07.12.2012 Views

Contact Vivienne at vivienne@ technews.co.za or 011543 5800 ...

Contact Vivienne at vivienne@ technews.co.za or 011543 5800 ...

Contact Vivienne at vivienne@ technews.co.za or 011543 5800 ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 1


4 .........Edit<strong>or</strong>’s <strong>co</strong>mment<br />

Opinion<br />

6 .........Moving towards practical security Solutions<br />

8 .........Integr<strong>at</strong>e <strong>or</strong> fail<br />

14 .......Biometrics by the book<br />

16 .......Make the right biometric choice<br />

20 .......Selecting the right biometric technology f<strong>or</strong> your needs<br />

40 .......Foolproof fi ngerprint detection<br />

87 .......Points to <strong>co</strong>nsider in selecting biometrics<br />

88 .......Access <strong>co</strong>ntrol does not equal time and <strong>at</strong>tendance<br />

Trends<br />

12 .......The new age of access <strong>co</strong>ntrol<br />

22 .......Biometric myth busting<br />

34 .......Face It<br />

36 .......The changing face of access <strong>co</strong>ntrol<br />

37 .......New kid on the M<strong>or</strong>pho block<br />

38 .......Balancing security and <strong>co</strong>nvenience to be<strong>at</strong> fraud<br />

85 .......W<strong>or</strong>kf<strong>or</strong>ce management effi ciency<br />

86 .......Identity in Africa, the mobile upwards<br />

89 .......Local digital identity innov<strong>at</strong>ion<br />

90 .......St<strong>at</strong>e of the access <strong>co</strong>ntrol market<br />

White paper<br />

28 .......Identity and access governance, a future in the cloud<br />

42 .......iCLASS SE implement<strong>at</strong>ion and migr<strong>at</strong>ion<br />

2 Access Access & & Id Identi Identity ntity ty y Man M Management agement Han Handbook and a book 2013 2013 www.secur<br />

www.securitysa.<strong>co</strong>m<br />

cur ur urity ity itysa. t sa <strong>co</strong>m<br />

<strong>co</strong>ntents<br />

System integr<strong>at</strong>ion<br />

76 .......System Integr<strong>at</strong><strong>or</strong> profi le<br />

78 .......T&A Solution Guide<br />

80 .......W<strong>or</strong>kf<strong>or</strong>ce Management Solution Guide<br />

84 .......Protect your business’s most imp<strong>or</strong>tant assets<br />

Best practices<br />

91 ......A guide to access <strong>co</strong>ntrol and sustainability<br />

Buyers’ Guide 2013<br />

44 ......Biometrics Selection Guide<br />

66 .......Access Selection Guide<br />

Product upd<strong>at</strong>e<br />

110 ....Access <strong>co</strong>ntrol fi ngerprint management with Unis<br />

111 .....Real-time, Web-based time and <strong>at</strong>tendance solution<br />

112 .....A new approach to people management<br />

114 .....The ProxNet 647-50 fi ngerprint reader<br />

114 .....Next gener<strong>at</strong>ion time and <strong>at</strong>tendance<br />

114 .....Hands-on <strong>at</strong>tendance<br />

115 .....IP to the do<strong>or</strong><br />

The back page<br />

116 .....Is th<strong>at</strong> you, darling?


Government<br />

case studies<br />

94 ...... High security access <strong>at</strong> nuclear site<br />

95 ...... Integr<strong>at</strong>ed security defends the prosecution<br />

Commercial<br />

96 ...... Access to mixed-use development<br />

97 ...... A taste of integr<strong>at</strong>ed access <strong>co</strong>ntrol<br />

Manufacturing<br />

98 ...... Carrol Boyes reduces downtime with<br />

Trac-Tech system<br />

99 ...... Compliance via biometrics<br />

100 .... Xpanding access <strong>co</strong>ntrol<br />

101 .... Pepk<strong>or</strong> opts f<strong>or</strong> turnstile access<br />

102 .... Integr<strong>at</strong>ed access roars with fl avour<br />

104 .... Biometrics: returns beyond access<br />

105 .... Back to school<br />

Construction<br />

106 .... Controlled access f<strong>or</strong> 15 000 people<br />

each day<br />

Identity management<br />

107 .... New Y<strong>or</strong>k City Transit<br />

Healthcare<br />

108 .... Hospital access <strong>co</strong>ntrolled<br />

Finance<br />

109 .... Ministry of Finance, Nigeria<br />

www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 3


EDITOR’S COMMENT<br />

Card? Wh<strong>at</strong> card?<br />

It’s th<strong>at</strong> time of the year again and the Access<br />

and Identity Management Handbook 2013 is<br />

now in your hands. This year’s handbook is<br />

probably the most imp<strong>or</strong>tant one we’ve done<br />

over the past few years, not only in terms of<br />

the specifi c <strong>co</strong>ntent, but also the overall focus<br />

on the public<strong>at</strong>ion.<br />

In the past, Hi-Tech Security Solutions has<br />

never been shy to talk about the move to<br />

biometrics and the imp<strong>or</strong>tance of integr<strong>at</strong>ing<br />

access into other solutions. This issue gave<br />

us no choice as biometrics seems to have<br />

reached a turning point which sees inf<strong>or</strong>med<br />

<strong>co</strong>mpanies actively <strong>co</strong>nsidering biometrics<br />

f<strong>or</strong> their access solutions<br />

instead of looking <strong>at</strong> it as a<br />

se<strong>co</strong>nd thought.<br />

The trend hasn’t quite<br />

caught on in the IT w<strong>or</strong>ld,<br />

which seems to be happy<br />

with cards and passw<strong>or</strong>ds,<br />

but how long can this carry<br />

on? There’s the st<strong>or</strong>y of the<br />

IT department who says<br />

it’s s<strong>at</strong>isfi ed th<strong>at</strong> passw<strong>or</strong>ds<br />

and cards are safe because<br />

their employees have<br />

signed a <strong>co</strong>ntract agreeing<br />

not to share their cards and<br />

passw<strong>or</strong>ds with anyone.<br />

I hope the IT manager in question was just<br />

saying th<strong>at</strong> to get rid of a sales person and<br />

isn’t actually risking his job on it.<br />

Of <strong>co</strong>urse there are still millions of cards<br />

and card-based access systems out there in<br />

the real w<strong>or</strong>ld, but as m<strong>or</strong>e <strong>co</strong>mpanies have<br />

to protect their premises, assets, d<strong>at</strong>a and<br />

fi nances from criminal syndic<strong>at</strong>es who have<br />

m<strong>or</strong>e time and money than they do, we can<br />

expect to see m<strong>or</strong>e biometrics installed in<br />

almost every industry out there – especially in<br />

sensitive areas.<br />

The biometrics market also had a bit of a<br />

shake-up this year with M<strong>or</strong>pho, the brand<br />

with the lion’s share of the South African<br />

LETTERS TO THE EDITOR<br />

Letters to the Edit<strong>or</strong> should be addressed to Andrew Seldon <strong>at</strong> andrew@<strong>technews</strong>.<strong>co</strong>.<strong>za</strong>.<br />

Sending m<strong>at</strong>erial to this public<strong>at</strong>ion will be <strong>co</strong>nsidered autom<strong>at</strong>ic permission to use in full<br />

<strong>or</strong> in part in our Letters <strong>co</strong>lumn. Be sure to include your name, e-mail address, city and<br />

postal <strong>co</strong>de. We reserve the right to edit all letters.<br />

4 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

market, expanding its distribution base. Will<br />

this result in even better sales f<strong>or</strong> the biometric<br />

brand? If you look <strong>at</strong> the pages th<strong>at</strong><br />

follow, it’s clear th<strong>at</strong> other brands are not<br />

resting on their laurels, but actively driving<br />

their solutions to market.<br />

Buyers’ selection guides<br />

We’ve also included our Biometrics Selection<br />

Guide in the handbook f<strong>or</strong> the fi rst time<br />

this year. And it’s proved to be the right<br />

decision. You can fi nd a biometric device f<strong>or</strong><br />

any need in the guide. We were also told we<br />

can’t ign<strong>or</strong>e other access <strong>co</strong>ntrol devices just<br />

because they weren’t<br />

biometric based, so<br />

we’ve also included<br />

an Access Selection<br />

Guide f<strong>or</strong> non-biometric<br />

solutions. The number<br />

of entries we received<br />

was quite surprising,<br />

showing th<strong>at</strong> biometrics<br />

haven’t taken over the<br />

w<strong>or</strong>ld.<br />

We’ve included the<br />

option in both guides<br />

f<strong>or</strong> the vend<strong>or</strong>s to highlight<br />

wh<strong>at</strong> applic<strong>at</strong>ions<br />

their devices are aimed<br />

<strong>at</strong> as well as any integr<strong>at</strong>ion assistance and<br />

capabilities buyers can expect. We don’t go<br />

into intric<strong>at</strong>e details, but the tables provide<br />

insight into wh<strong>at</strong> your hardware can do and<br />

wh<strong>at</strong> solutions it <strong>co</strong>uld be integr<strong>at</strong>ed into.<br />

And if you think integr<strong>at</strong>ion is a rumour,<br />

the following pages will change your mind.<br />

Any insight from readers into wh<strong>at</strong> we<br />

can do to improve the guides next year is<br />

m<strong>or</strong>e than wel<strong>co</strong>me. Feel free to let us know<br />

<strong>at</strong> andrew@<strong>technews</strong>.<strong>co</strong>.<strong>za</strong>. And please use<br />

the same address should you have any <strong>co</strong>mments<br />

on the handbook as a whole.<br />

Andrew Seldon – Edit<strong>or</strong><br />

Published by<br />

Technews Publishing (Pty) Ltd<br />

1st Flo<strong>or</strong> Stabilitas, 265 Kent Avenue,<br />

Randburg<br />

Box 385, Pinegowrie 2123<br />

Tel: 011 543 <strong>5800</strong><br />

Fax: 011 787 8052<br />

ISSN 1562-952X<br />

Edit<strong>or</strong><br />

Andrew Seldon: andrew@<strong>technews</strong>.<strong>co</strong>.<strong>za</strong><br />

Contribut<strong>or</strong>s<br />

Allyson Koekhoven<br />

Mark Eardley<br />

Business Manager<br />

<strong>Vivienne</strong> D<strong>or</strong>rington:<br />

<strong>vivienne@</strong><strong>technews</strong>.<strong>co</strong>.<strong>za</strong><br />

Advertising sales<br />

Tracy Wolter: tracy@<strong>technews</strong>.<strong>co</strong>.<strong>za</strong><br />

Laura D<strong>or</strong>rington: laura@<strong>technews</strong>.<strong>co</strong>.<strong>za</strong><br />

Angie Crew: angie@<strong>technews</strong>.<strong>co</strong>.<strong>za</strong><br />

Subscription Services<br />

F<strong>or</strong> address changes, <strong>or</strong>ders, renewal<br />

st<strong>at</strong>us <strong>or</strong> missing issues,<br />

e-mail:<br />

subs@<strong>technews</strong>.<strong>co</strong>.<strong>za</strong><br />

Subscribe online: www.<strong>technews</strong>.<strong>co</strong>.<strong>za</strong><br />

Design and layout: Technique Design<br />

Printed by: Intrepid Printers (Pty) Ltd,<br />

9 Grix Road, Willowton, Pietermaritzburg<br />

All rights reserved. No part of this public<strong>at</strong>ion may be<br />

reproduced, adapted, st<strong>or</strong>ed in a retrieval system <strong>or</strong><br />

transmitted in any f<strong>or</strong>m <strong>or</strong> by any means, electronic,<br />

mechanical, photo<strong>co</strong>pying, re<strong>co</strong>rding <strong>or</strong> otherwise,<br />

without the pri<strong>or</strong> written permission of Technews<br />

Publishing (Pty) Ltd,<br />

Reg No. 2005/034598/07<br />

Disclaimer<br />

While every eff <strong>or</strong>t has been made to ensure the accuracy of<br />

the inf<strong>or</strong>m<strong>at</strong>ion <strong>co</strong>ntained<br />

herein, the publisher and its agents cannot be held<br />

responsible f<strong>or</strong> any err<strong>or</strong>s <strong>co</strong>ntained, <strong>or</strong> any loss incurred<br />

as a result. Articles published do not necessarily refl ect the<br />

views of the publishers. The edit<strong>or</strong> reserves the right to alter<br />

<strong>or</strong> cut <strong>co</strong>py. Articles submitted are deemed to have been<br />

cleared f<strong>or</strong> public<strong>at</strong>ion.<br />

Advertisements, inserts and <strong>co</strong>mpany <strong>co</strong>ntact details are<br />

printed as provided by the advertiser. Technews Publishing<br />

(Pty) Ltd cannot be held responsible f<strong>or</strong> the accuracy <strong>or</strong><br />

veracity of supplied m<strong>at</strong>erial.


www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 5


OPINION<br />

Moving towards practical security<br />

solutions<br />

By Peter Bouwer, GM, special projects <strong>at</strong> Mustek Security Technologies.<br />

The identity management and access <strong>co</strong>ntrol market is <strong>at</strong> an exciting<br />

point, with technology being available th<strong>at</strong> can bridge the gap<br />

between high <strong>co</strong>st and high-end solutions, and m<strong>or</strong>e <strong>co</strong>st-eff ective<br />

and functional ones. This will essentially help businesses and crime<br />

prevention services get m<strong>or</strong>e benefi t out of them.<br />

Gartner st<strong>at</strong>ed earlier this year th<strong>at</strong> <strong>co</strong>mpanies need to increase<br />

their focus on identity and privacy projects th<strong>at</strong> can deliver real value,<br />

not just to IT departments – but to<br />

the rest of the business. As <strong>or</strong>ganis<strong>at</strong>ional<br />

boundaries erode under the<br />

pressure of feder<strong>at</strong>ion and outsourcing,<br />

and as <strong>co</strong>mpany <strong>co</strong>ntrol<br />

over IT <strong>co</strong>ntinues to weaken, due to<br />

the increased adoption of mobile and<br />

cloud services, identity management<br />

is be<strong>co</strong>ming m<strong>or</strong>e imp<strong>or</strong>tant than<br />

ever bef<strong>or</strong>e.<br />

A face f<strong>or</strong> crime<br />

One of the key aspects of identity<br />

management and access is th<strong>at</strong> of<br />

facial re<strong>co</strong>gnition, which has many<br />

advantages over other biometrics<br />

solutions. It enables faces to be<br />

re<strong>co</strong>rded and archived <strong>at</strong> a distance,<br />

act as a crime deterrent, and help<br />

identify a person immedi<strong>at</strong>ely <strong>or</strong> <strong>at</strong><br />

a l<strong>at</strong>er d<strong>at</strong>e. M<strong>or</strong>e imp<strong>or</strong>tantly, the<br />

<strong>co</strong>ntact-free and non-obtrusive procedure<br />

makes f<strong>or</strong> a m<strong>or</strong>e acceptable<br />

and easier integr<strong>at</strong>ed identifi c<strong>at</strong>ion<br />

solution using existing cameras.<br />

The prevention of real-time<br />

Peter Bouwer<br />

crimes and tracking persons of<br />

interest is diffi cult to do, due to a lack of accuracy by human eyes, and<br />

the <strong>co</strong>st of manpower to monit<strong>or</strong> surveillance systems <strong>co</strong>nnected to<br />

numerous cameras.<br />

There are solutions available th<strong>at</strong> can in<strong>co</strong>rp<strong>or</strong><strong>at</strong>e embedded face<br />

re<strong>co</strong>gnition and 3G technologies to integr<strong>at</strong>e with existing CCTV<br />

cameras, to off er fl exibility and mobility f<strong>or</strong> install<strong>at</strong>ion in remote,<br />

rugged, and challenging areas. Some solutions also have law enf<strong>or</strong>cement<br />

applic<strong>at</strong>ions th<strong>at</strong> enable mugshot browsing, searching, m<strong>at</strong>ching,<br />

and fi ltering via Web-based front-ends. This means th<strong>at</strong> access can<br />

be from anywhere, based on auth<strong>or</strong>is<strong>at</strong>ion. Intelligence g<strong>at</strong>hering from<br />

live cameras can be displayed and searched in se<strong>co</strong>nds. M<strong>at</strong>ching can<br />

6 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

be perf<strong>or</strong>med quickly by uploading local fi les <strong>or</strong> via remote devices,<br />

such as mobile phones <strong>or</strong> wireless video servers.<br />

Making technology accessible<br />

Companies are theref<strong>or</strong>e faced with wh<strong>at</strong> seems to be a dizzying array<br />

of choices. Yet, many of them have been frustr<strong>at</strong>ed by the expensive<br />

<strong>co</strong>sts associ<strong>at</strong>ed to having quality facial re<strong>co</strong>gnition technologies<br />

in<strong>co</strong>rp<strong>or</strong><strong>at</strong>ed into a security system.<br />

Far too often this leads to a <strong>co</strong>mpany<br />

buying an off -the-shelf CCTV<br />

solution, from a retail st<strong>or</strong>e th<strong>at</strong><br />

does not take its specifi c requirements<br />

into <strong>co</strong>nsider<strong>at</strong>ion. These<br />

businesses are then surprised th<strong>at</strong><br />

the quality of the re<strong>co</strong>rdings are not<br />

good enough to be used as evidence<br />

in crime fi ghting.<br />

Locally, <strong>co</strong>mpanies need to be<br />

educ<strong>at</strong>ed on the benefi ts of the<br />

respective solutions in <strong>or</strong>der f<strong>or</strong><br />

them to make a qualifi ed purchasing<br />

decision. And while many may<br />

think this educ<strong>at</strong>ion <strong>co</strong>mes down to<br />

m<strong>or</strong>e expensive being better, it is a<br />

case of implementing systems th<strong>at</strong><br />

can be used as evidence to not only<br />

identify those who break the law –<br />

but also help to prosecute them.<br />

Thankfully, many <strong>co</strong>mpanies<br />

understand the imp<strong>or</strong>tance of being<br />

pro-active when it <strong>co</strong>mes to identity<br />

management and access solutions.<br />

These <strong>co</strong>mpanies are also m<strong>or</strong>e open<br />

to technology developments than<br />

in the past. This <strong>co</strong>uld be <strong>at</strong>tributed to the realis<strong>at</strong>ion th<strong>at</strong> <strong>co</strong>ntrol over<br />

mobile and Internet-based services is virtually impossible to enf<strong>or</strong>ce.<br />

Solutions th<strong>at</strong> are <strong>co</strong>gnisant of this and empower <strong>co</strong>mpanies with the<br />

tools they need to manage any potential issues bef<strong>or</strong>e they arise are vital.<br />

The local market is truly <strong>at</strong> an exciting time f<strong>or</strong> these identity<br />

management and access <strong>co</strong>ntrol solutions. We will see quite a shift<br />

in how <strong>co</strong>m panies adopt these solutions and how law enf<strong>or</strong>cement<br />

agencies use them.<br />

F<strong>or</strong> m<strong>or</strong>e inf<strong>or</strong>m<strong>at</strong>ion <strong>co</strong>ntact Mustek Security Technologies,<br />

+27 (0)11 237 1364, sergiop@mustek.<strong>co</strong>.<strong>za</strong>, www.mustek.<strong>co</strong>.<strong>za</strong>


www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 7


OPINION<br />

Integr<strong>at</strong>e <strong>or</strong> fail<br />

Develop solutions th<strong>at</strong> capitalise on the <strong>co</strong>mmercial benefi ts provided by biometrics.<br />

Without any doubt, a <strong>co</strong>mmitment to integr<strong>at</strong>ion is one of the main <strong>co</strong>mpanies to begin replacing <strong>co</strong>nventional access cards by integr<strong>at</strong>ing<br />

reasons why fi ngerprint-based identifi c<strong>at</strong>ion is used so extensively in SA biometrics within their systems.<br />

to <strong>co</strong>ntrol w<strong>or</strong>kplace access and manage T&A. Managing identity within “Back in 2005, we saw how fi ngerprint technology <strong>co</strong>uld move beyond<br />

the w<strong>or</strong>kplace has been the found<strong>at</strong>ion f<strong>or</strong> local biometric applic<strong>at</strong>ions. its applic<strong>at</strong>ions within law enf<strong>or</strong>cement. By w<strong>or</strong>king closely with Ide<strong>co</strong><br />

Dave Hunter, divisional managing direct<strong>or</strong> <strong>at</strong> Bytes Systems Integr<strong>at</strong>ion as our integr<strong>at</strong>ion partner, it became <strong>co</strong>mmercially feasible to use bio-<br />

says, “We re<strong>co</strong>gnised the potential of biometrics many years ago. Right metrics as a highly secure means of managing identity within our access<br />

from the start, we clearly saw how the technology <strong>co</strong>uld signifi cantly <strong>co</strong>ntrol systems. Without th<strong>at</strong> partnership, we would probably still regard<br />

strengthen the overall integrity of our Kronos w<strong>or</strong>kf<strong>or</strong>ce management the technology as sci-fi on TV shows like CSI. Instead, fi ngerprint-based<br />

solution.”<br />

identifi c<strong>at</strong>ion is now a business real-<br />

Hunter says th<strong>at</strong> the Kronos pl<strong>at</strong>- Jason M<strong>at</strong>thews Dave Hunter ity f<strong>or</strong> hundreds of our end-users like<br />

f<strong>or</strong>m addresses the needs of large<br />

<strong>or</strong>ganis<strong>at</strong>ions with high numbers of<br />

Voda<strong>co</strong>m and Coca-Cola.”<br />

personnel who are widely dispersed<br />

Integr<strong>at</strong>ion demands<br />

geographically. “It’s a heavy-duty<br />

resources<br />

solution f<strong>or</strong> large, diversifi ed <strong>or</strong>gani-<br />

Coetzee says th<strong>at</strong> Ide<strong>co</strong> spends<br />

s<strong>at</strong>ions. Nevertheless, even such an<br />

around R2,5m a year on providing<br />

advanced solution is still subject to<br />

integr<strong>at</strong>ion services th<strong>at</strong> enable the<br />

the age-old security vulnerabilities<br />

use of fi ngerprint scanners within a<br />

th<strong>at</strong> are cre<strong>at</strong>ed by a dependence<br />

diversity of secure business solu-<br />

on old-fashioned access cards and<br />

tions. “Most of th<strong>at</strong> budget goes<br />

<strong>co</strong>des to authentic<strong>at</strong>e people’s<br />

towards funding our technical and<br />

identities.”<br />

development team. It provides a<br />

In Hunter’s opinion, in 2004 the<br />

‘can-do’ pl<strong>at</strong>f<strong>or</strong>m of technical skills<br />

potential benefi ts th<strong>at</strong> biometrics<br />

and expertise th<strong>at</strong> allows us to<br />

clearly off ered were nothing m<strong>or</strong>e<br />

<strong>co</strong>-oper<strong>at</strong>e with our partners in<br />

than th<strong>at</strong> – potential benefi ts. “Unless we <strong>co</strong>uld integr<strong>at</strong>e our technolo- building fi ngerprint-based business solutions f<strong>or</strong> their clients.”<br />

gies with biometrics, th<strong>at</strong> potential was always going to remain unful- But the fi nancial <strong>co</strong>mmitment to integr<strong>at</strong>ion doesn’t end there. At<br />

fi lled. It was nothing m<strong>or</strong>e than a nice-to-have <strong>co</strong>ncept in some hypo- any given time, Ide<strong>co</strong> typically has R600k w<strong>or</strong>th of development <strong>or</strong><br />

thetical future. Commercially, it would have been a non-starter. Wh<strong>at</strong> demo equipment alloc<strong>at</strong>ed to specifi c projects where biometrics are<br />

turned it into a practical business reality was the extra<strong>or</strong>dinary <strong>co</strong>mmit- being in<strong>co</strong>rp<strong>or</strong><strong>at</strong>ed into new and existing solutions. Coetzee stresses<br />

ment towards integr<strong>at</strong>ion from our long-term biometrics partner, Ide<strong>co</strong>.” th<strong>at</strong>, “Our <strong>co</strong>ntinuous investment in integr<strong>at</strong>ion is one of the main rea-<br />

This perspective is end<strong>or</strong>sed by Mark Stoop, business unit manager sons why m<strong>or</strong>e than 70% of all local biometric applic<strong>at</strong>ions are based on<br />

within the Innov<strong>at</strong>ion Group <strong>at</strong> Business Connexion. “In partnership with fi ngerprint scanners from us.”<br />

Ide<strong>co</strong>, we have been implementing fi ngerprint-based physical security “Integr<strong>at</strong>ion is a <strong>co</strong>re <strong>co</strong>mponent of our business. It’s an on-going<br />

solutions in southern Africa f<strong>or</strong> the past seven years.<br />

process th<strong>at</strong> supp<strong>or</strong>ts an ever-growing range of business applic<strong>at</strong>ions<br />

“The business case f<strong>or</strong> replacing traditional access credentials with th<strong>at</strong> rely on accur<strong>at</strong>e identifi c<strong>at</strong>ion of the people who use them. As<br />

fi ngerprint technology is disarmingly straightf<strong>or</strong>ward. Fingerprint-based the business advantages of modern biometrics be<strong>co</strong>me m<strong>or</strong>e widely<br />

identifi c<strong>at</strong>ion cuts the repetitive losses caused by unauth<strong>or</strong>ised access and re<strong>co</strong>gnised, we are seeing increased demand f<strong>or</strong> us to integr<strong>at</strong>e scanners<br />

activity within the w<strong>or</strong>kplace. This has been proven repe<strong>at</strong>edly in local within diff erent types of systems.”<br />

<strong>or</strong>ganis<strong>at</strong>ions ranging from mines to food-processing plants. Our clients F<strong>or</strong> Coetzee, this extensive integr<strong>at</strong>ion w<strong>or</strong>k across such a wide range<br />

know this because they see the results on their bottom line. They re<strong>co</strong>gn- of leading solutions is essential and it f<strong>or</strong>ms part of an integr<strong>at</strong>ed bioise<br />

th<strong>at</strong> any security solution based on a card <strong>or</strong> a <strong>co</strong>de is clearly vulnerametric security industry estim<strong>at</strong>ed <strong>at</strong> m<strong>or</strong>e than R3 billion per annum. “In<br />

ble to abuse simply because it is so easy f<strong>or</strong> people to share <strong>or</strong> steal them.” <strong>or</strong>der to drive high volumes of biometric sales across southern Africa, we<br />

