Access and Identity Manegement PDF
Access and Identity Manegement PDF
hi-tech
security
PRINT
NEWS BRIEFS
solutions
Forbatt_Sep-cover 2018-Final4.pdf 1 15/8/2018 17:18
WEBSITE
VOLUME 24 NO 10 | NOVEMBER 2018 R25 (INCL VAT)
RESIDENTIAL ESTATE
business directory 2019
SECURITY
Handbook 2018
The journal for decision makers who solve today’s security challenges
The directory for decision makers who solve today’s security challenges
CM
MY
CY
CMY
MorphoWave Compact
TM
BY IDEMIA
Published by
HI-TECH SECURITY SOLUTIONS
Key components of access control........................................76 Deploying an integrated access control solution............. 104
What are the key components in a modern access control system? Integration is core to effective visitor management from the point
of entry to the point of exit.
The right access decisions......................................................78
Making the right access control decision depends on what you Identifying good visitor management practices.............. 105
want secured and how secure it should be. The SA driver’s licence is a good source of accurate information
about visitors.
IP is no stranger to access control.........................................82
IP communications takes your access control system beyond Reliability a fundamental in visitor management............ 106
simply opening the door. Make sure your visitor management hardware and software meet
the requirements of your environment.
Applying the SaaS model to access control..........................84
The software-as-a-service model has proven transformative to Digital identity
many organisations, and even entire industries.
Digital channels and the evolution of ID........................... 108
Access in the cloud While the concept of identity (ID) remains unchanged, the rapid
evolution of digital technology has dramatically extended both its
Cloud-based access control...................................................89 application and form factor.
Running your access control through a cloud service has made
people nervous in the past, but today’s solutions are hard to beat. Using tomorrow’s tools to solve today’s
security problems................................................................ 111
Controlling access in the cloud..............................................90 The criminals have a security roadmap in place, do you?
In the access control arena, the adoption of cloud-based access
control continues to grow as companies become more open to Case studies
the idea of relying on it to perform such a vital function.
Fingerprints protect privacy for AIDS testing.....................112
Video-based access High-speed door solutions are cool.........................................113
Integrated security and event management......................114
They sure don’t make them like they used to......................92 Aesthetics and access........................................................................115
A doorbell used to be a simple thing. Today, however, they offer Accessing Toyota..................................................................................116
two-way communications and even video. Behave or buy new tyres.................................................................116
Fruity, insulated access......................................................................117
Workforce management Security, convenience and comfort..........................................119
Seamless access to multiple doors............................................120
Integrating access with OHS and operations.......................96 Trendy access control........................................................................121
Veracitech has developed access control plug-ins to add Eliminating tailgating at Wits........................................................121
certifications and key management decision-making to traditional Hospital adopts integrated solution.........................................122
access control.
Authorised OEM partner A direct channel partner An accredited partner/ Authorised system Integration solutions
for Avigilon video systems channel for Gallagher integration partner. partner for Sagem and
Veracitech is a direct partner and
expert-recognised systems house with direct engineering security systems. Morpho products.
for Autec Babylon in southern and procurement to
Africa. Our executives introduced Avigilon HQ in Canada.
Autec Babylon to the southern
Africa market in the early 1990s
and have built up an unparalleled
experience and knowledge base
in system design and integration
with Autec Babylon.
Veracitech
30 years of successful high-end security solutions.
+27 11 888 7251
[email protected]
www.veracitech.co.za
Hi-Tech Security Solutions looks at access and identity management and asks some
industry players what ‘zero trust’ and ‘least privilege’ access means.
The concepts of zero trust and least privilege implement a least privilege model to allow the managing and mitigating risks in their data
access and identity management are gaining right people to access only the areas and data environments, whether it is on-premise, in
a lot of airtime these days. While not new, in that is pertinent to them. the cloud or via edge devices, especially with
organisations’ attempts to control all forms Mayleen Bywater, senior product manager legislation such as GDPR and PoPIA in mind.
of access and manage the cyber threats to for cloud security solutions at Vox, explains Sagan Pillay, CA Southern Africa security
systems and data, these concepts are seen as that the terms least privilege and zero trust solution strategist, adds that least privilege
more important. In the physical security world, refer to the understanding a business has of and zero trust are part of the defence-in-depth
these ideas are also not new, but they have who has access to what information, when strategy organisations apply to ensure the
often taken a back seat to traditional physical and how. “The business has to ensure that right access is provided to the right person
security issues. users have the correct access to the right data or people at the right time. It’s basically
However, as physical and logical security at any given time. When IoT is brought into understanding what is happening in every
increasingly converge (and even when the environment, where it connects various transaction, from a simple exchange of data to
the two are separated, there is always a networks, people and devices, the business complex financial transactions.
connection between them), access and needs to ensure that it knows who or what is In most organisations, this is decided by the
identity management has become a critical connecting, to where or what, and who has individual’s job. Person X needs to do certain
issue. In this article, Hi-Tech Security Solutions access to the data and analytics.” things and is therefore granted rights to access
looks at access and identity management and She adds that this is a crucial area the places, applications and data to fulfil that
asks some industry players what zero trust and for companies to control in terms of function. Unfortunately, many organisations
least privilege access means and how it can be have become lazy and when people move to a
rolled out to incorporate the converged world new position or even leave the company, their
of security. historical rights remain in place.
Starting out, we asked what the terms ‘least For example, someone may take over
privilege’ and ‘zero trust’ mean in the world of a job and the routine solution would be to
access and identity management. And looking give them the same access rights as their
at the world around us, what do they mean as predecessor. Too often, the predecessor’s
we move into an IoT (Internet of Things) world rights are not modified to change or remove
where connected things are as important as their access and neither are the new person’s
connected people, and devices on the edge old access rights modified to remove access to
send continuous streams of data to servers and what they required in their previous roles. This
data centres? is, obviously, a security risk.
With the sheer number of people and The idea of zero trust can also be
devices that are able to connect to our aligned to the concept of zero tolerance,
networks today, there are an almost infinite says Pillay. This implies strong control of all
number of possible connections that will access and a demand that systems trust an
want access, legitimate or not. Therefore, identity completely before any transaction
Kurt Burger, sales manager at Altron Bytes is permitted. “Strictly enforced, this binds a
System Integration, says organisations must Mayleen Bywater. Continued on page 12
Continued from page 13 they are protecting. Accessing the parking log into a PC in the building. This should raise
reality today and will grow along with general lot and the canteen could easily be a cloud a flag. And as noted above, for remote access,
cloud services, and that there are many options service, but accessing the vault would require a depending on where the person is logging
as to how companies can make use of access bit more thought. in from and the device they are using will
systems based in the cloud. The maturity and He also highlights the benefits of determine if they are allowed access, and if so,
reliability of cloud services is rising and we will integrating your physical access control with how much.
see many traditionally in-house applications your logical access. He says this adds another No matter what solution you select, Burger
being made available as cloud services in future. layer to your authentication security by noting says, you need to design a system that works
“Cloud services are growing exponentially the physical location of the individual and the for what you need and then look for the
and if your business is not on board it leaves relevance of him/her accessing a server from technology that will make it work, not decide
you behind from a technology and digital there. An example often used is if someone has on the technology and then see how you can
transformation perspective,” adds Bywater. not entered the office building and is trying to jam it into your organisation.
“Cloud is simplifying services for businesses, Access and identity management is
making it easier for them to access and common in every organisation and even at
use a whole host of services. It also brings home, it is just the complexity of the processes
down the cost of managing and maintaining that vary. In the business world, authentication
infrastructure. is more crucial than ever in a world where
“A business’s data is its number one asset. cyber criminals seem to have almost no
With cloud, the business has an audit trail of restrictions. Controlling access to company
who has access to which systems and services resources, logical and physical, on-site and in
and what was updated or not updated. The the cloud, is therefore a critical aspect in your
cloud is a realistic and reliable option for access security arsenal, and combining the two into
and identity management as security is top of a collaborative effort to protect the enterprise,
mind for cloud service providers. its people and assets is no longer an idea that
“It is always a good idea to ask the cloud could happen one day, it needs to happen
service provider about the security measures now. The catch, as discussed elsewhere in
that are in place and whether it is necessary this publication, is getting the physical and
for the business to add its own measures,” she IT disciplines on the same wavelength and
advises. capitalising on the areas of speciality of both.
Burger agrees that cloud is the way to go,
but also advises that there is not a one-size- For more information, contact:
fits-all solution that can be applied to every Heidi Ziegelmeier, CA Southern Africa, +27 11
company like a template. Every organisation 417 8594, [email protected].
needs to take the time to determine what form Mayleen Bywater, Vox, +27 87 805 0000,
of cloud services would best suit them, even [email protected],
adjusting the solution depending on the areas Dragan Petkovic. www.vox.co.za.
Today’s access control isn’t only concerned with who has access, but also what has
access, why they need it and what they are doing with it.
The access and identity market is no stranger reports from the system is a possible danger to TCP/IP communication is protected through
to cybersecurity and all the implications of the access of information.” encryption technologies such as TLS. On the
losing control over your physical and logical Protection can be achieved by ensuring server side, you want a system that has strong
assets. However, in the past the physical side of the database is on an independent computer. user permissions, and from which you can view
this industry has been a laggard in protecting This should also not have attachments comprehensive audit logs and easily manage
its customers and products from cyber risks. to the existing network infrastructure or expiration of personal data.
This lack has become more of a problem Internet. If there is a need for connections, He adds that these technologies also
over the past few years as we have seen physical he says encryption of data as well as the struggle to stand alone, “there is no point in
access and time and attendance products using connection should be ensured. Additionally, all locking the doors of your car but you leave the
IP communications as well as being integrated information, apart from the temporary cache, windows open, a comprehensive system needs
with other business systems. Today, allowing should exist on a central machine and not on to be employed.”
strangers to access and control a physical individual devices that are easily accessible.
access point can also give them a foot in the He adds that people and access Securing the database
door of your organisation’s complete identity permissions are also extremely important as David Corder from Saflec Systems says a good
management system and, if not properly this is where breaches happen in most cases. start is to ensure that the permissions on the
protected, other sensitive corporate systems. Limiting access to very few key personnel database are set up sufficiently in order to limit
It is therefore critical for physical security should, therefore, be standard practice. access to only the people who should have
decision-makers to make sure their systems Elvey’s Chris Lelicanin adds that at each access. You then limit the personal data that
are protected from cyber attack, no matter exposure point there should be technology- is captured to what is strictly necessary for
how unlikely it may seem that something like driven solutions in place that protect the the business processes used within the access
a simple reader on the door could be used to organisation, users and their data. In a scenario control setup. This is necessary for parts of the
compromise the company. where the user badges on a secure access PoPI act anyway, so it is becoming a necessity
Marco della Peruta from Sensor Security, control device, we should use encrypted for database administrators to keep in mind.
explains that the most vulnerable information secure card credentials, which can take the SQL Server databases use TDE (Transparent
in an access installation is the organisation’s form of a wearable, smart device, physical Data Encryption) on the actual data files which
database of people, and following that, the access card or similar. The user’s fingerprint can protects the data on the hard drive or external
time and attendance logs and the payroll also be used as a secure credential. There are backups. In any event, all communications
information. “Too often we keep payroll also physical means along the lines of anti- between the database and any software
information highly confidential, but the path tamper features which erase secure data on package that reads from or writes to the
from database to payroll could often be edge devices and door controllers. database needs to be configured to use the
intercepted or investigated by the software When looking at the transaction point highest level of encryption available – this is
installation team, for example. between device and controller, he says OSDP currently Transport Layer Security (TLS) 1.2
“The key here would be to ensure that this is a secure protocol to prevent any tapping with 256-bit AES encryption. This protects
database, and the ensuing path, are protected of information between the device and door the data in transit between data reader and
and managed correctly. Even the pulling of controller, as well as to the central server where Continued on page 18
Continued from page 16 the areas where people are given access. It communications immediately come to mind”.
database, however what is typically done is tends to be when there is an issue of theft that (See more in the article: The advantages of
that there is an additional business layer that they then start trying to work out who has OSDP, www.securitysa.com/60145n).
ensures that the person looking at the data been given access where and by whom. However, he says the greatest advantage
is only seeing the information that has been “This trend is starting to change and as is the Secure Channel, which is the encryption
made available to them on a user-rights basis. time goes by people are more concerned with between third-party devices and controllers.
ensuring that the data is accurate and security Unfortunately, even some of the big players
Making it reality auditors are starting to push for proof that the out there have only basic implementations of
As can be seen above, effectively securing system is secure (only authorised people are OSDP and don’t support Secure Channel yet.
your access systems is not a simple task, being given access to certain areas),” Corder “We are working with various companies to
although there are products out there that notes. “As for cyber risks like hacking, I think try and increase the up-take of the protocol,
make the process of securing the full access that the industry is starting to care more, but especially the optional cybersecurity.”
control chain simpler and automated. As with it’s considered an ‘outside risk’. ” The benefits of OSDP are installation
all security issues, complexity is the enemy of and security related, says Della Peruta.
security as most people opt for ease-of-use Should we all OSDP? “Cybersecurity is not always espionage
and convenience to be able to get the job While it is easy to place physical access control over the Internet, but any stage where
done as fast as possible. products and installers/integrators in the box electronic information is intercepted and
If personal data protection wasn’t a relevant of not being aware of cybersecurity, that is understood. OSDP becomes important here
issue for users, we wouldn’t be hearing of not really true. One of the solutions devised as the communication medium might still
class action suits and settlements against to improve the security of data transferred in be accessible, but the high levels of data
major tech companies for user data breaches, access control transactions is Open Supervised encryption remove the risk of listening or
says Lelicanin, and regulations and acts such Device Protocol (OSDP), an access control talking down the line.”
as GDPR and PoPI would be non-existent. communications standard developed by the Lelicanin adds that the good news is
One of the big challenges is that so many Security Industry Association to improve that forward thinking manufacturers have
organisations are of the mindset that we’re ‘not interoperability among access control incorporated and integrated both technologies
in the firing line’ or ‘it won’t happen to us’, but and security products (see more at www. into their products, this lets legacy sites stagger
the reality is that all of us are at risk from cyber securityindustry.org/industry-standards/open- their security requirements and balance them
threats. It’s a serious issue and there are huge supervised-device-protocol). OSDP is touted with their existing upgrade budgets.
ramifications for organisations willing to play as a Wiegand replacement because of the
footloose with user data. additional security built into the protocol. Integrating to everything?
Della Peruta says most people will talk Adding to the conversation, Lelicanin Controlling who or what has access to who
the correct language about security, but the states, “Wiegand has been around for close or what is what access control is all about,
implementation does not always exist. “We on 35 years and is a standard in the industry; whether in the physical or logical world.
are sometimes called to do a recovery on a the problem is it hasn’t kept up with user and As we move into the age of the Internet of
database and find it is often far too easy to get organisational data security needs. Weigand Things (IoT), the question of controlling access
access to it, such as with a TeamViewer link. is unmonitored, easy to hack and suffers from between millions or even billions of devices
“I hear about ransomware that still hits interference and cable length is limited, to will become something the access industry
systems, which is indicative of a lack of security name a few disadvantages. OSDP is an open needs to take note of and prepare for. In this
and easy access from the Internet, LAN or standard so there is interoperability between scenario, the question of why also becomes
even a USB. There are a few customers that hardware of different manufacturers. It also an issue. There may be acceptable access to or
really do in-depth protection, but many do has greater support for biometrics due to from a device or server, but we need to know
not. Education about technology and what is the increased bandwidth and supports why the access is happening, is it a legitimate
happening in the real world, such as IoT and bi-directional communication. “ exchange of data or has someone hijacked
security breaches, should be a key component Corder explains that OSDP has several a device and is trying to install malware on a
of the system integrator’s service.” advantages over Wiegand: “generally fewer server? Is the access control industry ready
Corder’s experience is that traditionally the wiring cores, longer run distances, multi-drop and are the management capabilities for such
people in charge of the access control have rather than star, multiple different devices dispersed systems available?
been more worried about ensuring that people on one network line, less hard-coded ways There is no question that we are moving
have access to the building than locking down of interpreting the data and bi-directional towards a more inclusive integrated
environment, according to Della Peruta. technology? Are they an ethical moral group? cloud services, are modular and scale to
The past of discrete packages where access, The realm of integration such as this goes address the client’s specific needs, have
intrusion, video and building management are beyond ONVIF, and more the direction of PSIM integrated and complete solutions that
different brands and disconnected are over. software systems.” incorporate your access, CCTV, fire and
“I believe there are a few directions on this intrusion and take the hassle out of security.
the industry needs to become comfortable Accessing the IoT So, while we still focus on securing
with, such as threat management, business Access control can already be considered part readers, devices, data and servers within our
efficiency management and marketing of the IoT, most systems already connect to organisations, the future security concerns
analysis. We are not just using the individual the Internet and many are pioneers in IoT, says of the access industry will have to include far
components anymore, but collectively for Corder. IT networks themselves are becoming more ‘things’ that are requesting and sending
much greater functionality. We no longer more secure and are starting to require access or data. Even though most of these are
purchase devices for a simple function, but the authentication to the network itself, using simple sensors that deal in small bits of data
devices exist as a means to a greater solution.” something like 802.1x. Access control products that are generally necessary for analysis, but
Some examples he provides include: will soon have to support this in order to be not a security threat, unfortunately the data
• Monitor water usage and linking that with allowed on the networks themselves – and this pathways will be a tempting target for those
access control and video. is a good thing in that it provides an extra layer intent on getting into your network. Access
• Have a more accurate understanding of hotel of security. administrators will therefore need to make
guests to cater better and improve on food “I think the way the industry is heading sure they secure their networks from direct and
and maintenance costs while simultaneously will be that all access control devices will be indirect attack. If it is not already, cybersecurity
making the venue more appealing. Internet-enabled devices that are configured will soon be a core component of the access
• Collective security information to understand using IT systems like Active Directory. Personal control industry.
if a high security site could have a vulner mobile devices are also increasingly being
ability through a perimeter system fault. used as the access token using Bluetooth For more information contact:
“Naturally, such a level of integration Low Energy, NFC or similar technologies with Elvey, +27 11 401 6700, [email protected],
does become dangerous in terms of all the ability to report back or do biometric www.elvey.co.za.
the equipment that needs to interact authentication using Internet or LAN services.” Saflec Systems, +27 11 477 4760,
with a common platform. Who operates Similarly, Lelicanin also believes we are [email protected], www.safsys.co.za.
and configures such a platform? Are they there already. “Personally, I think the most Sensor Security, +27 11 314 9419, info@
experienced in the type of industry and successful platforms will be ones that offer sensorsecurity.co.za, www.sensorsecurity.co.za.
Physical/logical convergence
By Andrew Seldon.
The convergence between physical and logical (or cyber) security will be a game
changer because it will change the way we do everything.
