259 1047,
www.zkteco.co.za

64 Access & Identity Management Handbook 2019 www.securitysa.com


BIOMETRICS SELECTION GUIDE
BIOMETRICS SELECTION GUIDE

Access and Beyond Boomgate Systems


Device/solution: Morpho 3D
Face Reader
Manufacturer/brand name:
IDEMIA
Distributors: Access and
Beyond
Biometric technology: Facial
Product description: By
analysing the three-dimensional
structure of the subject’s face,
the reader achieves extremely
accurate matching while
ensuring high throughput.
Companies can enhance the Device/solution: Hurricane Mantrap Turnstile
look of their corporate reception Manufacturer/brand name: Boomgate Systems
areas and secure access points Distributors: Boomgate Systems
with the terminal’s sleek, stylish Biometric technology: Fingerprint, facial, retinal, iris
design. Acquisition is hands- Product description: The Hurricane Single Biometric Reader Mantrap
free and contactless, ideal for full-height turnstile is manufactured in South Africa. The turnstile is
environments requiring gloves designed to handle high volumes of traffic and is 100% duty rated. The
or where there are hygiene turnstile can interface with any biometric reader system, any other card
concerns. reader system or breathalyser. The turnstile mechanism comes with a 15
Typical applications: Access year warranty.
control in sensitive environments Typical applications: High-security access control
with special requirements Integration support: Integrates with any existing access control
Contact details: Christo Myburgh, [email protected], Contact details: Andre Rossouw, [email protected],
+27 31 263 1487, www.accessandbeyond.com +27 11 674 4441, www.boomgatesystems.co.za

ET Nice IDEMIA

Device/solution: MorphoWave Compact by IDEMIA


Manufacturer/brand name: MorphoAccess by IDEMIA
Distributors: Ideco Biometric Security Solutions, Gallagher Security,
EOH, Impro Technologies
Biometric technology: Fingerprint
Device/solution: Accentronix /ET Nice Infinity & Nano GSM Product description: The MorphoWave Compact captures and matches
Manufacturer/brand name: ET Nice & Accentronix four fingerprints on either the right or left hand in any direction. It is
Distributors: Regal Distributors, Stafix, IDS, Elvey immune to environmental factors such as extreme light or dust. The
Biometric technology: GSM and transmitter management solution patented touchless sensor technology ensures the most accurate and
Product description: Take control of your world, now from anywhere reliable fingerprint matching for maximum security, which also copes
in the world, with our smart online management solution to seamlessly with wet and dry fingers.
integrate traditional remote transmitters with GSM. Typical applications: Access control, time and attendance, contactless
Typical applications: Access automation Integration support: System integration and MorphoManager
Integration support: Smart online transmitter management. (BioBridge)
Contact details: Gerald Kirsten, [email protected], +27 21 404 8000, Contact details: Chelesile Moya, [email protected]
www.niceforyou.com/za +27 11 601 5500, www.idemia.com

66 Access & Identity Management Handbook 2019 www.securitysa.com


BIOMETRICS SELECTION GUIDE

IDEMIA IDEMIA

Device/solution: MorphoAccess Sigma


Manufacturer/brand name: MorphoAccess by IDEMIA
Distributors: Ideco Biometric Security Solutions, Gallagher Security, Device/solution: MorphoSmart Optical 300 Series
EOH, Impro Technologies Manufacturer/brand name: MorphoAccess by IDEMIA
Biometric technology: Fingerprint Distributors: Ideco Biometric Security Solutions, Gallagher Security,
Product description: The MA Sigma is a newly launched multiple EOH, Impro Technologies
recognition (NFC chip reader, PIN and BioPIN codes, contactless card Biometric technology: Fingerprint
reader) touchscreen device. It has a modern glossy black design with Product description: The MSO300 Series is a family of high-end USB
features designed for market needs and requirements, and brings optical sensors. It is based on Morpho’s 25-year experience in the field of
enhanced security and accuracy (FBI PIV IQS certified optical sensor). electro-optics and forensic quality fingerprint processing algorithms.
Typical applications: Access control; time and attendance Typical applications: Enrolment
Integration support: System integration Integration support: System integration
Contact details: Chelesile Moya, [email protected], Contact details: Chelesile Moya, [email protected],
+27 11 601 5500, www.idemia.com +27 11 601 5500, www.idemia.com

IDEMIA IDEMIA
Device/solution: MorphoWave
Manufacturer/brand name:
MorphoAccess by IDEMIA
Distributors: Ideco Biometric
Security Solutions, Gallagher
Security, EOH, Impro
Technologies
Biometric technology:
Fingerprint
Product description:
MorphoWave is the world’s
first biometric access solution
to capture and match four
Device/solution: Morpho Smart optical 1300 Series fingerprints with a single hand
Manufacturer/brand name: MorphoAccess by IDEMIA movement. It implements a
Distributors: Ideco Biometric Security Solutions, Gallagher Security, patented, truly contactless
EOH, Impro Technologies technology that not only
Biometric technology: Fingerprint acquires extremely accurate
Product description: The MSO 1300 (USB) has been designed to address fingerprint data but also over-
the needs of logical access control to highly secure PC applications in comes the challenges wet/dry
industrial, corporate and governmental environments. The MSO 1300 fingers and latent prints pose to
Series is based on a fast and cost effective optical sensor and has an conventional scanning systems.
embedded storage capacity of up to 5 000 users (10 000 templates). Typical applications: Access
Typical applications: Enrolment control, time and attendance, contactless
Integration support: System integration Integration support: System integration
Contact details: Chelesile Moya, [email protected], Contact details: Chelesile Moya, [email protected],
+27 11 601 5500, www.idemia.com +27 11 601 5500, www.idemia.com

www.securitysa.com Access & Identity Management Handbook 2019 67


BIOMETRICS SELECTION GUIDE

IDEMIA IDEMIA
Device/solution: Morpho 3-D
Face Reader
Manufacturer/brand name:
MorphoAccess by IDEMIA
Distributors: Ideco Biometric
Security Solutions, Gallagher
Security, EOH, Impro Technologies
Biometric technology: Face
Product description: These
3D facial recognition terminals
are ideal for environments that
Device/solution: MorphoTablet 2
require gloves or where hygiene
Manufacturer/ brand name: MorphoAccess by IDEMIA
is a concern. 3D geometry of the
Distributors: Ideco Biometric Security Solutions, Gallagher Security,
face is calculated with over 40 000
EOH, Impro Technologies
points for enrolment and identi-
Biometric technology: Fingerprint
fication, providing a high-speed,
Product description: The MorphoTablet 2 is an 8-inch touchscreen
hands-free access solution.
tablet with an incorporated FBI PIV IQS and STQC certified optical
Typical applications: Access
fingerprint sensor. The device offers signature capture, contactless
control, enrolment, identification,
smart card and a 13 megapixel camera with dual LED for face capture.
time and attendance
The slim, sleek device operates on 4G, Wi-Fi and Bluetooth, and
Integration support:
weighs a mere 545 grams.
System integration
Typical applications: Access control, time and attendance, KYC, data
Contact details: Chelesile Moya,
capture and other processes
[email protected], +27 11 601 5500,
Integration support: SDK available
www.idemia.com
Contact details: Chelesile Moya, [email protected],
+27 11 601 5500, www.idemia.com

IDEMIA IDEMIA

Device/solution: MorphoAccess VP Series Device/solution: MorphoSmart FingerVP Series


Manufacturer/brand name: MorphoAccess by IDEMIA Manufacturer/brand name: MorphoAccess by IDEMIA
Distributors: Ideco Biometric Security Solutions, Gallagher Security, Distributors: Ideco Biometric Security Solutions, Gallagher Security,
EOH, Impro Technologies EOH, Impro Technologies
Biometric technology: Fingerprint, vein Biometric technology: Fingerprint, vein
Product description: The MA-VP Series is an access control device Product description: The MSO FVP is an FBI PIV IQS certified USB
available as MA-VP Bio (fingerprint/vein only) or MA-VP Dual biometric reader using the latest technologies. It simultaneously
(fingerprint/vein + Mifare/ Desfire cards). It can store up to 10 000 captures fingerprint as well as vein templates, and combines
users (20 000 templates), and is IP65 rated and suited for indoor and the best of both templates to ensure the highest security and the
outdoor use. best possible performance.
Typical applications: Access control Typical applications: Enrolment
Integration support: System integration Integration support: System integration
Contact details: Chelesile Moya, [email protected], Contact details: Chelesile Moya, [email protected],
+27 11 601 5500, www.idemia.com +27 11 601 5500, www.idemia.com

68 Access & Identity Management Handbook 2019 www.securitysa.com


BIOMETRICS SELECTION GUIDE

IDEMIA IDEMIA
Device/solution: MorphoAccess
Sigma Extreme
Manufacturer/brand name:
MorphoAccess by IDEMIA
Distributors: Ideco Biometric
Security Solutions, Gallagher
Security, EOH, Impro Technologies
Biometric technology:
Fingerprint
Product description: The
MorphoAccess Sigma Extreme is a
Device/solution: MorphoAccess Sigma Lite + touchscreen device with multiple
Manufacturer/brand name: MorphoAccess by IDEMIA recognition interfaces (NFC chip
Distributors: Ideco Biometric Security Solutions, Gallagher Security, reader, PIN and BioPIN codes,
EOH, Impro Technologies contactless card readers). It has a
Biometric technology: Fingerprint modern glossy black design with
Product description: MorphoAccess Sigma Lite + is a slim, sleek and features designed for market
powerful fingerprint access control terminal. It offers time and attendance needs and requirements, and
in and out function keys and enhanced interactivity via a 2,8-inch QVGA delivers enhanced security and
colour touchscreen. The embedded web server enables on-device accuracy through an FBI PIV IQS
enrolment, terminal configuration and transaction log retrieval. This certified optical sensor.
device can perform 1:10 000 user identification in 1 second, and offers Typical applications: Access
a high capacity of up to 10 000 users (30 000 templates). control; time and attendance
Typical applications: Access control, time and attendance Integration support: SDK Thrift, Wiegand, MorphoManager (BioBridge)
Integration support: SDK, Thrift, Wiegand, MorphoManager (BioBridge) Contact details: Chelesile Moya, [email protected],
Contact details: Chelesile Moya, [email protected], +27 11 601 5500, www.idemia.com
+27 11 601 5500, www.idemia.com

IDEMIA iPulse Systems

Device/solution: MorphoAccess Sigma Lite Device/solution: iPB7 Biometric Reader


Manufacturer/ brand name: MorphoAccess by IDEMIA Manufacturer/brand name: iPulse Systems
Distributors: Ideco Biometric Security Solutions, Gallagher Security, Distributors: iPulse Systems
EOH, Impro Technologies Biometric technology: Fingerprint, multi-format card reader (optional)
Biometric technology: Fingerprint Product description: The iPB7 is a world-class device with technology
Product description: MorphoAccess Sigma Lite is a slim, sleek and far ahead of most of its competitors. The iPB7 is one of the most power-
powerful fingerprint access control terminal which can perform 1:10 000 ful, tough and cost effective biometric devices available in the world.
user identification in 1 second. Offering a high capacity of 10 000 users IP65 rated, with 10 000:1 print matching as standard, and with powerful
(30 000 templates), it is designed to fit narrow mounting surfaces such IntelliRelay included, the iPB7 is the most affordable biometric device in
as glass/aluminium door mullions, turnstiles or server rack doors. its class.
Typical applications: Access control Typical applications: Access control, workforce management
Integration support: SDK, Thrift, Wiegand, MorphoManager (BioBridge) Integration support: Full secured API framework
Contact details: Chelesile Moya, [email protected], Contact details: Sales team, [email protected], 0860 478 573,
+27 11 601 5500, www.idemia.com www.ipulsesystems.com

www.securitysa.com Access & Identity Management Handbook 2019 69


BIOMETRICS SELECTION GUIDE

Powell Tronics Powell Tronics

Device/solution: PT-Rollcall
Manufacturer/brand name: Powell Tronics
Device/solution: ATOM
Distributors: Powell Tronics
Manufacturer/brand name: Powell Tronics
Biometric technology: Fingerprint
Distributors: Powell Tronics
Product description: For use in education facilities as an electronic
Biometric technology: Fingerprint
examination register, PT-Rollcall offers biometric enrolment integration
Product description: ATOM is a web-based time and attendance
with the education facility’s examination system, so exam invigilators
system that is fully scalable to suit just about every time management
can verify the student’s identity on a portable biometric device.
application. ATOM supports both static and mobile enrolment for staff
It provides a live dashboard, students expected vs. present and
or employees clocking either onsite or in remote areas. It is a local
various management reports.
product with local development and support.
Typical applications: Student exam and classroom attendance
Typical applications: Time and attendance
Integration support: Impro Portal, IDEMIA/Morpho, CCTV
Integration support: Impro, IDEMIA
Contact details: Mike Austen, [email protected],
Contact details: Mike Austen, [email protected],
0861 784 357, www.p-tron.com
0861 784 357, www.p-tron.com

Regal Distributors SA Regal Distributors SA


Device/solution: LK171 / F22 Device/solution: LK353 /
Manufacturer/brand name: AC5000Plus
ZKTeco Manufacturer/brand name: ViRDI
Distributors: Regal Distributors Distributors: Regal Distributors SA
SA Biometric technology: Fingerprint
Biometric technology: Product description: The
Fingerprint AC5000Plus is a mid-range
Product description: The F22 biometric terminal complete with
is a compact unit offering an either a 125 kHz or 13,56 MHz
affordable, feature-packed cardreader and keypad. The IP65
solution to the African market. rated unit is perfect for outdoor
This unit not only offers the installations. The AC5000Plus
latest SilkID sensor with liveness offers the latest algorithm
detection, but also RFID and from ViRDI with live/fake
keypad functions as standard. finger detection.
Typical applications: Typical applications: Access
Standalone or networked control, time and attendance
access control Integration support: UNiS4,
Integration support: Paxton, HikVision
ZKAccess3.5 Contact details: Andrew Levell-Smith,
Contact details: Andrew Levell-Smith, [email protected], +27 11 553 3300,
[email protected], +27 11 553 3300, www.regalsecurity.co.za
www.regalsecurity.co.za

70 Access & Identity Management Handbook 2019 www.securitysa.com


BIOMETRICS SELECTION GUIDE

Regal Distributors SA SACO a division of Bidvest Protea Coin


Device/solution: AC2100Plus
Manufacturer/brand name: ViRDI
Distributors: Regal Distributors SA
Biometric technology: Fingerprint
Product description: The AC2000Plus
is a mid-range biometric terminal
complete with either a 125 kHz or
13,56 MHz card reader and is mobile Device/solution: SACO Workforce Management, SACO Guest, SACO
card capable. The IP65 rated unit is Anywhere, SACO Workflow
perfect for outdoor installations. Manufacturer/brand name: SACO a division of Bidvest Protea Coin
The AC2000Plus offers the latest Distributors: Bidvest Protea Coin
algorithm from ViRDI with live/fake Biometric technology: Fingerprint
finger detection. Product description: SACO delivers products designed to optimise
Typical applications: Access control, workforce efficiencies and processes through a variety of unified
time and attendance, standalone, solutions from the SACO stable. Our products provide progressive
networked, outdoor business intelligence that simplifies decision-making, reduces turn-
Integration support: HikVision, around times on operational activities and improves profitability.
Paxton, UNiS4 Typical applications: Access control, time and attendance, health
Contact details: Andrew Levell-Smith, and safety management, asset protection
[email protected], Integration support: Manufacturer proprietary technology, SAP,
+27 11 553 3300, Oracle, SAGE, IDEMIA
www.regalsecurity.co.za Contact details: Freddy Niehaus, [email protected],
086 123 7226, www.saco.co.za

Secutel Technologies Suprema


Device/solution:
FaceStation 2
Manufacturer/brand
name: Suprema
Distributors:
neaMetrics, ADI Global
Distribution, Elvey, EOH
FSS, Gallagher and
various system
integrators
Biometric technology:
Facial
Product description:
Suprema’s state-of-the-art FaceStation 2 offers high-speed face
Device/solution: Biometric-enabled access control
matching, live face detection, wide touchscreen, Mifare/Desfire RFID,
Manufacturer/brand name: Secutel Technologies
videophone interface and embedded web server. It offers an improved
Distributors: Secutel Technologies
height range and greater operating illuminance of up to 25 000 lux.
Biometric technology: Fingerprint
Maximum of 30 000 users, 50 000 image logs and 5 million text logs.
Product description: Secutel’s access control solution uses advanced
Typical applications: Access control, time and attendance, building
multispectral sensors to read the surface/subsurface of a finger, giving
management systems, CCTV and VMS integration, home, office and
a clear, strong image. It also reads the subsurface layer even if the
production automation
surface layer is not readable due to fingers being dirty/oily. It
Integration support: Developer API, software development
outperforms other fingerprint sensors and offers robust and reliable
integration support, open platform Wiegand, RS-485 (OSDP),
information of the user.
integrated door control, integrated with all major access
Typical applications: Access control, time and attendance
control manufacturers
Integration support: Developer API
Contact details: Suprema team, [email protected]
Contact details: Danny Pringle, [email protected], +27 10 015 1401,
+27 11 784 3952, www.suprema.co.za
www.secutel.co.za

www.securitysa.com Access & Identity Management Handbook 2019 71


BIOMETRICS SELECTION GUIDE

Suprema Suprema
Device/solution: BioStation L2
Manufacturer/brand name:
Suprema
Distributors: neaMetrics, ADI Global
Distribution, Elvey, EOH FSS, Gallagher
and various system integrators
Biometric technology: Fingerprint
Product description: Essential access
Device/solution: BioStation A2 control and time and attendance
Manufacturer/brand name: Suprema terminal with live finger detection,
Distributors: neaMetrics, ADI Global Distribution, Elvey, EOH FSS, fast data transfer speed, enhanced
Gallagher and various system integrators image processing and quick finger-
Biometric technology: Fingerprint print authentication (1:150 000/
Product description: Premium access control and time and attendance second). It supports fingerprint, RFID
terminal with live finger detection. Features RFID and PIN with a wide- and PIN, and features a 2-inch colour
angle camera with face detection, videophone interface and touch- LCD and programmable function keys.
screen LCD. Maximum users: 500 000(1:1), 100 000(1:N) and 5 million Maximum users: 500 000(1:1),
text logs. Interfaces: TCP/IP, Wi-Fi, PoE, RS-485 and Wiegand. Extensive RF 100 000(1:N).
card options supported. Typical applications: Access control, time and attendance, building
Typical applications: Access control, time and attendance, building management systems, CCTV and VMS integration, home, office and
management systems, CCTV and VMS integration, home, office and production automation
production automation Integration support: Developer API, software development
Integration support: Developer API, software development integra- integration support, open platform Wiegand, RS-485 (OSDP),
tion support, open platform Wiegand, RS-485 (OSDP), integrated door integrated door control, integrated with all major access
control, integrated with all major access control manufacturers control manufacturers
Contact details: Suprema team, [email protected] Contact details: Suprema team, [email protected]
+27 11 784 3952, www.suprema.co.za +27 11 784 3952, www.suprema.co.za

Suprema Suprema
Device/solution: Device/solution: BioLite N2
BioStation 2 Manufacturer/brand name:
Manufacturer/brand Suprema
name: Suprema Distributors: neaMetrics, ADI
Distributors: neaMetrics, Global Distribution, Elvey,
ADI Global Distribution, EOH FSS, Gallagher and
Elvey, EOH FSS, various system integrators
Gallagher and various Biometric technology:
system integrators Fingerprint
Biometric technology: Product description: Packed
Fingerprint in a rugged IP67 housing, N2
Product description: is perfect for outdoor/indoor
Latest Suprema technology in beautiful exterior with massive installations. It supports time
memory. Maximum users of 500 000(1:1), 20 000(1:N) and and attendance and access
3 million logs. Features interactive colour UI, instant matching control for 10 000 users, features
and authentication (20 000/sec), IP65 rating for in/outdoors, multi-class RFID reading technology, BLE and
built-in Wi-Fi, PoE and rapid data transfer (5 000/min). NFC for mobile fingerprint credentials, and operates
Interfaces: TCP/IP, RS-485, RS-232, USB and Wiegand. from -20°C to 50°C. Interfaces: TCP/IP, RS-485 and Wiegand.
Typical applications: Access control, building management FBI certified model available.
systems, CCTV and VMS integration, home, office and production Typical applications: Access control, time and attendance, building
automation, high-end security applications management systems, CCTV and VMS integration, home, office and
Integration support: Developer API, software development production automation
integration support, open platform Wiegand, RS-485 (OSDP), Integration support: Developer API, software development
integrated door control, integrated with all major access control integration support, open platform Wiegand, RS-485 (OSDP), integrated
manufacturers door control, integrated with all major access control manufacturers
Contact details: Suprema team, [email protected] Contact details: Suprema team, [email protected]
+27 11 784 3952, www.suprema.co.za +27 11 784 3952, www.suprema.co.za

72 Access & Identity Management Handbook 2019 www.securitysa.com


BIOMETRICS SELECTION GUIDE

Suprema Suprema

Device/solution: BioLite Net


Manufacturer/brand name: Suprema Device/solution: CoreStation
Distributors: neaMetrics, ADI Global Distribution, Elvey, EOH FSS, Manufacturer/brand name: Suprema
Gallagher and various system integrators Distributors: neaMetrics, ADI Global Distribution, Elvey, EOH FSS,
Biometric technology: Fingerprint Gallagher and various system integrators
Product description: IP fingerprint terminal with IP65 rated housing, Biometric technology: Fingerprint
for outdoor or indoor installations. Supports full time and attendance Product description: A secure intelligent door controller that provides
and access control for up to 5 000 users. Features illuminated keypad, the advantages of biometric-enabled security over a centralised access
LCD backlight and LED indicator, integrated RFID and offers secure control system. It features a multiport interface for fingerprint/RF
door control and I/O expansion. Card options: EM, Mifare/Desfire. readers and supports locks, sensors, RTE and alarm devices. It handles
BioStar 1 & 2 compatible. up to 500 000 users with a matching speed of up to 400 000 matches/
Typical applications: Access control, time and attendance, building second.
management systems, CCTV and VMS integration, home, office and Typical applications: Access control, time and attendance, building
production automation management systems, CCTV and VMS integration, centralised solutions
Integration support: Developer API, software development Integration support: Developer API, software development integration
integration support, open platform Wiegand, RS-485 (OSDP), integrated support, open platform Wiegand, RS-485 (OSDP), integrated door control,
door control, integrated with all major access control manufacturers integrated with all major access control manufacturers
Contact details: Suprema team, [email protected] Contact details: Suprema team, [email protected]
+27 11 784 3952, www.suprema.co.za +27 11 784 3952, www.suprema.co.za