He points out th<strong>at</strong> the ability to accur<strong>at</strong>ely identify people within the had to demonstr<strong>at</strong>e <strong>co</strong>mmitment to the <strong>co</strong>mpanies who use the products.<br />

w<strong>or</strong>kplace delivers a gre<strong>at</strong> deal m<strong>or</strong>e than just preventing unauth<strong>or</strong>ised “If we had just dropped boxes and walked away, M<strong>or</strong>pho would<br />

access and buddy clocking – the practice where people clock-on f<strong>or</strong> one just be another one of the min<strong>or</strong> players in the local biometrics market.<br />

another <strong>at</strong> w<strong>or</strong>k in <strong>or</strong>der to defraud their employer’s payroll system. We Instead, our integr<strong>at</strong>ion w<strong>or</strong>k means th<strong>at</strong> M<strong>or</strong>pho is rightly regarded as<br />

are also able to deliver benefi ts in areas such as occup<strong>at</strong>ional health and<br />

safety, because we can accur<strong>at</strong>ely <strong>co</strong>ntrol who can enter certain areas as<br />

the number-one biometric product.”<br />

well as re<strong>co</strong>rding people’s loc<strong>at</strong>ion as they move around their place of A f<strong>or</strong>mal business process<br />

w<strong>or</strong>k.”<br />

The type of integr<strong>at</strong>ion service provided by Ide<strong>co</strong> allows diff erent levels<br />

As one of the leading local manufacturers of access <strong>co</strong>ntrol systems, of integr<strong>at</strong>ion within the systems th<strong>at</strong> M<strong>or</strong>pho fe<strong>at</strong>ures. Coetzee says,<br />

Safl ec has a user-base of over 500 <strong>co</strong>mpanies across southern Africa. “We off er the service free of charge based on agreements th<strong>at</strong> the<br />

Sales manager, Barend Keyser, says th<strong>at</strong> Safl ec was one of the fi rst SA<br />

Continued on page 10<br />

8 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m


www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 9


OPINION<br />

Continued from page 8<br />

Biometric Systems says this is particularly evident within the established<br />

solution provider uses our biometric products. Obviously, it’s imp<strong>or</strong>tant discipline of identity management <strong>or</strong> IdM. “Within <strong>co</strong>rp<strong>or</strong><strong>at</strong>e IT systems,<br />

th<strong>at</strong> the technology itself is so highly regarded. Th<strong>at</strong> level of respect f<strong>or</strong> the function of managing identity has traditionally been the preserve of<br />

the product is based on a long-established track re<strong>co</strong>rd of exceptional specialised IdM solutions from big names like IBM, Sophos, RSA, Novell<br />

perf<strong>or</strong>mance and capabilities. At Ide<strong>co</strong>, one of our key roles is to make and Symantec.<br />

those <strong>co</strong>mmercial advantages readily available to the market.”<br />

“On the other hand, the function <strong>or</strong> discipline of authenti c<strong>at</strong>ing<br />

Ide<strong>co</strong> begins its f<strong>or</strong>mal integr<strong>at</strong>ion process with an NDA to protect identity is handled separ<strong>at</strong>ely by the big names in biometrics, like<br />

both parties when sharing their IP. This is followed by a str<strong>at</strong>egy dis- M<strong>or</strong>pho f<strong>or</strong> example. There is little <strong>co</strong>llab<strong>or</strong><strong>at</strong>ion across the two<br />

cussion to understand the business<br />

distinct disciplines and their<br />

objectives and integr<strong>at</strong>ion require-<br />

respective strengths often remain<br />

ments. “Then the two teams of<br />

in their separ<strong>at</strong>e silos as opposed<br />

technologists do their thing,” says<br />

to w<strong>or</strong>king together. It doesn’t<br />

Coetzee. “They move the integra-<br />

m<strong>at</strong>ter how sophistic<strong>at</strong>ed your<br />

tion f<strong>or</strong>ward to a point where it can<br />

IdM solution might be if it’s based<br />

be evalu<strong>at</strong>ed against the <strong>or</strong>iginal<br />

on cards and PINs and passw<strong>or</strong>ds.<br />

oper<strong>at</strong>ional and <strong>co</strong>mmercial objec-<br />

If the system can’t accur<strong>at</strong>ely<br />

tives and certifi ed as being <strong>co</strong>m-<br />

authentic<strong>at</strong>e users, well, wh<strong>at</strong>’s<br />

pliant to best biometric practices.”<br />

the point of trying to manage<br />

Coetzee knows th<strong>at</strong> integr<strong>at</strong>ion<br />

wh<strong>at</strong> they can do?<br />

is a living thing th<strong>at</strong> evolves with<br />

“Equally, authentic<strong>at</strong>ing IT<br />

advances in biometric technology<br />

users biometrically isn’t much<br />

as well as in the solutions where it<br />

is used. “With every new product <strong>or</strong><br />

Mark Stoop Barend Keyser<br />

good without an IdM solution<br />

to handle wh<strong>at</strong> those users can<br />

fi rmware release there are changes<br />

do. But, if you put the two sets of<br />

th<strong>at</strong> <strong>co</strong>uld have a m<strong>at</strong>erial eff ect on the overall solution. Ide<strong>co</strong> maintains technology together then you have a <strong>co</strong>mpletely diff erent animal. Then<br />

on-going technical rel<strong>at</strong>ionships with our partners so th<strong>at</strong> we can supp<strong>or</strong>t you have a system th<strong>at</strong> can truly authentic<strong>at</strong>e, auth<strong>or</strong>ise and audit users<br />

each other’s developments and maximise the demonstrable benefi ts th<strong>at</strong> and their IT activity.”<br />

biometrics off er the end-user. Together, we ensure th<strong>at</strong> the technology<br />

Stoop says th<strong>at</strong> although Business Connexion’s clients have fi rst-<br />

meets expect<strong>at</strong>ions.”<br />

hand experience of the fi nancial benefi ts derived from fi ngerprint<br />

identifi c<strong>at</strong>ion within physical security and w<strong>or</strong>kplace <strong>at</strong>tendance, he<br />

Thinking outside the box<br />

re<strong>co</strong>gnises th<strong>at</strong> <strong>or</strong>ganis<strong>at</strong>ions are increasingly exposed to security<br />

Jason M<strong>at</strong>thews, MD of access <strong>co</strong>ntrol and T&A specialists, Jarrison Systems, thre<strong>at</strong>s within their IT systems. “C<strong>or</strong>p<strong>or</strong><strong>at</strong>e IT still relies on passw<strong>or</strong>ds,<br />

has w<strong>or</strong>ked with Ide<strong>co</strong> since 2005 and says th<strong>at</strong> integr<strong>at</strong>ion is key to extend- PINs and cards to <strong>co</strong>ntrol who can access their systems and oper<strong>at</strong>e<br />

ing the business benefi ts th<strong>at</strong> can be achieved through biometrics.<br />

within them. This cre<strong>at</strong>es the same obvious and elementary risks th<strong>at</strong> we<br />

He cites Jarrison’s large-scale fi ngerprint-based solution <strong>at</strong> Omnia are <strong>co</strong>untering with biometrics in physical security.”<br />

Fertilizer as an example, “In addition to handling T&A and access f<strong>or</strong><br />

He believes th<strong>at</strong> the next maj<strong>or</strong> advance in biometric applic<strong>at</strong>ions<br />

about 5 000 employees <strong>at</strong> Omnia’s Sasolburg plant, the solution also uses will be their integr<strong>at</strong>ion into access and activity <strong>co</strong>ntrol within IT sys-<br />

fi ngerprint identifi c<strong>at</strong>ion to manage the personal protective equipment tems. “The motiv<strong>at</strong>ion to introduce biometric <strong>co</strong>ntrols into IT is really no<br />

<strong>or</strong> PPE st<strong>or</strong>e. The PPE <strong>co</strong>mponent of the system tracks wh<strong>at</strong> items were diff erent to wh<strong>at</strong> we have seen in physical security. The <strong>co</strong>mmon goal<br />

issued and to whom they were issued. Instead of signing f<strong>or</strong> equipment is to prevent unauth<strong>or</strong>ised access and the losses it causes. It strikes me<br />

in a book, we use fi ngerprints to identify who is taking the equipment th<strong>at</strong> this is a particularly pressing need in IT given the level of losses<br />

and who’s issuing it.<br />

being caused by <strong>co</strong>rp<strong>or</strong><strong>at</strong>e cybercrime.”<br />

“Omnia also uses the M<strong>or</strong>pho-based solution to <strong>co</strong>ntrol its on-site<br />

Once again, integr<strong>at</strong>ion is critical to such an advance and Stoop<br />

induction process, ensuring th<strong>at</strong> all the necessary Health & Safety <strong>co</strong>mpli- and his team have w<strong>or</strong>ked extensively with Ide<strong>co</strong> to facilit<strong>at</strong>e this. “We<br />

ances are met f<strong>or</strong> visit<strong>or</strong>s <strong>or</strong> <strong>co</strong>ntract<strong>or</strong>s entering certain areas of the plant.” are now <strong>at</strong> the point where we can replace IT access cards, PINs and<br />

With such an established local track re<strong>co</strong>rd th<strong>at</strong> demonstr<strong>at</strong>es both passw<strong>or</strong>ds with fi ngerprints. Not only can we <strong>co</strong>ntrol initial sign-on, we<br />

the capabilities of biometrics and the proven business results they<br />

can govern access to applic<strong>at</strong>ions, documents and Web f<strong>or</strong>ms. Through<br />

deliver, Coetzee sees the technology as being <strong>at</strong> a point where its appli- fi ngerprint-based authentic<strong>at</strong>ion of the user, we can also auth<strong>or</strong>ise<br />

c<strong>at</strong>ion isn’t limited to <strong>co</strong>nventional security solutions.<br />

changes to d<strong>at</strong>a and <strong>co</strong>ntrol transactions. At the same time, we re<strong>co</strong>rd all<br />

Increasingly, Ide<strong>co</strong> is seeing th<strong>at</strong> accur<strong>at</strong>e identity <strong>co</strong>ntrol is be<strong>co</strong>ming this activity and link it to the biometric identity of the user. This means<br />

an essential function within m<strong>or</strong>e and m<strong>or</strong>e business processes. Coetzee th<strong>at</strong> we build accur<strong>at</strong>e audit trails th<strong>at</strong> defi nitively show who did wh<strong>at</strong><br />

says, “We are currently w<strong>or</strong>king on 52 integr<strong>at</strong>ion projects. These include within an IT system. And we can do all this right now.”<br />

the use of biometrics within logistics and supply chains; vehicle driver<br />

As f<strong>or</strong> the future of biometric applic<strong>at</strong>ions, Coetzee en<strong>co</strong>urages<br />

identifi c<strong>at</strong>ion; managing the chain of custody within law enf<strong>or</strong>cement; anyone whose systems are reliant on identity to <strong>co</strong>nsider biometrics<br />

and handling identity-based processes within the manufacturing, retail, as a means to acceler<strong>at</strong>e processes and reinf<strong>or</strong>ce security. “The only<br />

banking and medical sect<strong>or</strong>s.”<br />

eff ective way to <strong>co</strong>ntrol identity is with fi ngerprint technology. South<br />

African <strong>or</strong>ganis<strong>at</strong>ions should be en<strong>co</strong>uraged by the fact there is such<br />

Collab<strong>or</strong><strong>at</strong>ion is essential<br />

a wealth of local experience in how to achieve this both in terms of<br />

Very often there is a limiting silo eff ect in terms of maximising the <strong>co</strong>m- technical expertise and practical knowledge <strong>co</strong>ncerning successful<br />

mercial results th<strong>at</strong> biometrics can deliver. Mark Eardley of SuperVision implement<strong>at</strong>ion.”<br />

10 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m


www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 11


TRENDS<br />

The new age of access <strong>co</strong>ntrol<br />

Oper<strong>at</strong>ed in isol<strong>at</strong>ion from other safety and security systems, even the most<br />

sophistic<strong>at</strong>ed access <strong>co</strong>ntrol system cannot live up to its promises.<br />

Access <strong>co</strong>ntrol has be<strong>co</strong>me a vital <strong>co</strong>mponent of any security <strong>co</strong>ncept<br />

w<strong>or</strong>ldwide. The protection of intellectual property rights, prevention<br />

of theft and sabotage <strong>or</strong> simply <strong>co</strong>mpliance requirements, there are a<br />

multitude of reasons why <strong>co</strong>mpanies of all kinds need to use a <strong>co</strong>mprehensive<br />

access <strong>co</strong>ntrol system to restrict, manage and <strong>co</strong>ntrol access<br />

to their facilities. However, oper<strong>at</strong>ed in isol<strong>at</strong>ion from other safety and<br />

security systems, even the most sophistic<strong>at</strong>ed access <strong>co</strong>ntrol system<br />

cannot really live up to its promises.<br />

In such an environment, oper<strong>at</strong>ion and monit<strong>or</strong>ing can quickly turn<br />

into a nightmare, as each system has its own architecture, its own user<br />

interface and its own management tool. This is why m<strong>or</strong>e and m<strong>or</strong>e<br />

<strong>or</strong>ganis<strong>at</strong>ions are looking out f<strong>or</strong> an access <strong>co</strong>ntrol solution th<strong>at</strong> easily<br />

integr<strong>at</strong>es with video monit<strong>or</strong>ing, intrusion detection and sometimes<br />

even visit<strong>or</strong> management to f<strong>or</strong>m a homogeneous security system with<br />

a <strong>co</strong>nsistent user interface and central management and oper<strong>at</strong>ions.<br />

Long gone are the days (<strong>or</strong> <strong>at</strong> least they should be), when a g<strong>at</strong>ekeeper<br />

made a digital yes/no decision whenever somebody required<br />

access to a <strong>co</strong>mpany’s premises. Today, <strong>co</strong>mpanies need to manage<br />

access on a <strong>co</strong>mpletely diff erent basis. They need to defi ne clearly who<br />

may enter which parts of the campus <strong>or</strong> individual buildings and they<br />

must also ensure th<strong>at</strong> access is only granted <strong>at</strong> times when it is needed.<br />

Further, suppliers are m<strong>or</strong>e and m<strong>or</strong>e often faced with requirements<br />

of their customers to supply a document<strong>at</strong>ion of all access <strong>at</strong>tempts,<br />

whether successful <strong>or</strong> not, to protect against industrial espionage.<br />

To fulfi l this requirement, not only employee access must be captured<br />

and re<strong>co</strong>rded, but also the entire visit<strong>or</strong> traffi c. In some industries<br />

there are also <strong>co</strong>mpliance issues enf<strong>or</strong>cing integr<strong>at</strong>ion of visit<strong>or</strong> management<br />

– f<strong>or</strong> example in the European food industry f<strong>or</strong> certifi c<strong>at</strong>ion<br />

against IFS-5. In addition to basic visit<strong>or</strong> management, it may also<br />

be desirable to have f<strong>or</strong>ced guidance along certain routes, <strong>co</strong>ntrol of<br />

singling systems such as turnstiles and weight sens<strong>or</strong>s, anti-passback<br />

fe<strong>at</strong>ures, guard tour modules and others.<br />

Video integr<strong>at</strong>ion f<strong>or</strong> m<strong>or</strong>e safety<br />

While modern access <strong>co</strong>ntrol systems allow an effi cient management<br />

of access rights, they are r<strong>at</strong>her powerless against abuse if oper<strong>at</strong>ed on<br />

their own. If an employee <strong>or</strong> visit<strong>or</strong> passes on his card, the illegitim<strong>at</strong>e<br />

recipient “inherits” all his access permissions. Tailg<strong>at</strong>ing is another issue<br />

th<strong>at</strong> standard access <strong>co</strong>ntrol systems do not address. In critical environments<br />

it is theref<strong>or</strong>e mand<strong>at</strong><strong>or</strong>y to add a se<strong>co</strong>nd layer of security<br />

by integr<strong>at</strong>ing access <strong>co</strong>ntrol with some kind of video surveillance. To<br />

prevent abuse, all access requests can then trigger one <strong>or</strong> m<strong>or</strong>e video<br />

cameras.<br />

Who is really standing <strong>at</strong> this rarely used backdo<strong>or</strong>? Who is trying to<br />

gain access to the warehouse right now with a card which was rep<strong>or</strong>ted<br />

as lost? In an integr<strong>at</strong>ed environment, oper<strong>at</strong>ing personnel can answer<br />

these kinds of questions with just a mouse click, ensuring a m<strong>or</strong>e rapid<br />

reaction to such events.<br />

Integr<strong>at</strong>ed systems can also provide alarm verifi c<strong>at</strong>ion, instantly displaying<br />

live video images from nearby cameras when there is an alarm<br />

event <strong>at</strong> a do<strong>or</strong> – such as when a person presents an unauth<strong>or</strong>ised credential<br />

<strong>or</strong> when a do<strong>or</strong> is f<strong>or</strong>ced open. With this capability, the oper<strong>at</strong><strong>or</strong><br />

does not even need to know which camera to select to investig<strong>at</strong>e the<br />

12 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

event, as integr<strong>at</strong>ed systems can be <strong>co</strong>nfi gured to autom<strong>at</strong>ically display<br />

the appropri<strong>at</strong>e video on the screen. This level of instant response can<br />

improve the overall perf<strong>or</strong>mance of a customer’s security staff .<br />

Security personnel do not need to go to the site of an event to look<br />

into an alarm. They can view video of the event from their w<strong>or</strong>kst<strong>at</strong>ions<br />

and positively identify the cause – only going to the alarm loc<strong>at</strong>ion<br />

when follow-up is necessary. This reduces the amount of time security<br />

personnel spend away from their w<strong>or</strong>kst<strong>at</strong>ions and better prepares them<br />

with an understanding of the situ<strong>at</strong>ion when they do need to visit the<br />

loc<strong>at</strong>ion. Some access <strong>co</strong>ntrol systems do even off er the same functionality<br />

to verify alarms of an integr<strong>at</strong>ed intrusion detection system.<br />

F<strong>or</strong>ensics can also benefi t from such integr<strong>at</strong>ion if the video re<strong>co</strong>rdings<br />

are referenced in the access <strong>co</strong>ntrol system’s event log. Such a<br />

fe<strong>at</strong>ure gre<strong>at</strong>ly facilit<strong>at</strong>es identifi c<strong>at</strong>ion, retrieval and playback of past<br />

events and alarms if necessary. Systems off ering pre-and post-alarm<br />

re<strong>co</strong>rding options also enable the oper<strong>at</strong><strong>or</strong> to see video from immedi<strong>at</strong>ely<br />

bef<strong>or</strong>e and after the alarm event to better judge the situ<strong>at</strong>ion.<br />

However, often the settings of surveillance cameras are less than optimal<br />

f<strong>or</strong> the specifi c event, and theref<strong>or</strong>e it is desirable to have the ability<br />

to change these settings without oper<strong>at</strong><strong>or</strong> intervention. This <strong>co</strong>uld allow<br />

an access event to prompt a PTZ camera to move into a pre-set position<br />

<strong>or</strong> cause a DVR to re<strong>co</strong>rd <strong>at</strong> a higher frame r<strong>at</strong>e to capture m<strong>or</strong>e details<br />

of the event.<br />

Prompting higher-quality re<strong>co</strong>rdings ensures the video resolution is<br />

suffi cient f<strong>or</strong> th<strong>or</strong>ough investig<strong>at</strong>ion of access events. Local re<strong>co</strong>rding


<strong>or</strong> archiving of live images <strong>or</strong> video clips from integr<strong>at</strong>ed video st<strong>or</strong>age<br />

devices is also possible with most systems, giving customers the ability<br />

to capture individual snapshots rel<strong>at</strong>ed to imp<strong>or</strong>tant events.<br />

Open standards ease integr<strong>at</strong>ion<br />

Integr<strong>at</strong>ing access <strong>co</strong>ntrol, video monit<strong>or</strong>ing, and intrusion detection<br />

can be r<strong>at</strong>her easy when all <strong>co</strong>mponents <strong>co</strong>me from the same<br />

vend<strong>or</strong> and if this vend<strong>or</strong> also off ers a management pl<strong>at</strong>f<strong>or</strong>m f<strong>or</strong> all<br />

of them. However, this is rarely the case. In a lot of applic<strong>at</strong>ions you<br />

will fi nd individual systems from diff erent vend<strong>or</strong>s f<strong>or</strong> each of these<br />

tasks. In this case integr<strong>at</strong>ion can be a nightmare if the integr<strong>at</strong><strong>or</strong><br />

has to develop interfaces between the individual systems and do a<br />

lot of programming. In today’s install<strong>at</strong>ions it is theref<strong>or</strong>e mand<strong>at</strong><strong>or</strong>y<br />

to select and install systems based on open and accepted standards<br />

which can easily be integr<strong>at</strong>ed by means of a central building management<br />

system as an umbrella. Most current systems use proven IT<br />

technologies such as TCP/IP and OPC f<strong>or</strong> <strong>co</strong>mmunic<strong>at</strong>ions with such a<br />

management system.<br />

Integr<strong>at</strong>ed systems “off the shelf” can gre<strong>at</strong>ly ease install<strong>at</strong>ion and<br />

<strong>co</strong>nfi gur<strong>at</strong>ion of the security solution. Logical integr<strong>at</strong>ion elimin<strong>at</strong>es the<br />

need f<strong>or</strong> multiple software pl<strong>at</strong>f<strong>or</strong>m and interfaces, resulting in fewer<br />

<strong>co</strong>mplic<strong>at</strong>ions and gre<strong>at</strong>er event-driven functionality as well as reduced<br />

install<strong>at</strong>ion time and <strong>co</strong>sts. Wh<strong>at</strong>’s m<strong>or</strong>e, this kind of integr<strong>at</strong>ion also<br />

promises m<strong>or</strong>e effi cient oper<strong>at</strong>ion and a clearly reduced need f<strong>or</strong> training,<br />

but above all also a higher security level.<br />

An open standards-based management system even makes sense in<br />

those cases where one vend<strong>or</strong> supplies everything, as it opens up the<br />

entire install<strong>at</strong>ion f<strong>or</strong> future expansion.<br />

User interface is key<br />

However, these benefi ts do not necessarily <strong>co</strong>me by default. While technical<br />

systems may be quite effi cient, if users cannot properly oper<strong>at</strong>e<br />

them, they will not deliver to the promise. An integr<strong>at</strong>ed security system<br />

is a very <strong>co</strong>mplex appar<strong>at</strong>us, and if this <strong>co</strong>mplexity is not hidden from<br />

the user, the system will be highly prone to human err<strong>or</strong> and malicious<br />

oper<strong>at</strong>ion. Such systems do need very clear and intuitive user interfaces,<br />

avoiding inf<strong>or</strong>m<strong>at</strong>ion overload while off ering all the inf<strong>or</strong>m<strong>at</strong>ion th<strong>at</strong> is<br />

currently needed.<br />

This is even m<strong>or</strong>e imp<strong>or</strong>tant when several <strong>co</strong>mponents <strong>or</strong> dialogs are<br />

open, which will often be the case if you deal with access <strong>co</strong>ntrol, video<br />

surveillance and maybe intrusion detection from the same <strong>co</strong>nsole.<br />

Secure the security system<br />

When planning an integr<strong>at</strong>ed system, functionality and ease of use are<br />

certainly the most imp<strong>or</strong>tant aspects. However, it is also w<strong>or</strong>th to have<br />

a ch<strong>at</strong> with the IT department, as f<strong>or</strong> them such a system is another <strong>co</strong>mplex<br />

applic<strong>at</strong>ion th<strong>at</strong> they need to supp<strong>or</strong>t. And wh<strong>at</strong>’s m<strong>or</strong>e, it is a mission-critical<br />

applic<strong>at</strong>ion. Security systems need to meet defi ned uptime<br />

requirements and, in the case of live video, also guaranteed bandwidth.<br />

In some cases, strict uptime requirements will enf<strong>or</strong>ce fault-tolerant<br />

and redundant <strong>co</strong>nfi gur<strong>at</strong>ions which the system must supp<strong>or</strong>t. Being a<br />

critical applic<strong>at</strong>ion, the security system itself needs to be secured against<br />

unauth<strong>or</strong>ised access by means of IT security technologies.<br />

F<strong>or</strong> m<strong>or</strong>e inf<strong>or</strong>m<strong>at</strong>ion <strong>co</strong>ntact Bosch Security Systems - South Africa &<br />

Sub-Sahara Africa, +27 (0)11 651 9838, Christine.Smit@<strong>za</strong>.bosch.<strong>co</strong>m,<br />

www.boschsecurity.<strong>co</strong>.<strong>za</strong><br />

www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 13


TRENDS<br />

Biometrics by the book<br />

By Andrew Seldon.<br />

All biometric readers are not cre<strong>at</strong>ed equal.<br />

When <strong>co</strong>nsidering implementing a fi ngerprint biometric solution, most<br />

<strong>co</strong>mpanies take the advice of their installer <strong>or</strong> integr<strong>at</strong><strong>or</strong> as to which product<br />

to use; others simply look f<strong>or</strong> the cheapest readers available in the<br />

belief th<strong>at</strong> a biometric reader is a biometric reader. The reality, however, is<br />

signifi cantly diff erent: all biometric readers are not cre<strong>at</strong>ed equal.<br />