The question of convergence is nothing new getting physical and logical security people (and hence losing money) due to a cyber-
to the physical security industry. It wasn’t and departments to work together and speak attack. Truebody adds that the point of
too long ago that surveillance technologies the same language. At the NEC XON summit contention in almost all discussions is not
converging onto the IP platform was the at Sun City this year, Bertus Marais, divisional technical or skills related, but cultural.
thing everyone was talking about and we GM of XON Safety & Security, noted that the The ‘IT guys’ and the ‘security guys’
have since seen a massive shift from analogue convergence of physical and cybersecurity have different priorities, personalities and
surveillance to IP-based surveillance – is already a reality in many organisations. He challenges, and very different working
although analogue is far from dead. Similarly, noted that companies today are demanding a cultures – even those working in the same
we have seen almost all the areas of the holistic view of their security operations and company. Overcoming these differences is
physical security industry moving to IP as a if the two worlds are separate, that simply where the hard work starts.
way to better control connected systems and leaves a gap in your security posture. Mark Walker, associate vice president:
integrate with other products. sub-Saharan Africa at IDC Middle East, Africa
Today, however, we are seeing a new Everyone is involved & Turkey, agrees, noting that the current
convergence game in town, one that will Roger Truebody also notes that physical/ allocation of duties among the physical and
have a far greater impact than IP convergence logical convergence is a discussion more logical teams are still very much in their silos
ever had. One of the reasons for this is people are having, but he says, it is a very and the teams have a singular view of their
that nothing in this industry will remain difficult topic to deal with as a generality. tasks and roles in the organisation. He says
unaffected. The convergence between The discussion is definitely growing, but the it is also a question of turf, especially among
physical and logical (or cyber) security will be level of the discussions vary from industry senior people who are worried what may
a game changer, not simply as a result of new to industry, and in some cases, company to happen to their position if the silos converge.
technologies available and new skills those in company. What’s needed from both sides is a
the industry will have to learn, but because Those who see security as important broader view of the business, adds Walker.
it will change the way we do everything, to their future business success are further Security personnel should start looking at
from planning to design and all the way to ahead of the curve due to various pressures security from a business and user point of
installation and maintenance. they find themselves under, as well as past view, expanding their concept of security
Another enormous challenge will be experiences of losing access to their systems to incorporate the whole business. To use
a familiar term, he says they need to look is going to be the boss of the converged sitting in front of it. This combination of
at integrating all their security systems and security department. physical and cyber is simple, but it can
platforms into a holistic enterprise solution. Walker echoes these sentiments, noting prevent unknown people using your
This will include everything, from data and that getting the two cultures working from computer, prevent ‘over-the-shoulder’
network perimeter protection, through to the same scorecard is the first challenge that password stealing and even be integrated
facilities management and surveillance, and has to be overcome. The parties need to get with physical access control in order
all the way to integrating the latest artificial talking and raise general awareness at the to prevent you from logging onto your
intelligence (AI) solutions – such as predictive top about the enterprise’s holistic security computer if you haven’t entered the building
and/or behavioural analytics. challenges. (or a trusted location). Similarly, if it notices
The next step is to continue the you have left the building or your area of
Starting the process communications while also acknowledging work without logging off, it can do so for you.
No matter the challenges, the convergence the scope of the task ahead. Then comes the Vernon Fryer, CISO and GM Cyber
process is not one that will go away and strategy to converge the security function Security at NEC XON, provides an example
companies that delay starting will only into one and the challenge of putting it all of convergence happening in some Cyber
see their people, assets and systems more under one executive – a chief security officer Defence Operation Centres (CDOC) NEC XON
vulnerable and more targeted by more (CSO) or someone with authority to speak to runs in South Africa and further up on the
sophisticated attacks – because they are the board. continent.
easier targets. Truebody says the starting Walker also recommends that automating These CDOCs are examples of
point is to first sit down, talk to each other, as much of the converged security function as convergence in that one of their functions
and develop the will to make convergence possible is critical in terms of getting the best is to monitor IoT devices, which includes
happen. results, as well as streamlining integration security systems, such as surveillance cameras
Once you know that it is going to happen challenges. and other electronic readers or sensors. The
and have buy-in from everyone concerned, central server automatically monitors any
you can then start with a risk analysis that Small wins number of devices over time and creates a
does a full audit of your physical, logical and While the convergence of physical and logical base line of various data points. Should any of
business security risks. In a nutshell, Truebody security is a complex operation and the chore these standard readings change, the control
says that once identified, you can then go of getting people from different cultures centre is immediately alerted that something
further with impact analysis and so forth, to work together is enormous, companies has changed and operators can investigate.
developing integrated prevention, protection can also go for smaller wins to prove its The readings under scrutiny include
and recovery strategies. effectiveness. almost anything, and range from a simple
However, he warns that while it may As an example, Marais said this change in state (from on to off, for example),
look good on paper, if the will and buy-in is convergence can simply be an application through to changes in the firmware (in case
missing, it will not happen as convergence is that logs your computer off, or activates a malware is installed as happened in the
a significant clash of culture and ego – who screen lock when it sees you are no longer Mirai botnet attack), to changes in a device’s
configuration or if a device is accessed from a
strange IP address.
Any changes are noted and investigated
by the CDOC personnel, thereby ensuring the
cybersecurity of physical security devices and
other IoT systems. This relieves pressure on
the operators and makes sure these devices
remain in working order over the long term.
Another integration Fryer says the CDOCs can
perform is to integrate social media feeds to
pick up trends, as well as to identify people
caught on camera from pictures on their
social media feeds.
One article can’t cover the full scope of the
convergence between physical and logical
security, but it is clear that this is a task we
need to get to grips with. Physical security
experts have to adapt to the IT world and all
that entails, including learning the language
and customs of what can be a completely
foreign culture in the office next door. The
result of this convergence will be a complete
security strategy that protects organisations
on all fronts from threats that are only
Mark Walker. Roger Truebody. increasing in size, scope and sophistication.
The main role of these Knightscope robots periodically at quiet times. Ensure device
is to register any suspicious activity and alert redundancy/failover is present if the device
the person responsible on duty. When they are is a key component to the security system.
on duty, they are moving around according to Rebooting will often get rid of malware already
the GPS and lasers, which helps them measure installed, however, in most cases it will remain
and calculate distances and also LIDAR – light therefore this should be merely one weapon in
image detection and ranging. A robotic your arsenal.
security guard. Operator login is managed by • Understand the DMZ portion of your network
password and user name or biometrics. and use it wisely to keep possible non-
• Drones/UAVs from SAPS airwing linked to shot essential IoT culprits off the safe side of your
spotter technology which enables high altitude network. If necessary, tier the firewalls with a
UAVs to be dispatched to the location of a double router configuration.
gunshot and track the perpetrators using GPS • Close ALL unused ports. If there is no option
technology along with thermal and standard for this, consider implementing a secondary
video feeds which stream live to ground router/switch to manage this. For example, if
support units and policing operations centres. you do not use Telnet (port TCP:23) to connect
• Biometric and smartcard login systems for to the router then it is a good idea to disable
networks and workstations – A UID token it so as to close off a potential loophole to
management system which integrates with intruders.
packages such as Microsoft Active Directory • One of the safest and most foolproof weapons
makes passwords a thing of the past and against cyber attacks is to blacklist all MAC⁴
instead forces all passwords through a addresses except those of devices which are
biometric fingerprint reader and manages authorised and allowed access to the system.
the backend password cycling and updating • Always change the manufacturer passwords
automatically using maximum security at initial setup even if the device does not
policies. People cannot share, lose, forget or prompt you to do so. If you are running an
steal them. They simply sign on with a smart intelligent system wide password cycling tool
card or their biometrics. At the same time, a such as SuperSign, then integrate this into as
system like this prevents and deters fraud by many IoT endpoints as possible.
creating Identity Chains that link users to their • Ensure you use complex passwords of at least
transactions, compiling an audit trail of who eight characters long, including numbers,
did what, where and when. special characters, upper and lower-case letters.
• An increasing amount of physical-security • Check often for new firmware versions and
systems are IP-enabled, offering a way to patches and install as soon as possible. If
merge with existing networks, or establish a feasible, set up an auto-script configuration to
separate IP network. run update alerts from the OEMs listings.
• A converged employee badge for physical • Don’t allow external network access to the
access to buildings and access to computers device unless absolutely necessary.
is possible and sets a course in establishing a Electronic security appliances and
common identity-management system. components are IoT devices and need to
• Businesses, especially in retailing be more strictly regulated. This will put the
environments, can benefit from advanced onus on OEMs to ship IoT products which are
IP-based video surveillance that allows for designed around cybersecurity instead of
integration of findings about shopper traffic, purely around usability and revenue.
displays and relative effectiveness of sales
when combined with business data. For more information, contact Terpay Group,
+27 74 566 3663, [email protected],
Advice for system integrators and www.terpaygroup.com.
installers
Some basic logical tips to help minimise the risk 1. IoT-OT and IT Security Convergence - Ruggero
of smart device infection: Contu - Research Director Gartner.
• Physical security systems are becoming 2. Conner Forrest for ZDNet – Internet of Things. The
technically sophisticated and it is wise to Security Challenge.
involve the IT department in their installation 3. IoT– A term first mentioned by Kevin Ashton, of
and management. Information gathered MIT during a RFID presentation he made to Procter &
from physical security systems can often be Gamble (P&G) in 1999.
merged as risk and threat factors with logical 4. Media Access Control address (MAC address) of
IT security. a device is a unique identifier (UID) assigned to a
• Reboot devices periodically – especially network interface controller (NIC) for addresses. Not
routers – and if viable, set the device to reboot to be confused with an Apple MAC or a MacBook.
What role is IT playing in the world of physical access control and how far will
its role expand in future?
It is a fact that IT is becoming more involved in education (19%), information (16%), organisations where IT is not involved in access
the physical security world. In a small minority government (11%), manufacturing (8%), health control, 36% of the respondents said it will be
of companies, these two departments are services (8%), and security, professional and within the next five years.
actually merging, although this is a mammoth business services (8%). Of the respondents, For those organisations where access
task fraught with problems, not only in terms 35% were IT managers, 26% were IT directors, control responsibilities are shared, 47% of
of technology, but primarily in terms of culture. 13% were IT staff, 8% were CIO/CTO, and the respondents report it had been shared
In the access control world, one could say 3% were VPs of technology. The survey also within the past five years. Similarly, where IT
it’s normal for IT to be involved in networking spanned companies of different sizes, with owns the responsibility, 42% of the companies
(assuming the access systems make use of the 24% having less than 100 employees, 22% say they were given this task within the last
corporate network and/or the IP protocol), but 101-500 employees, 11% have 501-1000 five years. Once again we see that IT/physical
the scope of IT has slowly been creeping into employees, 17% have 1001-5000, 6% have security convergence in the access world is an
more of the access control functions. In smaller 5001-9999, and 6% have 10 000-24 999 expanding reality.
companies, for example, it’s not unusual for the employees. The results therefore cover a broad We mentioned IT’s influence in access
service provider responsible for the company’s spectrum of companies and industries. control above in terms of the networking
IT to also take the responsibilities of physical of access systems, however, this is an old
security. The numbers tell a story function. The webinar showed that both
So how far has IT made inroads into the The research offers a significant amount of data IT professionals as well as physical security
access control world in general? HID Global about the role of IT in access control, however professionals see IT being involved in all areas
broadcast a webinar in October 2018 in the webinar brought out a few pertinent facts of access control. When it comes to physical
which it revealed some new research into the (a link to the white paper written by HID from security professionals:
increasing role IT departments and personnel the research is at the end of this article). When • 66% of physical security professionals see IT
are playing in the physical access control asking the organisations being surveyed “Who involved in influencing the decision-making
world. The webinar was hosted by HID Global’s is primarily responsible for physical access process.
Brandon Arcement and Matt Winn. After control in your organisation”, the responses • 48% see IT’s involvement in integrating access
discussing the findings of the research, they were as follows: and other systems.
went on to advise physical security operators • 29% said both IT and physical security. • 37% see IT involved in implementation.
as to how they can embrace their IT colleagues • 26% said IT only. • 22% see IT involved in managing the systems.
further, with the goal of improving the holistic • 25% said facility management handles the From the other side of the table, IT
security posture of their organisations. job. professionals have a similar view:
The survey was conducted by The 05 • 12% said physical security only. • 76% expect to influence decision making.
Group, sponsored by HID and was completed • 8% said the property management company • 72% will be involved in integration.
in March 2018. As the title of this article notes, was tasked with access control. • 59% will be involved in implementation.
the research found that IT departments are With a quarter of the respondents already • 39% expect to be involved in managing
now more involved than ever in organisations’ saying IT is responsible for access control, and systems.
physical access control decisions and a further 29% saying it is shared between the
implementation, and that trend is set to two departments, it’s clear that the divide Not all wine and roses
increase. between IT and physical security is rapidly Of course, as these different cultures work
The 05 Group surveyed 1 576 individuals vanishing – and in some cases, altogether together, there are bound to be some issues.
from more than a dozen industries, including gone. And this is a trend that will continue; in Continued on page 28
Hi-Tech Security Solutions spoke to IDEMIA’s Gary Jones about his career with the
company and its new vision of Augmented Identity.
In the early 2000s, a company named Ideco, in only have we been a major contributor to this Augmented Identity, as Jones explains it, is
close partnership with IDEMIA, was a driver in growth in acceptance of biometrics, thanks to a reliable identity authentication mechanism
bringing biometric technology to the South the performance of our technology, but we that fits in with whatever we are doing,
African market. In fact, this company was so have achieved the market leading position for providing the convenience, while also ensuring
successful that South Africa became a world biometric access and time solutions in North trust to guarantee secure, authenticated and
leader in biometric adoption for a number of America” verifiable transactions.
years. With the coming together of Oberthur The MorphoWave Tower was the first
The first employee, and eventually and Morpho, the company is now known as product aimed at this market in the biometric
managing director of Ideco Biometric Security IDEMIA. access and time space. It allows people
Solutions, was Gary Jones; he developed a Jones is now IDEMIA’s VP of Global to authenticate their identities simply by
successful channel model which proved so Channel and Marketing for biometric access scanning (or waving) their fingerprints over a
successful that Morpho quickly became the and time solutions, and is tasked with scanner while on the move – without having to
leading fingerprint biometric technology in broadening the company’s market share and touch a sensor. The Tower has done extremely
South Africa. share of mind globally. This is happening at well in the US market due to its convenience
Jones then moved to the USA in 2009 to a good time as IDEMIA is now focused on as well as the security it offers (its sensor
join Morpho and lead the restructuring of the Augmented Identity. technology is also certified by the FBI).
channel in that region, which includes most of As you wave your fingers over the scanner
the world’s largest and leading manufacturers Augmented Identity on the MorphoWave, it scans all four fingers
of access control and time and attendance Far from just being another marketing slogan, at 78 fps (frames per second) and it does a
systems. Augmented Identity has a basis in reality, 3D scan. This is like putting your fingers on a
“Reaching the US market was no small task specifically when it comes to security in our traditional sensor 78 times in a second. This
as any change takes a long time due to the daily business and personal lives. Jones says naturally collects high resolution data which
market’s size.” Jones says it took a good three there has always been a trade-off between increases the matching rate and hence the
to four years to see results in the world’s largest security and convenience in the real world. security of the fingerprint biometrics.
economy. But, over the years, biometrics have If you wanted security, you had to accept Additionally, because people don’t actually
become accepted in this market, and in many complexity; if you wanted convenience, it was touch anything, the hygiene factor is increased
instances are a mandatory requirement. “Not security that was compromised. and more people can be scanned faster. Jones
A cost-conscious Wave
To cater for a wider diversity of installations, as well as more cost-
conscious markets like South Africa, IDEMIA recently launched the
MorphoWave Compact, which offers the same authentication facility at
a lower cost. He says IDEMIA’s partners in the region were very excited
about the Compact and were selling it before it even landed in Africa. Of
course, the company has a number of other products, including facial
recognition solutions to supplement the MorphoWave in its pursuit of
its Augmented Identity ideal.
With trips to South Africa a regular part of his job these days, Jones
says South Africa and Africa are key markets for IDEMIA, partially due to
the country’s history of biometric adoption, as well as the willingness of
the market to push the boundaries.
The market in South Africa today is different from the one
in which the former company Morpho and Ideco were able to
establish fingerprint biometrics as a reliable and trustworthy identity
authentication mechanism all those years ago. There are more
companies active in the market and more competition, but Jones
believes IDEMIA is in a good position to take the market to the next level
as both businesses and individuals embrace the ease and convenience, For more information contact IDEMIA, +27 11 286 5800,
as well as the improved security in a world of Augmented Identity. [email protected], www.idemia.com.
Given the increase in the use of fingerprint • Claude Langley for HID Global, and Here I must add that it depends on
technology in public and private organisations, • Gary Jones for IDEMIA. what the application is. Level 1 and Level 2
as well as some recent announcements on the scanners are for commercial use, i.e. access
reliability or lack or reliability of certain types ViRDI Distribution SA, Deon control and time and attendance and have no
of sensors and algorithms in the fingerprint van Rensburg need for images to be kept in the database.
biometric market, Hi-Tech Security Solutions ViRDI is a biometric brand from Level 3 scanners are for governmental, law
spoke to some of the leading fingerprint UnionCommunity Co. in South Korea. The enforcement and banking use for identity
biometric vendors in the market to find out company is active in over 120 countries, management purposes and do keep images
more about the state of this market. including in South Africa and the rest of Africa, in the database. Level 3 systems also compare
To cover the scope of what fingerprint and offers a range of biometrics devices, from these fingerprint images to central databases
biometrics offer, we started by asking how fingerprint to facial recognition. Deon van such as HANIS or AFIS.
fingerprint biometric readers work and what Rensburg represents the ViRDI office in South The process for extracting, matching and
and how they store the data they collect, Africa and up into Africa. authentication is complex.
how reliable they are and then moved into • The user presents their finger to the platen on
the usage thereof. And finally, we asked our the optical scanner of the biometric terminal.
interviewees how end users should make the • The optical scanner then extracts a number of
decision as to what fingerprint biometrics they images of the fingerprint in digital format.
should look at purchasing for their particular • The extraction portion of the algorithm then
needs. extracts unique identifiable features from the
Often when looking for input on an article digital image. We call these unique features
like this, one has to dig around to get the minutiae points.
information one can use. In this case, we • Once these minutiae points have been
received such a large amount of information identified and extracted, the system discards
we had to cut out a significant amount of data. the physical images and everything is
Our information providers have put the effort converted into a complex hexadecimal string
in to take readers on a learning experience that is unique to every vendor.
of what goes into fingerprint biometrics • This hexadecimal string is called a template.
and what are the issues you, the buyer and • The template is then compared via the
user need to look out for when considering matching portion of the algorithm to the
Deon van Rensburg. template that resides within the database.
fingerprint biometrics for access and identity
management. Hi-Tech Security Solutions Although fingerprint biometric scanners • Dependent on the results, the user is then
appreciates their time and effort in supplying use imaging technology (in the form of CCD either verified, identified or rejected.
the below information. Our interviewees are: or CMOS) to capture images of the fingerprint, • The ViRDI system is unique in that it extracts
• Deon van Rensburg for ViRDI, most biometric vendors do not keep images of two templates per fingerprint and then
• Walter Rautenbach for Suprema, the fingerprint in the database. compares to two templates of the same
fingerprint in the database. This provides hack this encryption and was able to unearth It comes down to reliability, safety, security,
us with faster and more secure transaction the base hexadecimal string (template) and durability, speed of use and the extra features
times. was able to reverse engineer the extraction required to provide the solution the user
algorithm, all he or she would find was requires.