Suprema Suprema
Device/solution: BioEntry
Series
Manufacturer/brand name:
Suprema
Distributors: neaMetrics, ADI
Global Distribution, Elvey, EOH
FSS, Gallagher and various
system integrators
Biometric technology: Device/solution: BioMini Series
Fingerprint Manufacturer/brand name: Suprema
Product description: Packed Distributors: neaMetrics, ADI Global Distributors, Elvey, EOH FSS,
in a slim, mullion-type design, Gallagher and various system integrators
BioEntry Series provides high- Biometric technology: Fingerprint
definition fingerprint image Product description: Range of 500 dpi optical fingerprint sensors with
capture, minutiae extraction scratch-free surface, highspeed USB 2.0 interface and award-winning
and RF card reading capability. W2 offers IK09 vandal-resistant algorithm. BioMini Plus 2, Slim 2 and Combo feature live finger
housing with IP67 rating plus PoE and live finger detection. detection and FBI PIV/FIPS201 and mobile ID FAP certification. All
R2 (designed exclusively for centralised access control systems) models can operate in direct sunlight and the Combo has contact
and P2 make use of OSDP and NFC. and contactless card readers.
Typical applications: Access control, building management systems, Typical applications: Civil and criminal identification, fingerprint
CCTV and VMS integration, home, office and production automation enrolment, biometric identity systems, application user security and
Integration support: Developer API, software development Single Sign-on (SSO), time and attendance
integration support, open platform Wiegand, RS-485 (OSDP), Integration support: Developer API, SDK for Windows and Linux, and
integrated door control, integrated with all major access for Android, software development integration support, customised
control manufacturers solution development, OEM options for hardware integration
Contact details: Suprema team, [email protected] Contact details: Suprema team, [email protected]
+27 11 784 3952, www.suprema.co.za +27 11 784 3952, www.suprema.co.za

www.securitysa.com Access & Identity Management Handbook 2019 73


BIOMETRICS SELECTION GUIDE

Suprema Suprema

Device/solution: BioRugged Series


Manufacturer/brand name: BioRugged
Device/solution: SFM OEM Modules Distributors: neaMetrics
Manufacturer/brand name: Suprema Biometric technology: Fingerprint, facial, iris, voice
Distributors: neaMetrics Product description: Rugged mobile Android terminals customisable
Biometric technology: Fingerprint to include barcode scanning, card reading, RFID, NFC, etc. BioRugged
Product description: Suprema’s range of fingerprint modules with Ruggbo 20 series and BioWolf LE and 8N terminals have Suprema
SDK for easy integration into hardware solutions requiring biometric SFU-S21 fingerprint scanners integrated into them with live finger
authentication. Various options available with features including live detection and FBI PIV and FAP20 certification for any form of
finger detection, multi-dynamic range technology for operation in direct mobile identity applications.
sunlight, FBI PIV and mobile ID FAP certification, and automatic finger Typical applications: Government ID, voter registration, census, mobile
placement detection. policing, remote identification, workforce management, mobile time
Typical applications: Hardware manufacturing, custom time and and attendance, healthcare, banking, SIM registration, logistics and
attendance and access terminals, POS, ATM, cash deposit boxes and warehouse management
vending, vehicle ignition, manufacturing control equipment, any Integration support: Developer API, software development integration
custom hardware requiring fingerprint support, customised solution development, integrated with major civil
Integration support: Developer API, software development and criminal solution providers, integration into BioStar 2 for mobile
integration support, customised solution development time and attendance
Contact details: Suprema team, [email protected] Contact details: BioRugged team, [email protected],
+27 11 784 3952, www.suprema.co.za +27 87 073 5820, www.biorugged.com

Suprema Veracitech
Device/solution:
RealScan Series
Manufacturer/brand
name: Suprema
Distributors:
neaMetrics
Biometric
technology:
Fingerprint, palm
Product description:
FBI certified and AFIS Device/solution: Morpho Wave & Sigma family
compliant live scanners Manufacturer/brand name: IDEMIA
with options for single or 10 print flats, rolls, 4 finger slaps and palm. Distributors: Veracitech, Veracitech Systems Namibia,
500 dpi greyscale images, high-quality image capturing with halo Veracitech Engineering Botswana
effect and ghost image elimination, wet or dry fingers, automated Biometric technology: Fingerprint, facial, hand
image quality check and WSQ image compression. Robust, ideal for Product description: Veracitech is an integration partner and value-
static and mobile operations. added reseller for IDEMIA (Sagem/Morpho) biometric terminals.
Typical applications: National ID, immigration and border control, Veracitech offer seamless, fully integrated template enrolment, template
criminal applications (police), civil identification, high-speed distribution, card and card-less terminal/reader usage on the XMP-
fingerprint capturing Babylon platform. The company has successfully integrated the new
Integration support: Developer API, software development MorphoWave terminal.
integration support, customised solution development, integrated Typical applications: Access control, identity management, people
with major civil and criminal solution providers management, time management, biometrics
Contact details: Suprema team, [email protected] Integration support: Integration partner for IDEMIA’s Sagem and
+27 11 784 3952, www.suprema.co.za Morpho products on the XMP-Babylon platform
Contact details: Alvin Flaum, [email protected],
+27 11 888 7251, www.veracitech.co.za

74 Access & Identity Management Handbook 2019 www.securitysa.com


BIOMETRICS SELECTION GUIDE

ZKTeco ZKTeco
Device/solution:
ZM100 Smart Lock
Manufacturer/brand name:
ZKTeco
Distributors: Regal Distributors SA,
Security Warehouse,
MiRO Distribution, Africlocks,
ERS Biometrics
Biometric technology:
Fingerprint, facial
Product description: The ZM100
smart lock with hybrid biometric
Device/solution: iClock 680 Biometric Fingerprint Reader recognition technology provides
Manufacturer/brand name: ZKTeco a safe and high-security method
Distributors: Regal Distributors SA, Security Warehouse, MiRO of unlocking. It features facial
Distribution, Africlocks, ERS Biometrics and fingerprint recognition, a
Biometric technology: Fingerprint reversible design to suit all door
Product description: iClock 680 is a biometric fingerprint reader for opening directions, and a
time and attendance and access control applications. It adopts a rechargeable lithium battery.
brand-new firmware and provides an unprecedented user experience Typical applications: Access
with stunning GUI, rock-solid stability, fast matching speed and control
expandability. It also supports data backup and retrieve to avoid the risk Integration support: Standalone,
of accidental deletion. works with ZKBioSecurity
Typical applications: Access control, time and attendance Contact details: Brent Saaiman,
Integration support: Standalone, works with ZKBioSecurity. [email protected], +27 12 259 1047,
Contact details: Brent Saaiman, [email protected], +27 12 259 1047, www.zkteco.co.za
www.zkteco.co.za

ZKTeco ZKTeco

Device/solution: PFace202 Time and Attendance and


Access Control Terminal Device/solution: ZK9500 Optical Fingerprint Scanner
Manufacturer/brand name: ZKTeco Manufacturer/brand name: ZKTeco
Distributors: Regal Distributors SA, Security Warehouse, MiRO Distributors: Regal Distributors SA, Security Warehouse, MiRO
Distribution, Africlocks, ERS Biometrics Distribution, Africlocks, ERS Biometrics
Biometric technology: Fingerprint, facial, palm vein Biometric technology: Fingerprint
Product description: The PFace202 multi-biometric time and Product description: The ZK9500 supports finger detection and
attendance and access control terminal supports up to 600 palm captures fingerprint images fast and with high resolution. The product
templates, 1 200 face templates, 2 000 fingerprint templates and is easy to use for registering fingerprints on a desktop. Featuring low
10 000 cards (optional). With ZKTeco’s latest hardware platform and power consumption, it is suitable for applications on Android tablets
ZKFace, ZKFinger and ZKPalmVein algorithms, it offers a brand new and mobile phones. ZKTeco provides SDKs for customers to develop
UI and user-friendly operating interface. their own applications.
Typical applications: Access control, time and attendance Typical applications: Time and attendance
Integration support: Standalone, works with ZKBioSecurity Integration support: Standalone, works with ZKBioSecurity
Contact details: Brent Saaiman, [email protected], +27 12 259 1047, Contact details: Brent Saaiman, [email protected], +27 12 259 1047,
www.zkteco.co.za www.zkteco.co.za

www.securitysa.com Access & Identity Management Handbook 2019 75


ACCESS CONTROL

Key components of access control


What are the key components in a modern access control system?
Access control was a growth market “When thinking about implementing is intelligently opening and closing doors,
worldwide over the past year, posting or upgrading an access control solution but this should be done based on how you
healthier growth than surveillance, although there are a few key elements to consider,” want people to flow through your building.
the surveillance market is much larger in Drayton answers. “In essence, access control This can be as simple as setting specific times
terms of revenues. The reason for the growth, when doors are permanently open or locked
or one of them at least, is that access control based on factors such as risk and busy or
is no longer simply opening and closing a quiet periods.
door. “Critically important is the simplicity
Today, selling readers and cards is a of the software. Operators of an access
margin game with lots of competition. On control system can frequently change so the
the other hand, just buying access control administration of the system must be simple
is a budget game and if all you’re buying is and intuitive. Regulatory awareness, such as
getting people in and out the door then why utilising access control on fire and escape
bother going for a brand when there are routes, must comply with regulations.”
plenty of cheaper alternatives. Finally, he says consideration should be
The question is, is opening and closing given to system quality, post-sales support
doors all you should be looking at when and warranties. Access control is a critical
selling or buying access control today? Hi-Tech component of building security, however
Security Solutions approached Dan Drayton, faults or issues with the system can cause
international sales manager at Paxton Access, huge disruption for building users.
for some insights into what matters in access
control decisions. Integration is a must
Starting at the beginning, we asked what In addition to the above, Drayton also
companies looking to purchase a new or believes buyers should consider additional
upgrade an existing access infrastructure functionality and features that could be better
should be considering before signing on the suited to their specific situations. In Paxton’s
dotted line. Dan Drayton. case, “Our product range covers wireless and

76 Access & Identity Management Handbook 2019 www.securitysa.com


ACCESS CONTROL

wired IP access control, including IP video intercoms, so clients


can have a fully integrated access control solution from a single
vendor, without any licence fees (Paxton has removed all licence
fees from its product offerings for life). Our system and software
are widely recognised as the simplest to install, commission
and operate, and come with a hassle-free five-year swop out
warranty.”
Similarly, the ability for access systems to integrate with
other brands as well as other security systems (and even IoT
systems), is as important. Paxton has recently noted an increase
in requests for integration between biometric readers from one
brand and the access control backbone from another.
Drayton adds that it is useful for surveillance and access
control to work in harmony, enabling alarms and alerts from
access control to be matched to the visual evidence. “Intelligent
buildings are, without question, the future of our industry where
all building services work in harmony, with little interaction
from the user. This can be achieved in many ways that provide
different benefits to the user, so it’s important that consumers
have a clear idea on what they want from their system to get the
most from it.”
This extends to selecting a system and provider that can
adapt with the user as needs change. Users should look to work
with companies that are investing in technology and bringing
it to market, providing confidence that whatever type of access
control is required can be catered for.

Managing your identities


Arguably, the most important part of an access solution is the
database that contains the people and permissions assigned to
them in terms of where and what they can access. The process to
follow in setting up and maintaining this database differs when
smaller companies are compared to large enterprises, however,
the key is to have a single, accurate and reliable source of access
and identity information.
“Access control systems, like most other technology, are
only as good as the quality of information they contain,” notes
Drayton. “A company’s HR database is quite straightforward to
integrate into an access control system in order to add/delete
users and administer privileges. In smaller organisations, it is
common to have the access control database as a standalone
hub of information. This is where software simplicity is critical,
removing barriers to administrators, keeping all user data up to
date to minimise risk.
“Paxton Access is a manufacturer of IP access control and
video door intercom systems,” states Drayton. “Unique to South
Africa, we have a no licence fee approach to our software for
the life of the installation. Paxton trains more than 500 people
each year in South Africa, free of charge, to specify, install and
commission our systems. This ensures installers have all the
tools needed to provide excellent service and solutions to the
end user. We also have free phone after sales support service
backed up by our hassle free, five-year, swap out warranty for all
products.”

For more information, contact Paxton, +27 21 427 6691,


[email protected], www.paxtonaccess.co.za.

www.securitysa.com Access & Identity Management Handbook 2019 77


ACCESS CONTROL

The right access decisions


By Andrew Seldon.

Making the right access control decision depends on what you want secured
and how secure it should be.
We all want our access control to be the best today. “This is partly attributed to the system still from other vendors keeps your options open.
and most secure, until we see the price tag. In meeting their needs, but also due to the capital “While integrations have been available
the real world, companies all too often select investment required to upgrade or replace. in the past, they were often custom projects,
their access control solutions based on what This is an area we [Impro] have specifically requiring an intensive time and resource
fits the budget rather than the requirements of focused on, whereby legacy systems can be investment. Today, we’ve built APIs that enable
the business. slowly migrated into new technologies without a variety of products and services to quickly
This is understandable to a degree given the the traditional rip-and-replace. The benefit of and easily integrate into our systems – from
broad selection of different product available, as this is a company is not impacted with a large diverse systems such as elevators, production
well as the different price points and quality of investment, but rather smaller values over a management, canteen payments and payroll, to
products out there. But what should companies longer period.” the traditional CCTV and intrusion systems.”
be doing to ensure they have the right products, He does, however, see a strong move to He adds that another driver for integration
with the right performance in the right places? upgrading to new platforms, primarily because is the ability to manage everything from one
Moreover, what solutions are there to choose of the increased security and convenience console. “Customers want one place to monitor
from and where would they fit in optimally? now available. “If you think many systems are and manage their security.”
Hi-Tech Security Solutions asked Impro’s MD, five to ten years old, technology has moved
Mike Shipton what he sees in the access control on dramatically – whether it’s our cellphones, Overcoming the legacy of legacy
market today and for his advice to those looking computers, cars or TVs, the evolution has been And while many people seem to focus on
for new or upgraded access solutions. rapid. Whilst access control has not been as the latest and greatest in access and identity
One general trend in access control is that of disruptive, there are certainly industry-changing technologies, Shipton adds that legacy systems
longevity. People are not inclined to renew their technologies which are becoming mainstream bring legacy credentials – the card, tag and fob.
access installations every three to five years. – things such as virtual credentials, where you’re “There are still millions of these being
There are many examples of companies using able to use your cellphone to gain entry or to used around the world today,” he states, “but
their access control systems successfully for a manage your system.” this too is changing, and certainly much
decade or two. While this makes for pleasant And integration has become a critical issue faster internationally as the risk of cloning is
budgets, it does make integrating newer in the access market. While he admits there a significant concern. While the form of the
technologies harder – a fact some companies are still many systems that operate in isolation, credential doesn’t have to change, people
like Impro have focused on in expanding their this is changing. Shipton says the need for are certainly calling for secure credentials
businesses. integration is crucial – it saves time and – we already offer anti-cloning credentials,
Shipton notes that there are still a large reduces complexity. Furthermore, choosing including high encryption tags that have
number of companies using legacy systems solutions that can be combined with those Continued on page 80

78 Access & Identity Management Handbook 2019 www.securitysa.com


www.securitysa.com Access & Identity Management Handbook 2019 79
ACCESS CONTROL

to assess what your and disaster recovery programmes. In a


greatest risks are, and cloud environment, this is all taken care of by
what are the areas that highly qualified individuals, with guaranteed
need the highest levels contractual uptimes and protection.
of security, if any. “Many “This means the customer can focus on
companies simply want their core business, knowing specialists in
to prevent unauthorised both cloud and access control are taking care
users from accessing the of their system. The customer also only pays
premises. In this case, for what they use. For example, in an on-site
biometrics can be used situation, they may buy larger servers to
at perimeter entrances for accommodate for future growth, but in a cloud
enhanced security, while throughout scenario this falls away. Only when you need
the interior areas traditional tags suffice. By the extra capacity will you pay for it; and this
focusing on the perimeter, you’re able to makes for easy scalability and growth.”
remove the risk and reduce cost as there are Another cloud benefit is that new feature
Continued from page 78 only a few entrances, as opposed to placing enhancements or updates to products can be
a unique institution code embedded at biometrics at every door.” automatically deployed, so you’ve always got
manufacture and cannot be ordered by a third If higher security is needed internally, such the latest, greatest functionality and security,
party without the institutions authorisation.” as in the server room or vaults, these specific built within your operational costs. There
Impro has also taken these credentials into areas can have additional measures, such as would be no additional licensing or upgrade
the mobile world because we all know where two or more people tagging in before the door fees, no additional personnel on site to deploy.
our phone is, so there is less risk of loss, and we is opened; or again the use of biometrics. For All this, says Shipton, adds up to a simpler,
don’t easily share our phone with others. It’s example, he notes that some mines are now quicker and better service.
also very convenient to have everything within deploying facial recognition biometric readers
one device – phone, camera, email, and now for high-risk areas, coupled with integrated Top issues to consider
access control. “Add in 256-bit AES encryption safety certificate validation at time of entry, As a final question, Hi-Tech Security Solutions
and the ability to revoke credentials over the breathalysers and tagging of equipment – all asked Shipton for his take on what the top
air, and you have a win-win solution for both to be completed before access is granted. issues would be when planning a new access
the organisation and the end user.” This isn’t for security purposes only, but rather control installation.
“Biometrics are another popular choice and also for health and safety due to the legal “Two main things are crucial,” says Shipton,
are certainly making strong ground as the cost ramifications of non-compliance. “the expected life of the system, as this is a
for these devices continues to reduce,” he adds. “The options really are extensive as we significant investment; as well as the after-sales
“In the past, biometrics were viewed as a high- have solutions to meet every budget, both support and warranty. We all know there’s
end, high-cost solution but this has changed from a hardware and software perspective,” nothing worse than buying something, having
dramatically over the past few years. However, Shipton says. “Whether it’s one door or a a problem and not getting assistance, or
accuracy and read time remains important, thousand doors, our solutions can grow with finding out those parts were imported or no
especially in high traffic areas such as front your needs and, more importantly, we offer longer available in South Africa.
entrances, or turnstiles – the technology off-the-shelf systems. Companies don’t want “Further to that, I’d also like to see South
continues to evolve to ensure that every extensive custom-built solutions that lock Africans supporting South Africans. As our
fingerprint can be read correctly, every time. them into one supplier. President recently stated, we need to be
“What will be interesting is the integration of “The first step though, is to identify those buying local, creating those local jobs and
biometrics with mobile within an access control risks and then work with an accredited and building our economy. South Africa has high
setting. We’ve seen how people have quickly credible installer, who will guide you on the security solutions, we have the technologies,
adopted biometrics on their cellphones and best solution for your needs.” and in many cases, we have better solutions
this will drive greater acceptance in everyday than many international offerings – it is time
situations. Imagine using your fingerprint or Is access getting cloudy? we get behind our local businesses.
facial recognition on your mobile device to Nothing can escape the influence and impact “To illustrate this, Impro has been
open your house, your car, your office door, to of cloud and remote services today and this specialising in access control for over 30 years
log into your computer and undertake online applies to access control as well in the form of and we were one of the first companies in the
transactions. This is fast becoming reality as the cloud and/or hosted access solutions, as well world to develop RFID solutions. In addition
IT world merges into the security sector.” as Access Control as a Service (ACaaS). But to our strong market share in South Africa,
are these solutions as simple and secure as we export to over 60 countries, spanning
Where to deploy what? traditional options? four continents. International companies are
With all these options, what does the security “Absolutely,” states Shipton. “In fact, choosing South African solutions for their
manager do in deciding the best fit for the depending on the skills or experience of the robustness, their security, technological
various access-controlled areas in their personnel managing the on-site system, it can advancements and convenience.”
organisation? As noted above, budget is too be a great improvement. For example, many
often a more important deciding factor than small to medium sized businesses don’t have For more information contact Impro
the applicability and reliability of technology. an in-house IT department managing firewalls, Technologies, +27 31 717 0700,
The first step, according to Shipton, is virus protection, server uptimes, fail-overs [email protected], www.impro.net.

80 Access & Identity Management Handbook 2019 www.securitysa.com


www.securitysa.com Access & Identity Management Handbook 2019 81
ACCESS CONTROL

IP is no stranger to access control


By Andrew Seldon.

IP communications takes your access control system beyond simply


opening the door.
Just as the surveillance market made the move with little doubt in the stability and speed of system. Historically, access control has been
to IP-based communications, the access control these solutions. The benefits are that you can characterised as a sector dominated by
market is also moving to IP (or some would say, easily expand the system and have many more proprietary cabling solutions and complex
has moved to IP for all new installations). There devices connected (from a SALTO perspective), wiring, making products more difficult to install
seems to be considerably less hype around the integration between sub-systems and third- and maintain. The simplification provided by
changes in the access industry as compared party systems is also a lot easier, and with POE IP networks is the main driving force behind
to surveillance, but the move is definitely systems a single cable can be used as your the mass adoption; very few solutions available
happening, even among vendors that built their network and power connection. Therefore, in the market today are not IP ready or indeed
brands on proprietary technology. from a hardware perspective there are some dependant. Given that very few solutions
Hi-Tech Security Solutions decided to look cost benefits. This naturally refers to an access available today do not require a network
at what the benefits and advantages of IP control domain where we can leverage on backbone in one guise or another, I’m not so
in the access industry are, as well as some existing IT infrastructure instead of deploying a sure there is much choice to not use IP where an
potential snags in the move to this modern separate network. online access control solution is required.
communications protocol. For input, we IP technology is the future and even though
approached two experts who are in the midst it is still more expensive than conventional Hi-Tech Security Solutions: Why do we still
of the IP access control world: Wouter du Toit systems, it does simplify management issues. I have companies that are not using their
from SALTO Systems sub-Saharan Africa, and am not sure why companies would not embrace IP networks for access control? Are there
Dan Drayton, international sales manager at this. I can understand that companies will use a hindrances to moving to IP?
Paxton Access. hybrid of IP and 485 devices to reduce the cost,
but many companies out there have intelligent Du Toit: It may be a slow adoption rate where
Hi-Tech Security Solutions: What are the ways of dealing with multiple devices from companies have spent significant amounts of
benefits of moving your access control a single IP address. IP systems allow you to money on their current technology and can’t
infrastructure to the IP platform? What interact in a way that all other IP systems can just go and convert everything to IP, but with
is driving companies to make this move? be merged and integrated or interface with new projects this is not the case and the only
Alternatively, why would a company choose each other. factor could be cost, but then the advanced
not to move to IP-based access? functionality should supersede this argument.
Drayton: The inherent benefit of utilising IP You are buying a solution to solve your current
Du Toit: IP-based systems have been used for technology is that you are using the existing needs, but also future needs and IP systems
many years and are widely used in the industry building infrastructure for your security have proven their reliability and scalability.