Hi-Tech Security Solutions spoke to Ide<strong>co</strong>’s CEO, Marius Coetzee to fi nd<br />

out m<strong>or</strong>e about how end users should be choosing biometric readers. In<br />

this article we focus on two aspects of selecting biometric devices: standards<br />

and the admissibility of biometric evidence in <strong>co</strong>urt.<br />

Biometric standards<br />

Focusing on fi ngerprint biometrics, as fi ngerprints<br />

represent the maj<strong>or</strong>ity of all biometrics in use by far,<br />

Coetzee’s fi rst <strong>co</strong>mment on standards is th<strong>at</strong> the<br />

device must be AFIS (Autom<strong>at</strong>ed Fingerprint<br />

Identifi c<strong>at</strong>ion System) <strong>co</strong>mpliant. AFIS is a digital<br />

fi ngerprint system used by law enf<strong>or</strong>cement and<br />

governments the w<strong>or</strong>ld over, including by SAPS<br />

and Home Aff airs. Being AFIS <strong>co</strong>mpliant will<br />

allow these auth<strong>or</strong>ities to process the fi ngerprint<br />

eff ectively without having to res<strong>or</strong>t to manual<br />

procedures <strong>or</strong> to manipul<strong>at</strong>e the images.<br />

Furtherm<strong>or</strong>e, although PIV (Personal Identity<br />

Verifi c<strong>at</strong>ion ) standards are US-based, Coetzee<br />

says some tenders are calling f<strong>or</strong> <strong>co</strong>mpliance in<br />

<strong>or</strong>der to ensure their biometric systems are <strong>co</strong>mp<strong>at</strong>ible<br />

with the highest security standards. M<strong>or</strong>e inf<strong>or</strong>m<strong>at</strong>ion<br />

is available in the Personal Identity Verifi c<strong>at</strong>ion of<br />

Federal Employees and Contract<strong>or</strong>s document <strong>at</strong> http://csrc.<br />

nist.gov/public<strong>at</strong>ions/fi ps/fi ps201-1/FIPS-201-1-chng1.pdf.<br />

To round it off , Coetzee also re<strong>co</strong>mmends all biometric devices should<br />

be <strong>co</strong>mpliant with the image quality standards set by the FBI. These<br />

standards have been in<strong>co</strong>rp<strong>or</strong><strong>at</strong>ed into the rel<strong>at</strong>ed ISO and SABS (South<br />

African Bureau of Standards) standards. The ISO relevant standards<br />

include ISO 19794 (Biometric d<strong>at</strong>a interchange f<strong>or</strong>m<strong>at</strong>s) and ISO 18013<br />

(Personal identifi c<strong>at</strong>ion), as well as ISO 19092 and ISO 19785. Further standards<br />

rel<strong>at</strong>ing to other biometric types and templ<strong>at</strong>es are also available.<br />

F<strong>or</strong> a full listing of ISO standards see http://en.wikipedia.<strong>or</strong>g/wiki/List_of_<br />

Intern<strong>at</strong>ional_Organiz<strong>at</strong>ion_f<strong>or</strong>_Standardiz<strong>at</strong>ion_standards#ISO_15000.<br />

E2.80.93ISO_19999, <strong>or</strong> refer to http://www.iso.<strong>or</strong>g.<br />

The SABS in<strong>co</strong>rp<strong>or</strong><strong>at</strong>es these standards into its own and they have<br />

specifi c <strong>co</strong>mmittees dealing with various aspects of electronic inf<strong>or</strong>m<strong>at</strong>ion<br />

and biometrics. SC71F deals with inf<strong>or</strong>m<strong>at</strong>ion security, f<strong>or</strong> example, while<br />

SC71J deals with cards and personal inf<strong>or</strong>m<strong>at</strong>ion, and SC71Q deals specifi -<br />

cally with biometric standards.<br />

All these standards deal with the appropri<strong>at</strong>e and <strong>co</strong>mpliant use of<br />

personal inf<strong>or</strong>m<strong>at</strong>ion and images, of which an individual’s biometric d<strong>at</strong>a is<br />

one. It is theref<strong>or</strong>e imp<strong>or</strong>tant f<strong>or</strong> the biometric device one selects to <strong>co</strong>mply<br />

to specifi c standards to ensure interoperability, but also to ensure th<strong>at</strong> the<br />

service one obtains m<strong>at</strong>ches intern<strong>at</strong>ionally accepted standards.<br />

Interoperability<br />

ISO 19794 is imp<strong>or</strong>tant in th<strong>at</strong> it deals specifi cally with interoperability<br />

14 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

along with standards from the USA’s NIST (N<strong>at</strong>ional Institute of Standards<br />

and Technology). Coetzee says interoperability standards are critical<br />

as they allow fi ngerprint templ<strong>at</strong>es saved from one <strong>co</strong>mpliant reader<br />

to be exp<strong>or</strong>ted and read by another <strong>co</strong>mpliant reader from a diff erent<br />

manufacturer.<br />

Coetzee notes th<strong>at</strong> certain biometric technologies, such as<br />

Multispectral imaging, do not <strong>co</strong>mply with all the standards, which <strong>co</strong>uld<br />

result in in<strong>co</strong>mp<strong>at</strong>ibility with AFIS systems as well as a high percentage<br />

of false minutiae (the fe<strong>at</strong>ures of a fi ngerprint th<strong>at</strong> are used to identify<br />

them and make <strong>co</strong>mparisons). If the alg<strong>or</strong>ithm used to identify the<br />

minutiae isn’t accur<strong>at</strong>e, templ<strong>at</strong>es can fail to identify people<br />

accur<strong>at</strong>ely <strong>or</strong> assign the wrong identity to people.<br />

In response to the standards question, Lumidigm, a<br />

<strong>co</strong>mpany using Multispectral imaging in its biometric<br />

readers noted, “Lumidigm meets the ISO, ANSI<br />

and MINIX standards f<strong>or</strong> templ<strong>at</strong>e interoperability”.<br />

M<strong>or</strong>e specifi cally, the <strong>co</strong>mpany’s devices<br />

meet the following standards: “Interoperability:<br />

ANSI 378, ISO 19794-2:2005, ANSI 381, ISO<br />

19794-4:2005, NFIQ <strong>co</strong>mpliant; MINEX-certifi ed<br />

alg<strong>or</strong>ithm; Device certifi c<strong>at</strong>ions: CE, FCC Part 15<br />

Class B, EN 60950, IEC 62471, RoHS”.<br />

Securing biometrics as evidence<br />

Another aspect to <strong>co</strong>nsider when looking <strong>at</strong><br />

using biometrics is the various regul<strong>at</strong>ions in South<br />

African law <strong>co</strong>ntending with the protection of personal<br />

inf<strong>or</strong>m<strong>at</strong>ion, as well as the ability of <strong>co</strong>mpanies to<br />

use digital biometrics in <strong>co</strong>urt.<br />

Coetzee explains th<strong>at</strong> evidence presented in <strong>co</strong>urt must<br />

not only be unaltered in any way from when it was presented, but the<br />

chain of evidence showing it has been st<strong>or</strong>ed securely and has not been<br />

manipul<strong>at</strong>ed <strong>at</strong> anytime is crucial.<br />

From a biometric perspective, this means th<strong>at</strong> the prosecution <strong>or</strong><br />

<strong>co</strong>mplainant needs to be able to show th<strong>at</strong> the fi nger put on the reader<br />

was read and the templ<strong>at</strong>e st<strong>or</strong>ed accur<strong>at</strong>ely, ac<strong>co</strong>rding to accepted<br />

standards. It must also show th<strong>at</strong> it was st<strong>or</strong>ed on a system in a way th<strong>at</strong><br />

did not alter it and was protected from manipul<strong>at</strong>ion by any party while<br />

st<strong>or</strong>ed and being brought into <strong>co</strong>urt as evidence. If this is not done and<br />

can’t be shown to have been done, the <strong>co</strong>urt may reject the biometric<br />

evidence.<br />

F<strong>or</strong> example, a recent episode saw a CEO accused of stealing a few<br />

million from his <strong>co</strong>mpany. This individual’s passw<strong>or</strong>d was used to log<br />

into the system and transfer the money. However, the CEO simply said<br />

he didn’t do it and someone must have used his passw<strong>or</strong>d. There was no<br />

way to prove anything diff erent so the case remains unsolved.<br />

If biometrics had been used to log into the system, the perpetr<strong>at</strong><strong>or</strong><br />

would have been caught, as his (<strong>or</strong> her) fi ngerprint would have been<br />

the proof th<strong>at</strong> he actually <strong>co</strong>mmitted the fraud. In <strong>co</strong>urt, however, if the<br />

biometric device had not been <strong>co</strong>mpliant with the relevant standards the<br />

defendant <strong>co</strong>uld claim the fi ngerprint templ<strong>at</strong>e had been manipul<strong>at</strong>ed<br />

and was not admissible.<br />

We haven’t seen such a case in <strong>co</strong>urt yet, but Coetzee warns th<strong>at</strong> it


only has to happen once to cre<strong>at</strong>e serious problems f<strong>or</strong> the biometrics<br />

industry. Any manipul<strong>at</strong>ion, no m<strong>at</strong>ter how small <strong>co</strong>uld result in the biometric<br />

evidence being ruled inadmissible, causing headaches f<strong>or</strong> those<br />

<strong>co</strong>mpanies using <strong>co</strong>mpliant biometric systems. In other w<strong>or</strong>ds, the CEO’s<br />

fi ngerprint may have been captured when he stole his loot, but because<br />

the reader used does not <strong>co</strong>mply with the standards mentioned above,<br />

he <strong>co</strong>uld claim it was manipul<strong>at</strong>ed when read <strong>or</strong> st<strong>or</strong>ed and the <strong>co</strong>urt<br />

<strong>co</strong>uld refuse to accept the biometric evidence on th<strong>at</strong> ground alone.<br />

Protecting personal inf<strong>or</strong>m<strong>at</strong>ion<br />

There are various laws in eff ect which govern the use of personal<br />

inf<strong>or</strong>m<strong>at</strong>ion. The Electronic Communic<strong>at</strong>ions Security Act, f<strong>or</strong> example,<br />

in part deals with the protection and security of electronic <strong>co</strong>mmunic<strong>at</strong>ions<br />

between systems and people and the prevention of<br />

un auth<strong>or</strong>ised access. The new Protection of Personal Inf<strong>or</strong>m<strong>at</strong>ion<br />

Act focuses on how and when to st<strong>or</strong>e personal inf<strong>or</strong>m<strong>at</strong>ion (and<br />

wh<strong>at</strong> <strong>co</strong>nstitutes personal inf<strong>or</strong>m<strong>at</strong>ion), including the prevention of<br />

tampering <strong>or</strong> manipul<strong>at</strong>ion of this d<strong>at</strong>a. In addition, the Electronic<br />

Communic<strong>at</strong>ions and Transactions Act en<strong>co</strong>urages and governs<br />

electronic <strong>co</strong>mmunic<strong>at</strong>ions, dealing with issues such as tampering and<br />

securing the inf<strong>or</strong>m<strong>at</strong>ion in transactions.<br />

These laws don’t directly deal with biometrics, but do govern<br />

authentic<strong>at</strong>ion to systems and the security of inf<strong>or</strong>m<strong>at</strong>ion citizens,<br />

customers <strong>or</strong> suppliers provide, as well as the secure transmission of the<br />

d<strong>at</strong>a. The <strong>co</strong>mpany holding the inf<strong>or</strong>m<strong>at</strong>ion (and this includes biometric<br />

d<strong>at</strong>a if it is used to authentic<strong>at</strong>e and allow <strong>or</strong> disallow access) must<br />

ensure it is securely st<strong>or</strong>ed and is free from tampering <strong>or</strong> manipul<strong>at</strong>ion<br />

from the moment is it entered. Not only will failing to do so fall foul of<br />

the law, but, again, it <strong>co</strong>uld <strong>co</strong>mpromise the admissibility of the inf<strong>or</strong>m<strong>at</strong>ion<br />

in <strong>co</strong>urt.<br />

A simple example Coetzee provides <strong>co</strong>ncerns AFIS. If your biometric<br />

device does not <strong>co</strong>mply with the AFIS standard when reading fi ngerprints,<br />

it will have to alter the image to make it <strong>co</strong>mp<strong>at</strong>ible. Wh<strong>at</strong> then<br />

are the legal implic<strong>at</strong>ion of th<strong>at</strong> alter<strong>at</strong>ion? How can the <strong>co</strong>mpany be<br />

sure the alter<strong>at</strong>ions are done <strong>co</strong>nsistently and unif<strong>or</strong>mly so th<strong>at</strong> it won’t<br />

cause legitim<strong>at</strong>e users’ prints to be rejected <strong>or</strong> illegitim<strong>at</strong>e prints to be<br />

accepted under the in<strong>co</strong>rrect identity?<br />

In <strong>co</strong>ncluding, Coetzee notes th<strong>at</strong> it’s a case of Buyer Beware. The<br />

responsibility f<strong>or</strong> the quality and interoperability of your devices<br />

ultim<strong>at</strong>ely lies with the individual <strong>or</strong> <strong>co</strong>mpany purchasing the solution.<br />

If you’re simply looking f<strong>or</strong> access to your premises and won’t be using<br />

biometrics f<strong>or</strong> employee verifi c<strong>at</strong>ion <strong>or</strong> sensitive transactions, perhaps<br />

<strong>co</strong>mpliance is not critical.<br />

However, when looking <strong>at</strong> the growth of biometrics and its increased<br />

use in fi nancial transactions and identity verifi c<strong>at</strong>ion processes, it may<br />

be the wiser choice to opt f<strong>or</strong> a solution th<strong>at</strong> <strong>co</strong>mplies with intern<strong>at</strong>ional<br />

standards to ensure your own peace of mind as well as the ability to<br />

safely and reliably transact with external systems using biometric d<strong>at</strong>a.<br />

And let’s be honest, if your biometric reader <strong>co</strong>mplies with FBI standards,<br />

it’s unlikely to be rejected as evidence in <strong>co</strong>urt.<br />

As a starting point, to ascertain if your biometrics reader does<br />

<strong>co</strong>mply with FIPS (Federal Inf<strong>or</strong>m<strong>at</strong>ion Processing Standard) and FBI<br />

standards, you can search f<strong>or</strong> the manufacturer and device via these two<br />

links:<br />

1.) http://fi ps201ep.cio.gov/apl.php<br />

2.) https://www.fbibiospecs.<strong>or</strong>g/IAFIS/Default.aspx<br />

www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 15


OPINION<br />

Make the right biometric choice<br />

By Marius Coetzee, CEO of Ide<strong>co</strong> Biometric Security Solutions.<br />

Maximise ROI by basing your biometric buying decisions on the ACSIS perf<strong>or</strong>mance<br />

criteria: Accuracy, Capacity, Speed, Integr<strong>at</strong>ion, Security.<br />

Fingerprint biometrics is a secure found<strong>at</strong>ion f<strong>or</strong> access <strong>co</strong>ntrol and time<br />

and <strong>at</strong>tendance (T&A) solutions. The technology has a rock-solid reput<strong>at</strong>ion<br />

f<strong>or</strong> cutting the risks and losses caused by unauth<strong>or</strong>ised access and<br />

activity within the w<strong>or</strong>kplace. In <strong>co</strong>mparison to the outmoded access<br />

cards th<strong>at</strong> biometrics are rapidly replacing, the technology delivers<br />

<strong>co</strong>mpletely new levels of security <strong>co</strong>ntrol.<br />

All s<strong>or</strong>ts of <strong>or</strong>ganis<strong>at</strong>ions, from mines to retailers,<br />

have dram<strong>at</strong>ically cut these types of loss by introducing<br />

fi ngerprint-based identifi c<strong>at</strong>ion of employees, <strong>co</strong>ntract<strong>or</strong>s<br />

and visit<strong>or</strong>s. The business case is straightf<strong>or</strong>ward:<br />

the right technology pays f<strong>or</strong> itself.<br />

But this widespread <strong>co</strong>mmercial success doesn’t<br />

mean th<strong>at</strong> all biometrics are the all same – some are<br />

defi nitely m<strong>or</strong>e capable than others. To decide on which<br />

biometric to choose, you need to assess the technology’s<br />

<strong>co</strong>mpetency in fi ve key areas: Accuracy, Capacity,<br />

Speed, Integr<strong>at</strong>ion and Security.<br />

Your assessment should focus on how each of these<br />

key technical <strong>co</strong>mpetencies transl<strong>at</strong>e into measurable<br />

business benefi ts.<br />

Accuracy<br />

This is about how well the technology diff erenti<strong>at</strong>es<br />

between the people it must identify. The process of fi ngerprint-based<br />

identifi c<strong>at</strong>ion begins by registering <strong>or</strong> enrolling the fi ngerprints of people<br />

who will use the system. The key objective of the enrolment process is to<br />

re<strong>co</strong>rd the best possible fi ngerprint d<strong>at</strong>a f<strong>or</strong> each person th<strong>at</strong> the system<br />

will l<strong>at</strong>er identify. Successful enrolment depends on technology <strong>co</strong>mbined<br />

with methodology. Procedural tasks need to be <strong>co</strong>mpleted <strong>co</strong>rrectly<br />

during enrolment in <strong>or</strong>der to achieve the optimum results.<br />

These results are based on the technology’s ability to re<strong>co</strong>gnise the<br />

characteristics – known as Minutia Points – th<strong>at</strong> distinguish one fi ngerprint<br />

from all the other fi ngerprints in the w<strong>or</strong>ld.<br />

Minutia Points are the precise loc<strong>at</strong>ions on a print’s surface where<br />

the ridges on your fi ngerprint either split <strong>or</strong> end. The p<strong>at</strong>tern f<strong>or</strong>med by<br />

these points is unique. Every time you scan your print, the technology<br />

cre<strong>at</strong>es this p<strong>at</strong>tern and then <strong>co</strong>mpares it to the enrolment re<strong>co</strong>rd st<strong>or</strong>ed<br />

in the system’s d<strong>at</strong>abase.<br />

If the technology is unable to re<strong>co</strong>gnise these points accur<strong>at</strong>ely, th<strong>at</strong>’s<br />

where the problems start and levels of accuracy begin to fall.<br />

Enrolment accuracy is measured in terms of Failure To Enrol (FTE).<br />

Based on Ide<strong>co</strong>’s experience over the past eight years in a wide variety<br />

of SA w<strong>or</strong>kplaces – and the fact th<strong>at</strong> over 2.5 million local people have<br />

been enrolled on our scanners – any technology with an FTE r<strong>at</strong>e higher<br />

than 0.2% should be avoided.<br />

Two other accuracy-rel<strong>at</strong>ed fact<strong>or</strong>s also need to be <strong>co</strong>nsidered:<br />

False Acceptance R<strong>at</strong>es (FAR) and False Rejection R<strong>at</strong>es (FRR). False<br />

acceptances occur when the technology <strong>co</strong>nfuses the fi ngerprints of<br />

two people. False rejections happen when the technology doesn’t even<br />

re<strong>co</strong>gnise Jack’s fi ngerprint and wrongly denies him access. Currently,<br />

the most <strong>co</strong>mpetent fi ngerprint technology will deliver a FAR of under<br />

0.01% and a FRR of below 1%.<br />

16 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

Marius Coetzee<br />

Always look f<strong>or</strong> proof. Who says th<strong>at</strong> the technology is capable of<br />

perf<strong>or</strong>ming <strong>at</strong> these levels of accuracy? The intern<strong>at</strong>ional benchmarks<br />

have clearly been established through technology-testing by <strong>or</strong>ganis<strong>at</strong>ions<br />

like the FBI and America’s N<strong>at</strong>ional Institute f<strong>or</strong> Science and<br />

Technology (NIST). Ask your vend<strong>or</strong> f<strong>or</strong> these l<strong>at</strong>est test results.<br />

FTE occurs when you can’t register a person’s fi ngerprints.<br />

It happens when the technology is unable to<br />

re<strong>co</strong>rd suffi cient d<strong>at</strong>a from a print and can be caused by<br />

fact<strong>or</strong>s such as w<strong>or</strong>n <strong>or</strong> scarred prints. The <strong>co</strong>nsequence<br />

of technologies th<strong>at</strong> produce high FTE r<strong>at</strong>es is th<strong>at</strong> you<br />

will not be able to include everyone you want in the<br />

system. You will have to start cre<strong>at</strong>ing exceptions. You will<br />

have to use another means of <strong>co</strong>ntrolling access f<strong>or</strong> these<br />

people. And th<strong>at</strong> means m<strong>or</strong>e <strong>co</strong>st because you now<br />

have to install and administer two separ<strong>at</strong>e systems.<br />

FAR, FTE and FRR might sound like techno-jargon<br />

but in reality they cre<strong>at</strong>e a lot of unnecessary expense.<br />

Capacity<br />

How many people’s prints can the technology manage<br />

and still maintain their optimum levels of accuracy?<br />

Some technologies can’t even handle a few hundred<br />

people bef<strong>or</strong>e their FAR and FRR levels go through the<br />

roof <strong>or</strong> they just hang and need to be re-booted.<br />

These technologies might be fi ne in a test environment when you<br />

are running a proof-of-<strong>co</strong>ncept trial with just 20 users, but wh<strong>at</strong> happens<br />

when the system gets deployed across the full w<strong>or</strong>kf<strong>or</strong>ce and doesn’t<br />

perf<strong>or</strong>m as expected? Wh<strong>at</strong> will it then <strong>co</strong>st you to switch to a <strong>co</strong>mpetent<br />

technology and wh<strong>at</strong> re<strong>co</strong>urse will you have with the supplier?<br />

In <strong>co</strong>ntrast, the leading fi ngerprint technologies w<strong>or</strong>k perfectly with<br />

many thousands of prints. Th<strong>at</strong>’s primarily because th<strong>at</strong>’s wh<strong>at</strong> the leading<br />

technology was initially designed to do within law enf<strong>or</strong>cement and<br />

government agencies around the w<strong>or</strong>ld.<br />

Within the w<strong>or</strong>kplace, an increasing number of business functions<br />

are leveraging the accuracy of fi ngerprint-based identity d<strong>at</strong>a. A clear<br />

example of this is how d<strong>at</strong>a from access <strong>co</strong>ntrol systems is also being<br />

used by HR within the payroll function to monit<strong>or</strong> hours w<strong>or</strong>ked and<br />

remuner<strong>at</strong>ion.<br />

Sharing identity d<strong>at</strong>a across diff erent business functions leads to <strong>co</strong>st<br />

sharing across the <strong>or</strong>ganis<strong>at</strong>ion. The biometric system can be funded by<br />

multiple business units. While this is gre<strong>at</strong> in terms of increasing ROI, it<br />

can also increase the number of users th<strong>at</strong> must be identifi ed. Can the<br />

fi ngerprint technology handle the higher volumes of users?<br />

Speed<br />

This is all about processing times, how long does it take the technology<br />

to accur<strong>at</strong>ely re<strong>co</strong>gnise users and either grant <strong>or</strong> deny access? A technology<br />

th<strong>at</strong> delivers 100% accuracy is probably not much good to you if<br />

it takes fi ve minutes to identify each user. Look f<strong>or</strong> processing times of<br />

under one se<strong>co</strong>nd per user – even f<strong>or</strong> a system th<strong>at</strong> will need to manage<br />

several thousand users.<br />

Continued on page 18


www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 17


OPINION<br />

Continued from page 16<br />

Slow processing times cre<strong>at</strong>e delays. People have to queue f<strong>or</strong> longer<br />

in <strong>or</strong>der to gain access <strong>or</strong> clock-on. To <strong>co</strong>unter the delays caused by<br />

inferi<strong>or</strong> biometrics, you will need to cre<strong>at</strong>e m<strong>or</strong>e access points and install<br />

m<strong>or</strong>e scanners. In other w<strong>or</strong>ds, you have to spend m<strong>or</strong>e on infrastructure<br />

and technology. You might need to use four turnstiles and four<br />

fi ngerprint scanners instead of only two. Or you <strong>co</strong>uld <strong>co</strong>mpens<strong>at</strong>e f<strong>or</strong><br />

the inadequacies by changing your w<strong>or</strong>king hours to allow f<strong>or</strong> a longer,<br />

phased clocking process <strong>at</strong> the start and end of the day.<br />

If you choose the right fi ngerprint technology and all this additional,<br />

unnecessary expense can be avoided right from the outset.<br />

Integr<strong>at</strong>ion<br />

Having assessed perf<strong>or</strong>mance in terms of Accuracy, Speed, Capacity and<br />

Security, it is clearly imp<strong>or</strong>tant to <strong>co</strong>nsider how the fi ngerprint technology<br />

will w<strong>or</strong>k within your <strong>or</strong>ganis<strong>at</strong>ion. How it will integr<strong>at</strong>e with various<br />

business functions.<br />

Successful integr<strong>at</strong>ion determines how you will be able to maximise<br />

the business benefi ts th<strong>at</strong> can be derived from the technology. F<strong>or</strong><br />

example, is it <strong>co</strong>mp<strong>at</strong>ible with all the various <strong>co</strong>mponents of the existing<br />

systems th<strong>at</strong> handle your access <strong>co</strong>ntrol and T&A? Will it w<strong>or</strong>k with your<br />

hardware such as turnstiles and vehicle barriers and will it w<strong>or</strong>k with the<br />

software package th<strong>at</strong> manages your payroll?<br />

Another imp<strong>or</strong>tant benchmark here is the technology’s ability to<br />

meet its perf<strong>or</strong>mance criteria in a variety of physical environments – hot,<br />

<strong>co</strong>ld, dusty, arid, wet, humid, inside and outside. It’s imp<strong>or</strong>tant to be able<br />

to <strong>co</strong>ver all the bases with one fi ngerprint technology r<strong>at</strong>her than getting<br />

into all the <strong>co</strong>mplexities of a mix-and-m<strong>at</strong>ch solution.<br />

A fi nal <strong>co</strong>nsider<strong>at</strong>ion <strong>co</strong>ncerns the <strong>co</strong>mp<strong>at</strong>ibility of your system’s fi ngerprint<br />

d<strong>at</strong>a with external agencies such as local law enf<strong>or</strong>cement and<br />

government systems. As we see biometrics increasingly being used to<br />

identify people beyond applic<strong>at</strong>ions in the local w<strong>or</strong>kplace, the signifi -<br />

cance of this <strong>co</strong>mp<strong>at</strong>ibility will be<strong>co</strong>me m<strong>or</strong>e and m<strong>or</strong>e imp<strong>or</strong>tant.<br />