International standards for the location of a few minutiae points on a
fingerprint biometrics fingerprint since we do not extract any other Recommended technology
There are two international standards available details, such as ridge flows (i.e. loops, whorls, I would advise that South Africa pays more
for commercial systems. ANSI / NIST-ITL-1-2011 arches, tented arches), ridge patterns or any attention to LFD technology since fingerprint
(updated 2013 & 2015 and includes ANSI 378 & such data required to reconstruct a fingerprint. fraud from users is one of the biggest issues
ANSI 381) and ISO / IEC 19794 (includes parts 4 Think of it as GPS coordinates with no map. affecting us now, especially in the time and
& 8:2006). These standards indicate minimum attendance vertical. If the system can also
requirements for greyscale, dpi, platen size, Specific scanning technology perform Multispectral Response Imaging it
output format etc., as well as interoperability ViRDI uses patented LFD scanning technology. would be an added bonus. There is probably
between different fingerprint biometric This is a multi-step process. First, the platen is only a handful of Tier 1 manufacturers
systems. According to the NIST website these manufactured from Sapphire Crystal to make available in SA (and when I say available, I
standards “…supports the proliferation of low- it scratch resistant for longer life span, and also don’t only mean available for sale, but also
cost commercial fingerprint sensors with limited to reduce the risk of transfer of bacteria. The having technical support, repairs, distributed
coverage, dynamic range, or resolution”. scanning process is subject to a live fingerprint points of presence etc.) and if the end-user has
However, they are minimum standards and being placed on the platen. Until a live finger is a larger system they need to stay with these
most Tier-1 vendors use proprietary algorithms placed on the platen, the complete fingerprint manufacturers.
that far exceed these minimum standards as scanning module remains in low power state. When looking at the deployment of the
well as proprietary scanning systems (what Once the scanning process activates, the system, the end-user must decide whether
we call the fingerprint scanning module) fingerprint module bombards the fingerprint they want the TATA or the BMW. If it is a simple
that includes LED lighting technology, platen with multi-coloured LED light. By using one- or two-door deployment, the TATA may
construction, lenses and optical devices. this light source, we are able to achieve be just the device (for a simple application),
The PIV/AFIS systems used by governments, Multispectral Response Imaging, i.e. we do not but it won’t be able to handle 30 or 40 doors
law enforcement and banking have the MINEX solely use the epidermis of the fingerprint and on one system – it will fall over.
standard since they compare, verify or identify the scanning process is subject to a number Continued on page 34
fingerprints from a centralised database such of factors inside the dermis that needs to be
as HANIS or AFIS and all images must comply within acceptable parameters. Only once these
to one set of standards since a fingerprint have been complied with does the system
taken with a Level 3 PIV/AFIS scanner in South begin taking images of the fingerprint.
Africa must be exactly the same as one taken This is also not a straightforward process as
in the USA or Europe. the lenses inside the fingerprint module have
been specifically designed – and patented – by
Safety, security and privacy ViRDI for the best possible image to reach the
Reputable biometric vendors have been image sensor. Once the images have been
cognisant of the possibility of reverse captured, the algorithm extracts two separate
engineering fingerprints and templates for at templates of the minutiae points and converts
least a decade and they spend huge amounts it into a template which is then encrypted
of money on R&D specifically to prevent using our proprietary encryption. Matching
any form of fraud or reverse engineering. can either take place on the terminal or on the
Governing the usage and storage of biometric server, or at both locations.
data are subject to various standards and even The ViRDI algorithm is currently the highest
legislation. ISO 27001, for instance, provides rated commercially available for embedded
minimum standards on storage and encryption devices with an EER (Equal Error Rate, which is
of such data. a combination of FAR and FRR) of 0.234%, FRR
Speaking from the ViRDI point of view on of 0.1% and FAR of 0.0001%. Our algorithm
how we prevent reverse engineering: when complies with (and exceeds) ANSI / NIST and
our algorithm extracts the minutiae points ISO as well as some more obscure standards
from the fingerprint, we only include the such as WQL.
data relating specifically to those minutiae The question of whether it is worth paying
points in the algorithmic hexadecimal string more for our device than some cheap-and-
(or template). We then encrypt the template nasty device is similar to the question asking
with a proprietary encryption that exceeds why buy a luxury BMW as opposed to a TATA.
ISO 27001, very similar to a standard 512-bit Both have bodies, both have seating, both
encryption. have wheels, both have engines, both have
When data flows between terminal and transmissions and both have the same basic
database, the data is also encrypted using this function – transporting people from one point
proprietary encryption. If a ‘hacker’ was able to to another. So why buy one over the other?
Continued from page 34 bifurcations and ridge endings on the image to principles and who is willing to openly and
forerunners of standards and benchmarking verify the accuracy. honestly consult. To not obfuscate or avoid
systems. This can broadly be subdivided It is for this reason that NIST, in answering the question with some usefulness,
into two categories: the fingerprint image collaboration with the fingerprint the following are some of the deterrents at
produced by the fingerprint scanner on the community, started MINEX, short for Minutia hand:
one hand, and fingerprint algorithms on the Interoperability Exchange. There are various Liveness detection: Perhaps the simplest
other. MINEX standards all focusing on cross solution is using fingerprint hardware as well
When looking at fingerprint images, the vendor interoperability. Here vendors get as algorithms that detect fake fingers. We have
FBI certifications Appendix F/G, PIV, FAP and the opportunity to do fingerprint template to continue monitoring what defines ‘live’,
more exist, basically prescribing the quality extraction (extracting minutia) from a especially with 3D technology venturing into
and size a fingerprint scanner should produce. given data set and then to benchmark their organ production.
Quality, in layman’s terms, refers to how well matching algorithm, or other open standard Data protection: All solutions
it represents the actual fingerprint, and size, algorithms, using open standard fingerprint should ensure to encrypt both data
which does matter because the more of the templates against a large and given fingerprint being communicated and stored using
fingerprint that can be captured, the more test data set. Vendors that participate in internationally recognised and current
data that can be used by the algorithms that these tests get a performance ranking across encryption standards. It is not uncommon
process the images. other vendors, but remember that rankings for solution providers to apply proprietary
Fingerprint algorithms, or at least the good change on a daily basis as vendors rework their obfuscation over and above recognised
ones, normally offer two types of extraction, algorithms to deliver better results. I consider encryption since continuous efforts are
one that produces proprietary templates, of the impact of MINEX as exceptional, not only being applied on a daily basis by ethical
which the content and structure is unknown because it focuses on interoperability, but and unethical parties to break recognised
and only usable by the manufacturer’s system, also because it drives vendors to continuously encryption standards through mathematical
and then the second being the production improve. and brute force mechanisms. Although this
of an open standard, normally ISO/ANSI Looking specifically at the matching does complicate things for hackers, it also
compliant fingerprint templates. Where ISO/ capabilities of proprietary fingerprint creates a ‘proprietary’ threat to the vendor who
ANSI templates are produced, they can be used algorithms, not using open standards, then might be vulnerable to lock down. The benefits
by any vendor supporting these standardised FVC (Fingerprint Verification Competition) and downfalls of each need to be evaluated on
templates, and since the structure is open, is a well-known benchmark. It started as a a case-by-case basis.
the core finger data being extracted can be competition every second year, but the last Biographic and biometric data
evaluated by a fingerprint expert by plotting was in 2006 after which they progressed to separation and fragmentation: Separating
FVC-onGoing, allowing participants to do the biometric and biographic information across
test again at any time. This means a vendor can infrastructure helps protect data. For example,
tweak, test, tweak – instead of waiting for two should a hacker gain access to a server with
years, which once again is great for algorithm biometric data, where no personal data or
improvement. identifiers exist, the usefulness of the data
Buyers must ensure their selected deteriorates. In other words, if I get access
vendor does not boast about their algorithm to all biometric data for Bank X, but I do not
improvements based on internal results, but know whom they belong to, how would I use
use internationally recognised test benches this data to do fraudulent authentication? As a
and standards such as MINEX, FVC-onGoing hacker, I would now have to hack into another
and others recommended or prescribed by infrastructure stack and identify how these two
institutions such as NIST, FBI and ISO biometric data sets are linked.
workgroups.
Suprema’s technology
Security and privacy Suprema’s range of enrolment and
Fingerprint images are more hackable than authentication finger sensors, and selected
fingerprint templates, but in both cases, with access and T&A range complies with various
today’s technology, rebuilding a modelled FBI regulations. These include PIV, Mobile
3D image of a finger is not impossible and ID, FAP and Appendix F, designed to ensure
most likely is already being done. Even if an compliance to image quality and size
un-hackable fingerprint image or template was regulations. It is important to note that the
available, and I really wanted your fingerprint nature of the certifications do not allow all
image, why would I not just find a way to lift fingerprint readers to have all certifications. For
your latent print off an object you touched and example, due to its size, a slap or palm scanner
then use the same to recreate that modelled does not fall into the Mobile ID certification
fingerprint? range and Appendix F is designed for FAP45
Deterrence of unethical access and use of (FAP relates to specific sizes) and up.
biometric identity data can only be achieved Most of Suprema’s fingerprint scanners
through continuous change and a vendor and/ also include liveness detection, some in the
or solution provider that follows the same form of hardware components and some
Advice to buyers
Different use cases can be based on needs and purpose. In all
cases, we expect biometric technology to positively confirm or
identify a person, with tolerances only accepted based on the
limitation of the science of fingerprint mathematics. In summary to
the previously provided data:
• Determine if your system requires you to store fingerprint images
or only the templates. If images are required, then do ensure your
fingerprint scanner complies with known certifications (i.e. FBI
and NIST quality standards).
• Enrolment vs authentication. Keep in mind that initial enrolment,
or reference data collection, is the most important part of a
biometric identity solution. A bad enrolment will result in poor
matching performance.
Continued on page 38
Continued from page 38 they are protecting. There are over 35 000
in the capillary beds and other sub-dermal different materials which can be used to
structures. make fake fingers and hundreds of videos
Unlike surface fingerprint characteristics, on the Internet on how to make them.
which can be obscured during imaging by Government entities, banks and factories
moisture, dirt or wear, the ‘inner fingerprint’ must all consider the diversity of finger
lies undisturbed and unaltered beneath the types in their user population and base their
surface. When surface fingerprint information requirements for biometric technology on
is combined with subsurface fingerprint these factors. HID’s multispectral imaging
information and reassembled in an intelligent technology captures details below the
and integrated manner, the results are more surface of the finger and therefore performs
consistent, more inclusive and more tamper capture, liveness detection and matching on
resistant. The use of multispectral imaging also all the most difficult finger types.
contributes to our industry-leading liveness
detection. Purchase considerations
As of the printing of this article, HID V There are many considerations when
series multispectral imaging sensor is the only making a buying decision on biometric
sensor to achieve a perfect 100% detection of technology. The three most important
fake finger attacks during the ISO/IEC 30107-3 include:
Presentation Attack Detection (PAD) standard • Capture: How effectively does the sensor Gary Jones.
certification testing process. (See more at match my authorised individuals on a
supplied by a tier-1 MINEX III certified
https://www.hidglobal.com/press-releases/hid- consistent basis over time in the real-world
algorithm for fingerprint templates, including
global-lumidigmr-multispectral-fingerprint- setting? This is covered by the metrics
ANSI 378 and ISO 19794-2 MINEX templates
technology-earns-first-perfect-score.) related to the ability to capture usable
supplied by a Tier-1 fingerprint algorithm
Many of HID Global’s Lumidigm sensors biometric data on the first attempt for
partner, independently tested and validated
also offer the use of the Innovatrics MINEX every user. Ability to capture is the most
by the U.S. National Institute of Standards
III algorithm. As published by NIST on the essential performance consideration
and Technology (NIST).
12th of November 2015, HID became the in commercial biometric applications.
first vendor to achieve full PIV compliance in Consumers expect ‘100/100’ capture
For more information contact Claude Langley,
MINEX III while also ranking first in most of the performance, even in challenging
HID Biometrics, +27 83 321 2922,
main accuracy and interoperability criteria. environmental conditions and for diverse
[email protected].
The Innovatrics template generator is one of populations.
the most accurate out of all vendors and the • Liveness: How effectively does the
Innovatrics template matcher performed the fingerprint sensor determine whether
IDEMIA: Gary Jones
The combination of Oberthur Technologies
best in the native one-finger ranking where it the fingerprint is real or is a fake?
(OT) and Safran I&S (Morpho) resulted in
was placed first among all submissions. Liveness detection refers to the ability to
IDEMIA, a company that has coined the term
The bottom line is that HID’s multispectral confirm that the captured finger image
Augmented Identity. Gary Jones is the VP for
sensors offer the best performing sensor for is legitimate and from a live finger by
channels and marketing at IDEMIA (see more
image quality combined with the best liveness comparing complex optical characteristics
in the article “Taking augmented identity to
detection available. If matching is required of the material presented against known
the world” on page 30).
on the sensor, we offer a top-ranked minutia characteristics of living skin. This unique
The first stage of fingerprinting is referred
extraction and matching algorithm. ability of multispectral imaging provides
to as ‘acquisition’ because the sensor acquires
accurate fingerprint liveness detection and
an image of the fingerprint, which is a pattern
Recommended technology for eliminates the perception that fingerprint
of ridges and valleys.
Africa images must be kept secret to be trusted
Next comes the feature extraction phase
The fingerprint sensor should match the use for user authentication. Fingerprint images
during which the unique features of the print
case, yet in most cases where fingerprint are not secrets.
(referred to as minutia, are detected and
biometrics is used, the goal is to properly • Match: How effectively does the minutia
extracted). Minutiae are the points where
validate the identity of an individual. extraction and matching occur? Is the
ridges start or end (terminations), or where
Typically, performance matters and adoption data interoperable or am I locked into
they split from one into two (bifurcations), as
of the technology is hindered if authorised a proprietary template format that
well as various combinations thereof.
individuals are not matched quickly. Liveness requires me to purchase only a certain
should matter as the true value of biometrics is type of sensor? To prevent vendor
only realised when it is used. lock-in and to provide choice for users of
The potential impact of poor accuracy to commercial biometric systems, fingerprint
a government or a banking application can authentication solutions should use
be significant compared to a factory time and interoperable and independently tested
attendance application. Organisations need to global fingerprint minutia standards. HID
understand the level of attack sophistication, Global’s fingerprint matching technology
frequency of attack and the value of what uses existing ISO 19794-2 templates
The image below shows the process including an advanced method Additionally, there are four key aspects needed to prevent against
of enrolment using multiple acquisitions of the same finger which are identity theft risks:
compared/matched against each other, and then consolidated to create
a more complete and reliable template. The nature of data stored.
• One key reason biometric systems discard the image is to make the
process of reverse engineering as complex or improbable as possible.
Even if we assume a hacker somehow gets hold of a template, a reverse
engineering process will always result in differences from the original
image (as it will be a synthetic/generated image from a much smaller
subset of data).
• This is analogous to a children’s join-the-dots drawing. You can join
the dots in the correct order millions of times, but depending on how
the lines flow, every resultant picture can look slightly different, and
even small differences can have a significantly negative impact when
matching fingerprints.
International biometric standards • Irrespective, the process of reverse engineering is a very complex one
Biometric sensor standards govern both the image size and quality and typically not worthwhile for reasons described below.
produced by a sensor. They define parameters such as resolution (ppi),
distortion, illumination consistency as well as image dimensions. FBI System security architecture
PIV IQS is the standard most commonly relied upon for sensors used in At a high level, this includes:
access control and/or time and attendance. • Hardware/software architecture and resultant robustness against
There are also standards for biometric template generation, such as physical and network penetration,
the ANSI INCITS 378 format, which is designed as a common template • Defining access roles and privileges, and
format which can be used by any vendor. This resultant interoperability • How the data is encrypted at rest and during transmission.
allows templates generated by a system from manufacturer A, to be
compatible with a system from manufacturer B, and so on. Spoof detection
Most major biometric vendors submit their algorithms to NIST This is a key line of defence in biometric systems. Today’s leading
(National Institute of Standards & Technology) for independent technologies employ complex mechanisms to determine if the
benchmarking. These benchmarks are heavily relied upon by major biometric being presented is genuine or some kind of 2D or 3D spoof
users of biometrics, but equally present a valuable resource for smaller attack (such as a fake finger or hand). This drastically reduces the risk or
customers to determine the robustness and performance of a given threat posed by stolen or hacked biometrics
vendor’s biometric algorithms, now and over an extended period as the
benchmarks have been running for multiple years. Multi-modal or multi-factor authentication
This can help determine how long a vendor has demonstrated • By incorporating two biometric factors (e.g. face and fingerprint),
leading performance, how consistent their solutions are over time, and the security of a system can be increased even further. Similarly, by
how much they invest in R&D to ensure continuous improvement of scanning more than one finger on a hand the accuracy is increased
their products over time. whilst also increasing the complexity of spoof attacks.
NIST conducts benchmarks for both proprietary and interoperable • Incorporating a card and/or PIN in addition to the biometric (or any
template formats, and it is important to select a vendor with strong combination thereof ) can also be used to further strengthen the
performance in both domains to ensure robustness and future proofing robustness of a system against attack
of the enrolment data and solution. o Something you know
o Something you have
Preventing identity theft o Something you are
This also ties back to the encoding process mentioned above. Continued on page 42
Continued from page 41 validated by the large number of customers simple examples can be used to illustrate the
No system is 100% bulletproof, but one can who are still using Morpho readers installed importance of accuracy and its impact on cost:
design a system to make the level of effort far almost 20 years ago, which are still performing • In a time and attendance system, every false
outweigh either the reward, or alternate means better than many new entrants on the market clocking (either because a fingerprint did not
of achieving the same goal. today. Our sensors and algorithms are proven match, or worse, matched incorrectly) leads to
in the harshest industries and environments, downstream payroll errors that require human
Technology from IDEMIA and comply with major industry standards. intervention to correct. This has a direct labour,
As the global leader in biometrics for over four Our most advance offerings, MorphoWave time and financial cost, which over only a
decades, IDEMIA manufactures a wide range of Compact and MorphoWave Tower, are few months can exceed the cost differential
FBI PIV IQS-certified optical sensor technology in a league of their own. The 3D imaging between a cheap biometric system and an
for access control and time and attendance technology is able to acquire up to 30% more industry-leading biometric solution.
markets. These include: data from each finger and scan all four fingers • In an access control application, a company
• High-speed touchless 3D fingerprint sensors multiple times in 3D during a single wave. This with 1000 employees transiting through
(MorphoWave) which scan all four fingers is faster than many competing readers can a conservative five access points per day,
with a simple wave of the hand. scan one finger in 2D. may have over 1 million access transactions
• Large area contact-based single fingerprint With in-motion matching, users do not per year. We often see cheaper biometric
sensors used in our MorphoSmart and need to stop or pause at the reader, resulting in systems being configured with low matching
MorphoAccess Sigma readers. throughput exceeding 45 people per minute. thresholds such as 1 in 1000 False Accept
In addition, IDEMIA’s fingerprint algorithms A major breakthrough with this technology Rate (FAR) in order to avoid high levels of
are consistently ranked #1 on NIST benchmarks is that both security and convenience are inconvenience due to False Rejection Rate
and are trusted by the world’s largest users increased simultaneously, therefore requiring (FRR). This would result in approximately 1000
of biometrics. Due to the strength of our no compromises. incorrect false authorisations per year, leading
algorithms we are able to offer customers to a high risk or fraudulent access and making
the ability to configure a security threshold User and technology the system audit highly questionable.