82 Access & Identity Management Handbook 2019 www.securitysa.com


ACCESS CONTROL

Drayton: Standalone access control systems one wants to do video verification, for
are more cost-effective in terms of the capex example)?
required to install a system in a building.
Migrating to IP is a process of education, Du Toit: I think a big driver for IP systems in
showing installers and end users the benefits security is because of integration and bringing
of an online solution where events are multiple systems into a single user interface,
highlighted and acted upon in real time. I where the operator can make informed decisions
would suggest that some people who are not quicker, without having to understand all the
that literate about IP technology may be risk backend systems and how to work in them.
averse to adopting it, but with solutions like Many companies still run multiple systems and
Paxton’s Net2, we are showing the market manage them in a standalone way, but this is not
that the simplicity of IP access control is easily necessary anymore. There are many systems out
within their grasp. there that can tie all your systems together and
they are becoming more affordable.
Hi-Tech Security Solutions: In terms of costs
and complexity, does IP-based access Drayton: It most certainly would. Any access
offer benefits or is it much the same control company that has not or is not
for the technicians in the field and the developing products for use in IP networks is
administrators? Would the users gain any ­removing itself from the future of our industry.
benefit from IP or would they simply see
things happening as always? Hi-Tech Security Solutions: When moving to • SALTOKS is a true cloud-based IP system
IP, cybersecurity becomes a problem. What sitting on your network via Wi-Fi, POE
Du Toit: The user or operator should see no steps can one take to ensure your access network or 4G. One IP address, handling up
­difference except that the interfaces used control infrastructure is secure? to 16 devices and no 485 cabled devices. It is
should be easier to use and offer better already integrated with third-party IP camera
functionality. The technician on the other hand Du Toit: Your systems should be secured by systems to bring forward that single view of
will need to skill-up and understand the IT encryption so people can’t just tap into your events between access control and cameras.
environment that he is working in. This should network and hack the security system from • SALTO Space can handle four million
not be a challenge, but could be depending on outside or inside. The only way you should be users and 64 000 devices with a standard
the skill level of the individual. able to access the system is from an authorised IP interface and hybrid IP solutions. It is
IP-based systems are more complex, but in terminal with secure credentials, but this should designed to talk to third-party systems
access control you need to skill-up your staff not be new to security manufacturers, as they through IP, HTTP, UDP and SHIP (our
to deal with this. Many companies offer basic had to protect the security of the hardware in integration interface).
IP courses so that staff can understand the the field before IP systems came along. • Danalock is aimed at the residential market,
basics and grow from there. Not having the Systems hosted in the cloud must have and can interface with your mobile devices
understanding and skills will make it difficult multi-factor authentication to ensure a secure through your home network to give you a
for a technician to fault find when a problem system and only relevant data should be truly keyless security solution.
arises, installation of hardware should not be a stored to protect the individuals’ privacy. All of the above solutions are based on
problem as most hardware is very easy to install. future-proof technology in the IP domain and
Drayton: At Paxton, we take cybersecurity protected with encryption.
Drayton: There are clear benefits for utilising very seriously and rigorously test our products
IP as it makes the installation, support and to ensure that Net2 remains a highly robust Drayton: 95% of Paxton’s global sales are
maintenance of the system a huge amount and secure access control solution. However, it IP-based products. Whether that is our Net2
easier. IP technology is being adopted at should not be overstated that the first line of wired or wireless access control, Net2 Entry
an expanding rate across the industry, the defence for any company is their responsibility video intercoms or our brand new battery
benefit of having multiple systems utilising the to take all necessary measures to protect their powered door handle, PaxLock Pro, the Paxton
same communication backbone has greatly networks from cyber threats with firewalls, etc. Net2 range is a complete access control
simplified the ability to integrate access control Networks can also be partitioned with VPNs to solution from perimeter to the building centre.
with other security equipment, such as CCTV, isolate the security system. Where higher levels In providing customers with an IP-based,
so end-users can match visual recording to of security are required, it is important that end fully online system with all the benefits of
real time events. This is an undeniable benefit users carefully choose their installer partner so live events and alarms in real time, we pride
for the end-user. Companies like Paxton that the right solution is implemented. ourselves on the simplicity of our system,
are ­leading the way with making all our our unique five-year swap warranty and our
integrations available free of charge to help Hi-Tech Security Solutions: What products licence free for life software.
installers and end-users reap the benefits. do you offer that are IP-based and what are
their benefits in the world of access and For more information, contact:
Hi-Tech Security Solutions: As more ­security identity management? Paxton, +27 21 427 6691, support@
(and other) systems are integrated, would paxtonaccess.co.za, www.paxtonaccess.co.za.
IP-based access control not provide for Du Toit: All systems offered by SALTO, in one SALTO Systems, +27 11 534 8489, info.za@
easier integration and more flexibility (if form or another, are IP-based. saltosystems.com, www.saltosystems.com.

www.securitysa.com Access & Identity Management Handbook 2019 83


ACCESS CONTROL

Applying the SaaS model to access control


By Brett van den Bosch.

The software-as-a-service model has proven used. With ACaaS you only pay for what you and management of any business-critical
transformative to many organisations, and need and you’re able to scale up on-demand, information.
even entire industries. The benefits it can offer without a capital investment. Compared to traditional access control,
are undeniable, but in the security sector Another benefit for businesses is the ACaaS offers several advantages, for example:
which is risk-averse by necessity, we wanted guaranteed uptimes, built-in redundancy • The information is stored at remote servers,
to hear the views of some local experts in and disaster recovery, qualified personnel which eliminates the need for expensive
access control as a service (ACaaS) to find managing the systems, as well as 24/7 support. hardware at the controlled premises. In
out what some of the pros and cons are. Our As ACaaS is an operational cost, much needed principle this means that ACaaS should be
interviewees are: capex can also be focused on the end users’ less expensive than traditional (legacy type)
• Mike Shipton, managing director, Impro revenue generating areas i.e. focus on their access control.
Technologies core business, while the access control is • Using ACaaS enables the management of
• Gary Chalmers, CEO, iPulse Systems managed by specialists in this field. your access control from anywhere in the
• Mike Smiles, managing director, Masc Having specialists managing your system world as long as Internet access is available.
Solutions also ensures global best practices are adopted • ACaaS is ideally suited to the monitoring and
• Mayleen Bywater and Rudi Potgieter, senior and adhered to – firewalls, virus protection, control of multiple locations. Information
product managers, Vox DRP, associated data encryption and legal generated at these facilities is stored at a
considerations such as GDPR, as well as all the single location and is available to authorised
Hi-Tech Security Solutions: What are the associated IT skills. These are expensive skills users, 24/7.
pros and cons of ACaaS versus using a which many businesses can’t afford, however This type of service is ideal for all sizes of
combination of onsite access control and with ACaaS the skill set is standard. system; however, most small businesses do not
cloud services for some offsite benefits? Lastly, the simplicity of accessing the have the manpower resources to manage the
Mike Shipton: Globally, ACaaS is expected to system is revolutionised, with only an Internet system on a daily basis, or don’t have access
grow at nearly triple the rate of traditional connection and Web browser needed to to technical support/engineering personnel,
access control equipment over the next five access your site – and this could be done with 24/7. ACaaS removes these obstacles.
years, according to research company IHS a mobile phone, tablet or PC. Both a time and Implementing cloud-based security and/
Markit. Naturally, a large amount of this will money saving. or ACaaS provides a flexible solution which is
be focused on the European and American infinitely scalable, by simply adding more doors,
markets, simply because of their strong Gary Chalmers: Pure ACaaS allows for centralised assigning cardholders access authorisation
adoption of ‘as a service’ business models management and support, making the TCO without the need of changing hardware or
– most business software is now operated significantly lower. It also appeals heavily to obtaining extra software. Although there’s
‘as a service’ in these markets. Think of your distributed organisations who only require a concern over possible hacker attacks, most
Microsoft Office 365, CRM packages and small number of devices per branch, which ACaaS uses encrypted communications and
project management tools – all in the cloud. they want to manage and control from a central data storage solutions that are superior to many
Whilst these models are growing in South point, without needing to have a PC in every server-based systems.
Africa it’s still at the early adoption stage, but we location. ACaaS allows this to be conveniently Whilst the majority of the current AcaaS
expect this to ramp up significantly in the next controlled and managed from a single source, offerings utilise ‘panels’ to manage card/
few years. One of the most significant benefits which hybrid systems typically do not. biometric readers and control/monitoring
that will drive the growth is the reduction of hardware for the secured door, the more
upfront costs. As an example, many businesses Mike Smiles: ACaaS is no different to using radical options eliminate a large portion of this
will invest in the hardware and IT infrastructure cloud services – all the access control hardware hardware by utilising mobile applications that
to enable future growth – in essence, they are remains onsite, software and servers are enable a credential, stored on a smartphone to
purchasing their future growth, up front, at removed from a company’s premises and are identify the phone’s owner and issue a signal
great cost, and many of those resources may be housed in data centres designed to meet the to a basic door controller that permits the staff
sitting idle as the capacity is not initially being exacting standards necessary for the storage Continued on page 86

84 Access & Identity Management Handbook 2019 www.securitysa.com


www.securitysa.com Access & Identity Management Handbook 2019 85
ACCESS CONTROL

Gary Chalmers. Mayleen Bywater. Rudi Potgieter.

Continued from page 84 hybrid of the two. We are either investigating through pre-defined interfaces, ensuring that
member to enter the portals/doors they are or already have a product for almost every any system can be integrated quickly and
permitted to access. single one of our current traditional security efficiently.
solutions in the cloud. Whilst certain value propositions are lost
Mayleen Bywater: This is a multifaceted issue, ACaaS represents a predictable cost, (such as easy remote support and centralised
which is precisely why I am providing my essentially converting capex into opex and management) in these scenarios, clients
insights on the network and security systems allowing you to budget for it better. It derisks are able to leverage existing architecture
that complement the personal identity that portion of your business by decentralising for longer, and slowly replace ageing
management side of things, whereas my this data portion and taking it offsite if need infrastructure rather than having to face a ‘rip
colleague Rudi Potgieter’s expertise is closer to be. It also assists your potential critical skills and replace’ option so often advocated by
the area of physical access control. shortages, as an organisation doesn’t need to security professionals.
The question of using a cloud-service have advanced IT and other skills in-house.
versus offsite access control really revolves Mike Smiles: This is solely dependent on the
around capturing the viewer images, storing Hi-Tech Security Solutions: How does one legacy hardware currently in use at the facility.
the data, and specific requirements from a integrate new access solutions and existing Most ‘traditional’ access control systems
client’s perspective so they can then traverse legacy systems use proprietary hardware that utilises serial
the network for data and info. For example, if Mike Shipton: In most access control systems, communications such as RS-485 or RS-422. In
they have huge video surveillance for access the term ‘rip and replace’ is standard. Often, instances where the door control hardware/
where they’re going to use visual images they simply scaling up from one system to another panels support IP, these are often ‘closed’
would need to have something onsite because requires this harsh and expensive route. systems that have been created to restrict the
of the bandwidth and volume of data. Whereas However, given the large installed base of end user from using software other than that
if they’re just using IT-based and specific Impro legacy systems, we have developed the provided by the hardware manufacture.
control measures that are in place, with just means to slowly migrate from old technologies
access control based on policy, then cloud is to new. This means that many sites are able to Rudi Potgieter: My understanding is that
obviously the way to go, as opex models assist operate with existing hardware, take on new yes, this can be challenging, but there are
with cost saving and a managed service can software, and slowly replace the legacy items some in-between applications and physical
assist with IT and security confidence. whilst enjoying new software features. on-premise hardware that can be deployed to
For many companies, when they need to do We generally recommend when customers translate the environment. So in other words
access control they need to trust that they’re are wanting to upgrade, or expand, this is the if you’ve got a brand new install you probably
bringing in strangers to do this. From a skills time to assess the next 10-year path. With would push it out via Web services into the
perspective we can alleviate their problem ACaaS this becomes a much easier solution, as cloud, whereas in an older environment you
from an HR point of view, as well as help with there is not the high capital investment of the might still sync to a local copy of an Impro or
best practices and try where we can to help past and, once you have the cloud platform, Paxton or whatever that service might be, and
manage their business. Effectively this gives it opens a world of new technologies and then locally translate it into the correct format
the client more time to be effective in their services to the end-user which simply cannot so that you can access it and process it in your
business, so they can go and make money be accessed with very old technology. cloud housing, so to speak.
and let us worry about how to do the access
control component. Gary Chalmers: iPulse Systems’ IQSuite.cloud Hi-Tech Security Solutions: How does ACaaS
is a true ACaaS platform, designed to work integrate with other management systems,
Rudi Potgieter: At Vox we try to provide a with both new and legacy equipment. Local like security or building management?
solution that caters to clients’ needs, so it can memory resident services and SDKs allow Mike Shipton: The process of integration hasn’t
be either private cloud, public cloud, or a legacy devices to communicate with the cloud principally changed. Whether the access

86 Access & Identity Management Handbook 2019 www.securitysa.com


ACCESS CONTROL

control system is on-premise or operated as responsibility for the physical infrastructure of What people don’t always do is ensure that
a service, the mechanics are pretty much the the client’s network. So integration is still part the testing of the network and the testing of
same. However, ACaaS obviously provides and parcel of the overall solution – we’re not the access control actually complement each
the latest technologies and systems to make going to take functionality away, but actually other. In some cases the one will negate the
that integration simpler, faster and better. By add functionality. other, and if you’re not managing it from a
having a standard platform, it also ensures Taking services like these to the cloud one-provider perspective you are creating a
others systems can quickly integrate, rather also allows for better management of a loophole in your client’s environment.
than the traditional route of having to do mobile workforce, such as field marketers or
multiple integrations for each and every merchandisers in a retail environment, or even Hi-Tech Security Solutions: How does one
system – integrate once on the platform, and security companies that have staff temporarily deal with the risks of losing sensitive data,
it’s available for many. deployed at a site. It is nowadays trivial to especially with respect to GDPR and PoPIA?
have a mobile finger reader whereby a mobile Mike Shipton: This is where international
Gary Chalmers: IQSuite.cloud as a platform has worker can login and they are then virtually certification becomes crucial. The rigorous
a fully secured API, accessed via an SDK that clocked in at a specific site. So I think it actually standards enforced internationally must be
makes integration quick and simple. Using takes the concept to the next level. adopted to ensure complete compliance with
sample code and designed in such a way as to all legislative requirements. For example, ISO
ensure minimal coding is needed, creating an Mayleen Bywater: If you’ve got the policies and 27001 for technical measures, ISO 27017 for
integration with an existing system, whether processes mapped out properly and you do cloud security, ISO 27018 for cloud privacy,
local or cloud-based, is a matter of hours, the fingerprint or specific single sign-on or any as well as EU specific certifications such as
rather than months. kind of authentication to a specific person, if BSI’s Common Cloud Computing Controls
your ERP or other system is dated it does create Catalogue and adherence to the CISPE (Cloud
Rudi Potgieter: Whenever technology moves a bit of a stumbling block because they would Infrastructure Services Providers in Europe)
to the cloud you don’t lose functionality, so need to be upgraded or integrated. However Code of Conduct.
if you have an app that’s already integrated this also presents an opportunity to make sure In addition, strong encryption of all
into a building management system, payroll, clients are running the correct patches, their personal data is a must; as well as the regular
or time and attendance, all of that just moves version control is correct and that everything testing, assessing and evaluating of the system
to the cloud. You’re essentially just taking actually works together. Continued on page 88

www.securitysa.com Access & Identity Management Handbook 2019 87


ACCESS CONTROL

Continued from page 87 businesses who haven’t considered access


to ensure that it is continually monitored and control previously due to the costs, or those
meets the changing demands of a globally same businesses that don’t have the IT
connected system. and specialists resources to manage all the
infrastructure. These are normally the earlier
Gary Chalmers: Following international adopters of ACaaS as the benefit is significant
guidelines for storing and managing data, and quickly achieved.
and leveraging the inherent underlying On the enterprise side, the adoption is
security principles of Microsoft Azure, slower simply because of their significant
allows IQSuite.cloud to maintain a rigorous investment in the access control system which
and certified methodology for managing cannot be thrown out overnight. In this
security. In addition to this, our team performs sector, we see a longer term for the migration
regular penetration testing around the API as that equipment ages, becomes obsolete
and its security, and constantly update the and upgrading becomes a business priority
underlying authentication and authorisation and reality. Then ACaaS makes very good
models to accommodate the ever-changing sense, especially because of the ability to add
environment. additional services such as mobile or virtual
credentials, alarm and event monitoring,
Mayleen Bywater: Let’s say for example you have credential management, SLAs with regulated
an ERP system and you have access to your services etc.
client’s info and/or their personal details from a
payments perspective. If you know you’ve only Gary Chalmers: ACaaS is the future. All other
Mike Smiles.
given a person access to a specific environment products are already dead, even if they don’t
and there’s a solid audit trail, when something realise it. From small companies to large and presentations I’ve seen from our existing
does happen whereby information is leaked enterprises, ACaaS is the wave of the future. vendors, in the smaller environments cloud
either maliciously or in error, an organisation’s It simply carries too many benefits to ignore, access control is the sweet spot. Businesses
security measures mean they can validate and and IT trends have shown that everything will like that don’t necessarily have the skill set
prove what has occurred. ultimately migrate to the cloud in order to to run with it locally, nor do they have the IT,
remain competitive in terms of TCO. Ultimately, the knowledge etc. So there it works well for
Hi-Tech Security Solutions: Where would onsite, closed systems are a thing of the past, us to offer it as a complete service – not only
ACaaS be advised and where not – for and the dangers they bring are no less than access control in the cloud but access-control-
example, is it good for small companies but anything offered by cloud architecture. as-a-service. With our 24/7 nerve centre
not reliable enough for the enterprise? we can field these support calls and assist
Mike Shipton: As mentioned previously, the Mike Smiles: There is no question that the with bringing on board and activating and
easiest adoption is for small to medium take-on rate for ACaaS is far higher in the small deactivating access etc.
business space as opposed to enterprise wide In your larger environments I think they’re
solutions. Major organisations spend years going more for the cloud play because as-a-
and large sums of money selecting access service play is not quite there yet and the guys
control products that are suitable for their are still quite stringent with their policies.
organisation and take many years to change Essentially we are looking at trying to mould
this perspective because of the risks involved. some of our existing, traditional models into a
Small operations quickly identify the cloud model whether the vendor is ready for
benefits of prescribing to a service which that or not. I think we are quite innovative and
enables them to focus on their core business we’ve got the right skills here to be able to take
and eliminate the need to allocate a resource products like that and deploy them in a virtual
to the task of security system administrator. cloud environment for our clients.
The majority of control panels that support
this technology are imported from the USA For more information contact:
or Europe and are relatively expensive. The Impro Technologies, +27 31 717 0700,
delayed implementation of benchmark cloud [email protected], www.impro.net
services such as those offered by Microsoft iPulse Systems, +27 86 0478 573,
Assure or Amazon Web Services are a barrier [email protected], www.ipulsesystems.com
to take-up here in South Africa. Furthermore, Masc Solutions, +27 11 100 0088,
the monthly subscription costs charged [email protected],
by companies offering this technology are www.mascsolutions.com
currently too expensive to support widespread Vox, +27 87 805 0000,
adoption of the solution. [email protected],
[email protected],
Mike Shipton. Rudi Potgieter: From the research I’ve done www.vox.co.za

88 Access & Identity Management Handbook 2019 www.securitysa.com


ACCESS IN THE CLOUD

Cloud-based access control


Running your access control through a cloud service has made people nervous in
the past, but today’s solutions are hard to beat.
One of the most promising, or perhaps challenging aspects of access A professionally designed and commissioned cloud-based access
control has been the slow growth of cloud-based access throughout control solution will provide peace of mind by ensuring access control
the world. The acceptance of cloud-based access has taken longer readers will continue to operate normally during any network disruption
than many vendors would have preferred, some say due to the cost vs. and that data related to any access control activity is recorded locally.
performance ratio, others say due to security issues associated with
the cloud, while others say it’s due to the reliability of connectivity Hi-Tech Security Solutions: What can companies do to ensure their
options. internal networks remain secure from hacking or malware when
Yet, while there are always arguments against cloud access control using a cloud service?
services, cloud-based systems in their variety of permutations have Mallett: While no manufacturer can offer a 100% guarantee, a
expanded and are finding increased acceptance in various industries. combination of a high-level encryption, anti-virus software and regular
To find out more about the current state of cloud-based access control, software updates which take into account the latest known threats,
Hi-Tech Security Solutions spoke to Ernest Mallett, regional director of should help keep a cloud-based solution one step ahead of the hackers.
Tyco, the security products division of Johnson Controls.
Hi-Tech Security Solutions: What is your cloud-based solution and
Hi-Tech Security Solutions: Has cloud-based access control reached how does it work?
the stage where large companies can rely on the solution? Mallett: The Kantech hattrix cloud-based access control solution
Mallett: Manufacturers such as Tyco, have taken advantage of recent allows you to manage access control for your entire estate, whether
advances in IP network technology to deliver a cloud-based access control it’s one door, or thousands spread across multiple sites. With ‘hosted’
system which is robust, reliable and secure. 128-bit AES encryption of data or ‘managed’ options, you can choose to work with a hattrix Managed
and low bandwidth usage to ensure real-time operation are just two key Service Provider (MSP) to outsource all or just part of your security
attributes for a solution which offers significant operational advantages activities and management.
over traditional methods of deploying access control, as well as a lower Hattrix eliminates the need to incur the capital, running and maintenance
total cost of ownership. costs of utilising a server which you would normally need to do in order to
operate a medium- to large-sized access control system. It is supported by the
Hi-Tech Security Solutions: What are the b ­ enefits of implementing EntraPass web platform and EntraPass Go mobile app which are designed to
cloud-based access control? enhance the user experience by delivering remote and convenient real-time
Mallett: There are so many reasons why it makes perfect sense to have access, to manage common security tasks. These include locking/unlocking
a cloud-based access control system, not the least of which is the ability doors, managing cards and schedules, requesting reports, viewing live video,
to make best use of human resources. Your Managed Service Provider monitoring events by floor plan and more.
(MSP) or your security personnel, can be anywhere in the world and yet With minimal training, authorised personnel are able to configure
be able to remotely manage the access control systems operating at hattrix to deliver customised reports by email or they can view activity in
any number of your sites, and all from the convenience of a desktop PC, real-time. Scheduled back-ups, audit trails and automated health checks,
tablet or smartphone. This means a security manager does not need to ensure that security best practice is adhered to at all times.
be on-site in real-time to manage the access credentials of colleagues,
contractors and visitors, or control many other important features of an For more information contact Johnson Controls Security Products,
access control system. +27 82 566 5274, [email protected].

www.securitysa.com Access & Identity Management Handbook 2019 89


ACCESS IN THE CLOUD

Controlling access in the cloud


By Brett van den Bosch.