There are two key questions <strong>co</strong>ncerning external integr<strong>at</strong>ion. Firstly,<br />

is the fi ngerprint technology <strong>co</strong>mpliant with SA’s requirements th<strong>at</strong><br />

govern the use of digital fi ngerprints within our legal system – is it<br />

accepted as proof of identity in a <strong>co</strong>urt of law? Can it, f<strong>or</strong> example, be<br />

used to prove the identity of a person who auth<strong>or</strong>ised a fraudulent EFT<br />

payment with their fi ngerprint?<br />

Se<strong>co</strong>ndly, is the fi ngerprint d<strong>at</strong>a fully-<strong>co</strong>mp<strong>at</strong>ible with the d<strong>at</strong>a held<br />

by government entities such as Home Aff airs and the N<strong>at</strong>ional Centre f<strong>or</strong><br />

Certifi ed Identities (NCCI)? F<strong>or</strong> example, if a duly-auth<strong>or</strong>ised fi nancial services<br />

<strong>or</strong>ganis<strong>at</strong>ion chooses to <strong>co</strong>nfi rm customers’ identities by <strong>co</strong>mparing<br />

their prints with those st<strong>or</strong>ed by the Home Aff airs N<strong>at</strong>ional Identifi c<strong>at</strong>ion<br />

System (HANIS), will the two technologies be fully-<strong>co</strong>mp<strong>at</strong>ible?<br />

In other w<strong>or</strong>ds, be very wary of technology such as multi-spectral<br />

imaging th<strong>at</strong> does not <strong>co</strong>mply with the relevant intern<strong>at</strong>ional standards.<br />

In isol<strong>at</strong>ion, the biometric technology might tick all the right boxes,<br />

but if it isn’t <strong>co</strong>mp<strong>at</strong>ible with your current systems, then wh<strong>at</strong> will it<br />

<strong>co</strong>st to replace them? If integr<strong>at</strong>ion is required, how long will it take and<br />

wh<strong>at</strong>’s the bill going to <strong>co</strong>me to?<br />

In terms of access <strong>co</strong>ntrol and T&A, the leading fi ngerprint technology<br />

has already been fully-integr<strong>at</strong>ed with all the maj<strong>or</strong> local solutions.<br />

No ifs and buts, it’s already been tried, tested and proven in local <strong>or</strong>ganis<strong>at</strong>ions<br />

ranging from mines and fact<strong>or</strong>ies to retailers and residential<br />

est<strong>at</strong>es. This is <strong>co</strong>mmercially signifi cant because past implement<strong>at</strong>ions<br />

are your assurance of future success, so it’s clearly sensible to learn m<strong>or</strong>e<br />

about these real-w<strong>or</strong>ld examples of biometrics in action.<br />

The ability to w<strong>or</strong>k with external systems like HANIS, SAPS Criminal<br />

18 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

Re<strong>co</strong>rd Centre and the NCCI is signifi cant f<strong>or</strong> a variety of reasons ranging<br />

from HR’s background checking of new employees through to establishing<br />

customers’ identity and their credit-r<strong>at</strong>ing. The need to do this might<br />

not exist in your <strong>or</strong>ganis<strong>at</strong>ion today. But it might tom<strong>or</strong>row.<br />

Security<br />

How secure does the system need to be? This will vary ac<strong>co</strong>rding to the<br />

particular applic<strong>at</strong>ion, but it’s imp<strong>or</strong>tant to understand th<strong>at</strong> diff erent<br />

technologies off er diff erent levels of security. F<strong>or</strong> example, some technologies<br />

can re<strong>co</strong>gnise fake fi ngerprints, others can’t. Wh<strong>at</strong>’s imp<strong>or</strong>tant<br />

here is to fi rst decide upon the various levels of security required f<strong>or</strong> different<br />

business processes and then choose a single, unifi ed technology<br />

th<strong>at</strong> can deliver all of this within its range of products.<br />

F<strong>or</strong> example, the access <strong>co</strong>ntrol system <strong>at</strong> your main entrances might<br />

only require standard fi ngerprint-based identifi c<strong>at</strong>ion. However, access<br />

to m<strong>or</strong>e secure loc<strong>at</strong>ions, perhaps a server room, may need to be m<strong>or</strong>e<br />

strictly <strong>co</strong>ntrolled.<br />

Equally, activity within diff erent business functions may merit<br />

higher security measures. Physical entrance to the ac<strong>co</strong>unts department<br />

might not warrant the same <strong>co</strong>ntrols as access to your invoicing<br />

and payment systems. Auth<strong>or</strong>ising and making large EFT payments<br />

may need to be <strong>co</strong>ntrolled with the highest levels of biometric<br />

authentic<strong>at</strong>ions.<br />

This is about reducing risk, cutting <strong>co</strong>sts and preventing losses by<br />

using accur<strong>at</strong>e identifi c<strong>at</strong>ion to <strong>co</strong>ntrol and monit<strong>or</strong> who can do wh<strong>at</strong><br />

within the w<strong>or</strong>kplace. It means reinf<strong>or</strong>cing security within any business<br />

function th<strong>at</strong> can easily be <strong>co</strong>mpromised by unauth<strong>or</strong>ised access and<br />

activity – I use your card and you use mine.<br />

From physical access <strong>co</strong>ntrol and T&A, through to managing health<br />

and safety policies and accur<strong>at</strong>e authentic<strong>at</strong>ion of IT users, fi ngerprintbased<br />

identifi c<strong>at</strong>ion is clearly a powerful risk-management tool. But it<br />

also cuts <strong>co</strong>sts by acceler<strong>at</strong>ing business processes. An obvious example<br />

is how accur<strong>at</strong>e identity d<strong>at</strong>a cuts the admin <strong>co</strong>sts within the payroll<br />

function by elimin<strong>at</strong>ing disputes over hours w<strong>or</strong>ked. Any process th<strong>at</strong> is<br />

dependent on identity d<strong>at</strong>a can benefi t from biometric-based monit<strong>or</strong>ing.<br />

Who issued th<strong>at</strong> piece of protective equipment and who received it?<br />

Who delivered these goods and who took them into stock? Who <strong>or</strong>dered<br />

them and who issued payment?<br />

By selecting the right fi ngerprint technology, you are also selecting a<br />

single pl<strong>at</strong>f<strong>or</strong>m th<strong>at</strong> is capable of handling the future security of so many<br />

aspects of you <strong>or</strong>ganis<strong>at</strong>ion.<br />

Beyond ACSIS<br />

An appraisal of fi ngerprint technology based on the perf<strong>or</strong>mance criteria<br />

of ACSIS clearly makes sound business sense. However, there are other<br />

equally imp<strong>or</strong>tant fact<strong>or</strong>s which should infl uence your biometric buying<br />

decision.<br />

Service, supp<strong>or</strong>t, advice, training, warranty, repairs and product-availability<br />

are all imp<strong>or</strong>tant <strong>co</strong>mmercial criteria th<strong>at</strong> have a direct impact on<br />

maximising the business results th<strong>at</strong> are being achieved by biometrics.<br />

But none of these functions <strong>co</strong>me in the box with a fi ngerprint scanner.<br />

In each of these areas, the <strong>co</strong>mpetencies of the technology supplier will<br />

directly aff ect the overall perf<strong>or</strong>mance and <strong>co</strong>st of running a biometricbased<br />

system.<br />

Because the technology is now so <strong>co</strong>mmonplace in the South African<br />

w<strong>or</strong>kplace, there are many suppliers you can choose between. And just<br />

as all biometrics are not the same, not all suppliers are either. Choosing<br />

the right technology is one thing. Making it w<strong>or</strong>k in your <strong>or</strong>ganis<strong>at</strong>ion is<br />

something quite diff erent.


www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 19


OPINION<br />

Selecting the right biometric<br />

technology f<strong>or</strong> your needs<br />

By Ni<strong>co</strong>las Garcia, sales manager, M<strong>or</strong>pho South Africa.<br />

Biometrics can off er gre<strong>at</strong> <strong>co</strong>nvenience of use, increased security and accuracy,<br />

decrease in fraud, and gre<strong>at</strong> return on investment (ROI).<br />

In 500 BC, the Babylonian already understood the benefi t of using biomet-<br />

rics by signing business transaction with their fi ngerprint in clay tablets.<br />

Nowadays we have moved from clay tablets to electronic tablets and<br />

from simple biometrics to m<strong>or</strong>e advanced solutions. Although biometrics<br />

is very often used as a synonym of fi ngerprint, many other biometric<br />

authentic<strong>at</strong>ion methods can be used.<br />

Etymologically, biometrics is the science of measuring biological d<strong>at</strong>a,<br />

‘Bio’ referring to ‘life’ and ‘metrics’ to ‘measurement’, being the measurement<br />

of life <strong>or</strong> in other w<strong>or</strong>ds, the measurement of human body characteristics<br />

(DNA, fi ngerprints, veins, irises, voice p<strong>at</strong>terns, facial p<strong>at</strong>tern).<br />

Biometric technologies were, f<strong>or</strong> a long time, mostly used f<strong>or</strong> civil and<br />

f<strong>or</strong>ensic applic<strong>at</strong>ion to manage popul<strong>at</strong>ions, but over the last decade <strong>or</strong><br />

so, they have taken m<strong>or</strong>e and m<strong>or</strong>e imp<strong>or</strong>tance in our daily life, not only<br />

f<strong>or</strong> civil applic<strong>at</strong>ion but m<strong>or</strong>e often in the w<strong>or</strong>k environment.<br />

These technologies are now being used f<strong>or</strong> applic<strong>at</strong>ions such as<br />

physical and logical access <strong>co</strong>ntrol, time and <strong>at</strong>tendance, autom<strong>at</strong>ion and<br />

every day new applic<strong>at</strong>ions are introduced. This trend is mainly due to<br />

the many advantages th<strong>at</strong> biometrics has to off er over traditional systems.<br />

Biometrics can off er gre<strong>at</strong> <strong>co</strong>nvenience of use, increased security<br />

and accuracy, decrease in fraud, and gre<strong>at</strong> return on investment (ROI).<br />

However, each biometric has its pros and <strong>co</strong>ns and one needs to carefully<br />

select an adapted technology depending on the specifi c end-user needs.<br />

Let’s take an example. If the primary use of a system is to grant access<br />

to a plant were 5 000 employees have to enter and leave daily, fi ngerprint<br />

technology would be preferred to iris technology as it is faster, easier to<br />

use, and much m<strong>or</strong>e aff <strong>or</strong>dable. Iris technology is adapted to high-security<br />

zones were a few people have to be monit<strong>or</strong>ed, but not <strong>at</strong> all in the case of<br />

mass access <strong>co</strong>ntrol. Face re<strong>co</strong>gnition technology would preferably be used<br />

indo<strong>or</strong>s as its perf<strong>or</strong>mance can be aff ected by light fl uctu<strong>at</strong>ion, f<strong>or</strong> instance.<br />

Cost implic<strong>at</strong>ions<br />

Cost also does play an imp<strong>or</strong>tant role in the process of selecting adequ<strong>at</strong>e<br />

20 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

biometric technology. The purchase price is very often mistaken with <strong>co</strong>st<br />

of ownership. A system th<strong>at</strong> <strong>co</strong>st a little bit less to acquire might prove to<br />

have a much higher <strong>co</strong>st of ownership in the long run. Its perf<strong>or</strong>mances<br />

might drop when <strong>co</strong>nfronted with the real w<strong>or</strong>ld demands and require<br />

additional <strong>co</strong>mponents to perf<strong>or</strong>m acceptably. The <strong>co</strong>st of ownership<br />

theref<strong>or</strong>e will go up with the maintenance <strong>co</strong>sts involved. A proper system<br />

should allow f<strong>or</strong> future upgrades <strong>at</strong> reasonable <strong>co</strong>st and be reasonably<br />

backward <strong>co</strong>mp<strong>at</strong>ible.<br />

A biometric based system will always be made of two main <strong>co</strong>mponents.<br />

The enrolment <strong>co</strong>mponent where the base inf<strong>or</strong>m<strong>at</strong>ion of users is<br />

captured and the live system were actual inf<strong>or</strong>m<strong>at</strong>ion is <strong>co</strong>mpared with<br />

the reference one taken during the enrolment process.<br />

Enrolment is theref<strong>or</strong>e a very imp<strong>or</strong>tant, yet often disregarded, part<br />

of the system. From a bad templ<strong>at</strong>e, a system can only achieve average<br />

perf<strong>or</strong>mances <strong>at</strong> best. F<strong>or</strong> <strong>co</strong>nvenience of use and best perf<strong>or</strong>mances it is<br />

advisable to dissoci<strong>at</strong>e both parts of the system. F<strong>or</strong> fi ngerprint technology,<br />

500 dpi has be<strong>co</strong>me the standard and a large sens<strong>or</strong> f<strong>or</strong> enrolment<br />

is preferable in <strong>or</strong>der to capture as many details of the fi ngerprint as<br />

possible. This is very imp<strong>or</strong>tant in rough environments like mines where<br />

fi ngerprints are often partially <strong>or</strong> <strong>co</strong>mpletely w<strong>or</strong>n out.<br />

Where fi ngerprints are <strong>co</strong>mpletely w<strong>or</strong>n out <strong>or</strong> so bad th<strong>at</strong> traditional<br />

fi ngerprint technologies cannot read them effi ciently, a <strong>co</strong>mbin<strong>at</strong>ion of<br />

two technologies can be used. This is called multimodal biometrics and<br />

can dram<strong>at</strong>ically improve perf<strong>or</strong>mances and accuracy and th<strong>at</strong> is why<br />

mines all over the w<strong>or</strong>ld are rapidly adopting this fi nger vein technology.<br />

As biometrics technologies be<strong>co</strong>me part of m<strong>or</strong>e integr<strong>at</strong>ed systems,<br />

they can off er endless possibilities to <strong>or</strong>ganis<strong>at</strong>ions as long as design and<br />

integr<strong>at</strong>ion are managed properly.<br />

F<strong>or</strong> m<strong>or</strong>e inf<strong>or</strong>m<strong>at</strong>ion <strong>co</strong>ntact M<strong>or</strong>pho South Africa,<br />

+27 (0)11 286 <strong>5800</strong>, ni<strong>co</strong>las.garcia@m<strong>or</strong>pho.<strong>co</strong>m,<br />

www.m<strong>or</strong>pho.<strong>co</strong>m


www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 21


TRENDS<br />

Biometric myth busting<br />

By Mark Eardley, Supervision Biometric Systems.<br />

Biometrics may now be <strong>co</strong>mmonplace in the South African w<strong>or</strong>kplace, but do you<br />

really know enough about them?<br />

One of the strangest things in the w<strong>or</strong>ld of biometrics has to be<br />

the en<strong>or</strong>mous diff erences of opinion about the capabilities of this<br />

technology.<br />

Most people who w<strong>or</strong>k in a security-rel<strong>at</strong>ed environment have<br />

almost certainly heard of biometrics. Outside of th<strong>at</strong> group, lots of<br />

people know something about the topic – ranging from the fact<br />

th<strong>at</strong> the police use fi ngerprints, through to some f<strong>or</strong>m of <strong>co</strong>ntact<br />

with biometrics either <strong>at</strong> w<strong>or</strong>k, perhaps <strong>at</strong> their bank, <strong>or</strong> from stuff<br />

they’ve read in the media.<br />

Perceptions about biometrics<br />

amongst both groups of<br />

people - the security <strong>co</strong>mmunity<br />

and the public – are<br />

signifi cant. F<strong>or</strong> example, if we<br />

are going to move towards<br />

using biometrics to identify<br />

people <strong>at</strong> ATMs <strong>or</strong> when they<br />

use their payment cards <strong>at</strong> the<br />

tills, then it’s going to be vital<br />

th<strong>at</strong> Joe Public knows wh<strong>at</strong>’s<br />

wh<strong>at</strong> and wh<strong>at</strong>’s not.<br />

As we see biometrics<br />

increasingly used f<strong>or</strong> user-authentic<strong>at</strong>ion<br />

within IT systems,<br />

it is imp<strong>or</strong>tant th<strong>at</strong> the entire<br />

<strong>co</strong>mmunity of IT users is also<br />

provided with the low-down.<br />

Even if the IT security specialists<br />

in your <strong>or</strong>ganis<strong>at</strong>ion have<br />

balanced and accur<strong>at</strong>e perceptions,<br />

wh<strong>at</strong> happens if the<br />

C-Suite thinks th<strong>at</strong> fi ngerprints<br />

are nothing m<strong>or</strong>e than trivial<br />

sci-fi ?<br />

Myth # 1: You don’t<br />

have to use fi ngerprints.<br />

Why not iris, facial,<br />

voice, retina <strong>or</strong> palm?<br />

This has to be one of easiest misperceptions to get s<strong>or</strong>ted. Nothing<br />

<strong>co</strong>mes close to fi ngerprints in terms of <strong>co</strong>nvenience and accuracy.<br />

Not only is fi ngerprint technology by far the most widely used f<strong>or</strong>m<br />

of biometrics, it is also the most advanced and the most m<strong>at</strong>ure of all<br />

the biometric methodologies.<br />

The main reason f<strong>or</strong> this is th<strong>at</strong> most of the money spent on<br />

developing biometric technology has been devoted to advancing<br />

fi ngerprint identifi c<strong>at</strong>ion. Fingerprint technology also fe<strong>at</strong>ures in the<br />

broadest range of applic<strong>at</strong>ions, from physical access <strong>co</strong>ntrol to law<br />

enf<strong>or</strong>cement – which is where modern biometrics has its roots.<br />

About thirty years ago, technology th<strong>at</strong> <strong>co</strong>uld autom<strong>at</strong>e fi ngerprint<br />

identifi c<strong>at</strong>ion f<strong>or</strong> policing purposes was beginning to be<br />

Source: Ide<strong>co</strong> Biometric Security Solutions.<br />

22 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

developed. This is signifi cant f<strong>or</strong> two reasons. Firstly, it reinf<strong>or</strong>ced<br />

fi ngerprints as the dominant method of identifi c<strong>at</strong>ion within law<br />

enf<strong>or</strong>cement – criminals don’t leave an imprint of their iris <strong>at</strong> the<br />

scene of a crime. Se<strong>co</strong>ndly, it <strong>at</strong>tracted the technical and fi nancial<br />

resources necessary to produce wh<strong>at</strong> are now the w<strong>or</strong>ld’s most capable<br />

biometric systems. And because of its global imp<strong>or</strong>tance within<br />

law enf<strong>or</strong>cement, fi ngerprint technology will <strong>co</strong>ntinue to <strong>at</strong>tract the<br />

lion’s share of development funding and maintain its pre-eminence<br />

in the future.<br />

Buying anything other than a<br />

fi ngerprint-based biometric system<br />

really just boils down to a po<strong>or</strong>ly<br />

inf<strong>or</strong>med choice.<br />

Myth # 2: Fingerprints can<br />

be faked – so wh<strong>at</strong>’s the<br />

point?<br />

This one is dangerous because it is<br />

based on an element of truth. You<br />

can certainly dupe some fi ngerprint<br />

technology. But you can’t dupe it<br />

all. Fake Finger Detection <strong>or</strong> FFD<br />

technology is nothing new and is<br />

an optional fe<strong>at</strong>ure in all the leading<br />

brands of fi ngerprint scanners.<br />

Essentially, wh<strong>at</strong> it does is to establish<br />

th<strong>at</strong> the print it reads is from a<br />

living fi nger.<br />

There is also technology th<strong>at</strong><br />

<strong>co</strong>mbines fi ngerprint re<strong>co</strong>gnition<br />

with vein re<strong>co</strong>gnition. These scanners<br />

re<strong>co</strong>gnise two sets of unique p<strong>at</strong>terns:<br />

the traditional p<strong>at</strong>tern f<strong>or</strong>med<br />

by characteristics on the surface of<br />

the fi nger and the p<strong>at</strong>tern f<strong>or</strong>med by<br />

the vein structure within the fi nger.<br />

Replic<strong>at</strong>ing th<strong>at</strong> p<strong>at</strong>tern is going to<br />

be a pretty bloody business and is<br />

probably as near to impossible as makes no diff erence.<br />

So, if you’re <strong>co</strong>ncerned about people <strong>at</strong>tempting to dupe the<br />

technology, choose a scanner th<strong>at</strong> either off ers FFD <strong>or</strong> one th<strong>at</strong> <strong>co</strong>mbines<br />

fi nger and vein re<strong>co</strong>gnition in a single unit.<br />

Myth # 3: Fingerprints are unhygienic. How can you<br />

possibly expect us to all use the same scanner?<br />

When you think about it, this one really is a bit silly. Most of us use<br />

ATMs on a regular basis and aren’t <strong>co</strong>ncerned about pressing multiple<br />

buttons. Enter your PIN <strong>at</strong> the supermarket cash register and you’ll<br />

be touching <strong>at</strong> least four keys th<strong>at</strong> hundreds of people have touched<br />

bef<strong>or</strong>e you.<br />

We can probably fi le this one where it belongs – in the bin. If the<br />

Continued on page 24


www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 23


TRENDS<br />

Continued from page 22<br />

hygiene issue does bother you, perhaps I <strong>co</strong>uld gently suggest th<strong>at</strong><br />

you carry a hanky <strong>or</strong> a pack of wet-wipes.<br />

Myth # 4. My fi ngerprints are most defi nitely mine.<br />

Who knows wh<strong>at</strong> might happen if I give them to you?<br />

Nothing. It’s a blunt answer but it is the answer. Other than being<br />

used f<strong>or</strong> their intended purpose – in some f<strong>or</strong>m of access <strong>co</strong>ntrol f<strong>or</strong><br />

example, <strong>or</strong> perhaps as proof of identity in a law-<strong>co</strong>urt – nothing can<br />

be done with your fi ngerprint d<strong>at</strong>a.<br />

Advanced Biometric Technology (ABT) doesn’t w<strong>or</strong>k with a picture<br />

of your fi ngerprint. When you place your print on a fi ngerprint scanner,<br />

it doesn’t take a photo of your print. The technology has nothing<br />

to do with wh<strong>at</strong> your fi ngerprint actually looks like to you. Perhaps<br />

the most imp<strong>or</strong>tant thing to understand here is th<strong>at</strong> your fi ngerprint<br />

inf<strong>or</strong>m<strong>at</strong>ion is st<strong>or</strong>ed as an alg<strong>or</strong>ithm – a piece of m<strong>at</strong>hem<strong>at</strong>ical <strong>co</strong>de<br />

th<strong>at</strong> is just a string of numbers. The sidebar shows wh<strong>at</strong> inf<strong>or</strong>m<strong>at</strong>ion<br />

actually is being re<strong>co</strong>rded by the scanner.<br />

Myth # 5. Wh<strong>at</strong> happens if my fi ngerprints somehow<br />

get stolen? How will my prints then identify me and<br />

only me?<br />

This one sometimes gets referred to as the <strong>co</strong>mpromise argument.<br />

Unlike some of the other myths surrounding biometrics, on the face<br />

of it, this one sounds good and I’ve often heard it put f<strong>or</strong>ward as<br />

a showstopper – a s<strong>or</strong>t of ‘get-out-of-th<strong>at</strong>-one’ approach from the<br />

biometric naysayers.<br />

Let us accept f<strong>or</strong> a moment th<strong>at</strong> someone might be able to<br />

steal your prints and then use them to masquerade as you. Let us<br />

not bother about how they might steal your prints <strong>or</strong> even about<br />

how they might actually use them. Let us just assume th<strong>at</strong> this has<br />

happened. To address this myth, we need to get a bit m<strong>or</strong>e technical<br />

and look <strong>at</strong> the <strong>co</strong>ncept of revocable biometrics. While it might<br />

not be widely known about, the <strong>co</strong>ncept has been around f<strong>or</strong> years<br />

even if it has been mostly restricted to biometric research and<br />

academic circles.<br />

Perhaps the most high-profi le w<strong>or</strong>k being done on revocable<br />

biometrics is a European Community project called TURBINE.<br />

Admittedly, it’s a bit of a <strong>co</strong>nvoluted acronym, but TURBINE stands f<strong>or</strong><br />

TrUsted Revocable Biometric IdeNtitiEs.<br />

To quote from the project’s website, “TURBINE technology will<br />

protect the biometric templ<strong>at</strong>e by cryptographic transf<strong>or</strong>m<strong>at</strong>ion<br />

of the fi ngerprint inf<strong>or</strong>m<strong>at</strong>ion into a non-invertible key th<strong>at</strong> allows<br />

m<strong>at</strong>ching by bit-to-bit <strong>co</strong>mparison. To enhance user trust, this key<br />

will also be revocable, i.e. a new independent key can be gener<strong>at</strong>ed<br />

using the same fi ngerprint.<br />

“TURBINE elimin<strong>at</strong>es the risk th<strong>at</strong> a third party breaches the<br />

privacy of a citizen by tracing back his/her identity and any of his/her<br />

personal inf<strong>or</strong>m<strong>at</strong>ion associ<strong>at</strong>ed to one <strong>or</strong> m<strong>or</strong>e of his/her identities.<br />

In addition, in case an identity is <strong>co</strong>mpromised, TURBINE will allow<br />

protecting the citizen’s privacy by revoking and replacing the identity<br />

without damages to his/her biometrics d<strong>at</strong>a and their use f<strong>or</strong> his/her<br />

other identities.”<br />

In sh<strong>or</strong>t, it’s an approach to biometric security th<strong>at</strong> safeguards the<br />

integrity of your fi ngerprints in the unlikely event th<strong>at</strong> they somehow<br />

are stolen. F<strong>or</strong> much m<strong>or</strong>e detail on the technical aspects visit http://<br />

www.turbine-project.eu/index.php<br />

Myth # 6: Multispectral imaging is the way to go with<br />

fi ngerprint scanners<br />

This one’s dangerous. It’s possibly the most dangerous of all the<br />

24 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

biometric myths right now. It’s not th<strong>at</strong> the technology itself is<br />

dodgy, it’s the fact th<strong>at</strong> it falls foul of regul<strong>at</strong><strong>or</strong>y requirements. This<br />

is clearly a serious m<strong>at</strong>ter and is of a magnitude way beyond the<br />