(assurance level) that is strictly enforced by recommendations In addition to potential theft or malicious
our readers irrespective of the database size. We regularly see some important attack related losses, implementing an
Cheaper biometric products typically suffer fundamentals being overlooked in the insecure system opens the organisation to
from performance/accuracy degradation as commercial sector. Clients often choose to significant liability risk.
the user population grows. buy cheaper technology because they don’t South African organisations should look
Unlike many cheaper alternatives, our think of themselves as having the same closely at the total cost of ownership when
technology is designed and built to last, and accuracy requirements as a major government selecting a biometric system. Referencing major
therefore ensures the highest ROI. This is organisation, for example. However, a few benchmarks such as NIST and researching
which technologies are trusted by major
organisations such as Interpol and the FBI, who
rely heavily on biometrics, is a reliable indicator
of which technology is thoroughly proven, can
scale well, and ultimately can be trusted.
Factors such as local support from the
manufacturer in conjunction with a well-
established channel network of resellers
and installers in the region should also be
considered. Another factor is how long the
vendor/manufacturer has been present in
the market. A biometric system should be
looked at as an investment that should
last a minimum of 5 years but typically
10+ years is common for industry
leaders.
In other words, never
compromise. A more accurate,
proven solution will pay for itself
within months when compared
to cheaper alternatives.
A better approach to
fingerprint biometrics
An Integrated Biometrics White Paper.
Facial recognition has advanced to the point where it can be rolled out over large
areas and accuracy is no longer a hit-and-miss affair.
There are many companies offering facial face deviates from perfect, or the bigger the
recognition today, most of them incorporating age gap becomes, the lower the match scores.
some form of artificial intelligence into their A weak algorithm will deviate widely between
identification and authentication offerings. good and poor quality images, while a strong
Unfortunately, facial recognition has not algorithm’s accuracy will tail off, but with a
gained the best reputation over the years, gradual and predictable drop.”
although there are some success stories in When a face is enrolled into the NEC facial
controlled environments. biometric system, he says the AI-enabled
NEC XON held its seventh annual summit technology automatically simulates how the
at Sun City in October and mixed in with face would look, not only in ideal conditions,
the various discussions on Industry 4.0, safe but also in a variety of lighting conditions and
cities and artificial intelligence (among other angles. Additionally, the technology does not
topics), facial recognition gathered more than Bertus Marais need to see all of the face to get a good match.
a few mentions as a non-intrusive and reliable Ageing does impact the match scores, but
identification mechanism of the future. algorithms that work behind the scenes to the tail-off is very predictable; we have many
Following the summit, Hi-Tech Security interpret the data they receive. examples of a 30+ year age gap still yielding
Solutions spoke to Bertus Marais, GM, public successful results. “As a general rule, if a human
safety and security at NEC XON about facial Indirect and old views could identify someone from the facial picture,
recognition and NEC’s work in this regard. The issue of lighting and whether the subject our algorithm is highly likely to as well; this
When considering the previous lack of is looking directly at the camera, or if he/ usually translates to about 70% of the face being
reliability of facial recognition, due in large she is wearing sunglasses or a cap (and even visible. Unlike a human, the algorithms can do
part to issues such as uncontrolled lighting or ageing) is no longer as big a hindrance to facial this against many thousands of faces in real-time.”
people not looking directly at the camera, or biometrics. Marais says NEC has made huge
wearing caps and other clothing that hides inroads in this regard. Privacy and facial biometrics
part of the face, Marais says environmental “Performance will always be best if you If we assume that facial biometrics work well, the
difficulties have always played a role and will have a fully visible and well-lit frontal image privacy issues of using it in public spaces needs
continue to do so. and an image pair within five to 10 years of to be addressed as there will be nothing to stop
However, he adds that the algorithms each other, for example a passport and source anyone from identifying you anywhere if there
behind facial recognition have improved so that are maximum 10 years apart. However, the are no rules to manage the use of the technology.
remarkably that things like the angle of a real world does not always work like that. Facial recognition offers a unique platform
person’s face or the lighting make much less “In the real world people wear hats and that can help in many areas of society, notes
difference today. The camera hardware has glasses, their faces are often partially obscured, Marais, from providing benefits such as
also improved and continues to do so, but often at an angle and presented in various national security, law enforcement, and more.
the biggest improvements have been in the lighting conditions. The more the image of the Other examples include speeding up and
streamlining a traveller’s airport experience, Facial biometrics closer to home? Real-world usage
to reducing fraud in the financial sector, Most of the concepts of facial recognition we Facial biometrics are being used worldwide
to ensuring that aid reaches the intended hear about are in a safe-city scenario or being for a number of applications, at ports of entry
recipient after a disaster, to ensuring that a self- used in airports or public transport, but what and exit they are used to scan hundreds of
registered problem gambler can get the help about identity authentication in the workplace thousands of faces daily. They are used for
they need, all the way through to hospitality, or even at home? Could your laptop’s webcam public surveillance, such as is the case with
VIP solutions and beyond. All of these areas act as a touchless authentication mechanism an African authority that runs it across urban
offer a unique opportunity to provide benefits to make online shopping or logging into your CCTV networks. They use it for safety and
to society, but each has a very different context corporate network as simple as a glance? incident management. The same technology
and use-case. These must be addresses with a Liveness detection is a crucial issue in will be used for safety, monitoring, and
privacy model appropriate to the use-case. this regard, adds Marais. Some specialised management at the upcoming Olympics to be
“The key to this question is, “What is the webcams have depth of field sensing, which held in Japan. It’s already being used to help
context of the use-case?” It is reasonable to is crucial to liveliness detection, but the control hooliganism at soccer matches across
assume that a national security agency acting on technology is not widely adopted because it Europe and it is being used for border control
firm intelligence responding to a potential life- is expensive and not as mature as we would at several locations across Africa.
endangering scenario will take a very different like for tasks such as identity-based access “NEC’s NeoFace Watch facial recognition
view to a local retail outlet using the technology privileges to physical and virtual environments. software is now so advanced that it is scanning
to provide a VIP customer experience,” states “Your average laptop camera or webcam tens of thousands of faces in minutes, with
Marais. “Different use-cases will take different is essentially a 2D view of the world. You can many successful frames per face to record a
approaches to areas such as where the cameras trick most of those into facial recognition match. That’s how fast it is,” Marais says. “But it
are placed, what they are used for, who is with a good quality photograph or video of a obviously requires the right infrastructure to
captured, what records are stored, what records person. The camera has no way of knowing if support it, which many cities and facilities now
are enrolled, data retention periods, encryption it’s looking at a live human being. already have.
and security, alerting mechanisms, audit, etc. “Current high-end camera technology “You have to network all the cameras, feed the
“As with all technologies, robust regulatory that gets a real 3D view of the world is far data to servers in a properly maintained data centre,
frameworks and policies should be encouraged better and cannot be so easily tricked. But it’s analyse the huge volumes of data intelligently,
to drive ethical and responsible adoption,” expensive so it’s unusual to deploy it today. return usable results with high accuracy for
he continues. “The public, governments, We prefer not to position facial biometrics for processing by humans so they can respond – and
corporations and customers have a role to play access control, but rather for surveillance.” all of that in real time. It’s sophisticated, accurate,
in this area. From a technological standpoint, He continues, “we prefer to use a different, and dependable and organisations, from countries
the system is taking the exact same data as a two-factor system for access control. For to cities, installations, structures and public venues
regular CCTV camera; in fact, it is storing less example, if the facial recognition system sees can definitely use existing technologies such as
information as most facial recognition systems me walking past the restrooms it knows I’m not CCTV and networks. They only add what’s missing
tend not to store the entire video, but rather at my desk. It can check my laptop or desktop from the total picture.”
just the faces. The underlying point is that use system and, if it’s still active, lock it down so
of any facial recognition system should be nobody can access it. Or we use a fingerprint For more information contact Mark Harris,
subject to an appropriate level of control; this and a face check, or a normal magnetic access NEC XON, +27 11 237-4500,
comes down to context of the use case and the card combined with fingerprints or facial [email protected],
governing frameworks.” recognition.” www.nec.xon.co.za.
Device/solution: ASC1204B-S
Manufacturer/brand name: Zhejiang Dahua Technology Device/solution: Magicard PVC Card Printers
Distributors: Elvey, Reditron, Inhep Digital Security, Security Warehouse Manufacturer/brand name: Magicard
Product description: The Dahua access control solution integrates door Distributors: Doculam
control, user management, real-time video push, time and attendance, Product description: Magicard ID card printers are a superior brand of
and E-map. The all-in-one system is customised to meet the needs of all printer backed by the industry’s best warranties. The printers’ ability to
managed buildings. support field upgrades to transform them from single side printers to
Typical applications: Four door access controller, anti pass-back, alarm double side printers allows for flexibility to adapt to clients’ changing
function, user management requirements. The additional card security features that come with the
Integration support: Developer API Magicard Rio range of printers helps the brand stand out against its
Contact details: Fritz Wang, [email protected], competitors.
+27 72 628 6810, www.dahuasecurity.com Typical applications: Access control, student cards, driver’s licences,
loyalty cards
Contact details: Shaun Stanley, [email protected],
+27 21 557 0666, www.doculam.co.za
Doculam Doculam
Device/
solution: Alcohol
Breathalysers
Manufacturer/
brand name:
Alcovisor
Distributors:
Doculam
Product
description: The
Alcovisor range
of breathalysers
Device/solution: Metal detectors
carry a selection
Manufacturer/brand name: Garrett
of specifications
Distributors: Doculam
suited to each access screening application. The range
Product description: Garrett metal detection products form an
is made up of the Mark X, Mercury and Alcofind units. As alcohol
essential part of threat detection for a number of different sectors in the
screening forms part of an organisation’s health and safety regulations,
security industry. The walkthrough units come with 36 zones of
this is normally performed at a company’s ingress and egress points. The
detection and are superior in their class. Normally used in conjunction
Alcovisor range has been performing exceptionally well over the past
with the Garrett walkthrough units are the Garrett handheld super
12 years since its introduction to South Africa and continues to win the
scanners which professionals in the security industry trust as being
market’s trust.
reliable and having stood the test of time.
Typical applications: Access control, screening, industry,
Typical applications: Access control, security at checkpoints in airports,
law-enforcement
government facilities, entertainment and transportation venues, to
Contact details: Shaun Stanley, [email protected],
mention a few
+27 21 557 0666, www.doculam.co.za
Contact details: Shaun Stanley, [email protected],
+27 21 557 0666, www.doculam.co.za
ET Nice ET Nice
Device/solution: WIDE Vehicle Barriers Device/solution: Gate and garage door operators
Manufacturer/brand name: ET Nice Manufacturer/brand name: ET Nice
Distributors: Regal Distributors, Elvey, Stafix, IDS Distributors: Regal Distributors, Elvey, Stafix, IDS
Product description: WIDE manual and automated boom pole systems Product description: A world without barriers. Automated gates and
for vehicle traffic access control, including optional extras, accessories garage doors created for residential and high-traffic areas. Available
and spares. Proudly designed, manufactured and supported in South with a full range of accessories proudly designed, manufactured and
Africa. supported in South Africa.
Typical applications: Access automation Typical applications: Access automation
Integration support: Electronic technology Integration support: Electronic technology
Contact details: Gerald Kirsten, [email protected], +27 21 404 8000, Contact details: Gerald Kirsten, [email protected], +27 21 404 8000,
www.niceforyou.com/za www.niceforyou.com/za
Device/solution: IQSuite.cloud
Manufacturer/brand name: iPulse Systems
Distributors: iPulse Systems
Product description: Simple, secure and powerful: IQSuite.cloud
brings the as-a-service model to the access control and workforce
management space. Control and manage access to all your secure
areas, and track when and where team members use the system from
anywhere. Live clock events ensure that you know instantly who is using
what door, and what time they were there.
Typical applications: Access control, visitor management, workforce
management
Integration support: Full secured API framework Device/solution: PaxLock Pro
Contacts details: Sales team, [email protected], 0860 478 573, Manufacturer/brand name: Paxton Access
www.ipulsesystems.com Distributors: Regal Security, Reditron
Product description: PaxLock Pro is Paxton’s wireless networked access
control solution in a door handle. It communicates wirelessly to the
server PC via a Net2Air Bridge, reducing cabling and installation time.
Typical applications: Access control
Integration support: CCTV, fire alarm, intruder alarm, visitor
management
Contact details: Paxton, [email protected], +27 21 427 6691,
www.paxtonaccess.co.za
Device/solution: SDC-620 Multiple Door Controller Device/solution: SDC-650 Multiple Door Controller
Manufacturer/brand name: Saflec Systems Manufacturer/brand name: Saflec Systems
Distributors: Saflec Systems Distributors: Saflec Systems
Product description: The SDC-620 replaces the SDC-520 and brings Product description: The SDC-650 replaces the SDC-550 and brings
with it a host of new features and functionalities. It can control up to with it a host of new features and functionalities. It can control up to
eight doors and can be linked with up to 16 SDC door controllers eight doors and can be linked with up to 16 SDC door controllers
using a protected RS-485 network. The controller can store up to using a protected RS-485 network. The controller can store up to
1 million tags, 250 000 tag holders, more than 6 million access logs 1 million tags, 250 000 tag holders, more than 6 million access logs and
and 3 million system logs. It also offers 256 powerful offline event/ 3 million system logs. It also offers 256 powerful offline event/action
action combinations. combinations.
Typical applications: Access control, security, time and attendance Typical applications: Access control, security, time and attendance
Integration support: OSDP secure channel compatible, I/O integration, Integration support: OSDP secure channel compatible, I/O integration,
manufacturer proprietary technology, Wiegand, software level manufacturer proprietary technology, software level integration on the
integration on the server server
Contact details: Saflec Systems, [email protected], +27 11 477 4760, Contact details: Saflec Systems, [email protected], +27 11 477 4760,
www.saflecsystems.co.za www.saflecsystems.co.za
Veracitech Veracitech
Device/solution:
XMP-Babylon
Manufacturer/
brand name:
Autec (XMP-Babylon)
Distributors:
Veracitech, Veracitech
Systems Namibia,
Veracitech Engineering
Botswana
Product description:
Powerful, secure, flexible, enterprise level, multi-site access and Device/solution: Traka intelligent key cabinets and locker systems
automation control system. Stable, industrial, intelligent and Manufacturer/brand name: Traka
programmable hardware and software for card readers, door control Distributors: Veracitech, Veracitech Systems Namibia, Veracitech
units and hardware modules used in various applications, such as access Engineering Botswana
automation, time recording, people management, biometrics and Product description: Veracitech is an integration partner and value-
camera control. added reseller for Traka intelligent key cabinets and locker systems.
Typical applications: Access automation, time management, Veracitech has a fully integrated solution for managing Traka systems in
integration, security management the XMP-Bablyon platform, allowing full integration and control of keys
Integration support: Several integration and software/hardware and lockers together with access control and automation.
solutions Typical applications: Key management, lockers, key cabinets, asset
Contact details: Alvin Flaum, [email protected], +27 11 888 7251, lockers, access control, people management, biometrics.
www.veracitech.co.za Integration support: Integration partner for Traka key cabinets and
locker systems on the XMP-Babylon platform.
Contact details: Alvin Flaum, [email protected], +27 11 888 7251,
www.veracitech.co.za
ZKTeco ZKTeco
ZKTeco ZKTeco
Device/solution: LPRS 2000 Hybrid
Identification Vehicle Management
Terminal
Manufacturer/brand name: ZKTeco
Distributors: Regal Distributors SA,
Security Warehouse
Product description: The LPRS2000
is a hybrid identification vehicle
management terminal that adopts
multiple recognition modes for
long-range RFID and licence plate
recognition. It combines the latest
developed high-performance UHF
reader to ensure that the capture rate
Device/solution: C5S-Series IP-based Door Access Control Panel and recognition accuracy of fixed
Manufacturer/brand name: ZKTeco vehicles are up to 100%.
Distributors: Regal Distributors SA, Security Warehouse Typical applications: Access control,
Product description: The C5S supports all card readers, such as the entrance control
ZK KR-series; Wiegand readers and RS-485 card readers; HID Prox, Integration support: Standalone,
iClass and XceedID multi-card technology. It offers users more than works with ZKBioSecurity
access control: After programming, auxiliary relays can interface with Contact details: Brent Saaiman,
lights, alarms and intrusion detection panels. There is a case protecting [email protected], +27 12 259 1047,
the C5S controller. www.zkteco.co.za
Typical applications: Access control, entrance control
Integration support: Works with ZKBioSecurity
Contact details: Brent Saaiman, [email protected], +27 12 259 1047,
www.zkteco.co.za
ET Nice IDEMIA
IDEMIA IDEMIA
IDEMIA IDEMIA
Device/solution: MorphoWave
Manufacturer/brand name:
MorphoAccess by IDEMIA
Distributors: Ideco Biometric
Security Solutions, Gallagher
Security, EOH, Impro
Technologies
Biometric technology:
Fingerprint
Product description:
MorphoWave is the world’s
first biometric access solution
to capture and match four
Device/solution: Morpho Smart optical 1300 Series fingerprints with a single hand
Manufacturer/brand name: MorphoAccess by IDEMIA movement. It implements a
Distributors: Ideco Biometric Security Solutions, Gallagher Security, patented, truly contactless
EOH, Impro Technologies technology that not only
Biometric technology: Fingerprint acquires extremely accurate
Product description: The MSO 1300 (USB) has been designed to address fingerprint data but also over-
the needs of logical access control to highly secure PC applications in comes the challenges wet/dry
industrial, corporate and governmental environments. The MSO 1300 fingers and latent prints pose to
Series is based on a fast and cost effective optical sensor and has an conventional scanning systems.
embedded storage capacity of up to 5 000 users (10 000 templates). Typical applications: Access
Typical applications: Enrolment control, time and attendance, contactless
Integration support: System integration Integration support: System integration
Contact details: Chelesile Moya, [email protected], Contact details: Chelesile Moya, [email protected],
+27 11 601 5500, www.idemia.com +27 11 601 5500, www.idemia.com
IDEMIA IDEMIA
Device/solution: Morpho 3-D
Face Reader
Manufacturer/brand name:
MorphoAccess by IDEMIA
Distributors: Ideco Biometric
Security Solutions, Gallagher
Security, EOH, Impro Technologies
Biometric technology: Face
Product description: These
3D facial recognition terminals
are ideal for environments that
Device/solution: MorphoTablet 2
require gloves or where hygiene
Manufacturer/ brand name: MorphoAccess by IDEMIA
is a concern. 3D geometry of the
Distributors: Ideco Biometric Security Solutions, Gallagher Security,
face is calculated with over 40 000
EOH, Impro Technologies
points for enrolment and identi-
Biometric technology: Fingerprint
fication, providing a high-speed,
Product description: The MorphoTablet 2 is an 8-inch touchscreen
hands-free access solution.
tablet with an incorporated FBI PIV IQS and STQC certified optical
Typical applications: Access
fingerprint sensor. The device offers signature capture, contactless
control, enrolment, identification,
smart card and a 13 megapixel camera with dual LED for face capture.
time and attendance
The slim, sleek device operates on 4G, Wi-Fi and Bluetooth, and
Integration support:
weighs a mere 545 grams.