Cloud-based services have become an integral


part of our digital lives, allowing us to access our
important information from any smart device,
anywhere in the world. The convenience afforded
extends to organisations too, and they further
stand to gain from operational and cost benefits.
In the access control arena, hosted or managed
services have been around for a few years, and
the adoption of cloud-based access control only
continues to grow as companies become more
and more open to the idea of relying on it to
perform such a vital function within their business.
Glenn Allen. Wouter du Toit.
We spoke to representatives at Excellerate Services
and SALTO Systems to find out more about the no risk – the cloud is just there to ensure overall solution therefore eliminates the need to
benefits cloud-based access control can offer. you’ve got live communication to those doors, run cables to every door, and is expandable to
Depending on the end user’s requirements, and that you can manage them online,” he says. any number of doors at a site.
Internet connectivity can be an obstacle since The SALTO KS solution was a world-first On the cloud side, the IQ can have a
the overall solution relies heavily on connection when it was launched some four and a half physical network connection to the outside
outside of the local network, says Glenn Allen, years ago, and was initially regarded with some world, or it can additionally be fitted with a
director of Excellerate Services’ technical trepidation in the marketplace. In the time since SALTO SIM card for 4G cellular connectivity as
division. “The current climate for information its introduction, other companies have got in a failover or as the primary communication
communications systems in South Africa are on the act and are offering similar solutions, and medium. The combined flexibility provided by
often unreliable/temperamental (unless cost for du Toit says the technology has matured to the these wireless capabilities allows end users to
deployment is not a factor). Multiple connection point where it is now very well accepted. better control their IT infrastructure costs.
channels, such as wireless, GSM, fibre or satellite “Not just internationally, but in South Africa,
would need to be made available to each of we have a lot of cloud-based sites deployed, Addressing cybersecurity
the end points for redundancy. Obviously, ranging from the more ‘standard’ access control To address the ever-present issue of
this depends on the end user’s requirements requirements to the more demanding hospitality cybersecurity, du Toit explains that SALTO takes
as some end users would accept a period of environment,” says du Toit. “So there is no concern great care to ensure its clients’ data is secure.
potential downtime,” he says. for us as a manufacturer to push this to even “The data we transmit to the cloud is encrypted,
Owing to this potential issue, some clients will large companies, and we have already done that. and we comply with ISO standards to ensure
choose to implement a solution that can continue “For organisations that have to control our clients’ information is not vulnerable or
to run locally if the external connection is lost. access across multiple sites, the fact that SALTO shared with third parties. The only people that
“Depending on the solution the client wants to KS is cloud-based makes it easy to manage can access that information are those who the
implement, technicians will ensure that the system people’s credentials regardless of their location, client explicitly allows to access it – even our
can function to a certain degree on the local server through their mobile phone, one-time PIN or technical resources department cannot access
should communication be lost to cloud-based other mechanism. This is highly cost-effective privileged information without the client’s
servers, and once the communication is back since the only hardware that needs to be permission,” he says.
up and running, will push database updates to installed at the site is one of our IQ units.” Allen further recommends that the
update the cloud-based backup,” Allen continues. implementation of VLAN and firewall technology
“Cloud-based solutions provide the benefit Going wireless ensures that all traffic is monitored, securing the
of economies of scale, where hosting is in the Wireless technology has been a key enabler for the entire network. “Using a VLAN as well as firewalls
form of a rental from a third-party supplier’s proliferation of cloud-based systems, and SALTO’s would ensure that the data gets to where it is
server, meaning that local infrastructure costs solution takes advantage of wireless for local intended, however you’d also have to deploy
are diminished. An example can be drawn networking as well as communication with the some sort of encryption of the traffic between
from remote areas where there is no wireless cloud. The local networking is enabled by a device the client and the server to make sure that even
connectivity and no fibre infrastructure, where called the IQ as referred to by du Toit above, which if the data is eavesdropped it is unusable, which
this situation would require a locally hosted can be plugged into a physical network point via we cater for using SSL and the ability to deploy
solution,” he explains. an Ethernet cable, or communicate wirelessly, or a signed certificates to the web server.”
According to SALTO Systems’ Wouter du combination of both.
Toit, in terms of uptime the company’s cloud- The IQ also uses proprietary radio frequency For more information contact:
based access control solution, SALTO KS (Keys (RF) or Bluetooth signals to speak to the locks, Excellerate Services, +27 31 573 7600,
as a Service) has close to 100% reliability. “Even and to a controller that can drive an output, if one [email protected], www.excellerate.co.za
if your Internet connection and therefore your is required. The IQ essentially acts like an access SALTO Systems Africa, +27 87 701 5858,
link to the cloud services platform fails, the point, establishing a communication path for up [email protected],
system is still self-contained locally, so there’s to 16 devices in a radius of 10 to 15 metres. The www.saltosystems.co.za

90 Access & Identity Management Handbook 2019 www.securitysa.com


VIDEO-BASED ACCESS

They sure don’t make


them like they used to
By Brett van den Bosch.
A doorbell used to be a simple thing: you pushed a button and at the Riccardo Battaini: Doorbells are becoming more connected. Today you
other end of a pair of wires a bell sounded. Then intercoms came along can have a video doorbell connected wirelessly via Wi-Fi network. This
and opened up the possibility of two-way communication (although enables you to answer a visitor call from your smartphone. You may
anyone who remembers the early intercom systems will know the audio also have a PIR motion detector integrated which activates the system if
quality left a lot to be desired). some movement is detected by the entry panel.
These technologies have improved over the years and additional Most of these products are coming from the Far East and are very
functionalities added, so that nowadays systems are available that add simple, i.e. they are standalone systems that do not allow for expansion,
a visual dimension in the form of high-definition video, as well as other multiple entrances or intercoms between the units. Nevertheless, there
features such as mobile communication. We interviewed the following is a very important demand in this segment of the market. A big part of
people to learn what the current state of the market is: the residential solutions in South Africa are single-family houses and, in
Markus Bodenstein, key account manager at Axis Communications SA. these applications, if the user is not too sophisticated, the Wi-Fi video
Riccardo Battaini, managing director of Came BPT South Africa. doorbell is a good solution in terms of price/performance ratio.
Chris Lelicanin, access control product specialist at Elvey. On the intercom side of things, being complete systems, they have
Mohammad Meraj Hoda, vice president of Ring. developed more in the direction of wide communication, thanks to the IP
protocol being used for these applications. Today, in my opinion, we are
Hi-Tech Security Solutions: What are the latest offerings in the leading the way with full IP audio and video intercom systems. Our solutions
market with respect to doorbells and intercoms, and what allow direct connection of the entry panel to the Internet, and an unlimited
functionality do they offer? number of entry panels and receivers. The only limitation is the capacity of
Markus Bodenstein: The security market has evolved over the years, and the network to manage the volume of data generated by the cameras.
every year new solutions and products are introduced. The same goes
for access control, of which intercoms form part. Intercoms specifically Chris Lelicanin: Apart from world-class European-engineered voice and
have changed and are now intelligent devices that form an integral part video technology, the doorbell and intercom market is seeing a growing
of a security network. It is no longer a standalone analogue unit that trend in the adoption of facial recognition for access, app-based Wi-Fi
fulfils only one role. call forwarding, and integration into other systems such as intrusion.
At Axis we have changed the naming convention because it is no Fermax’s latest Meet system gives a good indication of where the
longer an intercom, but a network door station. Axis network door industry is headed in terms of IP systems and features, and functionality
stations combine communication, video surveillance and remote entry versus cost. A large part of this is also the refinement of existing
control in one single device. The Axis network door station offers a tried and tested technologies, less wires for installation, easier setup,
convenient complement to your surveillance installation and helps to management and deployment of devices.
keep your premises secure, providing reliable 24/7 identification. Continued on page 94

92 Access & Identity Management Handbook 2019 www.securitysa.com


VIDEO-BASED ACCESS

Chris Lelicanin. Markus Bodenstein. Riccardo Battaini. Mohammad Meraj Hoda.

Continued from page 92 people to see a live view and get alerts on their smartphone, tablet and
Mohammad Meraj Hoda: Since we invented the Video Doorbell in PC. We also allow any number of people to access the Video Doorbell
2013, these devices have become even more sophisticated. The latest through the app, depending on the type of subscription they have.
generation of the Video Doorbell offers features such as two-way talk,
1080p HD video, infrared night vision and instant mobile alerts, as well Hi-Tech Security Solutions: What security is included to ensure
as recording capability. only authorised people are able to gain access and manage these
devices?
Hi-Tech Security Solutions: Can these devices be managed by mobile Markus Bodenstein: Cybersecurity has become a hot topic over the past
devices, and if so, can multiple people control them via their few years. Axis always goes to great lengths to implement strict security
smartphones? protocols and requirements to ensure that any Axis device on a network is
Markus Bodenstein: With the Axis network door station, you can see, as secure as possible. We also provide hardening guides on cybersecurity,
talk to, identify and open the door to visitors regardless of where which includes guidelines on how to further enhance the security on your
you are. The network door station can be used to create a two-way network – all this information can be found on our website.
communication channel with designated mobile devices, which allows
for flexibility and convenience. Riccardo Battaini: Of course, with the connectivity, the security of the
technology becomes important. As security comes first, our solutions
Riccardo Battaini: In the intercoms solution, smartphones become an are cloud-based with the software package sitting in very well protected
extension of the internal receiver. They can be used to receive calls, data centres. Furthermore, all our applications connected to the Internet
initiate calls and activate the entry panels and the cameras connected. IP are user name and password protected. This includes web applications,
intercoms are much more powerful. They allow the user to be connected smartphone apps, but also the devices directly connected to the
via Wi-Fi while inside the property. This is very interesting in the commercial Internet, like the entry panels.
environment, where until some time ago it was a challenge to allow many
entry panels. We have recently worked on a project – and have several in the Chris Lelicanin: Apart from password protection, there are also encryption
pipeline – with 60 and 70 entry panels in large commercial compounds. protocols and standards in use to keep assailants at bay. The systems are
The IP solutions also allow more sophisticated PC-based switchboard well thought out and fortunately there are few points of entry and no data
services. Our solutions are even more powerful as we are now capable is stored on the edge device, such as the intercom panel.
of integrating all the Came systems in a single platform in the cloud,
called Came Connect. With this powerful technology we can control Mohammad Meraj Hoda: Because the Video Doorbells are linked to
all the Came devices (and partially also some competitors’ devices) like a specific Wi-Fi network and a specific device, they are password
gate automation, traffic barriers, door automation, audio and video protected. The ‘shared users’ function allows people to control who
intercoms, and home automation devices from a single platform. has access to the device, and so avoid the need to give out account
This solution allows us to provide new kinds of services. For example, the information.
end user can configure the system in order to send a message to their installer
if there is a potential problem with the safety devices of their gate automation. Hi-Tech Security Solutions: Are these systems able to integrate into
In other words, it is the system which initiates a service request, maintenance a broader management system for centralised control, or are they
or provides information. In some cases, the installer can be informed of a standalone solutions?
potential problem at his customer’s site and react immediately. Markus Bodenstein: The Axis network door station can integrate into
existing and new management systems or it can be used as a standalone
Chris Lelicanin: The digital age is upon us and you can securely and solution. The intelligence on the device allows it to communicate
remotely have a two-way video conversation or grant access to a visitor. directly with other devices on the network, to ensure that the system
You can turn the panel off should you not want to be disturbed and the becomes a working solution that can meet your requirements.
app can divert the call from the panel to multiple smart devices.
Riccardo Battaini: In our solutions we can have third-party cameras
Mohammad Meraj Hoda: Ring’s devices were specifically designed to be connected to the system and even the NVR (network video recorder),
managed through smartphones, but we have taken it further, allowing if necessary. It is also possible to control – with the limitation of simple

94 Access & Identity Management Handbook 2019 www.securitysa.com


VIDEO-BASED ACCESS

output and input signals – third-party Chris Lelicanin: Elvey prides itself on
devices like competitors’ gate automation fulfilling the security sector’s needs. All
or barriers. Elvey solutions are thoroughly researched
This is not so much due to the IP and tested. The manufacturers we partner
technology, but more to the flexibility of with are best in breed and I think in this
our solutions, and we can also interface context a good example is Fermax, which
with elevators and make it possible to covers the spectrum in terms of quality,
send a visitor only to the exact floor functionality at an affordable price, and
where the person to be visited is located. ease of use. Fermax incorporates the
This is convenient and safe at the same following features into its ecosystems:
time. facial recognition, mobile applications,
access control solutions, IP video
Chris Lelicanin: Integration and surveillance, lift control management and
functionality are essential in today’s integration into home automation systems,
security solutions and systems. to name a few.
Depending on the size of the
implementation the Fermax Meet system, Mohammad Meraj Hoda: The professional-
for instance, can incorporate access grade Ring video doorbell Elite lets
control, CCTV and motion detection. You homeowners watch over their home and
can use the video monitor to view CCTV answer the door from their phone, tablet
or as a panic. Should you need to scale and PC. The system allows them to create
this or integrate into an existing solution, and customise their own motion zones,
the panels can be integrated through and when anyone enters the motion zones
industry standard protocols. or presses the doorbell, they get an instant
alert.
Mohammad Meraj Hoda: Ring’s goal is The video doorbell Elite also allows for
to make communities safer by helping on-demand streaming of video and audio
people create a ring of security around with live view. This device has built-in night
their home. All Ring devices are linked vision sensors and a weather-resistant
to the app, which allows homeowners to design. Ring video doorbell Elite installs
keep an eye on their property through on standard junction boxes with a flush-
any number of devices. mounted finish, and connects to the
network via power-over-Ethernet for
Hi-Tech Security Solutions: What are the a reliable connection and non-stop
latest solutions your company has on power.
offer, and what features and benefits The Ring Video Doorbell 2 comes with
do they offer? adjustable motion sensors, and when
Markus Bodenstein: Axis offers the Axis anyone triggers the motion sensors or
A8004-VE and A8105-E network door presses the doorbell, homeowners get an
stations, with benefits and features instant alert on their phone, tablet and
such as high-quality video and audio, PC, allowing them to see, hear and speak
2-way communication, remote entry to people at their door from anywhere.
control, 24/7 video identification, and The Video Doorbell 2 also offers live view
SIP Support for IP phone integration. and on-demand streaming video and
The Axis network door station is also two-way audio, and features built-in night
scalable and definitely futureproof, so vision sensors and a weather-resistant
you are able to add door stations, expand design. Ring Video Doorbell 2 comes with
your communication system or upgrade an innovative quick-release rechargeable
the backbone of your system as you battery pack, so the doorbell can be
grow, while preserving the value of your charged without moving the device.
investment.
For more information contact:
Riccardo Battaini: I think I have explained Axis Communications SA, +27 11 548 6780,
everything about Came Connect in my [email protected], www.axis.com
answers above. The features of the complete Came BPT South Africa, +27 11 616 3222,
control of all Came installations allow [email protected], www.camebpt.co.za
peace of mind, better and more efficient Elvey, +27 11 401 6700, [email protected],
maintenance, and enhanced security for all www.elvey.co.za
parties concerned, i.e., end user, installer, Ring, +27 11 237 7000, [email protected],
facility manager or body corporate. www.ring.com

www.securitysa.com Access & Identity Management Handbook 2019 95


WORKFORCE MANAGEMENT

Integrating access
with OHS and operations
Veracitech has developed access control plug-ins to add certifications
and key management decision-making to traditional access control.
Occupational Health and Safety (OHS) controls
have become as important as security controls
when it comes to the control of access to a
facility or restricted environments. Many clients
today need to check and manage statutory
accreditations and competency prerequisites
prior to allowing personnel and visitors onto
their premises or work areas.
Some of these requirements include
legislative, HR, health and safety, and
accreditation or competency (training and
induction) prerequisites. This data is generally
managed by the HR department and the
security or access control systems merely
block or unblock the user’s access manually
from time to time when notified that the user’s
‘certification’ is valid or has expired.
Veracitech develops and deploys plug-ins
on the Babylon platform for various active
client applications; one such application is the
Veracitech Babylon Certifications solution.
The plug-in comprises access control and
automation, incorporating the certifications
prerequisites listed above. These certifications
can be defined and managed either directly
in the Veracitech Babylon Certifications
application or can be integrated with existing
HR or other databases.
Various certifications and competencies
can be defined in the system, which can then
control access to certain areas based on whether
the person requesting access meets corporate
requirements and vetting. For example: Babylon Key & Locker Management integration with the Traka backend allows key
• Access can be determined by the security Many industrial clients use smart key and and locker users to be managed seamlessly
level/profile as well as if the user has a valid locker management systems, such the TRAKA in the Babylon user database. Access level
medical check-up or has been certified in a system from ASSA ABLOY to manage who definitions ensure that full control and
certain skill required for access to a specific has access to certain keys. Again, here the management of key and locker rights is
area. client traditionally has to control the key centrally administered from the Babylon
• Before allowing anyone to start a truck or management as a separate, standalone system environment only. Through this high-level
machinery on a plant, the system may first from their access control, security or HR/OHS Babylon/Traka integration, the client can now
check to ensure the individual’s licence systems. With intelligent key systems, keys are incorporate access controls with key/locker
is up to date and that they underwent available 24/7 to authorised staff only, and controls, and even combine this with the
a breathalyser test that morning before usage can be managed. certifications solution mentioned above.
granting access to the truck or machinery. Veracitech has partnered with Traka and is • Access can be allowed / denied based on keys
Feedback to the user and an explanation the only authorised system integration partner returned: e.g., users can be prevented from
for Access Denied can also be displayed on the on the Babylon platform for Traka systems. leaving the site without returning keys.
Veracitech interactive touch display modules Veracitech again developed a plug-in for the • Access rights to keys can be based on not just
at the access points. These are fully integrated Babylon platform, the Veracitech Babylon Key the key profile, but also the validity of the user’s
and managed from the Veracitech Babylon & Locker Management solution. certifications (users can only withdraw a vehicle
Certifications application. In this solution, high-level database or machine key if they have the prerequisite

96 Access & Identity Management Handbook 2019 www.securitysa.com


WORKFORCE MANAGEMENT

certification status, such as a valid driver’s or There are numerous other applications
operator’s licence on record, or have passed the and integrations Veracitech has developed
breathalyser test within the last hour, etc.). on the Babylon. All told, Veracitech offers the
• With the access automation features of design, installation, configuration and custom
XMP-Babylon, one can also control key or development and integration of multiple
locker rights not just by access profile and security and operational systems into the
certification prerequisites, but also by live Babylon platform, which will allow clients to
status processing in the system. For example, more efficiently manage their operations,
a user can only withdraw a key if his manager even distributed operations, reliably from a
is badged in and present at the time, or a user central source. Veracitech is a bespoke system
can only withdraw a key based on previously engineering house and direct authorised
areas accessed (or not accessed) within a OEM partner for Autec XMP-Babylon systems.
pre-set period. The company currently has a client list that
• Key and locker alarms and events will also be includes companies like Anglo Platinum, De
reported and managed in the XMP-Babylon Beers, Petra Diamonds, Namdeb, Debmarine,
Alarm and Even Handling, alerting the Gemfields, South32, DTI, Transnet and others, For more information, contact Veracitech,
administrator when keys are not returned on including clients in Namibia, Botswana and +27 11 888 7251, [email protected],
time etc. Mozambique. www.veracitech.co.za.

Questions on workforce management


Paul Chari talks about workforce management in modern organisations.
Access control technologies are a staple of the workforce management Hi-Tech Security Solutions: How can modern workforce
industry, often using integrated solutions to combine the functions management tools assist in performance evaluations
of basic access control or time and attendance with more complex and productivity enhancers?
workforce management systems. Chari: Production data control allows planned work to be loaded to
To find out a little more about workforce management today, Hi-Tech various monitoring points. This allows for live tracking of order progress
Security Solutions asked Paul Chari, principal consultant, EDC Solutions at that includes supervisory inspection points. Job progress can be
dormakaba for his take on the market. recorded via barcode scanners, machine output monitoring and entry
of quantities at various steps. You can even record reasons for work
Hi-Tech Security Solutions: How has workforce management stoppages allowing you to react appropriately as the data is fed back
changed over the past few years? What additional fields direct from the floor. You do not have wait until the end of day / week /
are now included in workforce management solutions that month to react appropriately.
were seen as separate in the past?
Chari: Workforce management has transformed from being looked at as Hi-Tech Security Solutions: Do workforce management
a cost centre to a resource that should be harnessed. This has attracted tools, in general, integrate easily with security systems
acceptance of modern technologies already used to spearhead other as an integrated management system, or would
areas in companies. Workforce management, for example, now includes users be required to do the integration work
access control and production data control. themselves?
Interaction has expanded as driven by technology allowing operation Chari: Workforce management includes security and therefore
over Ethernet, GSM, Bluetooth and NFC. This means the traditional terminal security systems. Access control in particular is part of workforce
mounted in a building with Ethernet, GSM allowing mobile validation management as it is the same data with information of where, when
in vehicles and mobile offices, as well as Bluetooth and NFC which allow and how a user will have access. Surveillance that involves video or
mobile phones to be validation media. Apart from communications other sensors would require integration work. Users are not expected to
methods there are biometric innovations allowing people to use unique integrate; they normally request the integration depending on t
body characteristics in many different ways. Innovation around biometrics heir requirements, which are borne out of necessity (regulations,
ensures continued change and applications in the way users can interact. security compromises, practicality) or desire for newer or different
technology.
Hi-Tech Security Solutions: Has the mobile revolution
had an impact on workforce management systems? Hi-Tech Security Solutions: What does your company
Chari: Mobile has opened up areas that were previously impossible offer in terms of workforce management solutions and
to monitor. This impossible scenario has transformed with mobile services?
containing GSM for data, GPS for positioning, ubiquity and versatile Chari: dormakaba offers solutions for time data collection, access
applications (including biometry of various kinds). Personnel can be management and shop floor data collection. The verticals in focus
monitored for accountability, safety and customer feedback or on are ERP users that already see the value in integrated solutions. Our
route to a customer site. This allows flexibility between employee and solutions are integrated with various ERP vendors to allow extensions of
personal where service and sales team can go straight from home to the functionality. This means ERP users do not have to know an access
customer and provide reliable assurance via their mobile. point details as they can work within a familiar single place.

www.securitysa.com Access & Identity Management Handbook 2019 97


WORKFORCE MANAGEMENT

43 years of workforce optimisation


SACO has evolved into much more than just a workforce management platform.
Access to accurate information allows SACO offers an array of products and
for effective decision-making. Workforce innovative platforms, such as SACO Workforce
management solutions empower Management, SACO Anywhere, SACO Guest
organisations to track the relation between and SACO Workflow, to name but a few. These
productivity outputs and the cost of platforms assist businesses with distinctive
employment, as well as warrant the health features and benefits such as accurate human
and safety of its workforce, visitors, business capital identification management, optimised
partners and stakeholders. The key prerequisite resource management, productivity and
however, is ensuring that proven technology revenue protection, progressive business
is implemented, in partnership with a trusted intelligence, asset protection, enterprise
workforce management solutions partner. resource planning (ERP) and payroll integration
as well as risk management.
Proven track record
Over the past four decades, SACO has earned Real business value
Freddy Niehaus.
a reputation for delivering tangible value in “SACO achieves actual results through a
­business as a trusted provider of workforce to be modular and fully scalable to ensure that ­balanced focus on people and business, a
management solutions and has distinguished the SACO solution meets the needs of small to commitment to consistently improve our
itself to be synonymous with innovation and enterprise corporations. SACO takes pride in solutions and a drive to simplify that which
reliability within the time and attendance offering stakeholders vastly more than what seems complex. This ideology is reinforced
sphere. one would expect from a traditional workforce in our mantra of balance, consistency and
Throughout its 43 years, SACO has management solutions provider. simplicity,” remarks Niehaus.
enforced an evergreen approach towards Over the course of 43 years, the SACO
all its solutions, including access control Innovation brand has solidified its position as a leader in
management, time and attendance As a result of the Bidvest passion for the workforce optimisation space. “This success
management, health and safety management, innovation, SACO has evolved into much can be credited to our innovative approach,
business intelligence, multiple hardware more than just a workforce management but it is also due to the simple fact that SACO
integrations and IT infrastructure integration. platform. “Our brand delivers products that are values the importance of people as a precious
designed to optimise workforce efficiencies resource in business,” says Costa Diavastos, CEO
Proudly Bidvest and processes through a variety of unified of Bidvest Protea Coin. “At the heart of all our
SACO is proudly South African and forms part solutions from the SACO stable,” explains objectives, lies the aspiration to enhance and
of Bidvest Protea Coin as a division within Freddy Niehaus, ­general manager of SACO. harness the symbiotic relationship between
the organisation. Products and solutions are “Our products provide progressive business the employer and employee.”
locally designed and developed, offering a intelligence that simplifies decision-making,
unique advantage with workforce optimisation reduce turnaround times on operational For more information, contact
solutions specifically tailored to the African activities and improve results where it Freddy Niehaus, SACO, +27 12 665 8000,
market. Hardware and software are developed matters most – your organisation’s profit line.” [email protected], www.saco.co.za.

98 Access & Identity Management Handbook 2019 www.securitysa.com


VISITOR MANAGEMENT

Video-based parking management


By Eric Olson, vice president of product management and marketing, PureTech Systems.