<strong>co</strong>ncerns th<strong>at</strong> are raised in all the other myths.<br />

The problem is a simple one. Multispectral imaging – <strong>or</strong> MSI -<br />

does not meet the intern<strong>at</strong>ionally adopted standards f<strong>or</strong> fi ngerprint<br />

image-quality specifi ed by the US N<strong>at</strong>ional Institute f<strong>or</strong> Science &<br />

Technology (NIST), the Biometrics Task F<strong>or</strong>ce of the US Department<br />

of Defence and the FBI.<br />

F<strong>or</strong> a variety of technical reasons, governments and law enf<strong>or</strong>cement<br />

agencies do not <strong>co</strong>nsider MSI d<strong>at</strong>a to be an accur<strong>at</strong>e represent<strong>at</strong>ion<br />

of a fi ngerprint.<br />

This means th<strong>at</strong> a <strong>co</strong>urt of law is unlikely to accept multispectral<br />

d<strong>at</strong>a as evidence of a person’s identity. In other w<strong>or</strong>ds, you<br />

can’t prove th<strong>at</strong> the fi ngerprint d<strong>at</strong>a belongs to a specifi c person.<br />

In the eyes of the law, a multi-spectral print is problem<strong>at</strong>ic as proof<br />

of an identity.<br />

Let’s say you go to your bank branch and they ask you to scan<br />

your print as proof of your identity – perhaps to make a large cash<br />

withdrawal. At some l<strong>at</strong>er point there is a fraud problem on your<br />

ac<strong>co</strong>unt and it transpires th<strong>at</strong> someone has somehow <strong>co</strong>pied your<br />

fi ngerprint and made another large withdrawal.<br />

If the bank was using a multispectral scanner, then there’s nothing<br />

m<strong>or</strong>e to be done because the <strong>co</strong>urts won’t accept the fi ngerprint<br />

d<strong>at</strong>a.<br />

Myth # 7: Fingerprint scanners just don’t w<strong>or</strong>k.<br />

The question here is: which fi ngerprint scanners don’t w<strong>or</strong>k? There<br />

are a few very good scanners and there are a lot of very bad scanners.<br />

But the perf<strong>or</strong>mance of even the very best scanners is not just about<br />

the quality of the technology. Perf<strong>or</strong>mance is also dependent on how<br />

the technology is used.<br />

F<strong>or</strong> example, the way your fi ngerprint d<strong>at</strong>a is captured in the<br />

fi rst place will aff ect how the technology perf<strong>or</strong>ms when you actually<br />

<strong>co</strong>me to use it l<strong>at</strong>er on. Referred to as enrolment, the initial d<strong>at</strong>a<br />

capture needs to be handled ac<strong>co</strong>rding to some straightf<strong>or</strong>ward<br />

procedures. There’s nothing <strong>at</strong> all <strong>co</strong>mplex about enrolment but<br />

it does need to be done properly because po<strong>or</strong> enrolment leads<br />

directly to po<strong>or</strong> perf<strong>or</strong>mance. It’s the old st<strong>or</strong>y of garbage in, garbage<br />

out.<br />

Equally, some fi ngerprint technologies struggle with re<strong>co</strong>gnising<br />

the fi ngerprints of only a few hundred people while others<br />

w<strong>or</strong>k perfectly with many thousands. A po<strong>or</strong> experience with<br />

biometrics in the past is almost certainly down to po<strong>or</strong> technology.<br />

Once again, it is a m<strong>at</strong>ter of selecting the right technology. And to a<br />

certain extent, it’s another old st<strong>or</strong>y: you pays your money and you<br />

takes your choice.<br />

Myth # 8: Biometrics are gre<strong>at</strong> but they’re just<br />

excessively expensive<br />

This is all about wh<strong>at</strong> you want the technology to deliver in terms of<br />

sound business benefi ts. If your <strong>co</strong>mpany is suff ering losses from any<br />

f<strong>or</strong>m of identity-based fraud <strong>or</strong> unauth<strong>or</strong>ised access, then it’s certainly<br />

w<strong>or</strong>th looking <strong>at</strong> wh<strong>at</strong> these problems are actually <strong>co</strong>sting you<br />

over the long term.<br />

Buddy clocking is a <strong>co</strong>mmon f<strong>or</strong>m of identity-based fraud in<br />

the w<strong>or</strong>kplace. People share their cards, clock-on f<strong>or</strong> one another<br />

and get paid f<strong>or</strong> not being there. Thousands, yes thousands, of SA<br />

<strong>or</strong>ganis<strong>at</strong>ions have <strong>co</strong>mpletely elimin<strong>at</strong>ed those payroll losses by<br />

replacing their card-based systems with fi ngerprint scanners. And<br />

Continued on page 26


www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 25


TRENDS<br />

Continued from page 24<br />

26 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

the exceptional accuracy of fi ngerprint-based<br />

<strong>at</strong>tendance d<strong>at</strong>a means these <strong>co</strong>mpanies<br />

have also cut the admin time and rel<strong>at</strong>ed<br />

<strong>co</strong>sts arising from payroll disputes and<br />

discrepancies when cards get f<strong>or</strong>gotten, lost<br />

<strong>or</strong> damaged.<br />

But biometric technology isn’t just<br />

restricted to preventing payroll fraud <strong>or</strong><br />

<strong>co</strong>ntrolling physical access to your premises.<br />

Link it to your IT systems and you get rid of all<br />

those passw<strong>or</strong>ds and PINs and all the problems<br />

and risks they cause. Fingerprint-based<br />

identifi c<strong>at</strong>ion can be used to <strong>co</strong>ntrol a whole<br />

host of IT activities such as who can make<br />

EFT payments, alter invoice details <strong>or</strong> modify<br />

stock-<strong>co</strong>ntrol rep<strong>or</strong>ts.<br />

And the benefi ts of biometrics are certainly<br />

not limited to big businesses th<strong>at</strong> can<br />

aff <strong>or</strong>d to run their w<strong>or</strong>kf<strong>or</strong>ce management<br />

systems on advanced software pl<strong>at</strong>f<strong>or</strong>ms. F<strong>or</strong><br />

example, Ide<strong>co</strong>’s ES2 is a free software package<br />

th<strong>at</strong> <strong>co</strong>ntrols up to six M<strong>or</strong>pho scanners<br />

f<strong>or</strong> straightf<strong>or</strong>ward physical access <strong>co</strong>ntrol<br />

and time management.<br />

This one really <strong>co</strong>mes down to a business<br />

decision r<strong>at</strong>her than a technical one. If a<br />

stronger f<strong>or</strong>m of identity <strong>co</strong>ntrol would save<br />

you money, then the right biometrics can<br />

make solid <strong>co</strong>mmercial sense by cutting risk<br />

and cutting losses.<br />

Myth # 9: Biometrics might be<br />

fi ne in an offi ce, but they’re<br />

not suitable f<strong>or</strong> industrial<br />

applic<strong>at</strong>ions<br />

To <strong>co</strong>unter this perception it’s w<strong>or</strong>th <strong>co</strong>nsidering<br />

th<strong>at</strong> the local mining industry is one of<br />

the largest users of biometrics.<br />

Mining is also interesting because it’s<br />

also the industry where biometrics are<br />

used across a wide range of applic<strong>at</strong>ions.<br />

Aside from physical security and payroll<br />

management, the mining industry also uses<br />

fi ngerprint-based identifi c<strong>at</strong>ion to <strong>co</strong>ntrol<br />

access to canteens and monit<strong>or</strong> cal<strong>or</strong>ie<br />

intake; to govern the implement<strong>at</strong>ion of<br />

health and safety policies; and even to <strong>co</strong>ntrol<br />

who can drive those immense trucks th<strong>at</strong><br />

ferry <strong>or</strong>e around the mine.<br />

The plain fact is th<strong>at</strong> in <strong>co</strong>mparison to soft<br />

offi ce environments, biometrics are far m<strong>or</strong>e<br />

<strong>co</strong>mmon in tough environments such as<br />

fact<strong>or</strong>ies, chemical plants, agriculture, p<strong>or</strong>ts<br />

and <strong>co</strong>nstruction.<br />

Myth # 10: I can’t integr<strong>at</strong>e<br />

biometrics into my systems<br />

A practical rule of thumb here is th<strong>at</strong> if access<br />

to a system is currently <strong>co</strong>ntrolled by a card,<br />

PIN <strong>or</strong> passw<strong>or</strong>d, then these ineff ectual<br />

credentials can probably be replaced with<br />

fi ngerprint-based identifi c<strong>at</strong>ion. This s<strong>or</strong>t of<br />

integr<strong>at</strong>ion w<strong>or</strong>k has already been done f<strong>or</strong><br />

all of the most widely used access <strong>co</strong>ntrol and<br />

T&A pl<strong>at</strong>f<strong>or</strong>ms.<br />

In terms of access and activity <strong>co</strong>ntrol<br />

within <strong>co</strong>rp<strong>or</strong><strong>at</strong>e IT systems, <strong>co</strong>mpetent<br />

fi ngerprint biometrics have already been<br />

<strong>co</strong>nfi gured to w<strong>or</strong>k in <strong>co</strong>njunction with<br />

Microsoft’s Active Direct<strong>or</strong>y and Novell’s<br />

e-Direct<strong>or</strong>y. They have also been integr<strong>at</strong>ed<br />

with mainframe-based solutions, replacing<br />

passw<strong>or</strong>ds and PINS in software pl<strong>at</strong>f<strong>or</strong>ms<br />

such as BAS – the Basic Ac<strong>co</strong>unting System<br />

th<strong>at</strong> is used throughout SA government<br />

departments.<br />

It would theref<strong>or</strong>e be an err<strong>or</strong> to simply<br />

f<strong>or</strong>ego all the risk-cutting benefi ts of<br />

biometrics simply because you assume<br />

th<strong>at</strong> fi ngerprint identifi c<strong>at</strong>ion won’t w<strong>or</strong>k<br />

with a particular system. Of <strong>co</strong>urse, it may<br />

transpire th<strong>at</strong> the necessary integr<strong>at</strong>ion<br />

w<strong>or</strong>k doesn’t warrant the expense involved.<br />

On the other hand, it might be a m<strong>at</strong>ter of<br />

plug-and-play. But it certainly can’t do any<br />

harm to ask….<br />

Understanding fi ngerprint biometrics<br />

Advanced Biometrics Technology (ABT) solutions are <strong>co</strong>nsistently able to re<strong>co</strong>gnise the<br />

positions where the raised ridges on a fi ngerprint either split <strong>or</strong> end. These positions are<br />

called Minutia Points and are marked on the graphic by the blue symbols.<br />

It is the unique p<strong>at</strong>tern f<strong>or</strong>med by the minutia points th<strong>at</strong> enables an ABT system to distinguish<br />

one fi ngerprint from all others. ABT solutions <strong>co</strong>nvert this p<strong>at</strong>tern into an alg<strong>or</strong>ithmic<br />

<strong>co</strong>de and then st<strong>or</strong>e it f<strong>or</strong> l<strong>at</strong>er m<strong>at</strong>ching when a user scans their fi ngerprint. Unlike less<br />

advanced biometric technologies, ABTs are not dependent on capturing a photographic<br />

image of the fi ngerprint.<br />

Compliant with the intern<strong>at</strong>ional benchmark standards f<strong>or</strong> f<strong>or</strong>ensic and investig<strong>at</strong>ive<br />

biometrics, ABT systems underpin the digital fi ngerprint identifi c<strong>at</strong>ion solutions th<strong>at</strong> are<br />

used by law enf<strong>or</strong>cement and civil identity agencies w<strong>or</strong>ldwide.


www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 27


WHITE PAPER<br />

Identity and access governance, a<br />

future in the cloud<br />

By Connie Grobler, Technology Specialist: Identity, Security and Governance.<br />

When used eff ectively, IAG solutions be<strong>co</strong>me the c<strong>at</strong>alyst to meet the challenges of<br />

a <strong>co</strong>mplex and changing w<strong>or</strong>ld.<br />

Change is a given, especially in the technology landscape. There are two<br />

aspects of change th<strong>at</strong> businesses need to <strong>co</strong>nsider when it <strong>co</strong>mes to<br />

identity and access governance.<br />

First, businesses must manage their internal systems within ever growing<br />

and changing <strong>co</strong>mplexities. There are m<strong>or</strong>e things to <strong>co</strong>nnect, m<strong>or</strong>e<br />

people to <strong>co</strong>nnect with m<strong>or</strong>e d<strong>at</strong>a than ever bef<strong>or</strong>e. How is change and<br />

<strong>co</strong>mplexity causing you to rethink your approach to identity, security and<br />

governance? Do you have the necessary tools to meet those challenges?<br />

Do you have the processes in place to<br />

take your <strong>or</strong>ganis<strong>at</strong>ion f<strong>or</strong>ward into the<br />

rapidly evolving w<strong>or</strong>ld th<strong>at</strong> lies ahead?<br />

Se<strong>co</strong>nd, <strong>or</strong>ganis<strong>at</strong>ions are <strong>co</strong>nsuming<br />

software-as-a-service (SaaS) applic<strong>at</strong>ions<br />

<strong>at</strong> an exponential r<strong>at</strong>e. While<br />

the advantages of SaaS applic<strong>at</strong>ions<br />

are gre<strong>at</strong>, so are the potential pitfalls of<br />

unauth<strong>or</strong>ised access.<br />

There are several areas to <strong>co</strong>nsider<br />

when planning f<strong>or</strong> the future. An<br />

aff <strong>or</strong>dable, manageable solution th<strong>at</strong><br />

oversees and <strong>co</strong>ntrols user access to<br />

SaaS-hosted inf<strong>or</strong>m<strong>at</strong>ion be<strong>co</strong>mes<br />

m<strong>or</strong>e crucial. Security, <strong>co</strong>mpliance<br />

rep<strong>or</strong>ting and ease of access are all<br />

issues <strong>at</strong> the top of the list of <strong>co</strong>ncerns,<br />

and <strong>or</strong>ganis<strong>at</strong>ions must handle<br />

these <strong>co</strong>rrectly. Identity and Access<br />

Governance (IAG) solutions may seem<br />

like a burden brought on by increasing<br />

regul<strong>at</strong>ion and <strong>co</strong>mpliance issues,<br />

but when used eff ectively, IAG solutions<br />

be<strong>co</strong>me the c<strong>at</strong>alyst to meet the<br />

challenges of a <strong>co</strong>mplex and changing<br />

w<strong>or</strong>ld.<br />

Introducing identity changes<br />

The general trends transf<strong>or</strong>ming<br />

business also transf<strong>or</strong>m identity and access management: in a few years,<br />

even the meaning of the terms we use are diff erent. While in recent past<br />

technology vend<strong>or</strong>s, <strong>co</strong>nsultancies and businesses tended to see identity<br />

and access management as a min<strong>or</strong> <strong>co</strong>mplement to other security<br />

programmes, it is now be<strong>co</strong>ming evident th<strong>at</strong> wh<strong>at</strong> we do with identities<br />

is <strong>at</strong> the heart of any initi<strong>at</strong>ive both f<strong>or</strong> business and IT. With no real<br />

<strong>co</strong>ntrol over who does wh<strong>at</strong> when in your environment, there is hardly<br />

any chance of being eff ective <strong>at</strong> managing your business <strong>or</strong> security<br />

environments.<br />

Due to government and industry oversight, as well as increased<br />

requirements f<strong>or</strong> internal <strong>co</strong>ntrols. IAG has be<strong>co</strong>me a vital part of all<br />

<strong>or</strong>ganis<strong>at</strong>ions, be it autom<strong>at</strong>ed <strong>or</strong> manual. The drivers th<strong>at</strong> move IAG<br />

28 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

needs are nearly always external to the <strong>co</strong>mpany. IT and business<br />

managers must respond to the pressures of change and <strong>co</strong>mplexity in<br />

today’s business environment, security <strong>co</strong>ncerns, advancing technologies,<br />

and increased regul<strong>at</strong>ion and <strong>co</strong>mpliance issues. But as needs and<br />

pressures increase, budgets are on the decline. Managing change and<br />

<strong>co</strong>mplexity through governance can be a gre<strong>at</strong> opp<strong>or</strong>tunity if done<br />

<strong>co</strong>rrectly. The key is having not only the <strong>co</strong>rrect tools, but the processes<br />

in place to meet these ever growing needs.<br />

The IT industry has seen an<br />

onslaught of new technologies over<br />

the past decade, but one of the most<br />

pervasive and transf<strong>or</strong>m<strong>at</strong>ive is cloud<br />

<strong>co</strong>mputing. Ac<strong>co</strong>rding to market analysts,<br />

the software-as-a-service (SaaS)<br />

market will <strong>co</strong>ntinue its rapid growth<br />

through 2015. Businesses are getting<br />

over their cloud aversions and now<br />

often look to the cloud fi rst when they<br />

need a solution to solve their longterm<br />

<strong>or</strong> tactical need. A recent Gartner<br />

survey indic<strong>at</strong>es th<strong>at</strong> cloud <strong>co</strong>mputing<br />

is on a traject<strong>or</strong>y to be<strong>co</strong>me the<br />

dominant infrastructure f<strong>or</strong> enterprise<br />

<strong>co</strong>mputing – this decade.<br />

One of the maj<strong>or</strong> challenges f<strong>or</strong><br />

<strong>or</strong>ganis<strong>at</strong>ions adopting cloud-<strong>co</strong>mputing<br />

services is the secure and timely<br />

management of on-boarding (provisioning)<br />

and off -boarding (de-provisioning)<br />

of users in the cloud. Further, enterprises<br />

th<strong>at</strong> have invested in user management<br />

processes within an enterprise will seek<br />

to extend those processes to cloud<br />

services.<br />

Connie Grobler.<br />

Defi nitions<br />

Identity management<br />

Identity management <strong>co</strong>ncerns lie within the IT realm. These deal with<br />

provisioning hardware and software as well as managing the identity of<br />

those using <strong>co</strong>mpany resources, and the identity of the resources and<br />

devices themselves.<br />

• A person’s identity may include the following <strong>at</strong>tributes:<br />

• Who are you? – name, loc<strong>at</strong>ion, <strong>co</strong>ntact info, etc.<br />

• Roles – title, manager, etc.<br />

• Rel<strong>at</strong>ionships – employee, <strong>co</strong>ntract<strong>or</strong>, vend<strong>or</strong>, etc.<br />

Once an identity is established, the next step is to determine the<br />

appropri<strong>at</strong>e s<strong>co</strong>pe of each individual’s access by cre<strong>at</strong>ing rel<strong>at</strong>ionships<br />

with resources. This includes: applic<strong>at</strong>ions, systems, d<strong>at</strong>a, groups, physical<br />

facilities and other <strong>co</strong>mpany resources.<br />

Continued on page 30


www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 29


WHITE PAPER<br />

Continued from page 28<br />

Access governance<br />

Clearly understanding access is the key to governance. It is ultim<strong>at</strong>ely<br />

the responsibility of business management, r<strong>at</strong>her than IT management.<br />

The tools in this area are designed to meet business needs with straightf<strong>or</strong>ward,<br />

user-friendly interfaces, f<strong>or</strong> those who may be less technically<br />

inclined.<br />

Identity and access governance<br />

IAG is the <strong>co</strong>nvergence of both identity management and access<br />

governance. Eff ective IAG solutions should seamlessly integr<strong>at</strong>e both<br />

disciplines to meet overall <strong>co</strong>mpany objectives.<br />

The challenges f<strong>or</strong> executives<br />

The digital w<strong>or</strong>ld is cre<strong>at</strong>ing shifts in the way business gets done, resulting<br />

in both exciting but often troubling times f<strong>or</strong> executives. Wh<strong>at</strong> was<br />

once an intim<strong>at</strong>e <strong>co</strong>rp<strong>or</strong><strong>at</strong>e netw<strong>or</strong>k is now a globally <strong>co</strong>nnected web of<br />

people and devices. M<strong>or</strong>e employees w<strong>or</strong>k remotely, carrying sensitive<br />

d<strong>at</strong>a on notebooks and PDAs. Partners and suppliers are invited inside the<br />

<strong>co</strong>rp<strong>or</strong><strong>at</strong>e walls to inter<strong>co</strong>nnect their own systems and share inf<strong>or</strong>m<strong>at</strong>ion.<br />

Vend<strong>or</strong>s and <strong>co</strong>ntract<strong>or</strong>s are trusted with access to sensitive d<strong>at</strong>a.<br />

Many C-level executives may not know f<strong>or</strong> certain th<strong>at</strong> their inf<strong>or</strong>m<strong>at</strong>ion<br />

is secure – th<strong>at</strong> only the right people are gaining access to the<br />

appropri<strong>at</strong>e applic<strong>at</strong>ions, netw<strong>or</strong>ks, and d<strong>at</strong>a. And now with the introduction<br />

of cloud-based services, mobile devices, and remote users, there<br />

are even m<strong>or</strong>e <strong>co</strong>nnections to critical d<strong>at</strong>a and applic<strong>at</strong>ions both inside<br />

and outside of the enterprise.<br />

IAG is the security discipline th<strong>at</strong> auth<strong>or</strong>ises<br />

users to access <strong>co</strong>rp<strong>or</strong><strong>at</strong>e systems and inf<strong>or</strong>m<strong>at</strong>ion.<br />

It helps prevent fraudulent access and use of<br />

d<strong>at</strong>a th<strong>at</strong> <strong>co</strong>uld potentially impact the business, its<br />

partners, <strong>or</strong> even w<strong>or</strong>se, its customers. The maj<strong>or</strong>ity<br />

of <strong>or</strong>ganis<strong>at</strong>ions haven’t been able to realise the full<br />

promise of IAG – to secure the enterprise inf<strong>or</strong>m<strong>at</strong>ion<br />

in a <strong>co</strong>st eff ective and <strong>co</strong>mpliant manner. Many<br />

have implemented <strong>co</strong>mponents of IAG, some even<br />

ac<strong>co</strong>mplishing the elusive ‘single sign-on,’ but often fall sh<strong>or</strong>t in other<br />

areas.<br />

At the <strong>co</strong>re of an enterprise’s security and <strong>co</strong>mpliance <strong>co</strong>ncerns is the<br />

ability to <strong>co</strong>ntrol who has access to wh<strong>at</strong>, and to make sure this access is<br />

appropri<strong>at</strong>e <strong>at</strong> all times.<br />

Equally imp<strong>or</strong>tant is the ability to rep<strong>or</strong>t on who has been given<br />

access, how they use those resources and who granted access <strong>at</strong> any<br />

given time. However, as applic<strong>at</strong>ions extend from physical to virtual to<br />

cloud environments, answering these questions accur<strong>at</strong>ely and <strong>co</strong>nsistently<br />

be<strong>co</strong>mes challenging – especially <strong>at</strong> the very end of th<strong>at</strong> progression:<br />

the cloud.<br />

Keeping up in a changing w<strong>or</strong>ld<br />

While the cloud can mean many things, the N<strong>at</strong>ional Institute of<br />

Standards and Technology (NIST) defi nes it as “the delivery of <strong>co</strong>mputing<br />

as a service r<strong>at</strong>her than a product, whereby shared resources, software,<br />

and inf<strong>or</strong>m<strong>at</strong>ion are provided to <strong>co</strong>mputers and other devices as<br />

a utility (like the electricity grid) over a netw<strong>or</strong>k (typically the Internet).<br />

As software applic<strong>at</strong>ions are delivered in a SaaS model, keeping <strong>co</strong>mpany<br />

d<strong>at</strong>a secure is an increasing problem. How is d<strong>at</strong>a secured in the<br />

cloud? How do <strong>co</strong>mpanies ensure th<strong>at</strong> sensitive m<strong>at</strong>erials are not being<br />

accessed by those without proper authentic<strong>at</strong>ion <strong>or</strong> auth<strong>or</strong>is<strong>at</strong>ion?<br />

The increasing adoption of SaaS and other cloud-hosted applic<strong>at</strong>ions<br />

is introducing a new level of <strong>co</strong>mplexity and risk. These challenges<br />

are not just technical, but also pose a challenge from a procedural and<br />

30 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

“The only thing in<br />

life th<strong>at</strong> is <strong>co</strong>nstant<br />

is change” -<br />

François de la<br />

Rochefoucauld<br />

policy point of view, and while they vary from applic<strong>at</strong>ion to applic<strong>at</strong>ion.<br />

Some of the <strong>co</strong>mmon ones are as follows:<br />

Omnipresence<br />

Ironically one of the benefi ts of the cloud paradigm – they are accessible<br />

from anywhere, is also one of the toughest challenges to bringing<br />

them under governance. There is no intranet <strong>or</strong> extranet anym<strong>or</strong>e, it is<br />

all the same. M<strong>or</strong>eover, the advent of mobile devices and smart phones<br />

as enterprise <strong>co</strong>mputing pl<strong>at</strong>f<strong>or</strong>ms pushes ubiquity even further. Users<br />

have a multitude of access p<strong>at</strong>hs to cloud applic<strong>at</strong>ions, and in some<br />

cases, these p<strong>at</strong>hs provide in<strong>co</strong>nsistent security levels.<br />

Extensiveness<br />

When business owners rush to use SaaS apps f<strong>or</strong> e-mail, expense<br />

management, and m<strong>or</strong>e, they sometimes skip over the n<strong>or</strong>mal applic<strong>at</strong>ion<br />

deployment lifecycle and security assessment a typical, internally<br />

deployed applic<strong>at</strong>ion would follow, leaving security pros out of the<br />