System integration
Typical applications: Access control, time and attendance, KYC, data
Contact details: Chelesile Moya,
capture and other processes
[email protected], +27 11 601 5500,
Integration support: SDK available
www.idemia.com
Contact details: Chelesile Moya, [email protected],
+27 11 601 5500, www.idemia.com
IDEMIA IDEMIA
IDEMIA IDEMIA
Device/solution: MorphoAccess
Sigma Extreme
Manufacturer/brand name:
MorphoAccess by IDEMIA
Distributors: Ideco Biometric
Security Solutions, Gallagher
Security, EOH, Impro Technologies
Biometric technology:
Fingerprint
Product description: The
MorphoAccess Sigma Extreme is a
Device/solution: MorphoAccess Sigma Lite + touchscreen device with multiple
Manufacturer/brand name: MorphoAccess by IDEMIA recognition interfaces (NFC chip
Distributors: Ideco Biometric Security Solutions, Gallagher Security, reader, PIN and BioPIN codes,
EOH, Impro Technologies contactless card readers). It has a
Biometric technology: Fingerprint modern glossy black design with
Product description: MorphoAccess Sigma Lite + is a slim, sleek and features designed for market
powerful fingerprint access control terminal. It offers time and attendance needs and requirements, and
in and out function keys and enhanced interactivity via a 2,8-inch QVGA delivers enhanced security and
colour touchscreen. The embedded web server enables on-device accuracy through an FBI PIV IQS
enrolment, terminal configuration and transaction log retrieval. This certified optical sensor.
device can perform 1:10 000 user identification in 1 second, and offers Typical applications: Access
a high capacity of up to 10 000 users (30 000 templates). control; time and attendance
Typical applications: Access control, time and attendance Integration support: SDK Thrift, Wiegand, MorphoManager (BioBridge)
Integration support: SDK, Thrift, Wiegand, MorphoManager (BioBridge) Contact details: Chelesile Moya, [email protected],
Contact details: Chelesile Moya, [email protected], +27 11 601 5500, www.idemia.com
+27 11 601 5500, www.idemia.com
Device/solution: PT-Rollcall
Manufacturer/brand name: Powell Tronics
Device/solution: ATOM
Distributors: Powell Tronics
Manufacturer/brand name: Powell Tronics
Biometric technology: Fingerprint
Distributors: Powell Tronics
Product description: For use in education facilities as an electronic
Biometric technology: Fingerprint
examination register, PT-Rollcall offers biometric enrolment integration
Product description: ATOM is a web-based time and attendance
with the education facility’s examination system, so exam invigilators
system that is fully scalable to suit just about every time management
can verify the student’s identity on a portable biometric device.
application. ATOM supports both static and mobile enrolment for staff
It provides a live dashboard, students expected vs. present and
or employees clocking either onsite or in remote areas. It is a local
various management reports.
product with local development and support.
Typical applications: Student exam and classroom attendance
Typical applications: Time and attendance
Integration support: Impro Portal, IDEMIA/Morpho, CCTV
Integration support: Impro, IDEMIA
Contact details: Mike Austen, [email protected],
Contact details: Mike Austen, [email protected],
0861 784 357, www.p-tron.com
0861 784 357, www.p-tron.com
Suprema Suprema
Device/solution: BioStation L2
Manufacturer/brand name:
Suprema
Distributors: neaMetrics, ADI Global
Distribution, Elvey, EOH FSS, Gallagher
and various system integrators
Biometric technology: Fingerprint
Product description: Essential access
Device/solution: BioStation A2 control and time and attendance
Manufacturer/brand name: Suprema terminal with live finger detection,
Distributors: neaMetrics, ADI Global Distribution, Elvey, EOH FSS, fast data transfer speed, enhanced
Gallagher and various system integrators image processing and quick finger-
Biometric technology: Fingerprint print authentication (1:150 000/
Product description: Premium access control and time and attendance second). It supports fingerprint, RFID
terminal with live finger detection. Features RFID and PIN with a wide- and PIN, and features a 2-inch colour
angle camera with face detection, videophone interface and touch- LCD and programmable function keys.
screen LCD. Maximum users: 500 000(1:1), 100 000(1:N) and 5 million Maximum users: 500 000(1:1),
text logs. Interfaces: TCP/IP, Wi-Fi, PoE, RS-485 and Wiegand. Extensive RF 100 000(1:N).
card options supported. Typical applications: Access control, time and attendance, building
Typical applications: Access control, time and attendance, building management systems, CCTV and VMS integration, home, office and
management systems, CCTV and VMS integration, home, office and production automation
production automation Integration support: Developer API, software development
Integration support: Developer API, software development integra- integration support, open platform Wiegand, RS-485 (OSDP),
tion support, open platform Wiegand, RS-485 (OSDP), integrated door integrated door control, integrated with all major access
control, integrated with all major access control manufacturers control manufacturers
Contact details: Suprema team, [email protected] Contact details: Suprema team, [email protected]
+27 11 784 3952, www.suprema.co.za +27 11 784 3952, www.suprema.co.za
Suprema Suprema
Device/solution: Device/solution: BioLite N2
BioStation 2 Manufacturer/brand name:
Manufacturer/brand Suprema
name: Suprema Distributors: neaMetrics, ADI
Distributors: neaMetrics, Global Distribution, Elvey,
ADI Global Distribution, EOH FSS, Gallagher and
Elvey, EOH FSS, various system integrators
Gallagher and various Biometric technology:
system integrators Fingerprint
Biometric technology: Product description: Packed
Fingerprint in a rugged IP67 housing, N2
Product description: is perfect for outdoor/indoor
Latest Suprema technology in beautiful exterior with massive installations. It supports time
memory. Maximum users of 500 000(1:1), 20 000(1:N) and and attendance and access
3 million logs. Features interactive colour UI, instant matching control for 10 000 users, features
and authentication (20 000/sec), IP65 rating for in/outdoors, multi-class RFID reading technology, BLE and
built-in Wi-Fi, PoE and rapid data transfer (5 000/min). NFC for mobile fingerprint credentials, and operates
Interfaces: TCP/IP, RS-485, RS-232, USB and Wiegand. from -20°C to 50°C. Interfaces: TCP/IP, RS-485 and Wiegand.
Typical applications: Access control, building management FBI certified model available.
systems, CCTV and VMS integration, home, office and production Typical applications: Access control, time and attendance, building
automation, high-end security applications management systems, CCTV and VMS integration, home, office and
Integration support: Developer API, software development production automation
integration support, open platform Wiegand, RS-485 (OSDP), Integration support: Developer API, software development
integrated door control, integrated with all major access control integration support, open platform Wiegand, RS-485 (OSDP), integrated
manufacturers door control, integrated with all major access control manufacturers
Contact details: Suprema team, [email protected] Contact details: Suprema team, [email protected]
+27 11 784 3952, www.suprema.co.za +27 11 784 3952, www.suprema.co.za
Suprema Suprema
Suprema Suprema
Device/solution: BioEntry
Series
Manufacturer/brand name:
Suprema
Distributors: neaMetrics, ADI
Global Distribution, Elvey, EOH
FSS, Gallagher and various
system integrators
Biometric technology: Device/solution: BioMini Series
Fingerprint Manufacturer/brand name: Suprema
Product description: Packed Distributors: neaMetrics, ADI Global Distributors, Elvey, EOH FSS,
in a slim, mullion-type design, Gallagher and various system integrators
BioEntry Series provides high- Biometric technology: Fingerprint
definition fingerprint image Product description: Range of 500 dpi optical fingerprint sensors with
capture, minutiae extraction scratch-free surface, highspeed USB 2.0 interface and award-winning
and RF card reading capability. W2 offers IK09 vandal-resistant algorithm. BioMini Plus 2, Slim 2 and Combo feature live finger
housing with IP67 rating plus PoE and live finger detection. detection and FBI PIV/FIPS201 and mobile ID FAP certification. All
R2 (designed exclusively for centralised access control systems) models can operate in direct sunlight and the Combo has contact
and P2 make use of OSDP and NFC. and contactless card readers.
Typical applications: Access control, building management systems, Typical applications: Civil and criminal identification, fingerprint
CCTV and VMS integration, home, office and production automation enrolment, biometric identity systems, application user security and
Integration support: Developer API, software development Single Sign-on (SSO), time and attendance
integration support, open platform Wiegand, RS-485 (OSDP), Integration support: Developer API, SDK for Windows and Linux, and
integrated door control, integrated with all major access for Android, software development integration support, customised
control manufacturers solution development, OEM options for hardware integration
Contact details: Suprema team, [email protected] Contact details: Suprema team, [email protected]
+27 11 784 3952, www.suprema.co.za +27 11 784 3952, www.suprema.co.za
Suprema Suprema
Suprema Veracitech
Device/solution:
RealScan Series
Manufacturer/brand
name: Suprema
Distributors:
neaMetrics
Biometric
technology:
Fingerprint, palm
Product description:
FBI certified and AFIS Device/solution: Morpho Wave & Sigma family
compliant live scanners Manufacturer/brand name: IDEMIA
with options for single or 10 print flats, rolls, 4 finger slaps and palm. Distributors: Veracitech, Veracitech Systems Namibia,
500 dpi greyscale images, high-quality image capturing with halo Veracitech Engineering Botswana
effect and ghost image elimination, wet or dry fingers, automated Biometric technology: Fingerprint, facial, hand
image quality check and WSQ image compression. Robust, ideal for Product description: Veracitech is an integration partner and value-
static and mobile operations. added reseller for IDEMIA (Sagem/Morpho) biometric terminals.
Typical applications: National ID, immigration and border control, Veracitech offer seamless, fully integrated template enrolment, template
criminal applications (police), civil identification, high-speed distribution, card and card-less terminal/reader usage on the XMP-
fingerprint capturing Babylon platform. The company has successfully integrated the new
Integration support: Developer API, software development MorphoWave terminal.
integration support, customised solution development, integrated Typical applications: Access control, identity management, people
with major civil and criminal solution providers management, time management, biometrics
Contact details: Suprema team, [email protected] Integration support: Integration partner for IDEMIA’s Sagem and
+27 11 784 3952, www.suprema.co.za Morpho products on the XMP-Babylon platform
Contact details: Alvin Flaum, [email protected],
+27 11 888 7251, www.veracitech.co.za
ZKTeco ZKTeco
Device/solution:
ZM100 Smart Lock
Manufacturer/brand name:
ZKTeco
Distributors: Regal Distributors SA,
Security Warehouse,
MiRO Distribution, Africlocks,
ERS Biometrics
Biometric technology:
Fingerprint, facial
Product description: The ZM100
smart lock with hybrid biometric
Device/solution: iClock 680 Biometric Fingerprint Reader recognition technology provides
Manufacturer/brand name: ZKTeco a safe and high-security method
Distributors: Regal Distributors SA, Security Warehouse, MiRO of unlocking. It features facial
Distribution, Africlocks, ERS Biometrics and fingerprint recognition, a
Biometric technology: Fingerprint reversible design to suit all door
Product description: iClock 680 is a biometric fingerprint reader for opening directions, and a
time and attendance and access control applications. It adopts a rechargeable lithium battery.
brand-new firmware and provides an unprecedented user experience Typical applications: Access
with stunning GUI, rock-solid stability, fast matching speed and control
expandability. It also supports data backup and retrieve to avoid the risk Integration support: Standalone,
of accidental deletion. works with ZKBioSecurity
Typical applications: Access control, time and attendance Contact details: Brent Saaiman,
Integration support: Standalone, works with ZKBioSecurity. [email protected], +27 12 259 1047,
Contact details: Brent Saaiman, [email protected], +27 12 259 1047, www.zkteco.co.za
www.zkteco.co.za
ZKTeco ZKTeco
Making the right access control decision depends on what you want secured
and how secure it should be.
We all want our access control to be the best today. “This is partly attributed to the system still from other vendors keeps your options open.
and most secure, until we see the price tag. In meeting their needs, but also due to the capital “While integrations have been available
the real world, companies all too often select investment required to upgrade or replace. in the past, they were often custom projects,
their access control solutions based on what This is an area we [Impro] have specifically requiring an intensive time and resource
fits the budget rather than the requirements of focused on, whereby legacy systems can be investment. Today, we’ve built APIs that enable
the business. slowly migrated into new technologies without a variety of products and services to quickly
This is understandable to a degree given the the traditional rip-and-replace. The benefit of and easily integrate into our systems – from
broad selection of different product available, as this is a company is not impacted with a large diverse systems such as elevators, production
well as the different price points and quality of investment, but rather smaller values over a management, canteen payments and payroll, to
products out there. But what should companies longer period.” the traditional CCTV and intrusion systems.”
be doing to ensure they have the right products, He does, however, see a strong move to He adds that another driver for integration
with the right performance in the right places? upgrading to new platforms, primarily because is the ability to manage everything from one
Moreover, what solutions are there to choose of the increased security and convenience console. “Customers want one place to monitor
from and where would they fit in optimally? now available. “If you think many systems are and manage their security.”
Hi-Tech Security Solutions asked Impro’s MD, five to ten years old, technology has moved
Mike Shipton what he sees in the access control on dramatically – whether it’s our cellphones, Overcoming the legacy of legacy
market today and for his advice to those looking computers, cars or TVs, the evolution has been And while many people seem to focus on
for new or upgraded access solutions. rapid. Whilst access control has not been as the latest and greatest in access and identity
One general trend in access control is that of disruptive, there are certainly industry-changing technologies, Shipton adds that legacy systems
longevity. People are not inclined to renew their technologies which are becoming mainstream bring legacy credentials – the card, tag and fob.
access installations every three to five years. – things such as virtual credentials, where you’re “There are still millions of these being
There are many examples of companies using able to use your cellphone to gain entry or to used around the world today,” he states, “but
their access control systems successfully for a manage your system.” this too is changing, and certainly much
decade or two. While this makes for pleasant And integration has become a critical issue faster internationally as the risk of cloning is
budgets, it does make integrating newer in the access market. While he admits there a significant concern. While the form of the
technologies harder – a fact some companies are still many systems that operate in isolation, credential doesn’t have to change, people
like Impro have focused on in expanding their this is changing. Shipton says the need for are certainly calling for secure credentials
businesses. integration is crucial – it saves time and – we already offer anti-cloning credentials,
Shipton notes that there are still a large reduces complexity. Furthermore, choosing including high encryption tags that have
number of companies using legacy systems solutions that can be combined with those Continued on page 80
Drayton: Standalone access control systems one wants to do video verification, for
are more cost-effective in terms of the capex example)?
required to install a system in a building.
Migrating to IP is a process of education, Du Toit: I think a big driver for IP systems in
showing installers and end users the benefits security is because of integration and bringing
of an online solution where events are multiple systems into a single user interface,
highlighted and acted upon in real time. I where the operator can make informed decisions
would suggest that some people who are not quicker, without having to understand all the
that literate about IP technology may be risk backend systems and how to work in them.
averse to adopting it, but with solutions like Many companies still run multiple systems and
Paxton’s Net2, we are showing the market manage them in a standalone way, but this is not
that the simplicity of IP access control is easily necessary anymore. There are many systems out
within their grasp. there that can tie all your systems together and
they are becoming more affordable.
Hi-Tech Security Solutions: In terms of costs
and complexity, does IP-based access Drayton: It most certainly would. Any access
offer benefits or is it much the same control company that has not or is not
for the technicians in the field and the developing products for use in IP networks is
administrators? Would the users gain any removing itself from the future of our industry.
benefit from IP or would they simply see
things happening as always? Hi-Tech Security Solutions: When moving to • SALTOKS is a true cloud-based IP system
IP, cybersecurity becomes a problem. What sitting on your network via Wi-Fi, POE
Du Toit: The user or operator should see no steps can one take to ensure your access network or 4G. One IP address, handling up
difference except that the interfaces used control infrastructure is secure? to 16 devices and no 485 cabled devices. It is
should be easier to use and offer better already integrated with third-party IP camera
functionality. The technician on the other hand Du Toit: Your systems should be secured by systems to bring forward that single view of
will need to skill-up and understand the IT encryption so people can’t just tap into your events between access control and cameras.
environment that he is working in. This should network and hack the security system from • SALTO Space can handle four million
not be a challenge, but could be depending on outside or inside. The only way you should be users and 64 000 devices with a standard
the skill level of the individual. able to access the system is from an authorised IP interface and hybrid IP solutions. It is
IP-based systems are more complex, but in terminal with secure credentials, but this should designed to talk to third-party systems
access control you need to skill-up your staff not be new to security manufacturers, as they through IP, HTTP, UDP and SHIP (our
to deal with this. Many companies offer basic had to protect the security of the hardware in integration interface).
IP courses so that staff can understand the the field before IP systems came along. • Danalock is aimed at the residential market,
basics and grow from there. Not having the Systems hosted in the cloud must have and can interface with your mobile devices
understanding and skills will make it difficult multi-factor authentication to ensure a secure through your home network to give you a
for a technician to fault find when a problem system and only relevant data should be truly keyless security solution.
arises, installation of hardware should not be a stored to protect the individuals’ privacy. All of the above solutions are based on
problem as most hardware is very easy to install. future-proof technology in the IP domain and
Drayton: At Paxton, we take cybersecurity protected with encryption.