Using surveillance video for vehicle counting improves parking management


at an attractive cost.
Many industries utilise surface parking and parking garages as an integral
part of their business models. Managing the safe and efficient parking of
vehicles impacts many aspects of business operations, including safety,
revenue and the overall customer experience. Businesses with a parking
management component need a solution that accurately counts vehicles
in a cost effective manner. Specifically, they desire:
• Accuracy to enable increased revenue, high levels of customer
satisfaction, ensure safety of customers and their vehicles and secure
customer trust in the system.
• Robust capability to operate 24 hours a day/7 days a week in all types
of weather and lighting conditions.
• Intelligence to understand various types of vehicles, which may
occupy a parking space, and not be confused by non-parking objects,
Management of surface lots and parking garages is an integral part of
such as people or bicycles.
many industry business models. Accurately counting vehicles is a key
• Open architecture to integrate with new or existing systems. part of managing these assets.
• Affordable with use of off-the-shelf sensors and reuse of existing
infrastructure.
• Flexible installation options to address locations that may have power
or communication challenges, or support temporary parking venues
through the use or temporary deployments.
Many systems exist to aggregate and report on counting data,
but the sensors traditionally used to collect that data prove to be
either too expensive, too unreliable or difficult to install. Since 2005,
PureTech Systems has applied its video analytics expertise to perimeter
protection situations. When presented with the problem universities
and other large venues were experiencing with parking management,
it was quickly determined that video would be a very effective and cost
efficient sensor for counting vehicles in these situations.

Counting systems must have the intelligence to count only those


Accurate counting with video vehicles that could potentially occupy a parking spot.
A key component of parking management systems is accuracy. According
to an IBM survey, drivers globally spend an average of nearly 20 minutes Robust performance
per trip in pursuit of a parking space. After 20 minutes of searching for a Many lots operate 24 hours a day / 7 days a week, in all types of weather
parking space, a customer does not want information that there is a spot and lighting conditions. From a counting perspective, this can be
available, only to search the entire lot and find that this is not the case. The especially problematic for outdoor lots subjected to all types of weather.
result is a miserable customer experience and a low satisfaction rating. Similarly, budget and city codes affect lighting coverage of parking
In addition to keeping constituents happy with the parking areas.
experience, businesses with parking management responsibilities also Video based counting can accommodate these challenges using
need to ensure people’s safety and protection of their assets. The longer such features as background modelling, to ignore environmental factors
it takes a driver to find a parking spot, the more likely they are to park such as rain, falling snow, reflections from headlights and even moving
inappropriately or illegally. This is made worse by the fact that parking vegetation. These algorithms operate in conditions where the vehicle
issues tend to be governed by the First Law of Compounding Stupidity, can be ‘seen’, which means in most cases, non-specialised cameras and
which states that if a single person or group does something stupid (as existing lighting will suffice.
shown in Figure 1) the likelihood of other persons or groups performing For no light facilities, thermal and low light cameras have become
similar stupid acts will increase exponentially. very affordable options. Video-based counting systems can utilise these
Applying counting algorithms to video has proved to be extremely sensors in areas with low light, or no light, and provide very accurate
accurate, especially in short-range applications, including parking lots counting data.
and garages. The higher levels of accuracy over traditional counting
sensors greatly improves customer satisfaction, with some installations Counting intelligently
experiencing daily complaints drop to zero. It allows lot managers to Another challenge with typical sensors is the ability to intelligently
operate at a fuller capacity, which can increase parking revenue and count. They are often confused when encountering different types
help accommodate the maximum number of potential parkers. Continued on apge 102

100 Access & Identity Management Handbook 2019 www.securitysa.com


www.doculam.co.za doculam
IDENTIFICATION, SECURITY, SAFETY SOLUTIONS & EVENTS

Interested
in becoming a reseller?

We are currently seeking suitable resellers and distributors in Africa for our
top of the range safety and security solutions.
Contact us today to find out more about this opportunity!

X
Durban (Head Office): 140 Umbilo Road, Durban, 4001. P.O. Box 18333, Dalbridge, 4014
Tel: +27 31 201 2092, Fax: +27 31 201 9621, Email: [email protected]

Johannesburg: Unit 2 Verona Office Park, Cnr. MacArthur Ave. & Malibongwe Dr., Robindale Ext 9, Randburg, 2194.
P.O. Box 1013, Pinegowrie, 2123
Tel: +27 11 888 5110, Fax: +27 11 888 9030, Email: [email protected]

Cape Town: 10 Killarney Park, Killarney Gardens, 7441. P.O. Box 1072, Milnerton, 7435.
Tel: +27 21 557 0666, Fax: +27 21 557 0744, Email: [email protected]

Port Elizabeth: 132 Cape Road, Mill Park, 6001. P.O.Box 173, Port Elizabeth, 6000.
Tel: +27 41 373 0390, Fax: +27 41 373 0397, Email: [email protected]

Exports: Tel: +27 21 557 0666, Fax: +27 21 557 0744, Email: [email protected]
www.securitysa.com Access & Identity Management Handbook 2019 101
VISITOR MANAGEMENT

Video-based counting is a very synergistic More than just counting


approach to this variability, typically acting as It is important to mention that the application
a stand-alone sensor providing simple count of intelligence to video is a fast-growing
data to an enterprise system, which then technology. In addition to counting, a camera
aggregates and communicates the resulting enabled with video analytics can likely provide
state to operators and potential parkers. other pieces of valuable data, based on the
Transfer of the data between the counting selected software solution. Some related
sensor and the enterprise system is typically capabilities include the ability to detect
XML, but can be as simple as a discrete signal vehicle speed, regardless of the vehicle’s
output. The information content of the count direction of travel or distance from the camera.
can also vary based on the sophistication of Furthermore, video can detect stopped
the management system, from a simple count vehicles, vehicles in a no parking area, vehicles
to a count with many attributes, such as, that have been in a loading zone for too long,
object type, object speed, object location, etc. or indicate that a person has been loitering in
Additionally, the same camera used to provide the area for an extended period. A video-based
counting information, may also double as a solution can also help provide trends in vehicle
video feed to the security group. versus bicycle or pedestrian traffic.

Affordable Conclusion
Affordability is a key requirement for parking Utilising intelligent video to gain insights into
management systems. Often there are multiple business operations is becoming more and
lots or the lots are very large in physical more prevalent across all markets. Video is
area. When installing a new, or upgrading an readily available, cost effective and results in
existing, parking management system, this very accurate data. This is equally true when
can result in considerable costs for servers, considering its use as a counting sensor for
sensors, physical and network infrastructure. parking management operations. Video-based
As mentioned earlier, video-based counting counting is
can be very affordable using commercial • Extremely accurate.
cameras and the ability to double as a security • Robust in a range of lighting and weather
sensor is an additional cost savings. Cameras conditions.
also have a huge installation advantage in • Provides intelligence to understand vehicle
Counting systems are easily self-contained parking garages, as the cutting of concrete types.
and deployable to temporary or remote
for in-ground sensors can affect pre-stressed • Is affordable and supports a variety of
locations.
concrete and require extensive design work. installation options.
Continued from page 100 • Easily integrates into existing enterprise
of objects, including cars, trucks, people, Flexible installation options systems.
motorcycles or bicycles. For most applications, A video-based counting solution also affords If your business includes parking
lot owners are only interested in those vehicles a great amount of installation flexibility. management, a video-based counting solution
which will potentially take a parking spot (cars This is especially true in situations where may be a cost-effective option to consider.
and trucks) and ignore those objects which the installation of the infrastructure (power,
may pass through the lot, but will not impact communications, etc.) is extensive due to
Additional information/links
the number of available parking spots (people, the size of the parking area, or its remote • Counting solutions: http://www.puretechsystems.
bicycles, etc.). location. Still other businesses have the need com/solutions-car-counting.html
Through a feature called classification, to set up overflow lots, or temporary parking • Car counting video analytics: http://www.
video counting places objects into segments, for one-time events or special high demand puretechsystems.com/docs/Video Analytics - Car
Counting.pdf
such as car, person, animal, bicycle, etc. This timeframes. In these cases, installing a camera
• Counting examples: http://www.puretechsystems.
allows the software to count only those items counting system along with communication com/videos/car-counting.html
capable of inhabiting a parking space and capability facilitates a quick and effective • Car counting with service duration: http://www.
ignoring those that will not affect the total means to provide accurate counting for these puretechsystems.com/docs/Car-Counting-Service-
spaces available. types of temporary lots. Duration.pdf
PureTech Systems is a manufacturer of wide-area
Additionally, moving a counting zone is as
perimeter surveillance software solutions including
Synergy with existing systems easy as making a few changes in the software internally developed outdoor video analytics, PTZ
Parking management spans many industries, to accommodate a new zone in an existing auto follow, multi-sensor integration and a map-
including universities, entertainment camera view, or repointing the camera and based (real object size) command and control. With
venues, airports, seaports, hospitals, defining a new counting zone. Changing headquarters in Phoenix Arizona, PureTech Systems
serves national and international markets.
convention centres and even public offices counting zones utilising in-ground sensors,
Eric Olson is vice president of product
and municipalities. It stands to reason that or beam-break devices, typically requires management and marketing at PureTech Systems
each industry has their preferred method to uninstalling and then reinstalling sensors at (www.puretechsystems.com). He can be contacted at
report, display and disperse this information. the new zone entrance and exit. [email protected].

102 Access & Identity Management Handbook 2019 www.securitysa.com


www.securitysa.com Access & Identity Management Handbook 2019 103
VISITOR MANAGEMENT

Deploying an integrated access


control solution
By Allyson Koekhoven.

Integration is core to effective visitor management from the point of entry


to the point of exit.
At busy premises such as university campuses, information to get data, such as ‘a white car in IQSuite.cloud, the company’s access control
residential estates, corporate offices or business the morning containing three people’. system. This allows visitors to be enrolled once,
parks, the volume of pedestrian traffic can be At the reception: This should allow quick, and then ‘activated’ on the system for a period
immense. The challenge of controlling access seamless identification, whereby a South African of time, on a specific sub set of biometric
into these premises and then controlling where ID number can be verified against one of the readers, to acquire full control of who goes
staff and visitors go within the premises is one many databases available, and for foreigners, a where in the facilities.
that requires careful consideration and planning slightly more in-depth review and scan/copy of “Most of the data centres in South Africa
and the deployment of solutions that are suited their identity document. Again, all this should use this particular system to control access, as
to the specific requirements of the environment. be stored for later retrieval, in a manner which is it allows clear control and reporting, whilst also
Gary Chalmers from iPulse Systems says compliant with the PoPI Act. providing an additional benefit of incorporating
that he continues to be amazed at the amount In remote areas: This should be handled health and safety videos to validate that people
of money South Africans spend on security through a centralised enrolment system, have seen the information they need to see.
and knowing who their staff are, only to allow whereby visitors who wish to go to Features like badge printing, integration with
“arbitrary people onto their premises after they unsupervised or remote areas are first enrolled web-based portals and calendars add additional
have scribbled some random information onto or added to a system, preferably biometrically, flexibility and control,” says Chalmers.
a piece of paper (the visitor log book). Visitors then granted access at a specific date/time by In terms of extending these systems to
have been the most neglected aspect of office the system to an area through a biometric- include access to logical assets like the network
security for a long time, and given the access controlled access system. and business software assets, Austen believes
to information in South Africa, this is really not Mike Austen from Powell Tronics says that that this would be dependent on how the
necessary.” once the person enters the physical building, ‘assets’ are to be monitored and if an integration
According to Chalmers, the key aspects to biometrics work best in this environment and is possible. “In other words, will the supplier
any good visitor system can be encapsulated a number of systems can be integrated into provide a set of functions and procedures that
into three areas: and managed from one single platform. “How allow the creation of applications which access
At perimeter entrances: This is really about secure the institution would like the areas to be the features or data of an operating system,
vehicles, and tracking the information about would dictate the use of readers in and out of a application, or other service (APIs)?”
the car and the driver. Using one of the many door or the use of a push button to exit a door. Chalmers says that with a full integration
scanners available, it is easy to scan a licence These access control systems can then all be into Microsoft’s Active Directory, staff can be
disc, scan a driver’s licence, and add some integrated with the CCTV system, alarm system granted biometric access to their machines,
additional information, such as how many and fire alarm for instance.” based on their access rights to the building.
people are in the vehicle, or where they are Chalmers says that iPulse’s VisitorIQ.cloud is Integration can go as far as forcing computers
going. Any good visitor system should cater a cloud-based biometric access control system, to log off when a person leaves the building, or
for this, and allow the secure searching of that which is completely integrated into reporting when a PC is being accessed when

104 Access & Identity Management Handbook 2019 www.securitysa.com


VISITOR MANAGEMENT

the PC’s operator is recorded as being off site.


Access control solution providers should be Seamless integration
able to reassure clients that certain standards The iPulse API allows quick and rapid software development team that allows the
are adhered to in order to ensure their access development of integration frameworks company to assist clients with niche features
and identity systems can be integrated with between the IQSuite.cloud databases and that are not generally part of a standard
either new or even legacy systems. Chalmers any other system. Basic level integrations security system. As part of its offering to
says that in order to achieve this, one should can be achieved within hours, while the industry, the company has developed
always capture prints in multiple formats to complex integrations are done within various modules that seamlessly integrate
ensure that clients can migrate their database days, given the simplicity and power of the into its physical access control solutions.
in the future. integration framework. iPulse offers IQSuite. Examples of these solutions include visitor
He points out that while iPulse uses its own cloud as a core access control system, and visitor parking management, time &
Secugen algorithm for biometric extraction with the additional features provided by attendance, network user security, handheld
and matching, the system also records the ANSI VisitorIQ.cloud allowing for a far more clocking devices, student exam verification
standard to ensure that the enrolled database granular and controlled mechanism for and mobile mustering devices. In keeping
can be used by any other system in the future. dealing with visitors in almost any situation. with its holistic solutions approach, Powell
“Furthermore, the platform uses a tightly Powell Tronics supplies and distributes Tronics has added the AJAX wireless
controlled API for easy integration into any access control and security solutions intrusion system and HikVision IP intercoms
other system, such as CCTV, existing ticketing with the added benefit of having its own to its distribution offerings.
systems or almost any piece of hardware, such
as breathalysers and tablets, to allow for a in the long term to go with a well-known For more information contact
seamless view of data from any angle.” nationally supported brand that integrates • Powell Tronics, 0861 784 357,
Austen adds that once you have established and is compatible with most platforms. [email protected],
which brands are commonly used on most Some companies have their own in-house www.p-tron.com
platforms, you can then decide on the development teams that make this type of • iPulse, 0860 IPULSE, [email protected],
backend system. “It is far more cost effective integration much easier for their clients.” www.ipulse.co.za

Identifying good visitor management practices


The SA driver’s licence is a good source of accurate information about visitors.
There are a number of factors that security available for reporting purposes,” he adds.
managers need to consider when implementing The use of an electronic identity-scanning
visitor management and access control device does not obviate the need for rules
protocols. According to Excellent ID’s Riaan of access. Security officers need to be well
van den Berg, securing a device that eliminates trained and versed in the systematic capture of
the issues around traditional visitor logbooks visitor data and should be able to react quickly
entails careful due diligence and a request and efficiently when a person flagged on the
from suppliers that they provide a portfolio of blacklist tries to gain access. However, a lot of
success stories. the decision making is taken out of the security
“Apart from the problem of highly inaccurate officer’s hands since the verification of personal
and often illegible information provided in identity data is automated when using an SADL
paper-based visitor log books, visitors are reader,” says van den Berg.
often disinclined to write down their personal It is important when selecting an
information in a medium which can be read by identification verification device to ensure that and its accompanying software, means that the
many people. By using an electronic device to it complies with the PoPI Act. Van den Berg solution is extremely cost effective. For example,
capture and verify personal data, such as that explains that EXID’s own back end software as the overall cost of the solution for a single site
found in a South African Driver’s Licence (SADL), well as the physical eSkan device work together with one entry/exit, one security officer, one
visitors can be assured that the data is safe from with the responsible operations manager on scanner together with installation, training and
prying eyes,” says van den Berg. site to guarantee that all data is collected in Wi-Fi infrastructure (excluding a PC/server)
Additionally, with the exception of data that accordance with the PoPI Act. could start at under R50 000. The benefits
is contained in a blacklist database, captured The back end system for such a data derived from capturing accurate, verifiable
data is generally kept for only a very short collection device requires very little investment visitor data are apparent but security managers
period of time. “Using an electronic device in terms of infrastructure. Typically the system do need to do their homework in terms of
with its associated software means that one would require a PC and a network and/or aligning themselves with a reputable provider,”
can also add specific people to the blacklist, access to the cloud as the throughput speeds says Van den Berg.
thereby helping to build up a reliable database required are minimal compared to the capture
of known offenders. And because one can log of surveillance footage, for example. For more information contact EXID, +27 12
into the system at any stage, real-time data is “This, together with actual cost of the device 548 0940, [email protected], www.exid.co.za.

www.securitysa.com Access & Identity Management Handbook 2019 105


VISITOR MANAGEMENT

Reliability a fundamental in
visitor management
Make sure your hardware and software meet the requirements of your environment.
With the rapid evolution of biometric
technology, there are many options available
in the marketplace that promise varying levels
of performance. This can create a quagmire of
choices for security decision makers. The most
important elements for consideration in our
demanding South African environment and to
satisfy the need for maximised security, would
be reliability with limited downtime.
With the need for reliability it is wise to
link the security system to the source data, in
this case the institution’s enterprise software
or an estates management software. “The With a fully integrated solution you would data privacy action steps are being taken. This
most successful implementations, where data be able to take advantage of the ability to will include password-protected databases
reliability is optimised, can be found in projects schedule an automated report that will provide which are hosted and under the security
where there is a deep integration between the vital data such as contractors remaining on umbrella of the site’s network where an SLA
source/host data and the access control solution. site after a particular time or those visitors should be in place to cover the responsible
This also contributes in many cases to the who are on site in the event of an emergency. disposal of data collected.
elimination of manual entries by operators and Often sites have internal access points that The PoPI Act does not place emphasis on
security,” says John Powell, CEO of Powell Tronics. allow limited authorised access, which requires the duration of time personal information
On the physical access side and due to the specific management and reporting. can be kept, rather that personal information
often-harsh outdoor installation requirements, Through deep integration, if the source should not be kept longer than is reasonably
the technology performing the identification data is coming from the site’s membership, necessary. The principle that should be applied
function must be robust and be rated for enterprise or estate software, elimination is that when the validity of the purpose for
outdoor use. Choosing a product that is well of data entry by security can be drastically which personal data is being stored is no
tested in your particular vertical market with a reduced and ensures accuracy and improved longer applicable it should no longer be
solid track record in South Africa is vital. performance with added reliability. By kept. It is permissible to keep it longer for
Some of the new technology that is available instituting features like pre-authorisation reasonable business purposes but this must be
focuses on contactless biometric terminals through host validation one can eliminate the defined in an approved retention policy.
that use either face (still susceptible to ideal security officer from the equation in terms of Powell believes that one should first establish
environments) or wave technology (extremely decision making, thereby allowing security to the site requirements before installing a backend
forgiving and fast). focus on the security aspect of the entry and system. This leads to critical emphasis on the
The most challenging user group for these exit points. infrastructure required and focuses on aspects
sites is effectively managing visitors as this is such as visitor management, access control,
often the most vulnerable point, with many Compliance is key CCTV and even the logistical considerations for
unique site complexities to manage. Again, The PoPI Act is based around the principles contractors who require access to the site, since
a visitor solution that is fully integrated with of consent and purpose. This is not a South there may be a need for separate entrances.
the source data, access control and visitor African phenomenon as can be seen globally “Due care must be given to areas such as
management removes various pitfalls that through EU legislation around GDPR. Security ease of access or convenience, and what level of
occur when these various systems are not companies and other organisations may only security the site needs in order to keep occupants
operated in a unified manner. collect personal information from a visitor (data safe and enhance the flow of traffic in and out of
Optimal reporting is all about the quality, subject) with their consent and for the specific the estate or premises. Foresight must be given
integrity and availability of the data that is purpose of visiting the premises. Further to this, to the growing demands and future-proofing
being reported on. Where there are large the manner in which information is stored and that may be required in order for the site to
numbers of users with complex access collected needs to be conducted in line with function optimally. Scalability and budgeting
requirements it is essential that the reporting is the PoPI Act. It is important that appropriate components will also need to come under the
done based on individual requirements. and reasonable organisational and technical spotlight in comparison to the value proposition
If the access control system and, for measures should be implemented. sought by respective stakeholders,” says Powell.
instance the visitor management system, Cybersecurity protection practices such as
are not fully linked there will be no way of the use of encryption on computers or tablets For more information contact Powell Tronics,
reporting on a visitor’s entry or exit through and smartphones demonstrates responsibility 0861 784 357, [email protected],
the access control system. taken by the estate, thus ensuring appropriate www.p-tron.com.

106 Access & Identity Management Handbook 2019 www.securitysa.com


www.securitysa.com Access & Identity Management Handbook 2019 107
DIGITAL IDENTITY

Digital channels and the evolution of ID


By The Secure Identity Alliance.