<strong>co</strong>nvers<strong>at</strong>ion. This makes it diffi cult f<strong>or</strong> the <strong>or</strong>ganis<strong>at</strong>ion to proactively<br />

assess and manage these types of risk, and change their posture from<br />

proactive to reactive. IT security is often engaged after the fact to try<br />

and fi x gaping security holes pointed out by audit<strong>or</strong>s.<br />

Ineffi cient security<br />

Security is often an afterthought where <strong>co</strong>nvenience and usability take<br />

precedence over security. From an auth<strong>or</strong>is<strong>at</strong>ion perspective, the access<br />

<strong>co</strong>ntrol model f<strong>or</strong> each applic<strong>at</strong>ion often is very proprietary;<br />

some rely on a few roles to manage access<br />

while others provide fi ner granularity. Some <strong>co</strong>mpanies<br />

synchronise user ac<strong>co</strong>unts to external apps on a<br />

rel<strong>at</strong>ively infrequent schedule through insecure fi le<br />

transfer proto<strong>co</strong>l (FTP) <strong>or</strong> relying entirely on ‘frontdo<strong>or</strong>’<br />

authentic<strong>at</strong>ion f<strong>or</strong> access to wide sw<strong>at</strong>hs of app<br />

functionality.<br />

F<strong>or</strong> cloud applic<strong>at</strong>ions deemed sensitive, <strong>or</strong>ganis<strong>at</strong>ions<br />

should also be <strong>co</strong>ncerned with knowing how<br />

the inf<strong>or</strong>m<strong>at</strong>ion is protected within the applic<strong>at</strong>ion, its back ends, when<br />

the d<strong>at</strong>a is <strong>at</strong> rest, and when is backed up, and how it is segmented from<br />

other <strong>or</strong>ganis<strong>at</strong>ions’ d<strong>at</strong>a [due to multi-tenancy of the applic<strong>at</strong>ion]. The<br />

challenge here is SaaS vend<strong>or</strong>s do not disclose all of this inf<strong>or</strong>m<strong>at</strong>ion<br />

voluntarily, and <strong>at</strong> best, will share an IT security assessment rep<strong>or</strong>t on their<br />

security mechanisms and practices.<br />

Inadequ<strong>at</strong>e IAG integr<strong>at</strong>ion options<br />

While some m<strong>at</strong>ure standards exist (i.e. SAML, SPML, WS-Feder<strong>at</strong>ion)<br />

to allow <strong>or</strong>ganis<strong>at</strong>ions to integr<strong>at</strong>e their IAG infrastructure with cloud<br />

applic<strong>at</strong>ions, these are in<strong>co</strong>nsistently adopted by SaaS vend<strong>or</strong>s, if <strong>at</strong> all,<br />

turning the integr<strong>at</strong>ion landscape into a <strong>co</strong>llection of one-off s. Many<br />

cloud vend<strong>or</strong>s claim to supp<strong>or</strong>t identity feder<strong>at</strong>ion standards, but they<br />

either supp<strong>or</strong>t it f<strong>or</strong> limited use cases (mainly authentic<strong>at</strong>ion) <strong>or</strong> the<br />

bre<strong>at</strong>h of the integr<strong>at</strong>ion is limited <strong>co</strong>mpared to wh<strong>at</strong> they off er when<br />

using their proprietary APIs. In many cases, <strong>or</strong>ganis<strong>at</strong>ions have no choice<br />

but to implement custom integr<strong>at</strong>ion solutions to integr<strong>at</strong>e Cloud applic<strong>at</strong>ions<br />

with their IAG infrastructure.<br />

Wh<strong>at</strong> can be done?<br />

Industry particip<strong>at</strong>ion<br />

In this cutting edge area of IT, it is imp<strong>or</strong>tant to get involved with<br />

peers in the industry, particip<strong>at</strong>ing in industry f<strong>or</strong>ums, and reading<br />

inf<strong>or</strong>m<strong>at</strong>ion in the blog space. The w<strong>or</strong>k <strong>co</strong>ming out of the Cloud<br />

Security Alliance (CSA ) is very insightful. The CSA is a member-driven<br />

Continued on page 32


www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 31


WHITE PAPER<br />

Continued from page 30<br />

<strong>or</strong>ganis<strong>at</strong>ion, chartered with promoting the use of best practices f<strong>or</strong><br />

providing security assurance within Cloud Computing.<br />

Identity and access governance<br />

Whether you’re managing cloud applic<strong>at</strong>ions <strong>or</strong> on-premise applic<strong>at</strong>ions<br />

<strong>or</strong> both, you need to meet basic access <strong>co</strong>ntrol and governance standards.<br />

Being proactive in defi ning policies f<strong>or</strong> how cloud applic<strong>at</strong>ions<br />

are to be dealt with from a governance perspective will help the process<br />

of actually bringing them into the fold.<br />

As a baseline, this includes granting, changing, and removing user<br />

access to applic<strong>at</strong>ions and providing a single view of users and their<br />

access privileges in <strong>or</strong>der to answer the critical question around “who<br />

does have access to wh<strong>at</strong>?” In <strong>or</strong>der to meet <strong>co</strong>mpliance requirements,<br />

access <strong>co</strong>ntrols should ensure th<strong>at</strong> users are only granted access<br />

privileges to cloud applic<strong>at</strong>ions th<strong>at</strong> are appropri<strong>at</strong>e f<strong>or</strong> their job functions<br />

and th<strong>at</strong> the access privileges of all cloud users are reviewed on a<br />

regular basis to ensure they are <strong>co</strong>rrect.<br />

An eff ective IAG solution monit<strong>or</strong>s access to all <strong>co</strong>mpany resources,<br />

including those in the cloud. Cloud resources may be off -site, but<br />

they are not out of mind. Not only does an IAG solution monit<strong>or</strong> the<br />

appropri<strong>at</strong>e access and usage of cloud-based resources, it also ensures<br />

th<strong>at</strong> you are using only as much as you need, keeping usage fees to a<br />

minimum, and helping you maintain proper <strong>co</strong>ntrol.<br />

Control access to resources th<strong>at</strong> you don’t <strong>co</strong>ntrol.<br />

To ensure th<strong>at</strong> customer and <strong>co</strong>rp<strong>or</strong><strong>at</strong>e d<strong>at</strong>a is secure,<br />

you must extend access management beyond<br />

<strong>co</strong>rp<strong>or</strong><strong>at</strong>e boundaries. IT needs to take <strong>co</strong>ntrol of user<br />

access in the cloud the same way it has evolved its<br />

processes f<strong>or</strong> your internal applic<strong>at</strong>ions. And because<br />

employees are increasingly using their personal<br />

mobile devices to <strong>co</strong>nduct business, IT’s access management<br />

reach needs to include these devices as well.<br />

The key to keeping your <strong>co</strong>rp<strong>or</strong><strong>at</strong>e credentials<br />

safe is to keep them within your <strong>co</strong>ntrol and protection – never in the cloud.<br />

Solutions th<strong>at</strong> replic<strong>at</strong>e user credentials off -premises increase the risk to your<br />

inf<strong>or</strong>m<strong>at</strong>ion and ultim<strong>at</strong>ely to your business. Similarly, the most secure solutions<br />

won’t let users put <strong>co</strong>rp<strong>or</strong><strong>at</strong>e credentials in the cloud.<br />

Extend your internally autom<strong>at</strong>ed processes out into the cloud<br />

IT has spent many years developing the right processes f<strong>or</strong> managing<br />

your environment. F<strong>or</strong> example, today it’s <strong>co</strong>mmon f<strong>or</strong> <strong>or</strong>ganis<strong>at</strong>ions to<br />

have a set of policies and processes in place f<strong>or</strong> their enterprise direct<strong>or</strong>ies,<br />

which are frequently Active Direct<strong>or</strong>y implement<strong>at</strong>ions. From there,<br />

IT may have <strong>co</strong>nnections to other identity st<strong>or</strong>es within the business<br />

th<strong>at</strong> <strong>co</strong>ntrol access to resources and applic<strong>at</strong>ions based on the employee’s<br />

role within the <strong>or</strong>ganis<strong>at</strong>ion. These <strong>co</strong>nnections are synchronis<strong>at</strong>ion<br />

points th<strong>at</strong> autom<strong>at</strong>e access <strong>co</strong>ntrol.<br />

IT’s processes f<strong>or</strong> <strong>co</strong>ntrolling access to cloud-hosted applic<strong>at</strong>ions<br />

need to be just as autom<strong>at</strong>ed as its internal access processes. The most<br />

secure approach to <strong>co</strong>ntrolling auth<strong>or</strong>ised access to SaaS applic<strong>at</strong>ions is<br />

to extend IT’s existing processes to include cloud-hosted applic<strong>at</strong>ions.<br />

This approach also preserves IT’s current investment.<br />

Use standards f<strong>or</strong> IAG interfaces<br />

There is good news on the h<strong>or</strong>izon regarding standards-based provisioning<br />

of cloud applic<strong>at</strong>ions. A group of leading SaaS vend<strong>or</strong>s and<br />

identity management providers are w<strong>or</strong>king together to defi ne a Simple<br />

Cloud Identity Management (SCIM) interface f<strong>or</strong> provisioning. The fi rst<br />

specifi c<strong>at</strong>ion is already available and many IdM vend<strong>or</strong>s are beginning<br />

32 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

The digital w<strong>or</strong>ld<br />

is cre<strong>at</strong>ing shifts in<br />

the way business<br />

gets done.<br />

to productise the standard. The SCIM standard will cre<strong>at</strong>e a unif<strong>or</strong>m<br />

management interface f<strong>or</strong> autom<strong>at</strong>ed provisioning to cloud applic<strong>at</strong>ions<br />

and should make provisioning to cloud applic<strong>at</strong>ions widespread and<br />

usable, out-of-the-box.<br />

It is imp<strong>or</strong>tant to use global standards th<strong>at</strong> defi ne well-accepted and<br />

loosely <strong>co</strong>upled messaging around IAG functions.<br />

Keep w<strong>or</strong>karounds <strong>at</strong> bay<br />

Unless you extend your single sign-on capabilities out to your SaaS<br />

applic<strong>at</strong>ions, you’ll fi nd insecure authentic<strong>at</strong>ion practices creeping back<br />

into your <strong>or</strong>ganis<strong>at</strong>ion. Once again, users will st<strong>or</strong>e their passw<strong>or</strong>ds on<br />

notepads <strong>or</strong> Post-it notes, <strong>or</strong> in unsecured text fi les. Keeping passw<strong>or</strong>ds<br />

centralised in your secure identity vault is just as imp<strong>or</strong>tant as keeping<br />

your credentials out of the cloud. Single sign-on is the key. It ensures<br />

th<strong>at</strong> the user authentic<strong>at</strong>ion process is simple and doesn’t require users<br />

to remember additional sets of passw<strong>or</strong>ds. Security is maintained, and<br />

the user experience is enhanced as well.<br />

Single sign-on solutions done right don’t simply pass the user’s<br />

credentials out to the cloud; r<strong>at</strong>her, credentials are kept on the premises<br />

and in your <strong>co</strong>ntrol. Not only are secret credentials secret, but the solution<br />

<strong>co</strong>ntrols users’ access behaviour by requiring them to access the<br />

cloud through the g<strong>at</strong>eway.<br />

Rep<strong>or</strong>t and audit<br />

Depending on the type of applic<strong>at</strong>ions and inf<strong>or</strong>m<strong>at</strong>ion your <strong>or</strong>ganis<strong>at</strong>ion<br />

is keeping in the cloud, you may need the<br />

same level of auditing and rep<strong>or</strong>ting f<strong>or</strong> your SaaS<br />

environments th<strong>at</strong> you have f<strong>or</strong> your internal applic<strong>at</strong>ions.<br />

Key metrics to track include who has access<br />

privileges, who has actually accessed the applic<strong>at</strong>ions,<br />

and when they did so. F<strong>or</strong> regul<strong>at</strong>ed inf<strong>or</strong>m<strong>at</strong>ion,<br />

demonstr<strong>at</strong>ing <strong>co</strong>mpliance is as imp<strong>or</strong>tant as <strong>co</strong>mpliance<br />

itself.<br />

Summary<br />

Changes in the marketplace are cre<strong>at</strong>ing m<strong>or</strong>e urgency f<strong>or</strong> CIOs and<br />

CSOs to implement a better IAG str<strong>at</strong>egy – one th<strong>at</strong> aligns with specifi<br />

c business needs without signifi cantly increasing <strong>co</strong>sts <strong>or</strong> risk. It’s a<br />

diffi cult challenge and one th<strong>at</strong> won’t be solved overnight. However,<br />

it cannot be put on the bottom of the IT project list just because the<br />

<strong>co</strong>mpany has limited resources and budget. Nothing is a higher pri<strong>or</strong>ity<br />

than protecting sensitive <strong>co</strong>mpany and customer d<strong>at</strong>a.<br />

The advent of standards, particularly in security and IAM, as well as<br />

the adoption of <strong>co</strong>mmon interfaces will ultim<strong>at</strong>ely prevail, but it will<br />

take some time bef<strong>or</strong>e this happens. In the meantime, adoption of cloud<br />

applic<strong>at</strong>ions will <strong>co</strong>ntinue to push the envelope of the <strong>or</strong>ganis<strong>at</strong>ion’s IT<br />

security tolerance and agility.<br />

While the cloud does present new security and <strong>co</strong>mpliance challenges,<br />

a governance-based approach to identity management can help<br />

<strong>or</strong>ganis<strong>at</strong>ions smoothly make the transition to mission-critical cloud<br />

<strong>co</strong>mputing. By taking a proactive approach to governing cloud users<br />

and their access privileges, IT <strong>or</strong>ganis<strong>at</strong>ions can elimin<strong>at</strong>e potential gaps<br />

in <strong>co</strong>ntrol and help facilit<strong>at</strong>e the safe adoption of cloud <strong>co</strong>mputing.<br />

Over the next two years, identity management processes and tools will<br />

<strong>co</strong>ntinue to evolve to better supp<strong>or</strong>t the cloud, providing new levels of<br />

agility and <strong>co</strong>nvenience th<strong>at</strong> business users require to take advantage of<br />

the <strong>co</strong>st savings and business effi ciencies promised by the cloud.<br />

F<strong>or</strong> m<strong>or</strong>e inf<strong>or</strong>m<strong>at</strong>ion <strong>co</strong>ntact Novell, +27 (0)11 322 8342,<br />

CGrobler@novell.<strong>co</strong>m.


www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 33


TRENDS<br />

Face it<br />

By Walter Rautenbach, neaMetrics.<br />

Vari<strong>at</strong>ions in background illumin<strong>at</strong>ion have been one of the main challenges f<strong>or</strong><br />

practical face re<strong>co</strong>gnition systems.<br />

Facial re<strong>co</strong>gnition is nothing new. A number of facial re<strong>co</strong>gnition terminals<br />

have been available f<strong>or</strong> several years. Unf<strong>or</strong>tun<strong>at</strong>ely, this type of biometric<br />

reader is problem<strong>at</strong>ic in the African environment due to a <strong>co</strong>mbin<strong>at</strong>ion of<br />

extreme light <strong>co</strong>nditions and dark <strong>co</strong>mplexions.<br />

Vari<strong>at</strong>ions in background illumin<strong>at</strong>ion have been one of the main challenges<br />

f<strong>or</strong> practical face re<strong>co</strong>gnition systems. It is well known th<strong>at</strong> vari<strong>at</strong>ions<br />

of the same face due to illumin<strong>at</strong>ion are generally gre<strong>at</strong>er than the vari<strong>at</strong>ions<br />

of diff erent face identities.<br />

Many face re<strong>co</strong>gnition alg<strong>or</strong>ithms, such as illumin<strong>at</strong>ion <strong>co</strong>mpens<strong>at</strong>ion,<br />

image preprocessing, illumin<strong>at</strong>ion invariant fe<strong>at</strong>ure extraction and modeling<br />

of the face and illumin<strong>at</strong>ion have been cre<strong>at</strong>ed to <strong>co</strong>mpens<strong>at</strong>e f<strong>or</strong> this problem.<br />

However, these techniques cannot <strong>co</strong>mpletely <strong>co</strong>mpens<strong>at</strong>e f<strong>or</strong> the large<br />

vari<strong>at</strong>ion in the appearance of the same face due to changes in illumin<strong>at</strong>ion.<br />

Active illumin<strong>at</strong>ion-based<br />

face re<strong>co</strong>gnition techniques<br />

are <strong>co</strong>nsidered to be one<br />

of the most promising and<br />

practical methods f<strong>or</strong> solving<br />

illumin<strong>at</strong>ion issues in<br />

indo<strong>or</strong> applic<strong>at</strong>ions. It uses<br />

an active sensing technology<br />

to cre<strong>at</strong>e desirable ambient<br />

illumin<strong>at</strong>ion, unaff ected by<br />

un<strong>co</strong>ntrollable surrounding<br />

illumin<strong>at</strong>ion.<br />

It must be noted, however,<br />

th<strong>at</strong> this technology has its<br />

own limit<strong>at</strong>ions, based primarily<br />

on the variable distance<br />

between the user and the<br />

active illumin<strong>at</strong><strong>or</strong>. Overs<strong>at</strong>ur<strong>at</strong>ion,<br />

partial illumin<strong>at</strong>ion<br />

and the lack of illumin<strong>at</strong>ion<br />

are three inherent issues. These can result from the vari<strong>at</strong>ion of this distance<br />

and can signifi cantly impact the characteristics of a face and, in turn, ultim<strong>at</strong>ely<br />

degrade the perf<strong>or</strong>mance of a face re<strong>co</strong>gnition system.<br />

Suprema’s Adaptive IR Illumin<strong>at</strong>ion Technology solves this issue by<br />

<strong>co</strong>ntrolling the intensity of the illumin<strong>at</strong>ion based on the analysis of the<br />

image as well as various fe<strong>at</strong>ures of the face. The illumin<strong>at</strong>ion is adaptively<br />

adjusted to cre<strong>at</strong>e the ideal ambient environment f<strong>or</strong> the capture of clear<br />

face images.<br />

Non-intrusive and easy to use<br />

Furtherm<strong>or</strong>e, the human face is one of the most <strong>co</strong>mmon and non-intrusive<br />

biometrics used to identify individuals. It is m<strong>or</strong>e universal, acceptable and<br />

easier to access than a fi ngerprint.<br />

Conventional face re<strong>co</strong>gnition technology <strong>co</strong>ntains inherent weak<br />

points brought about by pose vari<strong>at</strong>ions. FaceSt<strong>at</strong>ion’s face re<strong>co</strong>gnition<br />

technology over<strong>co</strong>mes such weak points with Smart Enrollment<br />

Technology, Advanced Face Re<strong>co</strong>gnition Alg<strong>or</strong>ithm and Adaptive IR<br />

Illumin<strong>at</strong>ion Technology.<br />

Conventional face re<strong>co</strong>gnition systems use just the frontal face and<br />

34 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

thus require the user’s active <strong>co</strong>oper<strong>at</strong>ion to establish the <strong>co</strong>rrect position.<br />

Diff erent poses have the potential to drastically increase not only the false<br />

acceptance r<strong>at</strong>e, but also the false rejection r<strong>at</strong>e and theref<strong>or</strong>e gre<strong>at</strong>ly aff ect<br />

the overall perf<strong>or</strong>mance of a face re<strong>co</strong>gnition system. To <strong>co</strong>mpens<strong>at</strong>e, <strong>co</strong>nventional<br />

face re<strong>co</strong>gnition systems require the user to <strong>co</strong>ntrol their angle/pose<br />

to <strong>co</strong>incide exactly with how they were enrolled. This is very time <strong>co</strong>nsuming<br />

and extremely in<strong>co</strong>nvenient f<strong>or</strong> the user.<br />

Suprema’s Smart Enrollment Technology solves this problem by using<br />

enhanced face analysis alg<strong>or</strong>ithms, <strong>co</strong>mbined with a system<strong>at</strong>ic procedure to<br />

view key poses. The system begins by registering a few frontal face templ<strong>at</strong>es.<br />

These templ<strong>at</strong>es then be<strong>co</strong>me the reference f<strong>or</strong> evalu<strong>at</strong>ing and registering<br />

the templ<strong>at</strong>es f<strong>or</strong> the other poses: tilting up/down, moving closer/further, and<br />

turning left/right.<br />

Strike a pose<br />

Extensive experimental tests<br />

show th<strong>at</strong> each set of poses <strong>co</strong>ntributed<br />

gre<strong>at</strong>ly to the overall<br />

perf<strong>or</strong>mance of the system. With<br />

each pose, the facial inf<strong>or</strong>m<strong>at</strong>ion<br />

including eyes, nose and mouth,<br />

is autom<strong>at</strong>ically extracted and<br />

is then used to calcul<strong>at</strong>e the<br />

eff ects of the vari<strong>at</strong>ion using<br />

its rel<strong>at</strong>ion to the frontal face<br />

templ<strong>at</strong>es.<br />

Alg<strong>or</strong>ithms were also cre<strong>at</strong>ed<br />

to autom<strong>at</strong>ically detect<br />

and reject improper face images<br />

during the enrollment process.<br />

This ensures proper enrollment<br />

and the best possible<br />

perf<strong>or</strong>mance.<br />

Although face re<strong>co</strong>gnition has many advantages, the <strong>co</strong>ncern against<br />

‘Fake Face Attacks’ is highly warranted. Face re<strong>co</strong>gnition systems cannot be<br />

practically used without proper <strong>co</strong>untermeasures to this thre<strong>at</strong>.<br />

Even when <strong>co</strong>mpared to a fi ngerprint, a face can be m<strong>or</strong>e easily imit<strong>at</strong>ed<br />

using printed papers and LCD displays. There have been many <strong>at</strong>tempts to<br />

over<strong>co</strong>me this issue: hardware-dependent approaches such as facial thermogram,<br />

facial vein and 3D depth inf<strong>or</strong>m<strong>at</strong>ion require incredibly expensive<br />

hardware, making it infeasible f<strong>or</strong> practical use. Conventional alg<strong>or</strong>ithmbased<br />

methods using 2D images, up to now, have not been accur<strong>at</strong>e and<br />

required exhaustive calcul<strong>at</strong>ions/<strong>co</strong>mputing power.<br />

Suprema’s ‘Fake Face Detection’ technology <strong>co</strong>mbines cutting-edge<br />

technology with advanced proprietary alg<strong>or</strong>ithms. A dual camera system<br />

captures both visible and IR images, which are then processed using<br />

advanced image analysis techniques and intelligent machine learningbased<br />

classifi ers. A fake face is detected by estim<strong>at</strong>ing specifi c fe<strong>at</strong>ures and<br />

their distribution is <strong>co</strong>mpared to reference models of real faces.<br />

F<strong>or</strong> m<strong>or</strong>e inf<strong>or</strong>m<strong>at</strong>ion <strong>co</strong>ntact neaMetrics, 0861 632 638,<br />

info@neametrics.<strong>co</strong>m, www.neametrics.<strong>co</strong>m


www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 35


TRENDS<br />

The changing face of access<br />

<strong>co</strong>ntrol<br />

By Guido DiPilla, business development manager <strong>at</strong> Kantech, a Ty<strong>co</strong> <strong>co</strong>mpany.<br />

It’s a <strong>co</strong>ncept th<strong>at</strong> has transf<strong>or</strong>med industries, business models and the go-to-market<br />

str<strong>at</strong>egy of thousands of products and services.<br />

It’s a <strong>co</strong>ncept th<strong>at</strong> has transf<strong>or</strong>med industries, business models and<br />

the go-to-market str<strong>at</strong>egy of thousands of products and services.<br />

Many experts predict th<strong>at</strong> in a few sh<strong>or</strong>t years, the eff ects of the<br />

software-as-a-service (SaaS) model on the security industry will be<br />

just as transf<strong>or</strong>m<strong>at</strong>ive, as it rapidly gains acceptance among end<br />

users, dealers, integr<strong>at</strong><strong>or</strong>s and manufacturers.<br />

One area where SaaS is already producing signifi cant change is<br />

in access <strong>co</strong>ntrol. While managed access is not a new <strong>co</strong>ncept, savvy<br />

installers are fi nding new advantages to this approach, as a way to<br />

m<strong>or</strong>e effi ciently and eff ectively service their customers and as a<br />

tool f<strong>or</strong> additional marketing and customer retention.<br />

In today’s lean e<strong>co</strong>nomic times, selling<br />

traditional access <strong>co</strong>ntrol solutions to customers<br />

can be a challenge. As most businesses<br />

today focus on fi nancial re<strong>co</strong>very, <strong>co</strong>mpanies<br />

are oper<strong>at</strong>ing with less staff to handle ancillary<br />

functions like managing an access <strong>co</strong>ntrol<br />

system, and smaller budgets than ever bef<strong>or</strong>e.<br />

Many security dealers and integr<strong>at</strong><strong>or</strong>s,<br />

themselves b<strong>at</strong>tered by the last few years of<br />

downturn in the <strong>co</strong>mmercial market, using<br />

managed access to reposition their businesses<br />

from the traditional break/fi x model into a service<br />

provider. Instead of revenue chunks from<br />

diff erent install<strong>at</strong>ions, this approach results in<br />

monthly service fees th<strong>at</strong> provide a <strong>co</strong>nsistent<br />

revenue stream on a monthly and year-to-year<br />

basis. Not only does this Web-hosted access<br />

<strong>co</strong>ntrol model also off er additional business<br />

opp<strong>or</strong>tunities to the service provider, but<br />

numerous additional benefi ts to the end user Guido DiPilla<br />

as well.<br />

Dealers and integr<strong>at</strong><strong>or</strong>s <strong>co</strong>nsidering adding managed access to<br />

their product off erings should be<strong>co</strong>me familiar with a few key points<br />

bef<strong>or</strong>e making the jump into off ering this hosted solution to their<br />

customers.<br />

Pl<strong>at</strong>f<strong>or</strong>m fl exibility<br />

Managed access <strong>co</strong>ntrol can <strong>co</strong>me in many fl avours and can be<br />

customised to meet the varied needs of your customer base, whether<br />

a multin<strong>at</strong>ional <strong>co</strong>rp<strong>or</strong><strong>at</strong>ion with dozens of loc<strong>at</strong>ions, a large property<br />

management fi rm with several multi-tenant buildings <strong>or</strong> a small offi ce<br />

with a dozen employees.<br />

With a hosted solution, end users <strong>co</strong>ntrol and manage the access<br />