Drayton: There are clear benefits for utilising very seriously and rigorously test our products
IP as it makes the installation, support and to ensure that Net2 remains a highly robust Drayton: 95% of Paxton’s global sales are
maintenance of the system a huge amount and secure access control solution. However, it IP-based products. Whether that is our Net2
easier. IP technology is being adopted at should not be overstated that the first line of wired or wireless access control, Net2 Entry
an expanding rate across the industry, the defence for any company is their responsibility video intercoms or our brand new battery
benefit of having multiple systems utilising the to take all necessary measures to protect their powered door handle, PaxLock Pro, the Paxton
same communication backbone has greatly networks from cyber threats with firewalls, etc. Net2 range is a complete access control
simplified the ability to integrate access control Networks can also be partitioned with VPNs to solution from perimeter to the building centre.
with other security equipment, such as CCTV, isolate the security system. Where higher levels In providing customers with an IP-based,
so end-users can match visual recording to of security are required, it is important that end fully online system with all the benefits of
real time events. This is an undeniable benefit users carefully choose their installer partner so live events and alarms in real time, we pride
for the end-user. Companies like Paxton that the right solution is implemented. ourselves on the simplicity of our system,
are leading the way with making all our our unique five-year swap warranty and our
integrations available free of charge to help Hi-Tech Security Solutions: What products licence free for life software.
installers and end-users reap the benefits. do you offer that are IP-based and what are
their benefits in the world of access and For more information, contact:
Hi-Tech Security Solutions: As more security identity management? Paxton, +27 21 427 6691, support@
(and other) systems are integrated, would paxtonaccess.co.za, www.paxtonaccess.co.za.
IP-based access control not provide for Du Toit: All systems offered by SALTO, in one SALTO Systems, +27 11 534 8489, info.za@
easier integration and more flexibility (if form or another, are IP-based. saltosystems.com, www.saltosystems.com.
The software-as-a-service model has proven used. With ACaaS you only pay for what you and management of any business-critical
transformative to many organisations, and need and you’re able to scale up on-demand, information.
even entire industries. The benefits it can offer without a capital investment. Compared to traditional access control,
are undeniable, but in the security sector Another benefit for businesses is the ACaaS offers several advantages, for example:
which is risk-averse by necessity, we wanted guaranteed uptimes, built-in redundancy • The information is stored at remote servers,
to hear the views of some local experts in and disaster recovery, qualified personnel which eliminates the need for expensive
access control as a service (ACaaS) to find managing the systems, as well as 24/7 support. hardware at the controlled premises. In
out what some of the pros and cons are. Our As ACaaS is an operational cost, much needed principle this means that ACaaS should be
interviewees are: capex can also be focused on the end users’ less expensive than traditional (legacy type)
• Mike Shipton, managing director, Impro revenue generating areas i.e. focus on their access control.
Technologies core business, while the access control is • Using ACaaS enables the management of
• Gary Chalmers, CEO, iPulse Systems managed by specialists in this field. your access control from anywhere in the
• Mike Smiles, managing director, Masc Having specialists managing your system world as long as Internet access is available.
Solutions also ensures global best practices are adopted • ACaaS is ideally suited to the monitoring and
• Mayleen Bywater and Rudi Potgieter, senior and adhered to – firewalls, virus protection, control of multiple locations. Information
product managers, Vox DRP, associated data encryption and legal generated at these facilities is stored at a
considerations such as GDPR, as well as all the single location and is available to authorised
Hi-Tech Security Solutions: What are the associated IT skills. These are expensive skills users, 24/7.
pros and cons of ACaaS versus using a which many businesses can’t afford, however This type of service is ideal for all sizes of
combination of onsite access control and with ACaaS the skill set is standard. system; however, most small businesses do not
cloud services for some offsite benefits? Lastly, the simplicity of accessing the have the manpower resources to manage the
Mike Shipton: Globally, ACaaS is expected to system is revolutionised, with only an Internet system on a daily basis, or don’t have access
grow at nearly triple the rate of traditional connection and Web browser needed to to technical support/engineering personnel,
access control equipment over the next five access your site – and this could be done with 24/7. ACaaS removes these obstacles.
years, according to research company IHS a mobile phone, tablet or PC. Both a time and Implementing cloud-based security and/
Markit. Naturally, a large amount of this will money saving. or ACaaS provides a flexible solution which is
be focused on the European and American infinitely scalable, by simply adding more doors,
markets, simply because of their strong Gary Chalmers: Pure ACaaS allows for centralised assigning cardholders access authorisation
adoption of ‘as a service’ business models management and support, making the TCO without the need of changing hardware or
– most business software is now operated significantly lower. It also appeals heavily to obtaining extra software. Although there’s
‘as a service’ in these markets. Think of your distributed organisations who only require a concern over possible hacker attacks, most
Microsoft Office 365, CRM packages and small number of devices per branch, which ACaaS uses encrypted communications and
project management tools – all in the cloud. they want to manage and control from a central data storage solutions that are superior to many
Whilst these models are growing in South point, without needing to have a PC in every server-based systems.
Africa it’s still at the early adoption stage, but we location. ACaaS allows this to be conveniently Whilst the majority of the current AcaaS
expect this to ramp up significantly in the next controlled and managed from a single source, offerings utilise ‘panels’ to manage card/
few years. One of the most significant benefits which hybrid systems typically do not. biometric readers and control/monitoring
that will drive the growth is the reduction of hardware for the secured door, the more
upfront costs. As an example, many businesses Mike Smiles: ACaaS is no different to using radical options eliminate a large portion of this
will invest in the hardware and IT infrastructure cloud services – all the access control hardware hardware by utilising mobile applications that
to enable future growth – in essence, they are remains onsite, software and servers are enable a credential, stored on a smartphone to
purchasing their future growth, up front, at removed from a company’s premises and are identify the phone’s owner and issue a signal
great cost, and many of those resources may be housed in data centres designed to meet the to a basic door controller that permits the staff
sitting idle as the capacity is not initially being exacting standards necessary for the storage Continued on page 86
Continued from page 84 hybrid of the two. We are either investigating through pre-defined interfaces, ensuring that
member to enter the portals/doors they are or already have a product for almost every any system can be integrated quickly and
permitted to access. single one of our current traditional security efficiently.
solutions in the cloud. Whilst certain value propositions are lost
Mayleen Bywater: This is a multifaceted issue, ACaaS represents a predictable cost, (such as easy remote support and centralised
which is precisely why I am providing my essentially converting capex into opex and management) in these scenarios, clients
insights on the network and security systems allowing you to budget for it better. It derisks are able to leverage existing architecture
that complement the personal identity that portion of your business by decentralising for longer, and slowly replace ageing
management side of things, whereas my this data portion and taking it offsite if need infrastructure rather than having to face a ‘rip
colleague Rudi Potgieter’s expertise is closer to be. It also assists your potential critical skills and replace’ option so often advocated by
the area of physical access control. shortages, as an organisation doesn’t need to security professionals.
The question of using a cloud-service have advanced IT and other skills in-house.
versus offsite access control really revolves Mike Smiles: This is solely dependent on the
around capturing the viewer images, storing Hi-Tech Security Solutions: How does one legacy hardware currently in use at the facility.
the data, and specific requirements from a integrate new access solutions and existing Most ‘traditional’ access control systems
client’s perspective so they can then traverse legacy systems use proprietary hardware that utilises serial
the network for data and info. For example, if Mike Shipton: In most access control systems, communications such as RS-485 or RS-422. In
they have huge video surveillance for access the term ‘rip and replace’ is standard. Often, instances where the door control hardware/
where they’re going to use visual images they simply scaling up from one system to another panels support IP, these are often ‘closed’
would need to have something onsite because requires this harsh and expensive route. systems that have been created to restrict the
of the bandwidth and volume of data. Whereas However, given the large installed base of end user from using software other than that
if they’re just using IT-based and specific Impro legacy systems, we have developed the provided by the hardware manufacture.
control measures that are in place, with just means to slowly migrate from old technologies
access control based on policy, then cloud is to new. This means that many sites are able to Rudi Potgieter: My understanding is that
obviously the way to go, as opex models assist operate with existing hardware, take on new yes, this can be challenging, but there are
with cost saving and a managed service can software, and slowly replace the legacy items some in-between applications and physical
assist with IT and security confidence. whilst enjoying new software features. on-premise hardware that can be deployed to
For many companies, when they need to do We generally recommend when customers translate the environment. So in other words
access control they need to trust that they’re are wanting to upgrade, or expand, this is the if you’ve got a brand new install you probably
bringing in strangers to do this. From a skills time to assess the next 10-year path. With would push it out via Web services into the
perspective we can alleviate their problem ACaaS this becomes a much easier solution, as cloud, whereas in an older environment you
from an HR point of view, as well as help with there is not the high capital investment of the might still sync to a local copy of an Impro or
best practices and try where we can to help past and, once you have the cloud platform, Paxton or whatever that service might be, and
manage their business. Effectively this gives it opens a world of new technologies and then locally translate it into the correct format
the client more time to be effective in their services to the end-user which simply cannot so that you can access it and process it in your
business, so they can go and make money be accessed with very old technology. cloud housing, so to speak.
and let us worry about how to do the access
control component. Gary Chalmers: iPulse Systems’ IQSuite.cloud Hi-Tech Security Solutions: How does ACaaS
is a true ACaaS platform, designed to work integrate with other management systems,
Rudi Potgieter: At Vox we try to provide a with both new and legacy equipment. Local like security or building management?
solution that caters to clients’ needs, so it can memory resident services and SDKs allow Mike Shipton: The process of integration hasn’t
be either private cloud, public cloud, or a legacy devices to communicate with the cloud principally changed. Whether the access
control system is on-premise or operated as responsibility for the physical infrastructure of What people don’t always do is ensure that
a service, the mechanics are pretty much the the client’s network. So integration is still part the testing of the network and the testing of
same. However, ACaaS obviously provides and parcel of the overall solution – we’re not the access control actually complement each
the latest technologies and systems to make going to take functionality away, but actually other. In some cases the one will negate the
that integration simpler, faster and better. By add functionality. other, and if you’re not managing it from a
having a standard platform, it also ensures Taking services like these to the cloud one-provider perspective you are creating a
others systems can quickly integrate, rather also allows for better management of a loophole in your client’s environment.
than the traditional route of having to do mobile workforce, such as field marketers or
multiple integrations for each and every merchandisers in a retail environment, or even Hi-Tech Security Solutions: How does one
system – integrate once on the platform, and security companies that have staff temporarily deal with the risks of losing sensitive data,
it’s available for many. deployed at a site. It is nowadays trivial to especially with respect to GDPR and PoPIA?
have a mobile finger reader whereby a mobile Mike Shipton: This is where international
Gary Chalmers: IQSuite.cloud as a platform has worker can login and they are then virtually certification becomes crucial. The rigorous
a fully secured API, accessed via an SDK that clocked in at a specific site. So I think it actually standards enforced internationally must be
makes integration quick and simple. Using takes the concept to the next level. adopted to ensure complete compliance with
sample code and designed in such a way as to all legislative requirements. For example, ISO
ensure minimal coding is needed, creating an Mayleen Bywater: If you’ve got the policies and 27001 for technical measures, ISO 27017 for
integration with an existing system, whether processes mapped out properly and you do cloud security, ISO 27018 for cloud privacy,
local or cloud-based, is a matter of hours, the fingerprint or specific single sign-on or any as well as EU specific certifications such as
rather than months. kind of authentication to a specific person, if BSI’s Common Cloud Computing Controls
your ERP or other system is dated it does create Catalogue and adherence to the CISPE (Cloud
Rudi Potgieter: Whenever technology moves a bit of a stumbling block because they would Infrastructure Services Providers in Europe)
to the cloud you don’t lose functionality, so need to be upgraded or integrated. However Code of Conduct.
if you have an app that’s already integrated this also presents an opportunity to make sure In addition, strong encryption of all
into a building management system, payroll, clients are running the correct patches, their personal data is a must; as well as the regular
or time and attendance, all of that just moves version control is correct and that everything testing, assessing and evaluating of the system
to the cloud. You’re essentially just taking actually works together. Continued on page 88
Continued from page 92 people to see a live view and get alerts on their smartphone, tablet and
Mohammad Meraj Hoda: Since we invented the Video Doorbell in PC. We also allow any number of people to access the Video Doorbell
2013, these devices have become even more sophisticated. The latest through the app, depending on the type of subscription they have.
generation of the Video Doorbell offers features such as two-way talk,
1080p HD video, infrared night vision and instant mobile alerts, as well Hi-Tech Security Solutions: What security is included to ensure
as recording capability. only authorised people are able to gain access and manage these
devices?
Hi-Tech Security Solutions: Can these devices be managed by mobile Markus Bodenstein: Cybersecurity has become a hot topic over the past
devices, and if so, can multiple people control them via their few years. Axis always goes to great lengths to implement strict security
smartphones? protocols and requirements to ensure that any Axis device on a network is
Markus Bodenstein: With the Axis network door station, you can see, as secure as possible. We also provide hardening guides on cybersecurity,
talk to, identify and open the door to visitors regardless of where which includes guidelines on how to further enhance the security on your
you are. The network door station can be used to create a two-way network – all this information can be found on our website.
communication channel with designated mobile devices, which allows
for flexibility and convenience. Riccardo Battaini: Of course, with the connectivity, the security of the
technology becomes important. As security comes first, our solutions
Riccardo Battaini: In the intercoms solution, smartphones become an are cloud-based with the software package sitting in very well protected
extension of the internal receiver. They can be used to receive calls, data centres. Furthermore, all our applications connected to the Internet
initiate calls and activate the entry panels and the cameras connected. IP are user name and password protected. This includes web applications,
intercoms are much more powerful. They allow the user to be connected smartphone apps, but also the devices directly connected to the
via Wi-Fi while inside the property. This is very interesting in the commercial Internet, like the entry panels.
environment, where until some time ago it was a challenge to allow many
entry panels. We have recently worked on a project – and have several in the Chris Lelicanin: Apart from password protection, there are also encryption
pipeline – with 60 and 70 entry panels in large commercial compounds. protocols and standards in use to keep assailants at bay. The systems are
The IP solutions also allow more sophisticated PC-based switchboard well thought out and fortunately there are few points of entry and no data
services. Our solutions are even more powerful as we are now capable is stored on the edge device, such as the intercom panel.
of integrating all the Came systems in a single platform in the cloud,
called Came Connect. With this powerful technology we can control Mohammad Meraj Hoda: Because the Video Doorbells are linked to
all the Came devices (and partially also some competitors’ devices) like a specific Wi-Fi network and a specific device, they are password
gate automation, traffic barriers, door automation, audio and video protected. The ‘shared users’ function allows people to control who
intercoms, and home automation devices from a single platform. has access to the device, and so avoid the need to give out account
This solution allows us to provide new kinds of services. For example, the information.
end user can configure the system in order to send a message to their installer
if there is a potential problem with the safety devices of their gate automation. Hi-Tech Security Solutions: Are these systems able to integrate into
In other words, it is the system which initiates a service request, maintenance a broader management system for centralised control, or are they
or provides information. In some cases, the installer can be informed of a standalone solutions?
potential problem at his customer’s site and react immediately. Markus Bodenstein: The Axis network door station can integrate into
existing and new management systems or it can be used as a standalone
Chris Lelicanin: The digital age is upon us and you can securely and solution. The intelligence on the device allows it to communicate
remotely have a two-way video conversation or grant access to a visitor. directly with other devices on the network, to ensure that the system
You can turn the panel off should you not want to be disturbed and the becomes a working solution that can meet your requirements.
app can divert the call from the panel to multiple smart devices.
Riccardo Battaini: In our solutions we can have third-party cameras
Mohammad Meraj Hoda: Ring’s devices were specifically designed to be connected to the system and even the NVR (network video recorder),
managed through smartphones, but we have taken it further, allowing if necessary. It is also possible to control – with the limitation of simple
output and input signals – third-party Chris Lelicanin: Elvey prides itself on
devices like competitors’ gate automation fulfilling the security sector’s needs. All
or barriers. Elvey solutions are thoroughly researched
This is not so much due to the IP and tested. The manufacturers we partner
technology, but more to the flexibility of with are best in breed and I think in this
our solutions, and we can also interface context a good example is Fermax, which
with elevators and make it possible to covers the spectrum in terms of quality,
send a visitor only to the exact floor functionality at an affordable price, and
where the person to be visited is located. ease of use. Fermax incorporates the
This is convenient and safe at the same following features into its ecosystems:
time. facial recognition, mobile applications,
access control solutions, IP video
Chris Lelicanin: Integration and surveillance, lift control management and
functionality are essential in today’s integration into home automation systems,
security solutions and systems. to name a few.
Depending on the size of the
implementation the Fermax Meet system, Mohammad Meraj Hoda: The professional-
for instance, can incorporate access grade Ring video doorbell Elite lets
control, CCTV and motion detection. You homeowners watch over their home and
can use the video monitor to view CCTV answer the door from their phone, tablet
or as a panic. Should you need to scale and PC. The system allows them to create
this or integrate into an existing solution, and customise their own motion zones,
the panels can be integrated through and when anyone enters the motion zones
industry standard protocols. or presses the doorbell, they get an instant
alert.
Mohammad Meraj Hoda: Ring’s goal is The video doorbell Elite also allows for
to make communities safer by helping on-demand streaming of video and audio
people create a ring of security around with live view. This device has built-in night
their home. All Ring devices are linked vision sensors and a weather-resistant
to the app, which allows homeowners to design. Ring video doorbell Elite installs
keep an eye on their property through on standard junction boxes with a flush-
any number of devices. mounted finish, and connects to the
network via power-over-Ethernet for
Hi-Tech Security Solutions: What are the a reliable connection and non-stop
latest solutions your company has on power.
offer, and what features and benefits The Ring Video Doorbell 2 comes with
do they offer? adjustable motion sensors, and when
Markus Bodenstein: Axis offers the Axis anyone triggers the motion sensors or
A8004-VE and A8105-E network door presses the doorbell, homeowners get an
stations, with benefits and features instant alert on their phone, tablet and
such as high-quality video and audio, PC, allowing them to see, hear and speak
2-way communication, remote entry to people at their door from anywhere.
control, 24/7 video identification, and The Video Doorbell 2 also offers live view
SIP Support for IP phone integration. and on-demand streaming video and
The Axis network door station is also two-way audio, and features built-in night
scalable and definitely futureproof, so vision sensors and a weather-resistant
you are able to add door stations, expand design. Ring Video Doorbell 2 comes with
your communication system or upgrade an innovative quick-release rechargeable
the backbone of your system as you battery pack, so the doorbell can be
grow, while preserving the value of your charged without moving the device.
investment.
For more information contact:
Riccardo Battaini: I think I have explained Axis Communications SA, +27 11 548 6780,
everything about Came Connect in my [email protected], www.axis.com
answers above. The features of the complete Came BPT South Africa, +27 11 616 3222,
control of all Came installations allow [email protected], www.camebpt.co.za
peace of mind, better and more efficient Elvey, +27 11 401 6700, [email protected],
maintenance, and enhanced security for all www.elvey.co.za
parties concerned, i.e., end user, installer, Ring, +27 11 237 7000, [email protected],
facility manager or body corporate. www.ring.com
Integrating access
with OHS and operations
Veracitech has developed access control plug-ins to add certifications
and key management decision-making to traditional access control.
Occupational Health and Safety (OHS) controls
have become as important as security controls
when it comes to the control of access to a
facility or restricted environments. Many clients
today need to check and manage statutory
accreditations and competency prerequisites
prior to allowing personnel and visitors onto
their premises or work areas.