While the concept of identity (ID) remains unchanged, the rapid evolution of digital
technology has dramatically extended both its application and form factor.
In today’s increasingly connected world, Creation and verification of identity billion in annual savings by 2020. Alongside
proof of identity has gone mobile, with digital in the digital world boosting and rationalising access to ‘trust
driving licences and mobile identity cards the The concept of identity remains unchanged – based’ services, going digital enables a host
latest in a growing list of ID innovations to the set of unique characteristics or attributes of trusted interactions between society and
make it onto the smartphone. that define who we are, and crucially, that individuals. Indeed, a trusted (and secure)
For lawmakers, service providers and distinguish one individual from another. These digital identity is becoming ever more critical
citizens, this kind of application offers attributes often include name, date of birth, for healthcare, education, social welfare and
tremendous opportunity. In the near term, physical appearance and a variety of social civil security.
these digital documents will provide full factors including home address, occupation Today, Smart ID documents are already
identity or restricted access to relevant and so on. providing a high level of authentication for
attributes like age, town of residence and In a digital context, attributes may be accessing various European governmental
so on, for car hire, bank account opening extended to biometric data. Typically, these portals. As we move forward these state-
or access to age-restricted venues, such are confirmed by and/or derived from generated credentials offer unmatched
as clubs and bars. They can even support government-issued identities based on face- convenience when it comes to creating or
a variety of notification services including to-face enrolment, breeder documents and deriving mobile Identity online as they can
expiry and renewal, fines reporting and points civil registries. be remotely authenticated by the user’s
management, while enabling greater levels of Verifying identity in the physical world biometrics. Once created, the mobile identity
monitoring. has been a relatively straightforward task. then allows online connection, with identity
Further out, the ability to link identity, Individuals present themselves along with checking, to new and developing public and
through the licence, to connected cars offers their state-generated credentials – such as a private eServices.
exciting opportunities for keyless entry and a passport, ID card or driving licence – to the So, as more citizens live and conduct their
host of remote services. organisation requiring proof of identity. With lives online, the pressure is on states – which
Of course, as technologies and applications identity or the ‘age’ attribute successfully typically issue or regulate ‘sovereign’ identities
evolve, so must the controls. And here, checked, access to the service is granted or the – to extend identity to the digital channel.
government-derived identity will be the transaction completed. While things become Giving citizens a digital identity that can be
starting point for ensuring that every digitised more technically complex in the digital world, used for purposes other than law enforcement.
identity matches the correct individual. the advantages of digitising identity are Many already do so, with live programmes
In this paper we explore the evolution certainly significant. for example in Belgium, Bulgaria, Estonia and
of identity from physical to digital (or According to a Boston Consulting Group Latvia.
dematerialised), and take a closer look at the and Secure Identity Alliance report published While these digital channels will
opportunities this represents – for issuing at the end of 2013, going digital could offer complement and strengthen physical identity
authorities, service providers and users. governments around the globe up to $50 services, they rely heavily on the development

108 Access & Identity Management Handbook 2019 www.securitysa.com


DIGITAL IDENTITY

and promotion of sophisticated frameworks. As with national identity schemes, this all In this new world of mobility, mobile
Digitisation is a journey, there are many depends on having the ability to authenticate devices are becoming instruments for digital
starting points and the role of physical the individual – ensuring they are who they identity. And the mobile phone is increasingly
documentation remains crucial. say they are – in the public domain. This will acting as a bridge between physical and digital
enable them to use their trusted identity to identity. A connected, personal and multi-
The role and importance of state- verify their access information and services. For functional device that’s always on our person,
issued identity example: it’s the ideal tool to contain our identity.
The issue of trust is fundamental in the digital • Can a local council check you are a local Secure, convenient and manageable,
ecosystem. Today, we have multiple digital resident before it allows you access to a the mobile device is where our physical and
identities: email addresses, aliases on the service? digital identities converge. Say hello to mobile
Internet, social network profiles, IP addresses, • Can a motorcycle rental business verify you identity, where the mobile device becomes a
bank account details, SIM cards on mobile are permitted to ride an 80cc vehicle? powerful and convenient point tool for users
phones. Whether all can be trusted is open to • Can your bank check your residential status? to manage their proof of identity.
question.
Clearly, providing a disposable email The evolution of national identity Making identity mobile
address or login in the digital space is an into the digital channel As citizens opt for convenience, ID documents,
inefficient way of establishing identity as it While we reside in the physical world, we live like national IDs and driver licences, will
does not provide any trust in knowing the increasingly digital lives. Indeed, the digital ultimately follow the trend towards mobility.
individual behind the digital identity. What’s revolution has changed the lives of billions Since citizens rely on IDs for everyday
needed is for states to make it possible for of people. More households in developing scenarios, most are ready and willing to use
citizens to be recognised in an unequivocal countries now own a mobile phone than have their smartphones to simplify this aspect of
manner. access to electricity or improved sanitation life as well.
Just as they do today, when issuing or facilities. Indeed, mobile IDs give governments
regulating physical sovereign identities, states According to the GSMA , there are 4,7 an unprecedented opportunity to provide
need to consider providing or approving digital billion unique mobile phone subscribers citizens with new levels of convenience.
identity ‘companion’ solutions. Here, states have globally (63% penetration rate), by 2020 there Imagine being able to receive a digital
a tremendous advantage over private identity will be 5,6 billion (72% penetration). What’s companion for your drivers licence or
providers. Their enrolment process typically more, smartphone adoption is accelerating. your ID card – in addition to your physical
requires the physical presence of the individuals The GSMA says mobile broadband connections documentation – direct to your phone.
– which allows the capture of biometrics and are set to increase from 47% of all phones in Alongside making the secure retrieval of
the creation of a set of documents for identity 2015 to 71% by 2020. In the developing world, insurance, address or other identity credentials
proofing. Added to this, most states create mobile broadband already accounts for more fast and easy in the event of an accident, it
identities with high levels of assurance. It is than 80% of connections – by 2020, this will is now simplicity itself when you encounter
therefore logical that states take advantage of reach 92%. situations in which you need to prove identity
this unique position to create strong mobile Little surprise then that policy-makers to transact.
identity than everyone can trust. around the world are working hard to From driver’s licences to national ID cards,
It all starts with the digital transformation implement new mobile digital policies that vehicle registrations, residence permits, fishing
of administration services, and the protect citizens without impeding social permits and more, mobile IDs mark a new era
implementation of structures that harmonise and economic progress, ensuring there are in which citizens can confidently use their
the sovereign identity of individuals between sufficient trusted frameworks in place to help smartphone to demonstrate they hold secure
physical and digital spaces. These companion drive exciting new economic and infrastructure and trusted IDs.
digital IDs could either be linked to or ecosystems. And enable enhanced social So, while today’s citizen may use a national
de-coupled from the sovereign ID. inclusion for citizens. Continued on page 110

www.securitysa.com Access & Identity Management Handbook 2019 109


DIGITAL IDENTITY

Continued from page 109 document loss and, as we’ve seen, instant licence app – which is free to citizens – also
ID or driver’s licence at the airport for identification they can present on their creates the foundation for future applications.
domestic travel, with a digital ID securely phone the moment they need it (proof of Citizens can use their privacy-friendly mobile
stored on their smartphone, citizens can age for alcohol purchase or car rental, for wallet service to carry multiple licences:
leave documentation at home. What’s more, example). hunting/fishing, library membership/
citizens can renew their mobile ID remotely. Available in digital format, citizens now emergency contact information and more.
There is no need to stand in-line for new have a highly portable and convenient As smartphones become ubiquitous, new
cards or other renewals. way to manage their day-to-day essential innovations in facilitating the ability to issue
That’s good news for citizens and for documentation. and verify secure identification quickly, safely
government agencies, which can do their And, in the case of a driving licence, and remotely will enable governments to
job more efficiently. these digital IDs also enable ease of further extend their relationship with citizens,
verification for law enforcement agencies enabling users to utilise their smartphone
Mobile digital IDs – the digital who can instantly confirm a driver’s as a platform for holding their credentials
driving licence status and driving privileges on the spot. and other essential documentation for
Governments around the world are Similarly, commercial service providers like authentication.
introducing apps that allow citizens to car hire companies, pubs and clubs, and a In a world where airlines are already using
download and store digital copies of host of other businesses will benefit. mobile phone boarding passes and in which
their vehicle registration, driving licence, citizens can use their smartphones to present
insurance papers and pollution certificates Conclusion tickets for events or gain access to university
to their mobile phones. Today, over 30 Digitising ID is a highly effective way to campuses and hotel rooms, leveraging the
countries have digital driving licence enhance a citizen’s day-to-day experience, convenience and power of mobile devices to
programmes – over 276 million licences giving service providers and others a fast, deliver secure authenticated digital identities
were issued in 2015. secure and convenient way to verify status, and other government credentials to citizens
Eradicating the need to carry original age and identity. represents a major step forward.
documents, these digital companions Alongside offering a convenient and Find our more at www.
are downloadable via an app that can be fast way to confirm identity, document secureidentityalliance.org.
instantly verified by the police and other provisioning and updating becomes easier.
authorised authorities. Citizens can be sent e-reminders to their This article was first published by
Operational in both online and offline digital companion when driver licences the Secure Identity Alliance: h­ ttps://
environments, these mobile IDs provide need to be renewed, for example. secureidentityalliance.org/blog/entry/
citizens with back-up in the event of physical Implementing a mobile digital driver digital-channels-and-the-evolution-of-id.

110 Access & Identity Management Handbook 2019 www.securitysa.com


DIGITAL IDENTITY

Using tomorrow’s tools to solve


­today’s security problems
The criminals have a security roadmap in place, do you?
Organisations that do not have a clear longer- revoke access on mass, you can do it.” purposes. They are following a roadmap and if
term security roadmap in place are putting The next step is to roll out two-factor you are not doing the same, they are leaving
themselves at risk of being compromised. The authentication much more aggressively. you behind.
companies are already investing in tomorrow’s “For users that may mean a token, mobile “You must remember that these are career
tools to solve today’s problems that will survive authentication or something similar and for criminals, this is what they do for a living,
the ongoing onslaught to circumvent security system accounts it will probably mean digital and so, if you make it impossible for them
solutions. This is the view of Jon Tullett, certificates. Whatever it may be, start to to phish, they are going to find something
research manager – IT Services for sub-Saharan improve your authentication. Once you have else to compromise. What they are doing will
Africa at International Data Corporation (IDC). that in place, you really want to be on top of evolve in response to you. If we can eradicate
“The first step in creating this roadmap is activity management. So, looking at what phishing, that’s great, but that threat is going
to start getting their security under control,” accounts are doing what. to move to something else and you must be
he says. “This includes using analytics for You can’t really do this until you have your willing to keep following that path.”
behaviour anomaly detection at both a accounts consolidated and organised, but you
network and user level, gathering the data to want to know everything that an account does
do baseline profiling. While that is the type in a very standard format. That allows you to
of thing we are already doing today, many feed the information into an engine and get
organisations are still not doing it with a long- an activity report back when something goes
term view in mind.” wrong, so that you can identify any anomalies
To get their security under control, and address them quickly.
organisations must consider technologies that
play to the cloud and be prepared to evolve Cloud evolution
with the technology. User awareness and He believes that within the next two years,
training also remain key fundamentals that are most of this type of anomaly detection will
receiving enough attention. “At the moment, be happening largely out of the cloud. “This
training budgets are horrifically small and is going to happen alongside your evolution
that must be addressed. Start by spending to cloud. The AI platforms in the cloud are
the money, but more importantly, evolve that maturing very fast, so within the next couple
training over time. of years we’re expecting to see an awful lot of
“Today, the breach is a credential theft or cloud services just plugging AI in because they
phishing attack. Companies that tackle that, can. So, there will be a lot of machine learning
and really invest in training, see tremendous happening and, further down the line, we will
reductions. A good example of this is Google, see people looking at how they can use that to
which combined good training with two-factor optimise and automate,” says Tullett.
authentication for all their internal services “In the longer-term, organisations will
and, since they’ve done that they’ve had zero also start looking at automation, where an
phishing cases, but now they’ve moved on,” anomaly will be detected, and automatically
says Tullett. investigated and remediated. While it will
take a couple of years for this to happen,
Granular access rights organisations must include this in their
He says once organisations have this under security roadmaps. Today’s problems are
control and have done the risk assessments that you need to start getting your identities
required, they must start devolving those under control and doing better analytics, but
rights. “Break it up and create far more granular tomorrow that same platform is going to be
access controls. Create accounts which can your machine learning platform and is going
only do very specific tasks, so that if they are to be a complex, better managed identity
compromised, the damage the hacker can platform that will do a lot more things.”
do is limited. That also means that you have He points out that the criminals also have
to start evolving the technologies that you’re a roadmap and it is often more advanced
using to ones that support this. While it can be than those of organisations. “They know what
a pain to do it on some platforms, it is usually technologies are coming, they are getting the
baked into modern cloud platforms. The key required skills in place and are already looking
here is to ensure that should you need to at how to use the technology for various Jon Tullett.

www.securitysa.com Access & Identity Management Handbook 2019 111


CASE STUDY

Fingerprints protect privacy for


AIDS testing
A creative, progressive NGO uses biometric fingerprint scanning to
redefine confidentiality and AIDS treatment in South Africa.
Fingerprints have been the gold standard for status enters the first van, where a technician public health agencies’ ability to control and
identity for more than 125 years. Instant, accurate takes a fingerprint using an application prevent the transmission of AIDS.
identification can, however, work against the developed by IDversol, a South African identity Shout It Now’s education efforts deliver
goals of public health initiatives for diseases such management provider. The fingerprint scanner impressive results that directly counter these
as AIDS or tuberculosis. Individuals concerned itself is Integrated Biometrics’ Watson Mini, a trends, with 97% of participants agreeing to
they may be at risk for these conditions often two-finger device that delivers FBI certified same-day testing compared to 34% willing to
avoid testing due to fear of the social the stigma results in a thin and durable package that undergo HIV testing before the programme.
that comes with a positive diagnosis. As a result, integrates smoothly with the rest of the system The organisation’s mobile testing and treatment
they refuse examination if required to provide and requires little, if any maintenance. vans extend those efforts by making it
identification before testing, putting both The fingerprint becomes the patient’s unique exceptionally convenient for individuals to
themselves and their communities at risk. and private identifier. No information passes receive testing, counselling, and treatment in a
Shout It Now, a non-governmental to government databases or law enforcement safe, confidential environment. The organisation
organisation based in South Africa, dramatically organisations. The technician performs the has been so pleased with the mobile clinics’
improved both testing and treatment rates for bloodwork and initiates the tests. The patient initial success that they hope to extend testing
AIDS by turning this conventional paradigm receives the results via SMS text within 24 hours. from HIV to tuberculosis soon.
upside down. Rather than using fingerprints Those individuals who test positive then have “HIV and AIDS remain the biggest social
to identify individuals, Shout It Now’s mobile the option to visit Shout It Now’s companion van issue facing South Africa. As a stakeholder, we
testing vans use biometric fingerprint scanners to receive confirmation of results, counselling, take our role in ensuring the national 90-90-90
to create a unique and private identifier for each and, when warranted, an initial course of anti- targets are met seriously. We have found that
tested individual. No one must reveal who they retroviral therapy (ART). The fingerprint serves as first and foremost, our clients want convenience
are until they know their HIV status and have the link between test results and recommended – fast, free and friendly service at a time and
made decisions regarding treatment. treatment. These patients may choose to reveal location that suits them,” says Bruce Forgrieve,
In short, Shout It Now turned biometric their identity at that time, or to wait until they chairman, Shout-It-Now.
fingerprint scanning into a tool that protects visit their regular health care provider. “We are very pleased to have worked with
confidentiality. The practical results represent a This community-based approach serves up to Shout It Now to bring this programme to
potential revolution in public health. 250 clients per day per location for 24/7 operation. fruition,” said Cher Appunn, founder and CEO
The process begins with Shout It Now Each mobile clinic sets up in less than 15 minutes. of IDversol. “It’s a fascinating twist on our usual
placing its vans in areas frequented by young The testing process itself takes as little as identity management customer – protecting
adults. An individual concerned about HIV 10 minutes. Each van provides instructional identity rather than verifying it and doing so in a
materials in English, Zulu, and Sepedi. way that advances public health. We also thank
The cost of the programme, as well as the Integrated Biometrics for its participation. We
cost of treatment, receives support from the needed a foundational technology that was fast,
United States President’s Emergency Plan thin, didn’t need cleaning between scans, and
for AIDS Relief (PEPFAR). PEPFAR combines could take a beating out in the field. IB’s Watson
resources from eight US governmental Mini has been an ideal hardware solution for us.”
agencies, six at the cabinet level, to provide “Identity is a basic human right, and
public-private whole-government support to accurate, convenient identification is critical
transform the global response to AIDS. in health care,” added Stephen Thies, Chief
Shout It Now designed its mobile testing Executive Officer of Integrated Biometrics.
system to help South Africa meet the United “The ability to encourage testing by using
Nation’s ‘90-90-90’ goals. The 90-90-90 initiative fingerprints to protect patient confidentiality
encourages nations to diagnose 90% of their is just another fantastic example of how this
HIV-infected populations, treat 90% of those technology protects and saves lives. Shout It
diagnosed with antiretroviral medications, Now’s approach and IDversol’s solution for this
and achieve 90% viral suppression for those public health challenge illustrate how critical
receiving treatment. identity is for building a better, safer world.”
The need is urgent. Currently, only 53% of the
world’s HIV-positive population receive testing. For more information, go to http://shoutitnow.
12.9 million people globally remain untreated, org/ or https://idversol.com/, or contact Robert
and almost one-third of HIV-infected individuals Jones, Integrated Biometrics, +27 60 503 7077,
on treatment are not virally suppressed. Taken [email protected],
collectively, these results significantly impact www.integratedbiometrics.com.
112 Access & Identity Management Handbook 2019 www.securitysa.com
CASE STUDY

High-speed door solutions are cool


High-speed roll-up doors from Maxiflex are helping to maintain constant
temperatures inside the cold storage and refrigeration areas of Makro Riversands
and Makro Springfield.
High-speed roll-up doors from Maxiflex are and a greater return on investment.
helping to maintain constant temperatures Featuring modern drive technology and
inside the cold storage and refrigeration areas MCS frequency converter controls, the doors
of Makro Riversands and Makro Springfield can open and close at speeds of up to 2,4 m/s.
located in Gauteng and KwaZulu-Natal (KZN) These high operating speeds combined with
respectively. higher cycles (>100/hour) and excellent
“Makro Riversands is a new store that sealing capabilities allow for efficient traffic
opened its doors at the end of November flow, minimise temperature variations and
2017 while Makro Springfield was recently maximise energy savings.
renovated,” says Maxiflex MD, Bram Janssen. The doors must be installed in conjunction
Discussing the application, Janssen explains with an insulated ‘night door’ in order to
that products are stored in a cold room before maintain the extreme cold temperatures
being moved to a drop temperature area and during periods where there is minimal or
then finally out into the store. “Two high- no traffic and can be set on a timer to open
speed doors were required for each Makro automatically to minimise ice build-up on the
store.” curtain and side-guides and keep the door
While Gauteng is known for temperature functioning properly. Additionally, heating
extremes from summer heat waves and cables in the side columns and motor also
freezing winters, KZN is notorious for its prevent formation of ice.
hot and humid climate and mild winters. In During the design of the high-speed
these climates, maintaining temperatures in doors, Assa Abloy paid attention to worker
refrigeration and cold storage environments safety and reduced downtime and has
can be challenging. Product spoilage incorporated ‘intelligent’ features into the
caused by large temperature variations doors. Designed with a soft bottom edge
can be extremely costly for end-users. The with no rigid parts, the doors are able to
sustainable control of the interior climate of mould around any obstruction to prevent
cold storage/refrigerated areas is therefore injury or damage. Moreover, when an object
imperative and there simply can be no hits the door, the fabric curtain absorbs the
compromise. impact and releases itself from its side-guides
“So when we received the orders in without causing damage or being damaged
mid-2017 for the high-speed doors from itself. The door can be equipped with different
commercial refrigeration solutions specialist, sized windows or full door width vision
Insulated Structures, we immediately panels to increase admission of natural light • The galvanised steel construction ensures
recommended the high-speed door range and visibility to create a more comfortable rugged reliability (stainless steel option also
from Assa Abloy Entrance Systems for both working environment. available).
stores,” says Janssen. “Specially designed for Another intelligent feature of these • The compact footprint and slim side frames
interior freezer environments and featuring long- life-cycle doors is the break-away allow fitment even in tight spaces.
numerous bespoke characteristics, these and automatic repair system; the curtain • Fast and easy assembly.
intelligent, reliable, convenient, safe and reintroduces itself after a crash to reduce Designed for both small and large
energy-efficient high-speed doors present the downtime and maintenance. In addition, a openings, the high-speed doors are suited to
perfect entrance solution.” zip closure system and a flexible, automatic a wide range of industries offering specific
“Long-standing Maxiflex customer, curtain eliminate the risk of work stoppages solutions for applications such as hygienic
Insulated Structures, placed the orders with and minor collisions. food and pharmaceuticals manufacturing,
us because they are satisfied with the quality Additional features of the high-speed door machine guarding and protection operations.
of our products and service delivery,” adds range include: Maxiflex’s KZN and Johannesburg teams
Janssen. • A unique direct door drive system actively were responsible for installing the two high-
The high-speed doors incorporate the drives the door curtain which saves costs by speed doors at each of the Makro stores.
latest and most advanced control and safety eliminating the need for weighted bottom
systems to deliver reliable interior climate bars or tension systems. For more information contact Maxiflex Door
control, increased energy savings and • The robust steel IP54 control box is easy to Systems SA, +27 11 392 1709,
improved productivity. For end users this program and operate with a clear display [email protected],
translates to lowest total cost of ownership giving a wide range of information. www.maxiflex.co.za.

www.securitysa.com Access & Identity Management Handbook 2019 113


CASE STUDY CASE STUDY

Integrated security
and event
management
High-end central London multi-zone
development chooses Tyco Security
Products’ C•CURE 9000 Security and
Event Management system
High-end central London multi-zone development chooses Tyco Security
Products’ C•CURE 9000 Security and Event Management system to unite its
building management, access control and video surveillance systems for
comprehensive management of the site’s physical security.
Land Securities is the UK’s largest listed commercial real estate company.
Its £14.5 billion portfolio totals 23.6 million square feet and includes some of
London’s most desirable office buildings and the UK’s most successful shopping
and leisure destinations.
Land Securities appointed Skanska to start work on the £260 million
development in Central London comprising of two distinct buildings united by
a new public piazza named New Ludgate. Together, the buildings include more
than 355 000 square feet of office accommodation and 26 800 square feet of
restaurant and retail facilities.
After an extensive competitive tender process, Universal Security Systems
was chosen to design and build a fully integrated security system to protect the
site, people and assets at its prestigious new development.

Integrated security required


The New Ludgate site was built as two separate buildings with video
surveillance, access control and video door intercoms, which were installed
during the building construction phase of the project. It was vitally important
to Land Securities that the development’s new security system could integrate
the various systems together and synthesise their data to provide a clear and
total security picture, preferably through a single user interface. Land Securities
also sought a security solution for New Ludgate that could provide the
scalability and flexibility to accommodate additional tenants in the future and
to adapt as the use of the buildings evolved.
Lee Pegram, engineering director at Land Securities said: “In particular, we
needed a tight integration between our buildings’ lifts systems and the video
surveillance system so that our control room operators could view alarms
that combined video surveillance footage with lift activity. In addition, the
new security system needed to run on the buildings common network, and
communications between systems and devices had to work properly without
impacting other network communications.”