<strong>co</strong>ntrol system through a Web interface to the access <strong>co</strong>ntrol system<br />

housed on the dealer’s servers. While the end customer is responsible<br />

f<strong>or</strong> adding and deleting cards and perf<strong>or</strong>ming other system management,<br />

the dealer knows th<strong>at</strong> the system is regularly backed up<br />

and the software is up to d<strong>at</strong>e because it resides on his <strong>or</strong> her local<br />

servers.<br />

36 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

The managed solution means th<strong>at</strong> the dealer handles all aspects<br />

of system management, from managed access cards and access<br />

levels of diff erent personnel, autom<strong>at</strong>ed rep<strong>or</strong>ting to video integr<strong>at</strong>ion<br />

and <strong>co</strong>ncierge services. End users looking f<strong>or</strong> some hands-on<br />

<strong>co</strong>ntrol of their system but who are not equipped to handle full<br />

system management can often w<strong>or</strong>k with their dealer <strong>or</strong> integr<strong>at</strong><strong>or</strong> to<br />

cre<strong>at</strong>e a custom solution th<strong>at</strong> meets their needs.<br />

Additional revenue opp<strong>or</strong>tunities<br />

One signifi cant emerging benefi t of some pl<strong>at</strong>f<strong>or</strong>ms enables dealers<br />

and integr<strong>at</strong><strong>or</strong>s to off er managed access <strong>co</strong>ntrol on a third-party provider<br />

basis. This approach allows larger dealers<br />

to reap additional revenues by leveraging their<br />

existing infrastructure by hosting managed<br />

access ac<strong>co</strong>unts f<strong>or</strong> other smaller dealers who<br />

lack the infrastructure <strong>or</strong> capital to jump into<br />

the game.<br />

Some managed access <strong>co</strong>ntrol pl<strong>at</strong>f<strong>or</strong>ms<br />

allow an easy transition from hosted to managed<br />

<strong>or</strong> a hybrid, allowing customers to dial up<br />

<strong>or</strong> down the three levels of service they require<br />

from their systems integr<strong>at</strong><strong>or</strong> based on their<br />

current needs. Others off er a m<strong>or</strong>e focused<br />

approach with a solely hosted <strong>or</strong> fully managed<br />

solution.<br />

Additional avenues f<strong>or</strong> marketing<br />

Current versions of managed access <strong>co</strong>ntrol<br />

pl<strong>at</strong>f<strong>or</strong>ms also fe<strong>at</strong>ure the <strong>co</strong>nvenience of<br />

the Web f<strong>or</strong> ongoing system use and maintenance.<br />

In the past, end users faxed, phoned <strong>or</strong><br />

e-mailed requests to dealers to add and delete<br />

cards, change schedules, and other routine items. Now managed<br />

access pl<strong>at</strong>f<strong>or</strong>ms off er a Web interface where end users can handle<br />

many of these functions from any Internet-<strong>co</strong>nnected device.<br />

F<strong>or</strong> the dealer, often these user interfaces can be branded with<br />

the dealer’s <strong>co</strong>mpany inf<strong>or</strong>m<strong>at</strong>ion, and can also be used f<strong>or</strong> targeted<br />

marketing purposes. F<strong>or</strong> example, if an end user is logging into the<br />

system to add additional cards, a pop message can be programmed<br />

to appear asking the end user if it’s time to <strong>or</strong>der additional access<br />

cards.<br />

The many advancements in managed access <strong>co</strong>ntrol technology,<br />

as well as the growing acceptance in hosted and managed solutions,<br />

provides a glimpse to the future of this market. Dealers and<br />

integr<strong>at</strong><strong>or</strong>s adopting this type of solution will fi nd themselves well<br />

positioned to off er similar solutions as security technology <strong>co</strong>ntinues<br />

to transition to hosted and managed solutions.<br />

F<strong>or</strong> m<strong>or</strong>e inf<strong>or</strong>m<strong>at</strong>ion <strong>co</strong>ntact Ty<strong>co</strong> Security Products,<br />

+27 (0)82 566 5274, emallett@ty<strong>co</strong>int.<strong>co</strong>m, www.ty<strong>co</strong>acvs.<strong>co</strong>m


New kid on the M<strong>or</strong>pho<br />

block<br />

By Andrew Seldon.<br />

Powell Tronics now distributing M<strong>or</strong>pho biometrics.<br />

With M<strong>or</strong>pho biometric readers holding two-thirds<br />

<strong>or</strong> m<strong>or</strong>e of the South African market, the French<br />

<strong>co</strong>mpany decided earlier this year to expand its<br />

distribution base from one primary distribut<strong>or</strong> to<br />

four. M<strong>or</strong>pho hardware is now available from Ide<strong>co</strong><br />

Biometric Security Solutions, Powell Tronics, Impro<br />

and EOH (f<strong>or</strong>merly Stanley).<br />

Mike Austen, the M<strong>or</strong>pho product manager<br />

<strong>at</strong> Powell Tronics says the <strong>co</strong>mpany was excited to<br />

obtain its st<strong>at</strong>us as an offi cial M<strong>or</strong>pho distribut<strong>or</strong> in<br />

May this year. “We have a long hist<strong>or</strong>y of distributing<br />

high-end security products, including Impro<br />

access <strong>co</strong>ntrol solutions and Golmar IP and analogue<br />

inter<strong>co</strong>ms. The addition of M<strong>or</strong>pho to our product<br />

list reinf<strong>or</strong>ces our reput<strong>at</strong>ion f<strong>or</strong> supplying quality<br />

products.”<br />

Austen notes th<strong>at</strong> it’s not simply about shipping<br />

the product, but about the service and added value<br />

Powell Tronics delivers. “Some people thought we<br />

would end up in a price war as soon as the new<br />

distribut<strong>or</strong>s were announced, but we understand th<strong>at</strong><br />

successful distribution depends as much on the value<br />

you provide to your channel as on the quality of your<br />

products.<br />

He adds th<strong>at</strong> m<strong>or</strong>e resellers, installers and integr<strong>at</strong><strong>or</strong>s<br />

will now have access to the M<strong>or</strong>pho range,<br />

expanding its reach further into the South African<br />

and African market. Austen sees potential in Africa,<br />

with Powell Tronics already seeing between10% and<br />

15% of its sales <strong>co</strong>ming from n<strong>or</strong>th of the b<strong>or</strong>der.<br />

In gearing up to off er the full M<strong>or</strong>pho range<br />

to its customers, Powell Tronics has expanded its<br />

Johannesburg offi ce to c<strong>at</strong>er f<strong>or</strong> a new w<strong>or</strong>kshop<br />

and new technical resources. All M<strong>or</strong>pho kit sold will<br />

be put through a pre-delivery check to ensure clients<br />

receive a product th<strong>at</strong> perf<strong>or</strong>ms to expect<strong>at</strong>ion. In<br />

addition, the w<strong>or</strong>kshop will also be used to examine<br />

any products sent in f<strong>or</strong> repair. F<strong>or</strong> products still under<br />

warranty, however, the <strong>co</strong>mpany’s agreement with<br />

M<strong>or</strong>pho will ensure th<strong>at</strong> products are swapped out,<br />

not repaired.<br />

The prepar<strong>at</strong>ions f<strong>or</strong> taking on the brand even<br />

went as far as changing the <strong>co</strong>mpany’s ac<strong>co</strong>unting<br />

package to enable it to track serial numbers n<strong>at</strong>ionally.<br />

Should a customer need to take a M<strong>or</strong>pho<br />

product in f<strong>or</strong> repairs, it can be taken to any branch<br />

and they will have a re<strong>co</strong>rd of it.<br />

In terms of integr<strong>at</strong>ion, the <strong>co</strong>mpany’s software<br />

development team in Cape Town has designed a<br />

solution th<strong>at</strong> will integr<strong>at</strong>e M<strong>or</strong>pho readers via their<br />

interface directly into Microsoft’s Active Direct<strong>or</strong>y<br />

(MAD). This project is an extension to its existing<br />

integr<strong>at</strong>ion exercise in which it has integr<strong>at</strong>ed Impro’s<br />

Impronet access <strong>co</strong>ntrol system with MAD, and it will<br />

also be linking Golmar’s IP inter<strong>co</strong>m. This integr<strong>at</strong>ion<br />

allows customers to maintain only one master<br />

d<strong>at</strong>abase of user inf<strong>or</strong>m<strong>at</strong>ion f<strong>or</strong> their entire <strong>or</strong>ganis<strong>at</strong>ion.<br />

This will ensure th<strong>at</strong> as soon as a new employee<br />

is captured, he will autom<strong>at</strong>ically be assigned logical<br />

and physical access permissions. When the employee<br />

leaves, his details will be upd<strong>at</strong>ed in one loc<strong>at</strong>ion and<br />

all his access privileges will be termin<strong>at</strong>ed, over<strong>co</strong>ming<br />

the age-old problem of allowing people who<br />

have left the <strong>co</strong>mpany to retain their access long after<br />

it should have been revoked.<br />

Adds Austen, “We understand th<strong>at</strong> our customers<br />

are interested in solutions, not simply buying boxes of<br />

equipment and we have set ourselves up to c<strong>at</strong>er f<strong>or</strong><br />

this market. At the end of the day it’s all about quality<br />

products backed by service th<strong>at</strong> adds real value.”<br />

Zulmira Ferraz (P-Tron), Mike Austen (P-Tron), Paul Jeremias (M<strong>or</strong>pho), John Powell (P-Tron),<br />

Ni<strong>co</strong>las Garcia (M<strong>or</strong>pho), Jean-Paul Deguines (M<strong>or</strong>pho)<br />

www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 37


TRENDS<br />

Balancing security and<br />

<strong>co</strong>nvenience to be<strong>at</strong> fraud<br />

By Ugan Naidoo.<br />

Web-based fraud detection and risk-based authentic<strong>at</strong>ion solutions stop real-time<br />

fraud in its tracks.<br />

How can fi nancial services <strong>or</strong>ganis<strong>at</strong>ions enable valid users to <strong>co</strong>mplete<br />

transactions easily, and still stop fraudsters from criminal activity? Th<strong>at</strong><br />

question has been taxing the minds of the brightest security specialists<br />

f<strong>or</strong> the last 30 years, and with identity theft, d<strong>at</strong>a breaches and fraud <strong>at</strong><br />

an all-time high, the question has never been m<strong>or</strong>e relevant to fi nancial<br />

institutions.<br />

It’s never been m<strong>or</strong>e diffi cult to answer either. Consumers interact<br />

with their banks anywhere in the w<strong>or</strong>ld through many diff erent and<br />

fragmented channels, ranging from the bank website, an ATM machine,<br />

and an in-st<strong>or</strong>e chip and PIN transaction, to online shopping, the<br />

phone, <strong>or</strong> – just occasionally – <strong>at</strong> a bank branch. Fraudsters are waiting<br />

to strike <strong>at</strong> any opp<strong>or</strong>tunity to misuse user credentials <strong>at</strong> any of these<br />

touch points, whether it’s through malware, phishing, card skimming,<br />

<strong>or</strong> other evolving thre<strong>at</strong>s.<br />

Financial institutions typically struggle to <strong>co</strong>ll<strong>at</strong>e the risk across<br />

the various customer touchpoints. F<strong>or</strong> example,<br />

if a fraudulent individual steals a credit card and<br />

<strong>at</strong>tempts to take money out of an ATM machine,<br />

afterwards tries to buy a television using a st<strong>or</strong>e’s<br />

POS system, and then follows th<strong>at</strong> up with an<br />

<strong>at</strong>tempted online money transfer, many banks<br />

would tre<strong>at</strong> each of these breaches as separ<strong>at</strong>e<br />

events because of the diff erent systems and<br />

personnel th<strong>at</strong> service each channel. This severely<br />

undermines their ability to detect misuse.<br />

Convenience trumps security<br />

The fact is th<strong>at</strong> today’s <strong>co</strong>nsumers want the least<br />

possible degree of friction when it <strong>co</strong>mes to online<br />

transactions. Time is of the essence and only a<br />

certain degree of in<strong>co</strong>nvenience will be accepted<br />

– especially f<strong>or</strong> lower risk activities. People understand<br />

and toler<strong>at</strong>e prop<strong>or</strong>tion<strong>at</strong>e responses<br />

r<strong>at</strong>her than a fi xed amount of security under all<br />

Ugan Naidoo.<br />

circumstances.<br />

F<strong>or</strong> example, when banking online, customers will toler<strong>at</strong>e the<br />

process of using their hardware/software PKI token to make a payment<br />

to a new payee but will be less tolerant when making a repe<strong>at</strong> payment<br />

to the same payee <strong>or</strong> simply checking their bank balance.<br />

Similarly, isn’t it m<strong>or</strong>e reasonable to be asked to verify your identity<br />

when buying an expensive piece of jewelry than it would be if simply<br />

buying groceries <strong>at</strong> the supermarket? Ideally, the process f<strong>or</strong> low-risk<br />

transactions should be as instant and painless as paying in cash. And f<strong>or</strong><br />

the higher risk transactions, the bank should use prop<strong>or</strong>tion<strong>at</strong>e security<br />

th<strong>at</strong> is rel<strong>at</strong>ed to the risk. Customers understand this and actually enjoy<br />

the benefi ts of the protection.<br />

To keep the valid users in and the fraudsters locked out, fi nancial<br />

institutions need to strike a balance between <strong>co</strong>nvenience, <strong>co</strong>st, and<br />

security – simultaneously keeping customers s<strong>at</strong>isfi ed and their money<br />

38 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

safe. Th<strong>at</strong> puts them in a dilemma: on the one hand they need to enable<br />

fi nancial transaction services with the least degree of friction; on the<br />

other hand they must verify th<strong>at</strong> it is the right person bef<strong>or</strong>e allowing<br />

any access – typically authentic<strong>at</strong>ing the user via a passw<strong>or</strong>d and<br />

another credential.<br />

Layered fraud detection and risk-based authentic<strong>at</strong>ion<br />

To eff ectively separ<strong>at</strong>e the ‘goodies’ from the ‘baddies’, fi nancial institutions<br />

need a layered fraud detection str<strong>at</strong>egy th<strong>at</strong> <strong>co</strong>mbines risk-based<br />

authentic<strong>at</strong>ion with a number of diff erent methods of authentic<strong>at</strong>ion<br />

to ensure th<strong>at</strong> the security is prop<strong>or</strong>tion<strong>at</strong>e to the risk of wh<strong>at</strong> the user<br />

is doing. This sophistic<strong>at</strong>ed risk analysis can include many items such<br />

as the user loc<strong>at</strong>ion, the device they are using online, the value of the<br />

transaction, <strong>or</strong> the type of goods they are purchasing. Typically, only a<br />

small number of transactions are <strong>co</strong>nsidered risky and the ideal solution<br />

would identify these activities and then increase<br />

the security level required, in the most <strong>co</strong>nvenient<br />

manner possible. Such a solution would<br />

help prevent fraud in real-time on <strong>co</strong>nsumer<br />

online services without in<strong>co</strong>nveniencing legitim<strong>at</strong>e<br />

users in the vast maj<strong>or</strong>ity of their activities.<br />

An advanced authentic<strong>at</strong>ion solution cre<strong>at</strong>es<br />

an adaptive risk analysis process to assess<br />

the fraud potential of every online login and<br />

transaction. The technology provides a variety<br />

of two-fact<strong>or</strong> and risk-based authentic<strong>at</strong>ion<br />

methods – all geared to frictionless, multichannel<br />

authentic<strong>at</strong>ion. F<strong>or</strong> example, fi nancial institutions<br />

can examine a wide range of d<strong>at</strong>a <strong>co</strong>llected<br />

autom<strong>at</strong>ically about each login <strong>or</strong> transaction.<br />

A risk s<strong>co</strong>re can be calcul<strong>at</strong>ed to help determine<br />

wh<strong>at</strong> action to take on a given transaction.<br />

Tolerance thresholds can be set to adjust the<br />

impact on legitim<strong>at</strong>e users. And there’s the<br />

fl exibility to determine the response to th<strong>at</strong><br />

s<strong>co</strong>re based on policies and risk tolerance. This approach transf<strong>or</strong>ms<br />

authentic<strong>at</strong>ion and fraud prevention – while optimising <strong>co</strong>nvenience.<br />

Imagine, f<strong>or</strong> example, a customer is visiting London f<strong>or</strong> the Olympics. At<br />

the hotel, they use their credit card with a chip and pin machine so th<strong>at</strong><br />

their card is auth<strong>or</strong>ised f<strong>or</strong> purchases during their stay. In their hotel<br />

room, they make an online banking payment using their laptop. During<br />

the evening, another purchase is made via an iPad. Using multichannel<br />

advanced authentic<strong>at</strong>ion, the customer’s bank has verifi ed the chipand-pin<br />

card transaction, acknowledged th<strong>at</strong> the customer is in the UK,<br />

and monit<strong>or</strong>s subsequent transactions through other channels, whilst<br />

<strong>co</strong>nsidering this fi rst auth<strong>or</strong>ised transaction <strong>at</strong> the hotel.<br />

F<strong>or</strong> m<strong>or</strong>e inf<strong>or</strong>m<strong>at</strong>ion <strong>co</strong>ntact CA Southern Africa,<br />

+27 (0)11 417 8645, joanne.cawrse@caafrica.<strong>co</strong>.<strong>za</strong>, www.caafrica.<strong>co</strong>.<strong>za</strong>


www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 39


OPINION<br />

Foolproof fi ngerprint detection<br />

Virdi’s Jon<strong>at</strong>han Kahn talks about accur<strong>at</strong>e biometric detection.<br />

There are two measurable aspects with regard to the success of a biometric<br />

solution. Firstly, there is the security aspect in terms of enhancing<br />

the system and making it harder to circumvent than other systems such<br />

as card readers <strong>or</strong> PIN-based readers. In addition, it is easier to use and<br />

requires less mot<strong>or</strong> oper<strong>at</strong>ion than other systems – where the card <strong>co</strong>uld<br />

be easily left <strong>at</strong> home.<br />

“The reality is th<strong>at</strong> any access <strong>or</strong> security system is there to buy time<br />

f<strong>or</strong> the <strong>co</strong>ntrol room <strong>or</strong> security manager to send a reaction team to<br />

divert a possible criminal act. A biometric system takes longer and is<br />

harder to circumvent and aff <strong>or</strong>ds the security team m<strong>or</strong>e time to establish<br />

wh<strong>at</strong> thre<strong>at</strong> is present and wh<strong>at</strong> action to take,” said Jon<strong>at</strong>han Kahn,<br />

MD of Virdi Distribution.<br />

He cites an example. “Safes are r<strong>at</strong>ed based on how many hours are<br />

required to crack them. Obviously the higher the r<strong>at</strong>ing, the longer it will<br />

take even an experienced safebreaker<br />

to open. Criminals would then be<br />

f<strong>or</strong>ced to plan their event around the<br />

expected numbers of hours as per the<br />

safe’s r<strong>at</strong>ing.<br />

“Another example is th<strong>at</strong> many<br />

people believe th<strong>at</strong> their homes are<br />

burglar proof due to the large number<br />

of security measures they have in<br />

place. However, given the <strong>co</strong>rrect tools<br />

and skills, most security systems can<br />

be circumvented, provided th<strong>at</strong> there<br />

is suffi cient time to do so.”<br />

Similarly, the maj<strong>or</strong>ity of <strong>co</strong>mmercially<br />

available biometric technology<br />

readers can also be circumvented.<br />

“This is exacerb<strong>at</strong>ed by the prolifer<strong>at</strong>ion<br />

of inf<strong>or</strong>m<strong>at</strong>ion provided in the<br />

public domain on how to outwit<br />

security systems, as evidenced on a<br />

number of popular TV programmes<br />

and by using Google.”<br />

“Programmes like Myth Busters,<br />

Nikita and CSI screen inf<strong>or</strong>m<strong>at</strong>ion on<br />

how to produce and use a fake fi ngerprint.<br />

St<strong>or</strong>ies of students with time<br />

on their hands using these methodologies to access supposedly secure<br />

loc<strong>at</strong>ions abound and media noise surrounding bypassing of e-g<strong>at</strong>es <strong>at</strong><br />

passp<strong>or</strong>t <strong>co</strong>ntrol facilities is increasing,” Kahn added.<br />

Choosing the right system<br />

Kahn pointed out th<strong>at</strong> because of the inherent similarity in technology<br />

within biometric solutions, there are certain diff erenti<strong>at</strong>ing fact<strong>or</strong>s th<strong>at</strong><br />

should be <strong>co</strong>nsidered when choosing a suitable biometric system.<br />

“Firstly, the size of the sens<strong>or</strong>s should not be a deciding fact<strong>or</strong>.<br />

Following th<strong>at</strong>, detection units should be able to identify both live and<br />

fake fi ngerprints. The maj<strong>or</strong>ity of readers classify fi ngerprints based on<br />

certain p<strong>at</strong>terns in the loops, wh<strong>or</strong>ls and arches apparent in the actual<br />

fi ngerprint. Virdi has added a fourth c<strong>at</strong>eg<strong>or</strong>y – th<strong>at</strong> of ‘undetermined’. If<br />

you know where the minutia points are and you know you are dealing<br />

with a wh<strong>or</strong>l, then you can build a replica of the fi ngerprint so a sens<strong>or</strong><br />

can detect it.<br />

40 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

The ability to enrol the largest humanly possible number of users<br />

means th<strong>at</strong> your system provides you with increased <strong>co</strong>nvenience. “It’s a<br />

<strong>co</strong>mmonly known fact th<strong>at</strong> not all readers can enrol all users. F<strong>or</strong> example,<br />

an injury to a digit <strong>co</strong>uld exclude a user from the system because of<br />

predetermined specifi c<strong>at</strong>ions. Another example is those people with dry<br />

fi ngers, which means an absence of detail available. On the other hand,<br />

a fi nger th<strong>at</strong> is too wet will mean th<strong>at</strong> the captured image is too dark f<strong>or</strong><br />

<strong>co</strong>rrect determin<strong>at</strong>ion.”<br />

Intelligent image capture from Virdi measures the degree of dryness<br />

on a fi nger and auto-calibr<strong>at</strong>es the scan. In addition, the alg<strong>or</strong>ithm<br />

measures and identifi es other characteristics of the fi ngerprint which are<br />

unique, in addition to measuring the minutia points to identify the user.<br />

The traditional method is th<strong>at</strong> where lines start, end and intersect,<br />

the alg<strong>or</strong>ithm should plot these points and measure the rel<strong>at</strong>ionship<br />

between them to build a templ<strong>at</strong>e.<br />

The issue here is th<strong>at</strong> if there are not<br />

suffi cient points the print will fail<br />

to register. However, if you have a<br />

p<strong>at</strong>tern-based system, the alg<strong>or</strong>ithm<br />

is irrelevant. Minutia are not 100%<br />

unique. Virdi uses calibr<strong>at</strong>ion of<br />

minutia points and others to enrol<br />

the fi ngerprint.<br />

Dual technology foils<br />

criminals<br />

Unlike traditional biometric systems<br />

which have fake fi ngerprint <strong>or</strong> live<br />

fi ngerprint detection capabilities,<br />

Virdi biometric readers <strong>co</strong>me standard<br />

with both fe<strong>at</strong>ures. By having<br />

both technologies in one reader,<br />

criminals will be unable to use false<br />

fi ngerprints to access properties.<br />

Kahn explained th<strong>at</strong> live fi ngerprints<br />

rely on temper<strong>at</strong>ure, electrical<br />

capacitance and pulse to provide<br />

proof of authenticity th<strong>at</strong> the owner<br />

of the fi ngerprint is alive. “However,<br />

these can be defe<strong>at</strong>ed by holding the<br />

false fi ngerprint until a certain temper<strong>at</strong>ure is achieved; by transferring<br />

capacitance with a saline solution; and mimicking a pulse by transferring<br />

a fi ngerprint to a transparency and placing another live fi ngerprint<br />

behind this transparency.”<br />

With fake fi ngerprints there are a number of methods used f<strong>or</strong> identifi<br />

c<strong>at</strong>ion. One example of circumvention <strong>co</strong>uld include blocking off the<br />

capacitance. Virdi has a four-tiered approach used to undermine these<br />

avoidance techniques. This in<strong>co</strong>rp<strong>or</strong><strong>at</strong>es IR scanning technology with<br />

the ability to identify the m<strong>at</strong>erial the fi ngerprint is made of (chemical<br />

<strong>co</strong>mposition) such as sili<strong>co</strong>n, rubber, paper, plastic, gel, etc.; a capacitive<br />

sens<strong>or</strong> built into the optical scanner to measure electrical discharge;<br />

intelligent alg<strong>or</strong>ithm to measure and <strong>co</strong>mpare image dist<strong>or</strong>tion; and<br />

multi-spectral sens<strong>or</strong> capabilities.<br />

F<strong>or</strong> m<strong>or</strong>e inf<strong>or</strong>m<strong>at</strong>ion <strong>co</strong>ntact Virdi Distribution, 086 118 4734,<br />

chris@virditech.<strong>co</strong>.<strong>za</strong>, www.virditech.<strong>co</strong>.<strong>za</strong>


www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 41


WHITE PAPER<br />

iCLASS SE implement<strong>at</strong>ion and<br />

migr<strong>at</strong>ion<br />

HID Global white paper.<br />

HID Global iCLASS Secure Identity Object (SIO)-enabled (iCLASS SE) pl<strong>at</strong>f<strong>or</strong>m<br />

delivers trust-based security, improved usability and enhanced perf<strong>or</strong>mance.<br />