Some of these requirements include
legislative, HR, health and safety, and
accreditation or competency (training and
induction) prerequisites. This data is generally
managed by the HR department and the
security or access control systems merely
block or unblock the user’s access manually
from time to time when notified that the user’s
‘certification’ is valid or has expired.
Veracitech develops and deploys plug-ins
on the Babylon platform for various active
client applications; one such application is the
Veracitech Babylon Certifications solution.
The plug-in comprises access control and
automation, incorporating the certifications
prerequisites listed above. These certifications
can be defined and managed either directly
in the Veracitech Babylon Certifications
application or can be integrated with existing
HR or other databases.
Various certifications and competencies
can be defined in the system, which can then
control access to certain areas based on whether
the person requesting access meets corporate
requirements and vetting. For example: Babylon Key & Locker Management integration with the Traka backend allows key
• Access can be determined by the security Many industrial clients use smart key and and locker users to be managed seamlessly
level/profile as well as if the user has a valid locker management systems, such the TRAKA in the Babylon user database. Access level
medical check-up or has been certified in a system from ASSA ABLOY to manage who definitions ensure that full control and
certain skill required for access to a specific has access to certain keys. Again, here the management of key and locker rights is
area. client traditionally has to control the key centrally administered from the Babylon
• Before allowing anyone to start a truck or management as a separate, standalone system environment only. Through this high-level
machinery on a plant, the system may first from their access control, security or HR/OHS Babylon/Traka integration, the client can now
check to ensure the individual’s licence systems. With intelligent key systems, keys are incorporate access controls with key/locker
is up to date and that they underwent available 24/7 to authorised staff only, and controls, and even combine this with the
a breathalyser test that morning before usage can be managed. certifications solution mentioned above.
granting access to the truck or machinery. Veracitech has partnered with Traka and is • Access can be allowed / denied based on keys
Feedback to the user and an explanation the only authorised system integration partner returned: e.g., users can be prevented from
for Access Denied can also be displayed on the on the Babylon platform for Traka systems. leaving the site without returning keys.
Veracitech interactive touch display modules Veracitech again developed a plug-in for the • Access rights to keys can be based on not just
at the access points. These are fully integrated Babylon platform, the Veracitech Babylon Key the key profile, but also the validity of the user’s
and managed from the Veracitech Babylon & Locker Management solution. certifications (users can only withdraw a vehicle
Certifications application. In this solution, high-level database or machine key if they have the prerequisite
certification status, such as a valid driver’s or There are numerous other applications
operator’s licence on record, or have passed the and integrations Veracitech has developed
breathalyser test within the last hour, etc.). on the Babylon. All told, Veracitech offers the
• With the access automation features of design, installation, configuration and custom
XMP-Babylon, one can also control key or development and integration of multiple
locker rights not just by access profile and security and operational systems into the
certification prerequisites, but also by live Babylon platform, which will allow clients to
status processing in the system. For example, more efficiently manage their operations,
a user can only withdraw a key if his manager even distributed operations, reliably from a
is badged in and present at the time, or a user central source. Veracitech is a bespoke system
can only withdraw a key based on previously engineering house and direct authorised
areas accessed (or not accessed) within a OEM partner for Autec XMP-Babylon systems.
pre-set period. The company currently has a client list that
• Key and locker alarms and events will also be includes companies like Anglo Platinum, De
reported and managed in the XMP-Babylon Beers, Petra Diamonds, Namdeb, Debmarine,
Alarm and Even Handling, alerting the Gemfields, South32, DTI, Transnet and others, For more information, contact Veracitech,
administrator when keys are not returned on including clients in Namibia, Botswana and +27 11 888 7251, [email protected],
time etc. Mozambique. www.veracitech.co.za.
Interested
in becoming a reseller?
We are currently seeking suitable resellers and distributors in Africa for our
top of the range safety and security solutions.
Contact us today to find out more about this opportunity!
X
Durban (Head Office): 140 Umbilo Road, Durban, 4001. P.O. Box 18333, Dalbridge, 4014
Tel: +27 31 201 2092, Fax: +27 31 201 9621, Email: [email protected]
Johannesburg: Unit 2 Verona Office Park, Cnr. MacArthur Ave. & Malibongwe Dr., Robindale Ext 9, Randburg, 2194.
P.O. Box 1013, Pinegowrie, 2123
Tel: +27 11 888 5110, Fax: +27 11 888 9030, Email: [email protected]
Cape Town: 10 Killarney Park, Killarney Gardens, 7441. P.O. Box 1072, Milnerton, 7435.
Tel: +27 21 557 0666, Fax: +27 21 557 0744, Email: [email protected]
Port Elizabeth: 132 Cape Road, Mill Park, 6001. P.O.Box 173, Port Elizabeth, 6000.
Tel: +27 41 373 0390, Fax: +27 41 373 0397, Email: [email protected]
Exports: Tel: +27 21 557 0666, Fax: +27 21 557 0744, Email: [email protected]
www.securitysa.com Access & Identity Management Handbook 2019 101
VISITOR MANAGEMENT
Affordable Conclusion
Affordability is a key requirement for parking Utilising intelligent video to gain insights into
management systems. Often there are multiple business operations is becoming more and
lots or the lots are very large in physical more prevalent across all markets. Video is
area. When installing a new, or upgrading an readily available, cost effective and results in
existing, parking management system, this very accurate data. This is equally true when
can result in considerable costs for servers, considering its use as a counting sensor for
sensors, physical and network infrastructure. parking management operations. Video-based
As mentioned earlier, video-based counting counting is
can be very affordable using commercial • Extremely accurate.
cameras and the ability to double as a security • Robust in a range of lighting and weather
sensor is an additional cost savings. Cameras conditions.
also have a huge installation advantage in • Provides intelligence to understand vehicle
Counting systems are easily self-contained parking garages, as the cutting of concrete types.
and deployable to temporary or remote
for in-ground sensors can affect pre-stressed • Is affordable and supports a variety of
locations.
concrete and require extensive design work. installation options.
Continued from page 100 • Easily integrates into existing enterprise
of objects, including cars, trucks, people, Flexible installation options systems.
motorcycles or bicycles. For most applications, A video-based counting solution also affords If your business includes parking
lot owners are only interested in those vehicles a great amount of installation flexibility. management, a video-based counting solution
which will potentially take a parking spot (cars This is especially true in situations where may be a cost-effective option to consider.
and trucks) and ignore those objects which the installation of the infrastructure (power,
may pass through the lot, but will not impact communications, etc.) is extensive due to
Additional information/links
the number of available parking spots (people, the size of the parking area, or its remote • Counting solutions: http://www.puretechsystems.
bicycles, etc.). location. Still other businesses have the need com/solutions-car-counting.html
Through a feature called classification, to set up overflow lots, or temporary parking • Car counting video analytics: http://www.
video counting places objects into segments, for one-time events or special high demand puretechsystems.com/docs/Video Analytics - Car
Counting.pdf
such as car, person, animal, bicycle, etc. This timeframes. In these cases, installing a camera
• Counting examples: http://www.puretechsystems.
allows the software to count only those items counting system along with communication com/videos/car-counting.html
capable of inhabiting a parking space and capability facilitates a quick and effective • Car counting with service duration: http://www.
ignoring those that will not affect the total means to provide accurate counting for these puretechsystems.com/docs/Car-Counting-Service-
spaces available. types of temporary lots. Duration.pdf
PureTech Systems is a manufacturer of wide-area
Additionally, moving a counting zone is as
perimeter surveillance software solutions including
Synergy with existing systems easy as making a few changes in the software internally developed outdoor video analytics, PTZ
Parking management spans many industries, to accommodate a new zone in an existing auto follow, multi-sensor integration and a map-
including universities, entertainment camera view, or repointing the camera and based (real object size) command and control. With
venues, airports, seaports, hospitals, defining a new counting zone. Changing headquarters in Phoenix Arizona, PureTech Systems
serves national and international markets.
convention centres and even public offices counting zones utilising in-ground sensors,
Eric Olson is vice president of product
and municipalities. It stands to reason that or beam-break devices, typically requires management and marketing at PureTech Systems
each industry has their preferred method to uninstalling and then reinstalling sensors at (www.puretechsystems.com). He can be contacted at
report, display and disperse this information. the new zone entrance and exit. [email protected].
Reliability a fundamental in
visitor management
Make sure your hardware and software meet the requirements of your environment.
With the rapid evolution of biometric
technology, there are many options available
in the marketplace that promise varying levels
of performance. This can create a quagmire of
choices for security decision makers. The most
important elements for consideration in our
demanding South African environment and to
satisfy the need for maximised security, would
be reliability with limited downtime.
With the need for reliability it is wise to
link the security system to the source data, in
this case the institution’s enterprise software
or an estates management software. “The With a fully integrated solution you would data privacy action steps are being taken. This
most successful implementations, where data be able to take advantage of the ability to will include password-protected databases
reliability is optimised, can be found in projects schedule an automated report that will provide which are hosted and under the security
where there is a deep integration between the vital data such as contractors remaining on umbrella of the site’s network where an SLA
source/host data and the access control solution. site after a particular time or those visitors should be in place to cover the responsible
This also contributes in many cases to the who are on site in the event of an emergency. disposal of data collected.
elimination of manual entries by operators and Often sites have internal access points that The PoPI Act does not place emphasis on
security,” says John Powell, CEO of Powell Tronics. allow limited authorised access, which requires the duration of time personal information
On the physical access side and due to the specific management and reporting. can be kept, rather that personal information
often-harsh outdoor installation requirements, Through deep integration, if the source should not be kept longer than is reasonably
the technology performing the identification data is coming from the site’s membership, necessary. The principle that should be applied
function must be robust and be rated for enterprise or estate software, elimination is that when the validity of the purpose for
outdoor use. Choosing a product that is well of data entry by security can be drastically which personal data is being stored is no
tested in your particular vertical market with a reduced and ensures accuracy and improved longer applicable it should no longer be
solid track record in South Africa is vital. performance with added reliability. By kept. It is permissible to keep it longer for
Some of the new technology that is available instituting features like pre-authorisation reasonable business purposes but this must be
focuses on contactless biometric terminals through host validation one can eliminate the defined in an approved retention policy.
that use either face (still susceptible to ideal security officer from the equation in terms of Powell believes that one should first establish
environments) or wave technology (extremely decision making, thereby allowing security to the site requirements before installing a backend
forgiving and fast). focus on the security aspect of the entry and system. This leads to critical emphasis on the
The most challenging user group for these exit points. infrastructure required and focuses on aspects
sites is effectively managing visitors as this is such as visitor management, access control,
often the most vulnerable point, with many Compliance is key CCTV and even the logistical considerations for
unique site complexities to manage. Again, The PoPI Act is based around the principles contractors who require access to the site, since
a visitor solution that is fully integrated with of consent and purpose. This is not a South there may be a need for separate entrances.
the source data, access control and visitor African phenomenon as can be seen globally “Due care must be given to areas such as
management removes various pitfalls that through EU legislation around GDPR. Security ease of access or convenience, and what level of
occur when these various systems are not companies and other organisations may only security the site needs in order to keep occupants
operated in a unified manner. collect personal information from a visitor (data safe and enhance the flow of traffic in and out of
Optimal reporting is all about the quality, subject) with their consent and for the specific the estate or premises. Foresight must be given
integrity and availability of the data that is purpose of visiting the premises. Further to this, to the growing demands and future-proofing
being reported on. Where there are large the manner in which information is stored and that may be required in order for the site to
numbers of users with complex access collected needs to be conducted in line with function optimally. Scalability and budgeting
requirements it is essential that the reporting is the PoPI Act. It is important that appropriate components will also need to come under the
done based on individual requirements. and reasonable organisational and technical spotlight in comparison to the value proposition
If the access control system and, for measures should be implemented. sought by respective stakeholders,” says Powell.
instance the visitor management system, Cybersecurity protection practices such as
are not fully linked there will be no way of the use of encryption on computers or tablets For more information contact Powell Tronics,
reporting on a visitor’s entry or exit through and smartphones demonstrates responsibility 0861 784 357, [email protected],
the access control system. taken by the estate, thus ensuring appropriate www.p-tron.com.
While the concept of identity (ID) remains unchanged, the rapid evolution of digital
technology has dramatically extended both its application and form factor.
In today’s increasingly connected world, Creation and verification of identity billion in annual savings by 2020. Alongside
proof of identity has gone mobile, with digital in the digital world boosting and rationalising access to ‘trust
driving licences and mobile identity cards the The concept of identity remains unchanged – based’ services, going digital enables a host
latest in a growing list of ID innovations to the set of unique characteristics or attributes of trusted interactions between society and
make it onto the smartphone. that define who we are, and crucially, that individuals. Indeed, a trusted (and secure)
For lawmakers, service providers and distinguish one individual from another. These digital identity is becoming ever more critical
citizens, this kind of application offers attributes often include name, date of birth, for healthcare, education, social welfare and
tremendous opportunity. In the near term, physical appearance and a variety of social civil security.
these digital documents will provide full factors including home address, occupation Today, Smart ID documents are already
identity or restricted access to relevant and so on. providing a high level of authentication for
attributes like age, town of residence and In a digital context, attributes may be accessing various European governmental
so on, for car hire, bank account opening extended to biometric data. Typically, these portals. As we move forward these state-
or access to age-restricted venues, such are confirmed by and/or derived from generated credentials offer unmatched
as clubs and bars. They can even support government-issued identities based on face- convenience when it comes to creating or
a variety of notification services including to-face enrolment, breeder documents and deriving mobile Identity online as they can
expiry and renewal, fines reporting and points civil registries. be remotely authenticated by the user’s
management, while enabling greater levels of Verifying identity in the physical world biometrics. Once created, the mobile identity
monitoring. has been a relatively straightforward task. then allows online connection, with identity
Further out, the ability to link identity, Individuals present themselves along with checking, to new and developing public and
through the licence, to connected cars offers their state-generated credentials – such as a private eServices.
exciting opportunities for keyless entry and a passport, ID card or driving licence – to the So, as more citizens live and conduct their
host of remote services. organisation requiring proof of identity. With lives online, the pressure is on states – which
Of course, as technologies and applications identity or the ‘age’ attribute successfully typically issue or regulate ‘sovereign’ identities
evolve, so must the controls. And here, checked, access to the service is granted or the – to extend identity to the digital channel.
government-derived identity will be the transaction completed. While things become Giving citizens a digital identity that can be
starting point for ensuring that every digitised more technically complex in the digital world, used for purposes other than law enforcement.
identity matches the correct individual. the advantages of digitising identity are Many already do so, with live programmes
In this paper we explore the evolution certainly significant. for example in Belgium, Bulgaria, Estonia and
of identity from physical to digital (or According to a Boston Consulting Group Latvia.
dematerialised), and take a closer look at the and Secure Identity Alliance report published While these digital channels will
opportunities this represents – for issuing at the end of 2013, going digital could offer complement and strengthen physical identity
authorities, service providers and users. governments around the globe up to $50 services, they rely heavily on the development
and promotion of sophisticated frameworks. As with national identity schemes, this all In this new world of mobility, mobile
Digitisation is a journey, there are many depends on having the ability to authenticate devices are becoming instruments for digital
starting points and the role of physical the individual – ensuring they are who they identity. And the mobile phone is increasingly
documentation remains crucial. say they are – in the public domain. This will acting as a bridge between physical and digital
enable them to use their trusted identity to identity. A connected, personal and multi-
The role and importance of state- verify their access information and services. For functional device that’s always on our person,
issued identity example: it’s the ideal tool to contain our identity.
The issue of trust is fundamental in the digital • Can a local council check you are a local Secure, convenient and manageable,
ecosystem. Today, we have multiple digital resident before it allows you access to a the mobile device is where our physical and
identities: email addresses, aliases on the service? digital identities converge. Say hello to mobile
Internet, social network profiles, IP addresses, • Can a motorcycle rental business verify you identity, where the mobile device becomes a
bank account details, SIM cards on mobile are permitted to ride an 80cc vehicle? powerful and convenient point tool for users
phones. Whether all can be trusted is open to • Can your bank check your residential status? to manage their proof of identity.
question.
Clearly, providing a disposable email The evolution of national identity Making identity mobile
address or login in the digital space is an into the digital channel As citizens opt for convenience, ID documents,
inefficient way of establishing identity as it While we reside in the physical world, we live like national IDs and driver licences, will
does not provide any trust in knowing the increasingly digital lives. Indeed, the digital ultimately follow the trend towards mobility.
individual behind the digital identity. What’s revolution has changed the lives of billions Since citizens rely on IDs for everyday
needed is for states to make it possible for of people. More households in developing scenarios, most are ready and willing to use
citizens to be recognised in an unequivocal countries now own a mobile phone than have their smartphones to simplify this aspect of
manner. access to electricity or improved sanitation life as well.
Just as they do today, when issuing or facilities. Indeed, mobile IDs give governments
regulating physical sovereign identities, states According to the GSMA , there are 4,7 an unprecedented opportunity to provide
need to consider providing or approving digital billion unique mobile phone subscribers citizens with new levels of convenience.
identity ‘companion’ solutions. Here, states have globally (63% penetration rate), by 2020 there Imagine being able to receive a digital
a tremendous advantage over private identity will be 5,6 billion (72% penetration). What’s companion for your drivers licence or
providers. Their enrolment process typically more, smartphone adoption is accelerating. your ID card – in addition to your physical
requires the physical presence of the individuals The GSMA says mobile broadband connections documentation – direct to your phone.
– which allows the capture of biometrics and are set to increase from 47% of all phones in Alongside making the secure retrieval of
the creation of a set of documents for identity 2015 to 71% by 2020. In the developing world, insurance, address or other identity credentials
proofing. Added to this, most states create mobile broadband already accounts for more fast and easy in the event of an accident, it
identities with high levels of assurance. It is than 80% of connections – by 2020, this will is now simplicity itself when you encounter
therefore logical that states take advantage of reach 92%. situations in which you need to prove identity
this unique position to create strong mobile Little surprise then that policy-makers to transact.
identity than everyone can trust. around the world are working hard to From driver’s licences to national ID cards,
It all starts with the digital transformation implement new mobile digital policies that vehicle registrations, residence permits, fishing
of administration services, and the protect citizens without impeding social permits and more, mobile IDs mark a new era
implementation of structures that harmonise and economic progress, ensuring there are in which citizens can confidently use their
the sovereign identity of individuals between sufficient trusted frameworks in place to help smartphone to demonstrate they hold secure
physical and digital spaces. These companion drive exciting new economic and infrastructure and trusted IDs.
digital IDs could either be linked to or ecosystems. And enable enhanced social So, while today’s citizen may use a national
de-coupled from the sovereign ID. inclusion for citizens. Continued on page 110
Continued from page 109 document loss and, as we’ve seen, instant licence app – which is free to citizens – also
ID or driver’s licence at the airport for identification they can present on their creates the foundation for future applications.
domestic travel, with a digital ID securely phone the moment they need it (proof of Citizens can use their privacy-friendly mobile
stored on their smartphone, citizens can age for alcohol purchase or car rental, for wallet service to carry multiple licences:
leave documentation at home. What’s more, example). hunting/fishing, library membership/
citizens can renew their mobile ID remotely. Available in digital format, citizens now emergency contact information and more.