The solution
The security team at Universal Security Systems worked closely with engineers
to design an integrated system that could provide an intuitive GUI for video
management, IP video surveillance, lift integration, access control and video
intercoms. Since several disparate systems needed to be integrated together,
integrator Universal Security Systems wanted to be able to test the unified
system before installing it at New Ludgate, opting to build the entire security
system for a full FAT (Factory Acceptance Test) prior to the final installation.
Together, Universal Security Systems and Land Securities chose Tyco Security

114 Access & Identity Management Handbook 2019 www.securitysa.com


CASE STUDY

Aesthetics and access


Products’ C•CURE 9000 Enterprise to unite the
New Ludgate buildings’ disparate systems
together. The C•CURE 9000 user interface
provides the single, comprehensive security
view that Land Securities desired from its new
Alpro transom closers are a means of hydraulically
security system. Using C•CURE 9000, security controlling the opening and closing of aluminium doors.
operators can monitor events in real time,
manage personnel, create reports, display
dynamic views, and monitor system activity
using a desktop computer, web client or the
C•CURE Go mobile app.
“The flexibility that C•CURE 9000 offers
allowed us to create a truly unique security
solution for New Ludgate,” said James Crouch,
Director of Universal Security Systems. “One
of C•CURE 9000’s most powerful capabilities is
that you can simultaneously monitor alarms
from several different devices, systems and
buildings in a single user interface. That was
vital to the success of the entire project.”
The choice of C•CURE 9000 Enterprise
provides New Ludgate with an advanced
distributed architecture that can be scaled
according to needs and growth. C•CURE
9000 also gives New Ludgate the option of
implementing visitor management with a visitor
management web portal, and offers conditional
access and dynamic area management for areas
requiring supervised entry and occupancy.
Using C•CURE 9000 to manage and access
data from all of the different systems provides IDF Aluminium has installed transom closers nineteenth-century architect Thomas Cubitt
the option for advanced reporting, which can and latch locks from Alpro Architectural who created much of the surrounding area and
be used to understand events and patterns, and Hardware at a building that provides premium also designed the eastern front of Buckingham
overall business intelligence as well. co-working and flexible office space in central Palace.
The completed project at New Ludgate London near Victoria Station. Fabricator IDF devised a solution featuring
delivered a fully scaleable, integrated security Thomas House in Eccleston Square is a tailored SBD aluminium profiles from Jack
system including video, access control, seven-storey structure with a façade in Regency Aluminium Systems, bespoke glazing, internal
intercom and lift services. The C•CURE 9000 style and a distinctive timber-clad reception screens and the Alpro door management. The
solution enables Land Securities to manage that leads to two wings. It has collaborative Alpro products include Europrofile cylinder
and let out the site to many different tenants, drop-in work areas, meeting rooms and facilities deadlatches which can be combined with
whilst simultaneously ensuring the overall to suit present-day practices. The building has electric strikes to provide the added option of
safety and security for the site. Because the been refurbished for The Office Group, who remote access control.
security system was built on a virtual local area pioneered shared workspaces in Britain and Peter Keen, sales director at Alpro, said:
network, it is a scalable solution that enables now offer these services across multiple London “Installing transom closers on internal doors
future expansion. locations as well as Bristol and Leeds. is unusual but the concealed nature of these
Mark Ponzini, senior project engineer at The Alpro transom closers are a means closers, within the transom header bar, means
Land Securities said: “One of the things that of hydraulically controlling the opening and they are unobtrusive and meet the architect’s
impresses me the most about our C•CURE closing of aluminium doors. They allow precise goal of preserving interior geometry.”
9000 solution is that it works so well with adjustment of the latching and closing force He continued: “All of The Office Group
other systems and devices from different generated by the valve according to the weight premises are design-led, and we have now
manufacturers. Going forward, we also have and height of individual doors as well as type supplied equipment to five of their sites
the option of remotely managing other of usage. including Henry Wood House, a former
systems and devices in other geographical Aesthetics are a major consideration for BBC building in the West End. Our transom
locations from the same C•CURE 9000 work The Office Group who briefed Soda Studio, closers are durable and have been tested
station used for New Ludgate. That kind of an architectural practice known for its clean independently at 250 000 double-action
flexibility is phenomenal.” simple interiors, to create a design in keeping cycles.”
with the neighbouring Georgian squares. In
For more information contact Johnson addition to the working facilities, Thomas For more information, contact Alpro
Controls Security Products, +27 82 566 5274, House has a library, music room, roof terrace Architectural Hardware, +44 1202 676 262,
[email protected]. and gymnasium. It is named after the early [email protected], www.alpro.co.uk.

www.securitysa.com Access & Identity Management Handbook 2019 115


CASE STUDY

Accessing Toyota
Upgrade delivers unified access control for motor manufacturer.
BDI Security Solutions has installed access unified solution with badge-printing as an 200 000 operations or an estimated three years
control equipment from ACT Vanderbilt at integral and cost-effective element when it on a busy door.
sites in the UK for car manufacturer Toyota had previously been a separate process. There are visible and audible alerts for
Motor Manufacturing (UK). The project saw The equipment includes ACTpro problems with tampering, signal strength and
ACT Vanderbilt developers create a tailored Mifare1030 mullion proximity readers at both door status, and wireless connectivity is up to
solution after their closest competitor proved indoor and outdoor locations. These slim-line 150 metres (line of sight). The lock is available
unable to operate from a virtual environment readers support third-party smart cards and with an optional Euro-profile cylinder to
and respond promptly to client requests. fobs, feature a robust polycarbonate housing provide key override.
Toyota’s Burnaston production process and have an ingress rating of IP67. They are Richard Huison of ACT Vanderbilt said:
begins with the pressing of panels from flat particularly suited to this type of project “Toyota was able to exploit our import
steel on presses ranging up to 3 000 tons and where the smart card is used for multiple tool which is an additional module in the
proceeds to welding, painting, addition of applications across access control and HR. In ACTenterprise management suite. The tool
plastic moulding components and assembly. order to maximise use of budget and observe allowed automated integration of human
The company uses the Kaizen continuous the client’s stringent environmental policy, resources software with the access control user
improvement method to optimise quality a number of fit-for-purpose legacy Mifare database and ACT Vanderbilt proved able to
and efficiency through constant incremental readers were included in the new system. cope with multiple data sources and formats.”
changes. At Deeside, Toyota operates a 115-acre Toyota is also using ACT Vanderbilt’s He continued: “There was a requirement
engine plant. Together, the two sites represent ACTpro eLock MIFARE Classic. This is a that our product should be able to work in a
investment of £2.5bn and employ 3 000 people. wireless door lock that includes an access virtualised environment since all of Toyota’s
The ACT Vanderbilt installation has control reader and opening mechanism, all servers are virtualised and hosted at a
replaced a legacy system that was no longer powered by batteries. eLocks operate with European datacentre. ACT Vanderbilt was able
future-proof and did not allow access control an ACTpro eLock hub and up to 32 locks can to tick this box as soon as we received the brief.
listings to be integrated with Toyota’s general communicate over a wireless network with Across both sites, ACT Vanderbilt products
corporate database. The client now has a each hub. Battery life is exceptional at over have been used on over 200 doors.”

Behave or buy new tyres


Chilean shopping centre group chooses Turnstar’s spike barrier.
Mall Plaza is one of Latin America’s leading that would efficiently and seamlessly integrate to ensure ongoing operation over many years
shopping centre chains, with 20 commercial with the Amano traffic booms already in place. of service. The spikes are driven by a heavy-duty
centres operating, of which 16 are in Chile. The Installed at the exit points of the shopping torque motor and will automatically lower in the
organisation recently increased its focus on centre parking areas, these physical barriers event of power failures. The unique patented
providing security to all stakeholders with the ensure that vehicles can only drive over the double sided spikes offer protection for traffic in
inclusion of a number of physical security spike barrier once the driver has inserted their any direction and an electronic interlock safely
elements. valid parking ticket into the ticket receptacle. lowers spikes first and then raises the barrier
“Major concerns for Mall Plaza’s “Our Talon spike barriers are extremely arm, thereby ensuring that the tyres of validated
management were the safety and security effective at disallowing vehicles from illegally vehicles will not be damaged by raised spikes.
issues around vehicle theft and drivers forcing and recklessly exiting parking areas. These “Mall Plaza is very happy with the solution
their way through the exit. A number of high-security road spike barriers are suited for we provided and is especially pleased that the
technologies were evaluated, with the demand applications requiring high volume egress and quick 3-second descent time does not cause
being for guaranteed prohibited illegal crossing have been supplied to the Mall Plaza centres bottle necking at the exit points,” says Sacks.
of perimeters by drivers with criminal intent,” with a surface mount design, across an area of 3
says Turnstar MD Craig Sacks. metres,” says Sacks. For more information contact
Turnstar’s representative in Chile, MESTE S.A., The Talon spikes are constructed from Turnstar Systems, +27 11 786 1633,
was asked to provide spike barrier technology extremely durable galvanised mild steel material [email protected], www.turnstar.co.za.

116 Access & Identity Management Handbook 2019 www.securitysa.com


The Hi-Tech Security
The Hi-Tech Security
Business
Business Directory
Directory 2019
2019
www.hsbd.co.za
www.hsbd.co.za
The only place to find the company,
The only place to find the company,
product or brand you are looking for . . .
product or brand you are looking for . . .
Published in print and online for your search convenience.
Published in print and online for your search convenience.
Forbatt_Sep-cover 2018-Final4.pdf 1 15/8/2018 17:18

Forbatt_Sep-cover 2018-Final4.pdf 1 15/8/2018 17:18

South Africa’s most comprehensive


South Africa’s
directory most comprehensive
of who’s-who in the industry
business directory 2019 directory of who’s-who in the industry
business
The directory directory
for decision makers 2019challenges
who solve today’s security
• Comprehensive directory listing of
The directory for decision makers who solve today’s security challenges
• manufacturers,
Comprehensivesuppliers
directoryand
listing of
manufacturers, suppliers and
service providers
C

M
service providers
• Comprehensive listing of manufacturers
Y
C

CM
M

MY

• and
Comprehensive listing of manufacturers
Y

brand names, and the South African


CY
CM

CMY
MY

and brandthereof
names, and the South African
K
CY

CMY

K
suppliers
suppliers thereof
• Categorised and indexed for fast,
• easy
Categorised and indexed for fast,
reference
easy reference

Request your own copy


Request your own copy
if you aren’t already a subscriber to Hi-Tech Security Solutions
if you aren’t
email: already a subscriber toorHi-Tech
[email protected] Security
Tel: +27 11 543Solutions
5800
email: [email protected] or Tel: +27 11 543 5800
www.securitysa.com Access & Identity Management Handbook 2019 117
CASE STUDY

Fruity, insulated access


Maxiflex delivers sweet door solutions to leading Eastern Cape citrus fruit company.
Maxiflex secured an order for an overhead requirements.” Janssen adds that in addition of 2018 to the satisfaction of the customer
panel sectional door from a leading citrus fruit to its features, the door’s pleasing aesthetic who also confirmed that they were impressed
handling company situated in the Eastern appearance perfectly complements the with the quality of the product. The customer
Cape. warehouse’s façade. also confirms that they have confidence in
The customer required a specialised door Ideally suited for warehouses, logistics the door system as Maxiflex has successfully
solution for its new 11 000 m2 warehouse centres and factories, the robust, flexible, supplied these panel sectional doors for similar
with a capacity of handling tons of citrus efficient and safe door system presents warehouse applications in the local area.
produce every hour. A quality door solution excellent sealing properties. Each part of the “Correct use of the door system is critical as
was essential as product handling in and out overhead panel sectional door is built to the it will extend the product’s lifespan and keep
of the warehouse must be swift to maintain highest standards to ensure reliable operation running costs to a minimum for subsequent
the facility’s interior temperature in order to even under extremely high workloads and lowest total cost of ownership for our
reduce the risk of costly produce spoilage and arduous conditions. Made up of 42 mm customer,” notes Janssen.
losses. panels, the door forms a 4-way seal when In addition to the already well established
The project was spearheaded by Viaplan closed, ensuring insulation from all weather sole distributor rights for Assa Abloy
Consulting Engineers and Randcivils. With conditions, protecting the fruit inside the Entrance Solutions in sub-Saharan Africa,
quality product and service support stipulated warehouse. The door’s design has earned a Maxiflex recently acquired exclusive rights
by the customer as prerequisites, the two class 3-certification for water tightness, wind to distribute in southern Africa, Stackdoor,
companies immediately turned to Maxiflex to load and air permeability. Furthermore, by a pioneering security grille manufactured
provide an optimum door solution. helping to regulate the warehouse’s internal in the Netherlands. “We are very pleased to
“Maxiflex is known to Viaplan Consulting temperature, energy costs are kept to a announce that in the third quarter of 2018,
Engineers and Randcivils as we have been minimum with subsequent costs savings for we obtained the rights from American Mine
involved with them on a number of similar the customer. Door to manufacture and install underground
installations in the area,” explains Bram From a safety perspective, the panels are ventilation mine doors in South Africa,”
Janssen, MD of Maxiflex. “Once we had filled with flame retardant polyurethane so the concludes Janssen.
identified the customer’s exact requirements, door won’t accelerate a fire and a control panel
we immediately knew that the 1042P overhead fitted to the door will indicate any faults. For more information contact Maxiflex Door
panel sectional door from Assa Abloy Entrance Installation of the overhead sectional Systems SA, +27 11 392 1709,
Solutions would cater to the customer’s exact door was completed during the first quarter [email protected], www.maxiflex.co.za.

118 Access & Identity Management Handbook 2019 www.securitysa.com


CASE STUDY

Security,
convenience
and comfort
High security combined with
convenience and comfort. Bosch
implements a networked solution
for the Prime Tower in Zurich.
Jutting up to a height of 126 m, the 36-storey Prime Tower is
Zurich’s tallest building and number two in Switzerland. Its 40 000
square metres of floor space can accommodate more than 2000
workplaces. It is striking with its futuristic architecture and dark
green reflective exterior. The tower’s impressive details include
a 10 m-high entrance hall and the CLOUDS bar and restaurant
on the top floor boasting an unmatched view far out across the
surrounding landscape.
The operator relies on Bosch to keep the building safe and
secure. And to meet the Prime Tower’s requirements, the company’s
experts recently implemented a modernisation project.
One of the new system’s technical highlights is a combination
of electronic and biometric access control. “Our owner, the firm
of Swiss Prime Site Immobilien AG, attaches great importance
to monitoring who exactly is inside the building at all times,”
explained Annika Hammes, who heads the trustee department at
Wincasa, a building services outfit that was contracted to design
and execute the solution.
“Error-free biometric identification is accomplished by reading
the vein patterns on the backs of people’s hands. This is done
contactlessly for very easy, comfortable use. A total of 120 hand
vein readers have been installed in the building and connected
to the controllers of the eight elevators. Once employees and
guests have been biometrically registered, they board lifts that
automatically take them to the right floors.
Encrypted ID cards are used to access the rental units, thus
making sure that persons can only enter zones for which they have
been authorised. All relevant security information is collected in a
management system so that the responsible employees always have
everything in view and can respond quickly when there is a need.
Bosch handled everything for this project: advising the
client, and then planning and implementing the system. The
modifications were made without interrupting use of the building,
which was a major challenge not only for the project team,
which therefore had to work very swiftly, but also for the tenants
themselves.
“This called for very close cooperation between the Bosch team
and the mixed-use site management (MUSM) team of Wincasa AG,
which met the requirements for continued building use while the
work was ongoing,” explained Hammes.

For more information contact Bosch Building Technologies,


+27 11 651 9600, [email protected],
http://africa.boschsecurity.com.

www.securitysa.com Access & Identity Management Handbook 2019 119


CASE STUDY

Seamless access to multiple doors


Open and secure access to meeting rooms, conference rooms and auditoriums
that can be expanded to multiple sites.
Open Workspaces creates environments • Aesthetically pleasing. Access control is for when the BLE functionality is available on
for working, meeting and innovating. The integrated into the actual door lock. No bulky SALTO KS. Each meeting room door has its
company has locations all over South Africa, or ugly add-ons are needed. own SALTO KS XS4 Escutcheon and intelligent
allowing members access Open environments • No cabling needed to the lock. Existing doors mortice lock. The mortise lock is able to send
in different cities as they require. As a can be activated by replacing the existing an alert when a door had been left open, has
co-working space, Open needed to be able to lock with an electronic lock. an inbuilt panic function and an anti-pick latch.
control access to meeting rooms, conference • Door locks are battery powered, typically PoE SALTO KS IQs (hubs) were deployed.
rooms and auditoriums using a system that lasting 30 000 operations. The door locks will These IQs are powered by PoE switches
is easy to use, scalable and offers multi-site operate during a power failure and are non- strategically placed on each floor. PoE IQs
functionality. dependent on individual battery backups or saved money for Open because they did not
When looking at an access control system UPS power. have to provide a power point to each IQ.
that would meet its requirements, the business • Open members can use one tag for multiple The IQs used at Open in Sandton were
found that traditional access control solutions sites. connected to the cloud via Ethernet. However,
were too expensive as Open wanted to control • Open team members can monitor user access for future projects, an IQ with an integrated
every door in real time. In addition, as a and door status from anywhere, even on their GSM SIM card will be used. The SIM connects to
premier location, aesthetics were important mobile devices. available cellular networks in the absence of an
and many access control readers, whether Internet connection. This is a benefit because if
biometric or tag based, are large and clunky. Accessing Sandton the Internet goes down on-site, the SALTO KS
Open required seamless access control to Open Sandton, which has about 60 doors to system will still be online.
match its design aesthetic. The company also manage, chose the new XS4 escutcheon for The commissioning and installation was
found that traditional access control systems their doors. The BLE (low-power Bluetooth) handled by SALTO partner, Concept Store. To
required dedicated hardware, skilled operators, version was specified to future-proof Open make sure there was minimal disruption to
clunky software updates. the location, progress was measured door by
The directors of Open then found SALTO door. Once a door was online, it was tested
Project summary
KS and after a rigorous due diligence decided and signed off by the client. Because no local
this was the solution to their access control • Location: West Street, Sandton. servers are required it is quite easy to do a
problem. Open Workspace’s Mark Seftel says • Number of locks: 60 sign-off per door instead of completing the
the benefits SALTO offered were varied, and • Number of active users: 320 entire site and only then do sign-off (once the
include the following: • Combination of tags and cards. server is up and running), which is the norm for
• Low cost per unit/door compared to • Members can use one tag between all access control installations in South Africa.
traditional access control. sites in South Africa.
• Easy to manage and see who’s using what • The system is fully cloud-based. For more information contact SALTO Systems,
room at what time. An intuitive online web- • No onsite dedicated hardware needed. +27 11 543 8489, [email protected],
platform makes using the system easy. www.saltosystems.com

120 Access & Identity Management Handbook 2019 www.securitysa.com


CASE STUDY

Trendy access control


Hirt & Carter demands top-of-the-range physical
security that meets its contemporary look and feel.
Hirt & Carter has a 50-year legacy as a leading the reception area is designed with aesthetics in
integrator of multi-channel marketing and mind and with a 180° opening.
communication solutions. Offering complete For other employees and visitors to the
tailor-made systems and processes, the premises, three Trident waist-height single
company has extensive premises housing turnstiles manufactured in durable 316 stainless
high-tech, high-value equipment in Durban’s steel with Rustenburg Granite tops provide
Umgeni Park. fast and easy access. Their quiet operation and
“Not only is there a real need for careful sleek appearance makes them the perfect fit for
control over who enters the Hirt & Carter reception areas. Bi-directional electric control
premises,” says Craig Sacks, MD of Turnstar, is complemented by a self-centring rotation
“but furthermore, the facilities have a modern, system that ensures the rotor returns to the
contemporary look and feel, so any physical starting position after every rotation.
access control systems have to blend in with the Hirt & Carter has also installed four double
trendy environment.” and two single full-height four-arm Titan
The order was fairly extensive and included industrial turnstiles.
a sophisticated Triton full-height curved three- In addition to the turnstiles and special
wing single glass turnstile. The turnstile, with needs gate, Turnstar also supplied 20 biometric
matte graphite grey finish, has bi-directional fingerprint reader mounting brackets in 316
electrical control with a failsafe auto unlock stainless steel and four security gates. Also
which activates during power failures. Durability manufactured in 316 stainless steel, these left-
is often compromised for the sake of aesthetics handed gates are 1.5 m wide and 2.125 m high,
but this is not the case with the technology with a maglock and door closer.
used in the Triton turnstile, which offers years of
sustainable service. For more information contact Turnstar Systems,
Catering for all visitors, the stainless steel +27 11 786 1633, [email protected],
semi-automatic special needs gate installed in www.turnstar.co.za.

Eliminating tailgating at Wits


Turnstar deals with tailgating with its Velocity high-speed vehicle barriers.
Wits University is a public institution with five traffic flow is maximised, whilst still providing and an interface on the connection of an
faculties, 33 schools, 30 service departments, a high level of security. The exit booms have a infrared beam system.
17 residence halls, all spread over 400 acres. strict interlock feature whereby two booms are In the event that there is a power outage,
The institution offers 3 610 courses and houses interlinked to prevent tailgating. “In essence, the system has a built-in 7 Ah battery backup
approximately 37 000 students and 6 000 staff a vehicle passes under the first traffic barrier with battery protection and it can also operate
members with at least 10 000 vehicles that and then has to wait until it lowers before the on solar power. Effortless manual override
pass through its gates each day. second barrier is lifted for final exit from the also allows security officers to lift and lower
The university has 24-hour CCTV coverage campus,” says Craig Sacks, MD of Turnstar. the barrier in the event of a power failure and
and security officers on patrol. Mobile vehicle The Turnstar Velocity industrial vehicle battery exhaustion.
patrols are also conducted onsite to ensure barriers at Wits University are manufactured “Not only does the Velocity offer Wits
that there is safety and security of Wits’ staff, with white powder coated stainless steel University a seamless physical access control
students and visitors on the campus. cabinets and complementary powder coated solution, but it is also built for longevity. By
On campus, the university has a card swipe blue tops. The vehicle barriers come with four eliminating the motor rear-mounted brake and
system to assist in controlling access. In a adjustable raise and lower speed settings, clutch, and removing the need for proximity
recent security upgrade project, the institution which provide seamless control as well as sensors or microswitches for positioning, we
decided to install 18 new Turnstar Velocity dynamic braking and gentle stop. have drastically reduced the cost and time
automatic high-speed vehicle barriers at the The intelligent collision detection and required for maintenance,” says Sacks.
busy Yale Road North and Yale Road South mid-cycle auto-reverse functions are just two
entrances. of the safety features that make this product For more information contact Turnstar
Fitted with a 3-metre arm, the Velocity desirable. Other built-in standard safety Systems, +27 11 786 1633,
barriers open in just 1 second, ensuring that features include a dual channel loop detector [email protected], www.turnstar.co.za.

www.securitysa.com Access & Identity Management Handbook 2019 121


CASE STUDY

Hospital adopts integrated solution


Bosch equips Adana Integrated Health Campus with an integrated,
end-to-end security system.
Completed in 2017, the Adana Integrated integrate the most advanced hardware on For an extra level of integration, the
Health Campus is a state-of-the-art hospital a single platform covering four areas: video hospital’s telephone switchboard is integrated
complex in Turkey comprising three specialised surveillance, access control, fire alarm plus into the public address and voice alarm system
clinics with a total capacity of 1550 beds. public address and voice alarm. Bosch won via BIS to enable public announcement and/or
Located in Adana – the country’s fifth-largest the contract as the one-stop provider with the fire alarms from the nurse desks for immediate
city – the over 318 000 square-metre facility is capacity to unify all systems via its Building evacuation of patients and their relatives. And
a public-private partnership project realised Integration System (BIS) through different to safeguard the Maternity Clinic against ‘Code
in cooperation with the Ministry of Health to interfaces. The installation was completed by Pink’ cases (baby kidnapping), the Bosch access
serve patient populations from the surrounding the Bosch partner Ateksis. control integrates RFID tags on newborn
Adana, Hatay and Osmaniye provinces. Due to the size and complexity of the babies to trigger alarms.
The Adana Integrated Health Campus modern campus, this level of integration By implementing a complete solution
prides itself in offering the highest level of proved a true test for the Bosch Building on a single platform from the start, Adana
care through specialised physicians and Integration System (BIS): The IP-based video Integrated Health Campus sets the standard for
advanced equipment. The Main Hospital offers surveillance system consists of 2000 cameras exemplary patient safety in a system marked
an Oncology Hospital as well as a Cardiology for monitoring critical indoor and outdoor by low overall cost of ownership, maintenance
and Cardiovascular Hospital at a 367-bed areas such as entrances and corridors. costs, and failure rate. In the bigger picture, the
capacity. The Maternity & Pediatrics Hospital Managed on the Bosch Video Management state-of-the-art campus proves the end-to-end
have 349 beds and the General Hospital 584 System (BVMS), live feeds from high-definition capabilities of Bosch Building Technologies
beds. Before opening to the public, the project Flexidome, Dinion IP starlight, and Autodome and serves as a showcase for the next level of
won several awards, including Best Healthcare IP starlight cameras are monitored on-site healthcare and integrated security.
Project and World’s Largest Seismic Isolated through a single control room. Providing fire
Health Campus. safety, BIS controls roughly 45 000 detection For more information contact Bosch Building
When it came to choosing a security points, including 30 000 fire detectors, plus Technologies, +27 11 651 9600,
and safety solution for their high-profile manual call points and interface modules [email protected],
health facility, officials in Adana wanted to across the campus. http://africa.boschsecurity.com

122 Access & Identity Management Handbook 2019 www.securitysa.com


DIRECTORY OF
access and identity management suppliers
Access and Beyond Blacklight Integrated
Distributor/Supplier Installer/system integrator
Service provider
Contact: Christo Myburgh
Tel: +27 31 263 1487
Contact: Kelly Mclintock
[email protected]
Tel: +27 82 805 8447
Unit C1, 35 Intersite Avenue, Umgeni Business Park, KwaZulu-Natal
[email protected]
www.accessandbeyond.com
820 16th Road, Randtjies Park, Midrand, Gauteng
Branches: Durban, Centurion
www.blacklightconsulting.co.za
Branches: Sales – Johannesburg, Tshwane. Technical footprint –
Access and Beyond specialises in integrated access solutions (RFID and
Johannesburg, Tshwane, KwaZulu-Natal, Cape Town, Hoedspruit
biometrics) and is a value-added distributor of Impro, XTime, IDEMIA
and Nedap. To complete its range, the company also stocks all access
Blacklight Integrated specialises in system design, sales, installation,
control and CCTV peripherals and cable.
offsite monitoring and maintenance of IP surveillance, access systems,
booms, turnstiles, fencing, networking and integrated systems, as well
as Internet of Things (IoT) and IT security.

ADI Global Distribution


Distributor/supplier Boomgate Systems
Manufacturer
Contact: ADI Global Distribution
Distributor/Supplier
Tel: +27 11 574 2500
[email protected]
Contact: Andre Rossouw
5 Platinum Drive, Longmeadow Business Estate, Modderfontein,
Tel: +27 11 674 4441
Johannesburg, Gauteng
[email protected]
www.adiglobal.com/za
18 Minerva Avenue, Leaglen, Gauteng
Branches: Johannesburg, Pretoria, Cape Town, Durban, Bloemfontein,
www.boomgatesystems.co.za
Port Elizabeth
Branches: Cape Town
ADI offers an in-depth product solution for access control from market-
Manufacturer of vehicle and pedestrian access control equipment
leading manufacturers. The company’s consumables include, among
and high security anti-terror products. These include traffic
other things, mag locks, door closers, request to exit, cable and power
barriers (manual and automated), spike barriers, turnstiles,
supplies. It also has an array of system solutions such as biometrics and
pedestrian barriers, road blockers, speedstiles, mantrap cubicles,
proximity readers.
hydraulic bollards, revolving doors, bollards, rubber traffic islands
and camera poles.

ASSA ABLOY
Manufacturer
Distributor/supplier
BT-SA
Contact: Pieter Geyser System integrator
Tel: +27 11 761 5000
[email protected] Tel: 0860 105 183
ASSA ABLOY Commercial House, 9 Nickel Road, Technikon, Gauteng [email protected]
www.assaabloy.co.za 59 Lechwe Street, Corporate Park South, Midrand, Gauteng
Branches: Cape Town, Durban, Port Elizabeth, Ghana, Kenya, www.bt-sa.co.za
Namibia, Nigeria, Tanzania, Uganda, Zimbabwe Branches: Johannesburg, Cape Town, Rustenburg, Witbank, East London

ASSA ABLOY’s range includes SMARTair access control, Aperio BT-SA offers end-to-end security solutions that include design,
wireless door locks, and a wide range of mag locks, energy efficient installation and maintenance of high-tech integrated products. Its
electromechanical locks and electric strikes. Included in its product in-house team of experts can integrate all fire and security systems
offering for the residential market is a range of digital door locks, into a single platform with one-user interface. These products
including ENTR and Yale digital door locks, ideal for an include a variety of fire detection and suppression, evacuation
automated home. systems, access control, CCTV and all intruder detection types.

www.securitysa.com Access & Identity Management Handbook 2019 123


CA Southern Africa Doculam
Manufacturer Distributor/supplier
Installer/System Integrator
Contact: Shaun Stanley
Contact: Heidi Ziegelmeier Tel: +27 21 557 0666
Tel: +27 64 903 2600 [email protected]
[email protected] 140 Umbilo Road, Durban, KwaZulu-Natal
Block F, EOH Office Park, no 1 Osborne Lane, Bedfordview, Gauteng www.doculam.co.za
www.ca.com Branches: Durban, Cape Town, Johannesburg, Port Elizabeth
Branches: Durban, Cape Town, Johannesburg
Doculam offers a range of products that relate to the access control industry.
The depth and breadth of CA Technologies’ enterprise security Its Magicard PVC card printers, access cards and ID consumables all assist with
software – from API security, identity and access management the access control process, while Garrett metal detection products also form
and privileged access management to fraud and risk detection an essential part of threat detection applications as applied to access control.
and prevention – helps protect 49 of the Fortune 50 organisations As alcohol abuse is normally controlled at all entry points, organisations need-
in the world and provides you the ability to propel your businesses ing to screen for would-be offenders can effectively combat this health and
forward into the digital world. safety risk with Doculam’s range of Alcovisor breathalysers.

Elvey
CEM Systems Distributor/supplier
Manufacturer
Distributor/Supplier Contact: Elvey
Tel: +27 11 401 6700
Contact: Ernest Mallet [email protected]
Tel: +44 2890 456767 27 Greenstone Place, Greenstone Hill, Edenvale, Gauteng
[email protected] www.elvey.co.za
195 Airport Road West, Belfast, BT3 9ED, United Kingdom Branches: Bellville, Bloemfontein, Cape Town, Durban, Exports, East London,
www.cemsys.com East Rand, George, Greenstone, Johannesburg, Namibia, Nelspruit, Polokwane,
Branches: Johannesburg Port Elizabeth, Pretoria, Rustenburg, West Rand

CEM Systems access control and integrated security management Elvey provides a wide range of access control technology for the most extensive
systems from Johnson Controls secure sites around the world, range of applications. From time and attendance to monitoring solutions, integrated
ranging from education and healthcare to aviation and more. or standalone, Elvey provides for all its customers’ typical and diverse needs.
Johnson Controls manufactures both CEM hardware and
CEM AC2000 software, offering one of the most comprehensive,
resilient and reliable systems available. EOH Security and Building
Technologies
Installer/system integrator
Comb Communications Service provider
Manufacturer
Distributor / Supplier Contact: EOH Security and Building Technologies
Tel: +27 11 844 3200
Contact: Amelia Hayward [email protected]
Tel: +27 11 089 5800 www.eoh-fss.co.za
[email protected] Branches: Johannesburg, Cape Town, Port Elizabeth, Durban
Unit 17B, Allandale Park, Markels Close, Midrand, Gauteng
www.comb-communications.com Our offerings are powerful yet flexible, providing a turnkey solution to
manage your workforce effectively. It ranges from enhanced scheduling,
Leveraging web-based applications alongside functional components absence management, operational health and safety, access control,
and current technologies is what Comb Communications does best. payroll and HR integration. Our solutions include CCTV, BMS systems,
Its solutions not only provide you with peace-of-mind and reliability, infrastructure and support thereof. 30+ years of experience, guarantees
but give you the control that truly makes a difference in time successful implementations.
management and the management of access controlled environments.

ET Nice
Dahua Technology Manufacturer
South Africa Contact: Gerald Kirsten
Manufacturer Tel: +27 21 404 0800
[email protected]
Contact: Zhejiang Dahua Technology 15 Nelson Road, Observatory, Cape Town, Western Cape
Tel: +86 571 8768 8883 www.niceforyou.com/za
[email protected] Branches: Observatory, Brackenfell, Port Elizabeth, Pinetown, Nelspruit,
No.1199, Bin’an Road, Binjiang District, Hangzhou, China Samrand, Germiston
www.dahuasecurity.com
ET Nice, formerly ET Systems, has proudly been designing, manufacturing
Zhejiang Dahua Technology is a product and solution provider in and supporting products in South Africa for the access automation and
the global video surveillance industry. With more than 10 000 security industries for almost 30 years. Today, ET Nice is the optimal choice
employees all over the world, Dahua solutions, products and in the management of integrated automation systems, thanks to a
services are used in over 160 countries and regions. complete variety of smart and user-friendly products.

124 Access & Identity Management Handbook 2019 www.securitysa.com


Genetec Impro Technologies
Manufacturer Manufacturer

Contact: Brent Cary Contact: Mike Kidson


Tel: +27 82 854 1278 Tel: +27 11 469 5568
[email protected] [email protected]
2280 Alfred-Nobel Blvd, Suite 400, Montreal, Quebec, Canada 47B Gillitts Road, Pinetown, KwaZulu-Natal
www.genetec.com www.impro.net
Branches: Durban, Johannesburg
Genetec is an innovative technology company with a broad solutions
portfolio that encompasses security, intelligence and operations. Impro has been pioneering the access control industry for over 30 years. Its
The company’s flagship product, Security Center, is an open- access control solutions scale from small installations, all the way to enterprise
architecture platform that unifies IP-based video surveillance, multinationals. A proudly South African company, Impro offers customers a no-
access control, automatic license plate recognition (ALPR), quibble warranty exclusive to South African businesses, as well as free 24-hour
communications and analytics. technical support and accredited training.

iPulse Systems
GV-TECH Manufacturer
Distributor/Supplier
Contact: Sales team
Contact: Christo Botha Tel: 0860 478 573
Tel: +27 83 516 8213 [email protected]
[email protected] Unit 15A, Skyview Retail Park, 67 CR Swart Drive, Strijdompark,
1st Floor, 106 Jean Avenue, Centurion, Gauteng Randburg, Gauteng
www.gvtech.co.za www.ipulsesystems.com
Branches: Centurion
iPulse Systems designs, manufactures and sells cloud-based access
We import and distribute GeoVision products. Our products control and workforce management systems. All products are designed and
include IP cameras, surveillance recording systems like NVRs manufactured in South Africa, and exported to 27 countries. Products include
and VMS; we also have LPR/ANPR, POS, and access control both hardware and software solutions. iPulse sells IQSuite.cloud, a full access
solutions. We are a total CCTV solutions provider and offer control system hosted on Microsoft Azure.
customised solutions.

Johnson Controls
Installer/system integrator
IDEMIA Distributor/supplier
Manufacturer
Contact: Marius Brits
Contact: Chelesile Moya Tel: +27 11 921 7100
Tel: +27 11 601 5500 [email protected]
[email protected] 42 Electron Avenue, Isando, Gauteng
14 Milkyway Aveune, Linbro Business Park, www.johnsoncontrols.co.za
Johannesburg, Gauteng Branches: Johannesburg, Cape Town, Durban, Carletonvville
www.idemia.com
Johnson Controls works with customers to develop comprehensive, cost-
OT-Morpho is now IDEMIA, a leader in trusted identities for an effective security and fire safety solutions. As a building-wide technology
increasingly digital world. Through augmented identity, IDEMIA integrator, we look at how to both implement the appropriate technologies
empowers citizens and consumers alike to interact, pay, and protect your investment long term. We provide support for the
connect, travel and vote in ways that are now possible in a development, design, deployment and implementation of a breadth of
connected environment. With close to €3bn in revenues, technologies, regardless of the manufacturer.
IDEMIA serves clients in 180 countries.

Mustek Security Technologies


Installer/system integrator
iMAT Distributor/supplier
Manufacturer
Distributor/supplier Contact: Sergio Pedregal
Tel: +27 11 237 1000
Contact: iMAT [email protected]
Tel: +27 21 556 3866 322 15th Road, Randjespark, Midrand, Gauteng
[email protected] http://mst.mustek.co.za/
32 Sycamore Crescent, Atlas Gardens, Durbanville, Western Cape Branches: Gauteng, Port Elizabeth, East London, Polokwane, Bloemfontein,
www.imat.co.za Durban, Nelspruit, Mahikeng, Kimberley, Cape Town
Branches: Cape Town, Johannesburg, Durban
Mustek Security Technologies (MST) provides integrated security solutions,
iMAT is a manufacturer of physical access control products including enterprise-class access control and visitor management solutions
including well known turnstiles, vehicle barriers and many incorporating various technologies such as biometric (finger/face) and
more. Its products are designed to integrate seamlessly will any automatic number plate recognition. MST is able to provide a complete
biometrics or other triggers, and offer a safe bet for turnstiles end-to-end solution obviating the need to source various components from
that last. a host of suppliers.

www.securitysa.com Access & Identity Management Handbook 2019 125


neaMetrics Regal Distributors SA
Manufacturer Distributor/Supplier
Distributor/supplier
Contact: Andrew Levell-Smith
Contact: neaMetrics sales Tel: +27 87 802 3800
Tel: +27 11 784 3952 [email protected]
[email protected] 26 Greenstone Place, Greenstone Hill, Edenvale, Gauteng
108 11th Street, Parkmore, Sandton, Gauteng www.regalsecurity.co.za
www.neametrics.com Branches: Johannesburg, Boksburg, Roodepoort, Midrand, Pretoria,
Branches: Johannesburg, Nairobi, Kinshasa Centurion, Vanderbijlpark, Nelspruit, Witbank, Polokwane, Cape Town,
Bellville, East London, Port Elizabeth, Durban, Pietermaritzburg, Pinetown,
neaMetrics develops customised, integrated software Bloemfontein
solutions for biometric ID (fingerprint, face, iris), identification
(AFIS) and card personalisation (smartcard, RFID, ID cards). Regal Distributors SA offers a comprehensive range of biometric devices,
Exclusive distributor of Suprema and other identity products, RFID and keypad readers available as standalone or combined
providing specialised turnkey ID solutions. technology readers, PAC software and hardware such as maglocks, and an
extensive range of request-to-exit buttons for any application from
entry level to commercial access control installations.

Rhyco Risk Projects


Paxton Access Installer/System integrator
Manufacturer
Contact: Gary Swart
Contact: +27 21 427 6691 Tel: +27 83 306 5499
[email protected] [email protected]
Paxton House, Home Farm Road, Brighton, BN1 9HU, Unit 11, Eco Square Park, Witch-Hazel Avenue, Highveld Techno-Park,
United Kingdom Centurion, Gauteng
www.paxtonaccess.co.za www.rhms.co.za
Branches: South Africa, Tanzania, Uganda, UAE
Paxton designs and manufactures IP access control, door
entry and building intelligence systems for the mid-market Rhyco Risk Projects offers knowledge and expertise to its clients through
(education, healthcare, retail, leisure, commercial and public consultation, planning, product sourcing and implementation of tailor-made
sector). Paxton offers world-class technical support and free solutions. The company’s drive is to create exciting new solutions in partnership
training to all its customers. Every year around 25 000 with its clients, bringing together cutting-edge integrations from planning to
buildings are secured by Paxton. implementation. Rhyco specialises in CCTV, access control, intruder systems,
fire, PA and evacuation systems, as well as offsite monitoring.

SACO a division of Bidvest Protea Coin


Powell Tronics Manufacturer
Distributor/supplier Installer/System Integrator

Contact: Mike Austen Contact: Freddy Niehaus


Tel: 0861 784 357 Tel: 086 123 7226
[email protected] [email protected]
Unit 19-4, The Waverley Complex, Wyecroft Road, Observatory, 222 Witch-Hazel Avenue, Highveld Techno Park, Centurion, Gauteng
Western Cape www.saco.co.za/www.proteacoin.co.za
www.p-tron.com Branches: Centurion, Durban, Port Elizabeth, Cape Town, Rustenburg
Branches: Cape Town, Durban, Johannesburg, Port Elizabeth
SACO, a division of Bidvest Protea Coin, offers services including accurate
Impro, IDEMIA, Golmar and Powell Tronics’ own brand of P-tron human capital identification and management, progressive business
door furniture and software solutions, provide the market with intelligence, workforce efficiency and process optimisation management,
top of the range local and global product offerings, unrivalled productivity and revenue protection, asset protection, ERP and payroll
expertise and support with unparalleled integrated solutions. integration, and risk management.

Saflec Systems
Manufacturer
Value-added reseller

Reditron Contact: Saflec Systems


Distributor/Supplier Tel: +27 11 477 4760
[email protected]
Contact: Jacques Bester 522 Ontdekkers Road, Florida Hills, Johannesburg, Gauteng
Tel: +27 87 802 2288 www.saflecsystems.co.za
[email protected]
9 Electron Street, Linbro Park, Gauteng Local manufacturer of quality access control equipment and developer of the
www.reditron.co.za renowned SACS access control system, specialising in offline access control.
Branches: Johannesburg, Nelspruit, Cape Town, Durban Saflec is a value-added reseller for Salto for its Sallis and Salto electronic
locks, and for HID for its Mifare and mobile solutions, both of which are fully
IDEMIA, Paxton and ViRDI solutions. integrated into Saflec’s access control system.

126 Access & Identity Management Handbook 2019 www.securitysa.com


Salto Systems Stallion Security
Manufacturer | Distributor/supplier Installer/System Integrator

Contact: Wouter du Toit Contact: Kevin Monk


Tel: +27 87 701 5858 Tel: +27 11 533 8888
[email protected] [email protected]
Wild Fig Business Park, Block F, Unit 55, 1494 Cranberry Street, Honeydew, 35 Siemert Road, Doornfontein, Johannesburg, Gauteng
Roodepoort, Gauteng www.stallion.co.za
www.saltosystems.com Branches: Bloemfontein, Pretoria, CapeTown, Durban, Port Elizabeth
Branches: Johannesburg
Stallion Electronic Security understands the dynamics of the
Salto drives to develop innovative electronic locking solutions based on integrated electronic security market and can therefore tailor-make
simple and efficient technology to build on its portfolio of products both an integrated system to suit any commercial, industrial, mining
in design and functionality, making it possible for users to meet their or retail facility. The company has the diversity to provide integrated
access needs and secure all their doors. The company delivers networked, systems from entry level to the most complex and advanced
real-time solutions for sectors where security is critical, such as airports, networked systems.
healthcare, government, corporate, hospitality, mining and education.

Suprema
Secutel Technologies Manufacturer
Installer/System Integrator Distributor/supplier
Distributor/Supplier
Contact: The Suprema team
Contact: Danny Pringle Tel: +27 11 784 3952
Tel: +27 10 015 1401 [email protected]
[email protected] 108 11th Street, Parkmore, Sandton, Gauteng
13 Picaroon Street, Laser Park, Honeydew, Johannesburg, Gauteng www.suprema.co.za
www.secutel.co.za Branches: Johannesburg
Branches: Johannesburg, Polokwane, Cape Town, George, Nelspruit,
Durban, Port Elizabeth, Bloemfontein Suprema is a leader in biometric & identity management solutions,
including access control and T&A, embedded fingerprint modules,
The Secutel access control and visitor management platform combines PC fingerprint solutions, live scanners and e-passport readers.
iPad visitor registration kiosks, electronic door components, peripherals Suprema’s technology is aesthetically pleasing and supported
and software, providing tailor-made networked access control solutions. with award winning algorithms.
Everything fits together, everything works.

Sherlotronics Turnstar Systems


Manufacturer Manufacturer

Contact: Simon Knott Contact: Scott Davey


Tel: +27 11 462 5101 Tel: +27 11 786 1633
[email protected] [email protected]
251 Aintree Avenue, Northriding, Johannesburg, Gauteng 18 6th Street, Wynberg, Sandton, Gauteng
www.sherlotronics.co.za www.turnstar.co.za
Branches: Cape Town, Durban
Established over 25 years ago in Johannesburg, Sherlotronics specialises
in Radio Frequency licence-free remote control systems for the security Turnstar is an ISO 9001:2015 certified manufacturer of turnstiles, speed
industry and access control markets. Sherlotronics is a manufacturer gates, mantrap cubicles, security booths, vehicle barriers, bollards and
that strives to maintain a high level of build quality in its remote road blockers. Production takes place in a 7 700-square metre factory
control designs. in Wynberg, with distribution warehouses in the Western Cape and
KwaZulu-Natal.

Softcon
Manufacturer Tyco
Distributor/supplier Manufacturer

Contact: Reynardt Badenhorst / Tihan du Plooy Contact: Ernest Mallett


Tel: +27 12 348 7301 Tel: +27 11 026 9476
[email protected] [email protected]
475 King’s Highway, Lynnwood, Pretoria, Gauteng Unit 3, Thandanani Office Park, Invicta Street, Halfway Gardens,
www.softconserv.com Midrand, Gauteng
Branches: Pretoria, Cape Town www.tycosecurityproducts.com

The core modules of Softcon’s solution revolves around building Tyco, the security products division of Johnson Controls, manufactures
management, with the main focus on access control, input/output leading access control, video and intrusion systems, providing a
monitoring, biometric solutions, smart card solutions, vending control, fuel unified security platform from one trusted source. An extensive cyber
control, solutions for visitor control, asset management, ID card production, protection programme enforces Tyco’s approach to the design and
cashless point-of-sale at canteens and parking point-of-sale. development of its products to protect clients from cyber threats.

www.securitysa.com Access & Identity Management Handbook 2019 127


VERACITECH Workforce
Installer/System Integrator Management
Value-added Reseller Solutions
Distributor/supplier
Contact: Alvin Flaum
Tel: +27 11 888 7251 Contact: Glenn van der Westhuizen
[email protected] Tel: +27 76 571 5944
382 Kent Avenue, Ferndale, Randburg, Gauteng [email protected]
www.veracitech.co.za www.workforcemanagementsolutions.co.za
Branches: Johannesburg, Rustenburg, Mokopane, Windhoek,
Walvis Bay, Gaborone Workforce Management Solutions develops and delivers various
software systems to assist residential estates in managing their
Systems engineering house for high-end security, video and access residents, workforce, visitors and contractors.
automation systems in the industrial, mining and national key-point
sectors across southern Africa. OEM partner and expert system house for
XMP-Babylon (Autec), direct channel partner for Avigilon and integration
partner for Traka and IDEMIA.

ZKTeco
Wolfpack Information Manufacturer
Risk
Distributor/Supplier Contact: Hendrik Combrinck
Tel: +27 12 259 1047
Contact: Craig Rosewarne [email protected]
Tel: +27 11 794 7322 Block F, Wellness World Corporate Park, Beethoven Street, Melodie,
[email protected] Hartbeespoort, North West Province
Building 1, Pendoring Office Park, 299 Pendoring Road, Blackheath, www.zkteco.co.za
Northcliff, Gauteng
www.wolfpackrisk.com ZKTeco is a leading global developer of security and time
Branches: Johannesburg management solutions. ZKTeco controls manufacturing, product
design, component assembly and logistics/shipping – all under
Wolfpack Information Risk specialises in business-aligned information risk one roof. ZKTeco develops biometric technology in the mass
and cyber threat management covering the full spectrum of commercial market in a cost-effective manner to ensure efficient
prevention, detection, incident management and resilience requirements. use of biometric technology.

Disclaimer: The information in this publication is furnished for the exclusive use of subscribers and is based on the most reliable data available to
Technews ­Publishing. However, the information was obtained from sources which Technews Publishing does not control and, although every effort has
been made to verify it, the data is volatile. In furnishing this information, Technews Publishing in no way assumes any part of the users’ or suppliers’ risks,
does not guarantee its completeness, timeliness or accuracy and shall not be liable for any loss or injury whatever resulting from the use of or reliance
on the information, or from negligence.

Index to advertisers
Access and Beyond............................................................................11 Paxton Access......................................................................................93
ASSA ABLOY.........................................................................................77 Powell Tronics......................................................................................23
Boomgate Systems......................................................................... 107 Reditron.................................................................................................37
CEM Systems........................................................................................15 Regal Distributors SA........................................................................29
Dahua Technology South Africa..................................................... 7 Saco a division of Bidvest Protea Coin........................................99
Doculam............................................................................................. 101 Saflec Systems.....................................................................................45
ET Nice....................................................................................................91 Salto Systems..................................................................................... IFC
Genetec............................................................................................... 103 Specialised Exhibitions Montgomery.......................................IBC
Hi-Tech Security Solutions........................................................1,117 Stallion Security..................................................................................41
IDEMIA....................................................................................................39 Suprema....................................................................................27,35,81
iMat..........................................................................................................95 Turnstar Systems................................................................................17
Impro Technologies...........................................................................79 Tyco.........................................................................................................85
iPulse Systems.................................................................................OBC Wolfpack Information Risk..............................................................25
Johnson Controls................................................................................31 Workforce Management Solutions..............................................87
Mustek Security Technologies.......................................................19 VERACITECH...........................................................................................5
neaMetrics................................................................................27,35,81 ZK Teco...................................................................................................65

128 Access & Identity Management Handbook 2019 www.securitysa.com

You might also like