There is no need to stand in-line for new have a highly portable and convenient As smartphones become ubiquitous, new
cards or other renewals. way to manage their day-to-day essential innovations in facilitating the ability to issue
That’s good news for citizens and for documentation. and verify secure identification quickly, safely
government agencies, which can do their And, in the case of a driving licence, and remotely will enable governments to
job more efficiently. these digital IDs also enable ease of further extend their relationship with citizens,
verification for law enforcement agencies enabling users to utilise their smartphone
Mobile digital IDs – the digital who can instantly confirm a driver’s as a platform for holding their credentials
driving licence status and driving privileges on the spot. and other essential documentation for
Governments around the world are Similarly, commercial service providers like authentication.
introducing apps that allow citizens to car hire companies, pubs and clubs, and a In a world where airlines are already using
download and store digital copies of host of other businesses will benefit. mobile phone boarding passes and in which
their vehicle registration, driving licence, citizens can use their smartphones to present
insurance papers and pollution certificates Conclusion tickets for events or gain access to university
to their mobile phones. Today, over 30 Digitising ID is a highly effective way to campuses and hotel rooms, leveraging the
countries have digital driving licence enhance a citizen’s day-to-day experience, convenience and power of mobile devices to
programmes – over 276 million licences giving service providers and others a fast, deliver secure authenticated digital identities
were issued in 2015. secure and convenient way to verify status, and other government credentials to citizens
Eradicating the need to carry original age and identity. represents a major step forward.
documents, these digital companions Alongside offering a convenient and Find our more at www.
are downloadable via an app that can be fast way to confirm identity, document secureidentityalliance.org.
instantly verified by the police and other provisioning and updating becomes easier.
authorised authorities. Citizens can be sent e-reminders to their This article was first published by
Operational in both online and offline digital companion when driver licences the Secure Identity Alliance: h ttps://
environments, these mobile IDs provide need to be renewed, for example. secureidentityalliance.org/blog/entry/
citizens with back-up in the event of physical Implementing a mobile digital driver digital-channels-and-the-evolution-of-id.
Integrated security
and event
management
High-end central London multi-zone
development chooses Tyco Security
Products’ C•CURE 9000 Security and
Event Management system
High-end central London multi-zone development chooses Tyco Security
Products’ C•CURE 9000 Security and Event Management system to unite its
building management, access control and video surveillance systems for
comprehensive management of the site’s physical security.
Land Securities is the UK’s largest listed commercial real estate company.
Its £14.5 billion portfolio totals 23.6 million square feet and includes some of
London’s most desirable office buildings and the UK’s most successful shopping
and leisure destinations.
Land Securities appointed Skanska to start work on the £260 million
development in Central London comprising of two distinct buildings united by
a new public piazza named New Ludgate. Together, the buildings include more
than 355 000 square feet of office accommodation and 26 800 square feet of
restaurant and retail facilities.
After an extensive competitive tender process, Universal Security Systems
was chosen to design and build a fully integrated security system to protect the
site, people and assets at its prestigious new development.
The solution
The security team at Universal Security Systems worked closely with engineers
to design an integrated system that could provide an intuitive GUI for video
management, IP video surveillance, lift integration, access control and video
intercoms. Since several disparate systems needed to be integrated together,
integrator Universal Security Systems wanted to be able to test the unified
system before installing it at New Ludgate, opting to build the entire security
system for a full FAT (Factory Acceptance Test) prior to the final installation.
Together, Universal Security Systems and Land Securities chose Tyco Security
Accessing Toyota
Upgrade delivers unified access control for motor manufacturer.
BDI Security Solutions has installed access unified solution with badge-printing as an 200 000 operations or an estimated three years
control equipment from ACT Vanderbilt at integral and cost-effective element when it on a busy door.
sites in the UK for car manufacturer Toyota had previously been a separate process. There are visible and audible alerts for
Motor Manufacturing (UK). The project saw The equipment includes ACTpro problems with tampering, signal strength and
ACT Vanderbilt developers create a tailored Mifare1030 mullion proximity readers at both door status, and wireless connectivity is up to
solution after their closest competitor proved indoor and outdoor locations. These slim-line 150 metres (line of sight). The lock is available
unable to operate from a virtual environment readers support third-party smart cards and with an optional Euro-profile cylinder to
and respond promptly to client requests. fobs, feature a robust polycarbonate housing provide key override.
Toyota’s Burnaston production process and have an ingress rating of IP67. They are Richard Huison of ACT Vanderbilt said:
begins with the pressing of panels from flat particularly suited to this type of project “Toyota was able to exploit our import
steel on presses ranging up to 3 000 tons and where the smart card is used for multiple tool which is an additional module in the
proceeds to welding, painting, addition of applications across access control and HR. In ACTenterprise management suite. The tool
plastic moulding components and assembly. order to maximise use of budget and observe allowed automated integration of human
The company uses the Kaizen continuous the client’s stringent environmental policy, resources software with the access control user
improvement method to optimise quality a number of fit-for-purpose legacy Mifare database and ACT Vanderbilt proved able to
and efficiency through constant incremental readers were included in the new system. cope with multiple data sources and formats.”
changes. At Deeside, Toyota operates a 115-acre Toyota is also using ACT Vanderbilt’s He continued: “There was a requirement
engine plant. Together, the two sites represent ACTpro eLock MIFARE Classic. This is a that our product should be able to work in a
investment of £2.5bn and employ 3 000 people. wireless door lock that includes an access virtualised environment since all of Toyota’s
The ACT Vanderbilt installation has control reader and opening mechanism, all servers are virtualised and hosted at a
replaced a legacy system that was no longer powered by batteries. eLocks operate with European datacentre. ACT Vanderbilt was able
future-proof and did not allow access control an ACTpro eLock hub and up to 32 locks can to tick this box as soon as we received the brief.
listings to be integrated with Toyota’s general communicate over a wireless network with Across both sites, ACT Vanderbilt products
corporate database. The client now has a each hub. Battery life is exceptional at over have been used on over 200 doors.”
M
service providers
• Comprehensive listing of manufacturers
Y
C
CM
M
MY
• and
Comprehensive listing of manufacturers
Y
CMY
MY
and brandthereof
names, and the South African
K
CY
CMY
K
suppliers
suppliers thereof
• Categorised and indexed for fast,
• easy
Categorised and indexed for fast,
reference
easy reference
Security,
convenience
and comfort
High security combined with
convenience and comfort. Bosch
implements a networked solution
for the Prime Tower in Zurich.
Jutting up to a height of 126 m, the 36-storey Prime Tower is
Zurich’s tallest building and number two in Switzerland. Its 40 000
square metres of floor space can accommodate more than 2000
workplaces. It is striking with its futuristic architecture and dark
green reflective exterior. The tower’s impressive details include
a 10 m-high entrance hall and the CLOUDS bar and restaurant
on the top floor boasting an unmatched view far out across the
surrounding landscape.
The operator relies on Bosch to keep the building safe and
secure. And to meet the Prime Tower’s requirements, the company’s
experts recently implemented a modernisation project.
One of the new system’s technical highlights is a combination
of electronic and biometric access control. “Our owner, the firm
of Swiss Prime Site Immobilien AG, attaches great importance
to monitoring who exactly is inside the building at all times,”
explained Annika Hammes, who heads the trustee department at
Wincasa, a building services outfit that was contracted to design
and execute the solution.
“Error-free biometric identification is accomplished by reading
the vein patterns on the backs of people’s hands. This is done
contactlessly for very easy, comfortable use. A total of 120 hand
vein readers have been installed in the building and connected
to the controllers of the eight elevators. Once employees and
guests have been biometrically registered, they board lifts that
automatically take them to the right floors.
Encrypted ID cards are used to access the rental units, thus
making sure that persons can only enter zones for which they have
been authorised. All relevant security information is collected in a
management system so that the responsible employees always have
everything in view and can respond quickly when there is a need.
Bosch handled everything for this project: advising the
client, and then planning and implementing the system. The
modifications were made without interrupting use of the building,
which was a major challenge not only for the project team,
which therefore had to work very swiftly, but also for the tenants
themselves.
“This called for very close cooperation between the Bosch team
and the mixed-use site management (MUSM) team of Wincasa AG,
which met the requirements for continued building use while the
work was ongoing,” explained Hammes.
ASSA ABLOY
Manufacturer
Distributor/supplier
BT-SA
Contact: Pieter Geyser System integrator
Tel: +27 11 761 5000
[email protected] Tel: 0860 105 183
ASSA ABLOY Commercial House, 9 Nickel Road, Technikon, Gauteng [email protected]
www.assaabloy.co.za 59 Lechwe Street, Corporate Park South, Midrand, Gauteng
Branches: Cape Town, Durban, Port Elizabeth, Ghana, Kenya, www.bt-sa.co.za
Namibia, Nigeria, Tanzania, Uganda, Zimbabwe Branches: Johannesburg, Cape Town, Rustenburg, Witbank, East London
ASSA ABLOY’s range includes SMARTair access control, Aperio BT-SA offers end-to-end security solutions that include design,
wireless door locks, and a wide range of mag locks, energy efficient installation and maintenance of high-tech integrated products. Its
electromechanical locks and electric strikes. Included in its product in-house team of experts can integrate all fire and security systems
offering for the residential market is a range of digital door locks, into a single platform with one-user interface. These products
including ENTR and Yale digital door locks, ideal for an include a variety of fire detection and suppression, evacuation
automated home. systems, access control, CCTV and all intruder detection types.
Elvey
CEM Systems Distributor/supplier
Manufacturer
Distributor/Supplier Contact: Elvey
Tel: +27 11 401 6700
Contact: Ernest Mallet [email protected]
Tel: +44 2890 456767 27 Greenstone Place, Greenstone Hill, Edenvale, Gauteng
[email protected] www.elvey.co.za
195 Airport Road West, Belfast, BT3 9ED, United Kingdom Branches: Bellville, Bloemfontein, Cape Town, Durban, Exports, East London,
www.cemsys.com East Rand, George, Greenstone, Johannesburg, Namibia, Nelspruit, Polokwane,
Branches: Johannesburg Port Elizabeth, Pretoria, Rustenburg, West Rand
CEM Systems access control and integrated security management Elvey provides a wide range of access control technology for the most extensive
systems from Johnson Controls secure sites around the world, range of applications. From time and attendance to monitoring solutions, integrated
ranging from education and healthcare to aviation and more. or standalone, Elvey provides for all its customers’ typical and diverse needs.
Johnson Controls manufactures both CEM hardware and
CEM AC2000 software, offering one of the most comprehensive,
resilient and reliable systems available. EOH Security and Building
Technologies
Installer/system integrator
Comb Communications Service provider
Manufacturer
Distributor / Supplier Contact: EOH Security and Building Technologies
Tel: +27 11 844 3200
Contact: Amelia Hayward [email protected]
Tel: +27 11 089 5800 www.eoh-fss.co.za
[email protected] Branches: Johannesburg, Cape Town, Port Elizabeth, Durban
Unit 17B, Allandale Park, Markels Close, Midrand, Gauteng
www.comb-communications.com Our offerings are powerful yet flexible, providing a turnkey solution to
manage your workforce effectively. It ranges from enhanced scheduling,
Leveraging web-based applications alongside functional components absence management, operational health and safety, access control,
and current technologies is what Comb Communications does best. payroll and HR integration. Our solutions include CCTV, BMS systems,
Its solutions not only provide you with peace-of-mind and reliability, infrastructure and support thereof. 30+ years of experience, guarantees
but give you the control that truly makes a difference in time successful implementations.
management and the management of access controlled environments.
ET Nice
Dahua Technology Manufacturer
South Africa Contact: Gerald Kirsten
Manufacturer Tel: +27 21 404 0800
[email protected]
Contact: Zhejiang Dahua Technology 15 Nelson Road, Observatory, Cape Town, Western Cape
Tel: +86 571 8768 8883 www.niceforyou.com/za
[email protected] Branches: Observatory, Brackenfell, Port Elizabeth, Pinetown, Nelspruit,
No.1199, Bin’an Road, Binjiang District, Hangzhou, China Samrand, Germiston
www.dahuasecurity.com
ET Nice, formerly ET Systems, has proudly been designing, manufacturing
Zhejiang Dahua Technology is a product and solution provider in and supporting products in South Africa for the access automation and
the global video surveillance industry. With more than 10 000 security industries for almost 30 years. Today, ET Nice is the optimal choice
employees all over the world, Dahua solutions, products and in the management of integrated automation systems, thanks to a
services are used in over 160 countries and regions. complete variety of smart and user-friendly products.
iPulse Systems
GV-TECH Manufacturer
Distributor/Supplier
Contact: Sales team
Contact: Christo Botha Tel: 0860 478 573
Tel: +27 83 516 8213 [email protected]
[email protected] Unit 15A, Skyview Retail Park, 67 CR Swart Drive, Strijdompark,
1st Floor, 106 Jean Avenue, Centurion, Gauteng Randburg, Gauteng
www.gvtech.co.za www.ipulsesystems.com
Branches: Centurion
iPulse Systems designs, manufactures and sells cloud-based access
We import and distribute GeoVision products. Our products control and workforce management systems. All products are designed and
include IP cameras, surveillance recording systems like NVRs manufactured in South Africa, and exported to 27 countries. Products include
and VMS; we also have LPR/ANPR, POS, and access control both hardware and software solutions. iPulse sells IQSuite.cloud, a full access
solutions. We are a total CCTV solutions provider and offer control system hosted on Microsoft Azure.
customised solutions.
Johnson Controls
Installer/system integrator
IDEMIA Distributor/supplier
Manufacturer
Contact: Marius Brits
Contact: Chelesile Moya Tel: +27 11 921 7100
Tel: +27 11 601 5500 [email protected]
[email protected] 42 Electron Avenue, Isando, Gauteng
14 Milkyway Aveune, Linbro Business Park, www.johnsoncontrols.co.za
Johannesburg, Gauteng Branches: Johannesburg, Cape Town, Durban, Carletonvville
www.idemia.com
Johnson Controls works with customers to develop comprehensive, cost-
OT-Morpho is now IDEMIA, a leader in trusted identities for an effective security and fire safety solutions. As a building-wide technology
increasingly digital world. Through augmented identity, IDEMIA integrator, we look at how to both implement the appropriate technologies
empowers citizens and consumers alike to interact, pay, and protect your investment long term. We provide support for the
connect, travel and vote in ways that are now possible in a development, design, deployment and implementation of a breadth of
connected environment. With close to €3bn in revenues, technologies, regardless of the manufacturer.
IDEMIA serves clients in 180 countries.
Saflec Systems
Manufacturer
Value-added reseller
Suprema
Secutel Technologies Manufacturer
Installer/System Integrator Distributor/supplier
Distributor/Supplier
Contact: The Suprema team
Contact: Danny Pringle Tel: +27 11 784 3952
Tel: +27 10 015 1401 [email protected]
[email protected] 108 11th Street, Parkmore, Sandton, Gauteng
13 Picaroon Street, Laser Park, Honeydew, Johannesburg, Gauteng www.suprema.co.za
www.secutel.co.za Branches: Johannesburg
Branches: Johannesburg, Polokwane, Cape Town, George, Nelspruit,
Durban, Port Elizabeth, Bloemfontein Suprema is a leader in biometric & identity management solutions,
including access control and T&A, embedded fingerprint modules,
The Secutel access control and visitor management platform combines PC fingerprint solutions, live scanners and e-passport readers.
iPad visitor registration kiosks, electronic door components, peripherals Suprema’s technology is aesthetically pleasing and supported
and software, providing tailor-made networked access control solutions. with award winning algorithms.
Everything fits together, everything works.
Softcon
Manufacturer Tyco
Distributor/supplier Manufacturer
The core modules of Softcon’s solution revolves around building Tyco, the security products division of Johnson Controls, manufactures
management, with the main focus on access control, input/output leading access control, video and intrusion systems, providing a
monitoring, biometric solutions, smart card solutions, vending control, fuel unified security platform from one trusted source. An extensive cyber
control, solutions for visitor control, asset management, ID card production, protection programme enforces Tyco’s approach to the design and
cashless point-of-sale at canteens and parking point-of-sale. development of its products to protect clients from cyber threats.
ZKTeco
Wolfpack Information Manufacturer
Risk
Distributor/Supplier Contact: Hendrik Combrinck
Tel: +27 12 259 1047
Contact: Craig Rosewarne [email protected]
Tel: +27 11 794 7322 Block F, Wellness World Corporate Park, Beethoven Street, Melodie,
[email protected] Hartbeespoort, North West Province
Building 1, Pendoring Office Park, 299 Pendoring Road, Blackheath, www.zkteco.co.za
Northcliff, Gauteng
www.wolfpackrisk.com ZKTeco is a leading global developer of security and time
Branches: Johannesburg management solutions. ZKTeco controls manufacturing, product
design, component assembly and logistics/shipping – all under
Wolfpack Information Risk specialises in business-aligned information risk one roof. ZKTeco develops biometric technology in the mass
and cyber threat management covering the full spectrum of commercial market in a cost-effective manner to ensure efficient
prevention, detection, incident management and resilience requirements. use of biometric technology.
Disclaimer: The information in this publication is furnished for the exclusive use of subscribers and is based on the most reliable data available to
Technews Publishing. However, the information was obtained from sources which Technews Publishing does not control and, although every effort has
been made to verify it, the data is volatile. In furnishing this information, Technews Publishing in no way assumes any part of the users’ or suppliers’ risks,
does not guarantee its completeness, timeliness or accuracy and shall not be liable for any loss or injury whatever resulting from the use of or reliance
on the information, or from negligence.
Index to advertisers
Access and Beyond............................................................................11 Paxton Access......................................................................................93
ASSA ABLOY.........................................................................................77 Powell Tronics......................................................................................23
Boomgate Systems......................................................................... 107 Reditron.................................................................................................37
CEM Systems........................................................................................15 Regal Distributors SA........................................................................29
Dahua Technology South Africa..................................................... 7 Saco a division of Bidvest Protea Coin........................................99
Doculam............................................................................................. 101 Saflec Systems.....................................................................................45
ET Nice....................................................................................................91 Salto Systems..................................................................................... IFC
Genetec............................................................................................... 103 Specialised Exhibitions Montgomery.......................................IBC
Hi-Tech Security Solutions........................................................1,117 Stallion Security..................................................................................41
IDEMIA....................................................................................................39 Suprema....................................................................................27,35,81
iMat..........................................................................................................95 Turnstar Systems................................................................................17
Impro Technologies...........................................................................79 Tyco.........................................................................................................85
iPulse Systems.................................................................................OBC Wolfpack Information Risk..............................................................25
Johnson Controls................................................................................31 Workforce Management Solutions..............................................87
Mustek Security Technologies.......................................................19 VERACITECH...........................................................................................5
neaMetrics................................................................................27,35,81 ZK Teco...................................................................................................65