HID Global’s iCLASS SE access <strong>co</strong>ntrol pl<strong>at</strong>f<strong>or</strong>m goes beyond the<br />

traditional smart card model to implement a p<strong>or</strong>table credential<br />

methodology based on the <strong>co</strong>mpany’s secure, standards-based,<br />

technology-independent and flexible SIO d<strong>at</strong>a structure. HID Global’s<br />

iCLASS SE reader and credential family is designed to raise the bar<br />

f<strong>or</strong> overall system security while supp<strong>or</strong>ting key emerging technologies<br />

and delivering superi<strong>or</strong> perf<strong>or</strong>mance, enhanced usability and<br />

increased environmental sustainability.<br />

iCLASS SE readers and credentials are the first access <strong>co</strong>ntrol<br />

products to oper<strong>at</strong>e under the <strong>co</strong>mpany’s Trusted Identity Pl<strong>at</strong>f<strong>or</strong>m<br />

(TIP) framew<strong>or</strong>k, which cre<strong>at</strong>es a<br />

secure and trusted boundary within<br />

which all cryptographic keys governing<br />

system security can be delivered<br />

with end-to-end privacy and integrity.<br />

Moving to p<strong>or</strong>table SIOs<br />

within a trusted boundary<br />

In 2010, HID Global took the first step<br />

toward a new gener<strong>at</strong>ion of <strong>co</strong>ntactless<br />

smart card and reader technology<br />

with the introduction of its TIP<br />

framew<strong>or</strong>k, which improves security<br />

while enabling the migr<strong>at</strong>ion of physical<br />

access <strong>co</strong>ntrol technology beyond<br />

traditional cards and readers into a<br />

new w<strong>or</strong>ld of mobile credentials and<br />

remote identity management. TIPenabled<br />

devices, otherwise referred to<br />

as TIP Nodes, provide interoperability<br />

and p<strong>or</strong>tability of secure identity<br />

within a trusted boundary.<br />

TIP provides the framew<strong>or</strong>k and<br />

delivery infrastructure to extend the<br />

traditional card and reader model with<br />

a new secure, open and independent SIO d<strong>at</strong>a-structure on the credential<br />

side, and <strong>co</strong>rresponding SIO interpreters on the reader side.<br />

SIOs and SIO interpreters perf<strong>or</strong>m similar functions to traditional<br />

cards and readers, only using a significantly m<strong>or</strong>e secure, flexible and<br />

extensible d<strong>at</strong>a structure.<br />

From cards to SIOs<br />

An SIO is a standards-based, device-independent d<strong>at</strong>a object th<strong>at</strong><br />

can exist on any number of identity devices, including HID’s iCLASS<br />

SE credentials. SIOs deliver three key benefits: p<strong>or</strong>tability, security<br />

and flexibility.<br />

Firstly, SIOs can reside within any TIP Node, <strong>or</strong> any loc<strong>at</strong>ion where<br />

the SIO will be gener<strong>at</strong>ed and interpreted by TIP Nodes. Thus, not<br />

42 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

only can SIOs reside on HID’s iCLASS SE credentials, they also are p<strong>or</strong>table<br />

and can reside on other mem<strong>or</strong>y cards <strong>co</strong>ntaining other card<br />

technology, microprocess<strong>or</strong>-based cards like SmartMX, smartphones<br />

with NFC capabilities, <strong>co</strong>mputer disk drives, and many other f<strong>or</strong>m<strong>at</strong>s.<br />

This means th<strong>at</strong> solutions can be developed th<strong>at</strong> oper<strong>at</strong>e on multiple<br />

device types with varying security capabilities. The same object<br />

st<strong>or</strong>ed on one device can l<strong>at</strong>er be p<strong>or</strong>ted to another device with ease,<br />

and without strict <strong>co</strong>nstraints.<br />

Se<strong>co</strong>ndly, device-independent SIOs deliver trust-based security.<br />

This security protects objects cre<strong>at</strong>ed and bound to one device from<br />

being <strong>co</strong>pied to another device, thus<br />

protecting sites against cloned card<br />

<strong>at</strong>tacks.<br />

Thirdly, SIOs deliver extensibility<br />

because they are defined using open<br />

standards including Abstract Syntax<br />

Notific<strong>at</strong>ion One (ASN.1, a joint ISO/IEC<br />

and ITU-T standard). This d<strong>at</strong>a definition<br />

allows f<strong>or</strong> an infinitely extensible<br />

object definition. The definition can<br />

supp<strong>or</strong>t any piece of d<strong>at</strong>a, including<br />

d<strong>at</strong>a f<strong>or</strong> access <strong>co</strong>ntrol, biometrics,<br />

vending, time-and-<strong>at</strong>tendance, and<br />

many other applic<strong>at</strong>ions. Unlike many<br />

other fixed-field structures used in<br />

today’s access <strong>co</strong>ntrol card and reader<br />

systems, SIO and associ<strong>at</strong>ed interpreters<br />

<strong>co</strong>ntinue to grow in security capabilities<br />

while traditional architectures<br />

remain stagnant, stuck in a fixed definition.<br />

Extensibility brings significant<br />

value to the developer <strong>co</strong>mmunity<br />

th<strong>at</strong> utilises the technology. Since the<br />

interpreter takes care of mapping d<strong>at</strong>a<br />

to supp<strong>or</strong>ted devices, all the developer<br />

has to focus on is gener<strong>at</strong>ing and transacting (reading/writing)<br />

secure objects. The days of the vending machine developer having to<br />

learn about intric<strong>at</strong>e credential-technology sect<strong>or</strong> terminology and<br />

key rules is over.<br />

iCLASS SE pl<strong>at</strong>f<strong>or</strong>m overview<br />

The first endpoints to be based on the Secure Identity Object pl<strong>at</strong>f<strong>or</strong>m<br />

are HID Global’s iCLASS SE family of readers and credentials. The<br />

family includes:<br />

• iCLASS SE credentials.<br />

• iCLASS SE and multiCLASS SE readers.<br />

• iCLASS SE Reader Programming Cards (f<strong>or</strong> field <strong>co</strong>nfigur<strong>at</strong>ion and<br />

upgrade options).


iCLASS SE implement<strong>at</strong>ion overview<br />

Implementing next-gener<strong>at</strong>ion access <strong>co</strong>ntrol capabilities is a very straightf<strong>or</strong>ward<br />

process with the iCLASS SE pl<strong>at</strong>f<strong>or</strong>m:<br />

• Readers are technology-agnostic and designed to simplify migr<strong>at</strong>ion to the<br />

next-gener<strong>at</strong>ion iCLASS SE pl<strong>at</strong>f<strong>or</strong>m based on SIO technology.<br />

• Customers now can <strong>or</strong>der a single reader th<strong>at</strong> will ac<strong>co</strong>mmod<strong>at</strong>e technology<br />

needs both today and tom<strong>or</strong>row.<br />

• Users can optionally follow a migr<strong>at</strong>ion str<strong>at</strong>egy to SIO technology th<strong>at</strong><br />

simultaneously enables interoperability between both SIO- and non-SIObased<br />

credentials.<br />

• F<strong>or</strong> optimum security, users can <strong>co</strong>mpletely transition to the new SIO d<strong>at</strong>a<br />

structure.<br />

• Cards are delivered with pre-provisioned SIOs.<br />

• Simplifi es deployment.<br />

• Users have multiple reader-to-panel <strong>co</strong>mmunic<strong>at</strong>ion options.<br />

• RS-485 OSDP, CANBUS Hi-O, and Wiegand f<strong>or</strong> legacy <strong>co</strong>ntrol panel<br />

<strong>co</strong>mp<strong>at</strong>ibility.<br />

• Reader and credential upgrade options don’t require a physical change to<br />

the device.<br />

• Interpreter packages th<strong>at</strong> supp<strong>or</strong>t specifi c card technologies can be applied<br />

in the fi eld and after the initial install<strong>at</strong>ion.<br />

• Cryptographic oper<strong>at</strong>ion changes <strong>or</strong> upgrades can be applied to both readers<br />

and credentials after the initial install<strong>at</strong>ion and card deployment.<br />

• Customers optionally can manage their own cards and credential keys.<br />

iCLASS SE fe<strong>at</strong>ures and benefi ts<br />

Based on HID Global’s fl agship smart card and reader technology, HID Global’s<br />

iCLASS SE pl<strong>at</strong>f<strong>or</strong>m fe<strong>at</strong>ures deliver trusted security, sustainability, improved<br />

perf<strong>or</strong>mance and usability, and an open system environment th<strong>at</strong> simplifi es<br />

the development of both traditional and mobile access <strong>co</strong>ntrol solutions.<br />

Trusted and secure<br />

• Multi-layered security. Ensures d<strong>at</strong>a authenticity and privacy through the<br />

multi-layered security of HID’s SIO.<br />

• Out-of-box SIO <strong>co</strong>mp<strong>at</strong>ibility. Ensures highest level of protection.<br />

• Trusted Identity Pl<strong>at</strong>f<strong>or</strong>m (TIP) node. Provides trusted identity within a<br />

secure e<strong>co</strong>system of interoperable products.<br />

• EAL5+ certifi ed secure element hardware. Provides tamper-proof protection<br />

of keys and cryptographic oper<strong>at</strong>ions.<br />

• SIO d<strong>at</strong>a binding. Inhibits d<strong>at</strong>a cloning by binding an object to a specifi c<br />

credential.<br />

• Expanded iCLASS Elite Programme. Extends priv<strong>at</strong>e security by protecting<br />

uniquely keyed credentials, SIOs and programming upd<strong>at</strong>e keys.<br />

• Velocity checking. Provides breach resistance against electronic <strong>at</strong>tacks.<br />

• Active tamper. Protects against physical tampering of the reader.<br />

Sustainable<br />

• Software defi ned radio (SDR) technology. Enables reading multiple types<br />

of Prox (125 kHz), including HID and Indala simultaneously enabling SKU<br />

reduction.<br />

• Intelligent power management (IPM). Reduces reader power <strong>co</strong>nsumption<br />

by as much as 75% <strong>co</strong>mpared to standard oper<strong>at</strong>ing mode.<br />

• Recycled <strong>co</strong>ntent. Contributes toward building LEED credits.<br />

• Wiegand-<strong>co</strong>mp<strong>at</strong>ible interface. Provides <strong>co</strong>nnection to existing panels<br />

without the need to swap out back-end systems.<br />

Improved usability / perf<strong>or</strong>mance<br />

• SIO media mapping. Simplifi es deployment of third-part objects to multiple<br />

types of credentials.<br />

• Multi-mode frequency pri<strong>or</strong>itis<strong>at</strong>ion. Increases transaction perf<strong>or</strong>mance and<br />

improves card management.<br />

• Combined bi-directional host <strong>co</strong>mmunic<strong>at</strong>ion and 125 kHz supp<strong>or</strong>t.<br />

Simplifi es the reader p<strong>or</strong>tfolio off ering and expands the use of Prox and<br />

higher security <strong>co</strong>nnections.<br />

• New models. RP10 and RP30 provide multiCLASS functionality in new f<strong>or</strong>m<br />

fact<strong>or</strong>s, cre<strong>at</strong>ing m<strong>or</strong>e fl exible install<strong>at</strong>ion options.<br />

• Flexible hardware <strong>co</strong>nnection. Pigtail <strong>or</strong> terminal strip <strong>co</strong>nnections are<br />

included on all reader models.<br />

• Field programmable readers. Provide secure upgrades f<strong>or</strong> migr<strong>at</strong>ion and<br />

extended lifecycle.<br />

• RGB LEDs. Delivers increasing capability to notify users and trouble-shooters<br />

regarding system st<strong>at</strong>e.<br />

• Reader/card anti-passback user notifi c<strong>at</strong>ion. Provides clear feedback to the<br />

user while assisting trouble-shooters.<br />

• Read progress notifi c<strong>at</strong>ion using LEDs. Provides clear feedback to the user<br />

about new credentials entering the market th<strong>at</strong> require m<strong>or</strong>e lead time (e.g.<br />

FIPS 201-<strong>co</strong>mp<strong>at</strong>ible credentials).<br />

Open System Environment<br />

• Near Field Communic<strong>at</strong>ion (NFC) card emul<strong>at</strong>ion. Enables migr<strong>at</strong>ion to HID<br />

access <strong>co</strong>ntrol on mobile devices.<br />

• SIO p<strong>or</strong>tability. Provides technology independence and p<strong>or</strong>tability to other<br />

smart card technologies.<br />

• Licensable SIO gener<strong>at</strong><strong>or</strong>s and interpreters. Provide an expansive e<strong>co</strong>system<br />

through SDKs and embedded products.<br />

• Upgradeable hardware <strong>co</strong>nnection. Allows all Wiegand-based <strong>co</strong>mmunic<strong>at</strong>ion<br />

readers to l<strong>at</strong>er expand <strong>co</strong>mmunic<strong>at</strong>ion capabilities to OSDP, Hi-O and<br />

other bi-directional <strong>co</strong>mmunic<strong>at</strong>ion proto<strong>co</strong>ls.<br />

Conclusion<br />

HID Global’s next-gener<strong>at</strong>ion access <strong>co</strong>ntrol card and reader pl<strong>at</strong>f<strong>or</strong>m<br />

provides a gener<strong>at</strong>ional step function in security, usability and perf<strong>or</strong>mance,<br />

and environmental sustainability. The pl<strong>at</strong>f<strong>or</strong>m introduces a new p<strong>or</strong>table credential<br />

methodology based on a standards-based, technology independent<br />

and highly fl exible SIO identity d<strong>at</strong>a structure. HID Global’s iCLASS SE reader<br />

family uses this identity d<strong>at</strong>a structure to signifi cantly improve overall system<br />

security while cre<strong>at</strong>ing a m<strong>or</strong>e easily extensible access <strong>co</strong>ntrol system infrastructure<br />

th<strong>at</strong> can also supp<strong>or</strong>t a new era of m<strong>or</strong>e <strong>co</strong>nvenient mobile keys and<br />

credentials th<strong>at</strong> can be embedded into phones and other p<strong>or</strong>table devices.<br />

F<strong>or</strong> m<strong>or</strong>e inf<strong>or</strong>m<strong>at</strong>ion <strong>co</strong>ntact HID Global, +27 (0)82 449 9398,<br />

rtruter@hidglobal.<strong>co</strong>m, www.hidglobal.<strong>co</strong>m<br />

www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 43


BIOMETRICS SELECTION GUIDE<br />

44 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

Buyers’ Guide<br />

2013<br />

Regular readers will have seen the Hi-Tech Security<br />

Solutions Biometric Buyers’ Guide in various issues<br />

over the past few years. This year, we decided to<br />

include it in the Access and Identity Management<br />

Handbook, where it actually belongs. And as you will<br />

see, it proved the right decision as the following pages<br />

<strong>co</strong>ntain the largest buyers’ guide we’ve ever run.<br />

While biometric technology gets most of the<br />

<strong>at</strong>tention these days, there are still millions of people<br />

using cards, PINs, tokens and so f<strong>or</strong>th. We have<br />

theref<strong>or</strong>e supplemented the Biometric Buyers’ Guide<br />

with wh<strong>at</strong> we’ve called the Access Buyers’ Guide to<br />

highlight the <strong>co</strong>ntinued advances in non-biometric<br />

technology.<br />

The buyers’ guides th<strong>at</strong> follow <strong>co</strong>ntain a range of<br />

devices and solutions, primarily fi ngerprint based, but<br />

also including facial and hand biometrics, as well as<br />

non-biometric solutions. The idea behind the guides<br />

is to give potential customers an overview of wh<strong>at</strong> is<br />

available and most suitable to their needs.<br />

N<strong>at</strong>urally, in the space available we can’t go into<br />

intric<strong>at</strong>e details on each product, but we have given<br />

the vend<strong>or</strong>s the opp<strong>or</strong>tunity to display m<strong>or</strong>e than the<br />

basics. Specifi cally, we included two new c<strong>at</strong>eg<strong>or</strong>ies of<br />

Applic<strong>at</strong>ions and Integr<strong>at</strong>ion to give readers an idea<br />

where the devices mentioned are most often used, as<br />

well as wh<strong>at</strong> integr<strong>at</strong>ion opp<strong>or</strong>tunities and services<br />

are available.<br />

Once again, space is limited so the suppliers can’t<br />

go into detail, but readers will see wh<strong>at</strong> potential<br />

these devices have to be integr<strong>at</strong>ed into existing<br />

infrastructures as well as the integr<strong>at</strong>ion services<br />

the suppliers and vend<strong>or</strong>s off er. In some instances,<br />

suppliers w<strong>or</strong>k with their integr<strong>at</strong><strong>or</strong>s and installers to<br />

design and plan solutions. Others have separ<strong>at</strong>e divisions<br />

focused on software development to provide<br />

enhanced integr<strong>at</strong>ion capabilities f<strong>or</strong> their systems,<br />

something proving not only vital, but also popular in<br />

the buying decisions of end users.<br />

The ability to integr<strong>at</strong>e security devices with each<br />

other and into your existing infrastructure is be<strong>co</strong>ming<br />

the n<strong>or</strong>m as businesses look f<strong>or</strong> ways to streamline<br />

their security and IT infrastructure, lower <strong>co</strong>sts and<br />

reduce the diff erent skills they need to keep everything<br />

up and running.<br />

While we have changed the buyers’ guide to better<br />

c<strong>at</strong>er to the needs of the market, we are always on<br />

the lookout f<strong>or</strong> insight into how we can improve the<br />

next guide. So please let us have your <strong>co</strong>mments on<br />

andrew@<strong>technews</strong>.<strong>co</strong>.<strong>za</strong>


www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 45


BIOMETRICS SELECTION GUIDE<br />

Brand New Technologies Brand New Technologies<br />

Device/Solution: ICT G<strong>at</strong>e<br />

Manufacturer/ brand name:<br />

Identytech Solutions<br />

Distribut<strong>or</strong>/Supplier:<br />

Brand New Technologies<br />

Biometric<br />

technology:<br />

Fingerprint, card<br />

Hardware<br />

description: An<br />

advanced fi ngerprint<br />

re<strong>co</strong>gnition terminal<br />

using best-ofclass<br />

fi ngerprint<br />

re<strong>co</strong>gnition readers.<br />

The IDT G<strong>at</strong>e is<br />

available with<br />

integr<strong>at</strong>ed Lumidigm<br />

and Futronic sens<strong>or</strong>s and off ers full entry/exit two sens<strong>or</strong> <strong>co</strong>ntrol off<br />

one board. The solutions guarantees identifi c<strong>at</strong>ion in the harshest<br />

environment and successful integr<strong>at</strong>ion into most access and identity<br />

management solutions on the market.<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol • Identity management<br />

<strong>Contact</strong> details:<br />

Brand New Technologies, +27 (0)11 450 3092,<br />

dave@bntech.<strong>co</strong>.<strong>za</strong>, www.bntech.<strong>co</strong>.<strong>za</strong><br />

Brand New Technologies CEM Systems<br />

Device/Solution: IDT<br />

Wallmount<br />

Manufacturer/ brand<br />

name: Identytech Solutions<br />

Distribut<strong>or</strong>/Supplier:<br />

Brand New Technologies<br />

Biometric technology:<br />

Fingerprint, facial, card<br />

Hardware description:<br />

Introducing the next<br />

gener<strong>at</strong>ion physical<br />

access <strong>co</strong>ntrol terminal,<br />

the IDT Wallmount off ers<br />

a total solution f<strong>or</strong> those<br />

looking f<strong>or</strong> an indo<strong>or</strong>/<br />

outdo<strong>or</strong> terminal manufactured to meet the most rugged standard<br />

in the market (IP65) and with a full anti-vandal casing. IDT Wallmount<br />

series in<strong>co</strong>rp<strong>or</strong><strong>at</strong>es precision fi ngerprint technologies into ergonomic<br />

<strong>co</strong>mputer peripherals th<strong>at</strong> deliver unparalleled perf<strong>or</strong>mance, reliability<br />

and <strong>co</strong>nvenience f<strong>or</strong> both the logical and physical access w<strong>or</strong>ld.<br />

Applic<strong>at</strong>ion:<br />

• Multi modal biometrics<br />

• Identity management<br />

• Access <strong>co</strong>ntrol<br />

<strong>Contact</strong> details:<br />

Brand New Technologies, +27 (0)11 450 3092,<br />

dave@bntech.<strong>co</strong>.<strong>za</strong>, www.bntech.<strong>co</strong>.<strong>za</strong><br />

46 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

Device/Solution: IDT Access<br />

Manufacturer/ brand name:<br />

Identytech Solutions<br />

Distribut<strong>or</strong>/Supplier:<br />

Brand New Technologies<br />

Biometric technology:<br />

Fingerprint, card<br />

Hardware description: The<br />

physical access <strong>co</strong>ntrol terminal<br />

f<strong>or</strong> those who are looking f<strong>or</strong> a<br />

fast and accur<strong>at</strong>e identifi c<strong>at</strong>ion/<br />

verifi c<strong>at</strong>ion process. The IDT Access<br />

in<strong>co</strong>rp<strong>or</strong><strong>at</strong>es Multispectral imaging<br />

fi ngerprint technology into an<br />

ergonomic peripheral th<strong>at</strong> delivers unparalleled perf<strong>or</strong>mance,<br />

reliability and <strong>co</strong>nvenience. Available in a modular manner, the<br />

IDT Access provides a price-sensitive solution f<strong>or</strong> small to medium<br />

access <strong>co</strong>ntrol deployments. Whether looking f<strong>or</strong> a verifi c<strong>at</strong>ion <strong>or</strong><br />

identifi c<strong>at</strong>ion process, this PAC terminal and integr<strong>at</strong>ed smart card<br />

<strong>or</strong> proximity reader is the perfect solution.<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol • Identity management<br />

• Verifi c<strong>at</strong>ion • Identifi c<strong>at</strong>ion<br />

<strong>Contact</strong> details:<br />

Brand New Technologies, +27 (0)11 450 3092,<br />

dave@bntech.<strong>co</strong>.<strong>za</strong>,<br />

www.bntech.<strong>co</strong>.<strong>za</strong><br />

Device/Solution: S610f<br />

Fingerprint Reader<br />

Manufacturer/ brand<br />

name: CEM Systems<br />

Biometric technology:<br />

Fingerprint<br />

Hardware description:<br />

S610f Fingerprint Reader is a<br />

fully integr<strong>at</strong>ed biometric and<br />

access <strong>co</strong>ntrol reader th<strong>at</strong> is<br />

used as part of the AC2000<br />

system to <strong>co</strong>ntrol access to<br />

restricted areas where an<br />

additional biometric layer of<br />

security is required. Fe<strong>at</strong>uring<br />

a <strong>co</strong>ntroller, advanced IP card<br />

reader and single biometric solution all in one, the S610f fi ngerprint<br />

reader meets requirements f<strong>or</strong> three stage identity authentic<strong>at</strong>ion (card,<br />

PIN and biometric verifi c<strong>at</strong>ion) using one device.<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol<br />

• Fast verifi c<strong>at</strong>ion using a 1:1 fi ngerprint m<strong>at</strong>ch <strong>at</strong> the do<strong>or</strong><br />

• Integral reading technology f<strong>or</strong> Proximity, iClass and Mifare<br />

• Keypad f<strong>or</strong> <strong>co</strong>nfi gur<strong>at</strong>ion and optional personnel identifi c<strong>at</strong>ion<br />

number (PIN)<br />

<strong>Contact</strong> details:<br />

+44 2890 456767, cem.sales@ty<strong>co</strong>in.<strong>co</strong>m, www.cemsys.<strong>co</strong>m


EasyRoster Software Elvey Security Technologies<br />

Brand Name: EasyRoster Deployment Manager (ERDM)<br />

Distribut<strong>or</strong>/Supplier: EasyRoster Software<br />

Biometric technology: Various<br />

Hardware description: Biometric Readers from suppliers, integr<strong>at</strong>ed<br />

with EasyRoster Deployment Manager<br />

Applic<strong>at</strong>ion: Time and <strong>at</strong>tendance in EasyRoster<br />

Integr<strong>at</strong>ion: Integr<strong>at</strong>ion with EasyRoster, the leading w<strong>or</strong>kf<strong>or</strong>ce<br />

management system<br />

<strong>Contact</strong> details:<br />

EasyRoster Software, +27 (0)12 809 4270,<br />

info@easyroster.net, www.easyroster.net<br />

Elvey Security Technologies Elvey Security Technologies<br />

Manufacturer/ brand name:<br />

GSC 647-50<br />

Distribut<strong>or</strong>/Supplier:<br />

Elvey Security Technologies<br />

Biometric technology:<br />

Fingerprint, RFID<br />

Hardware description: The<br />

647-50 is a <strong>co</strong>mbined fi ngerprint<br />

and RFID reader with a durable,<br />

anti-st<strong>at</strong>ic optical sens<strong>or</strong>. The unit<br />

is easily integr<strong>at</strong>ed with both the<br />

ProxNet and ProxnetPro systems to<br />

enhance the security of an access<br />

<strong>co</strong>ntrol install<strong>at</strong>ion. The 647-50 can<br />

be used in two modes – RFID card<br />

plus fi ngerprint (1:1) – up to 5 000<br />

templ<strong>at</strong>es. fi ngerprint only (1:N) – up<br />

to 600 templ<strong>at</strong>es.<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t off ered by supplier:<br />

• Planning<br />

• Technical design<br />

• Repairs<br />

<strong>Contact</strong> details: Elvey Security Technologies,<br />

+27 (0)11 401 6700, Info@elvey.<strong>co</strong>.<strong>za</strong>,<br />

www.elvey.<strong>co</strong>.<strong>za</strong><br />

Manufacturer/ brand name:<br />

Sagem J Series MA J – DUAL<br />

Distribut<strong>or</strong>/Supplier:<br />

Elvey Security Technologies<br />

Biometric technology: Fingerprint<br />

Hardware description:<br />

Supp<strong>or</strong>ts 500 users, 2 templ<strong>at</strong>es each.<br />

Can be soft-unlocked to supp<strong>or</strong>t<br />

3 000 users. Connects to a<br />

TCP/IP netw<strong>or</strong>k. Supp<strong>or</strong>ts<br />

the optical sens<strong>or</strong><br />

14x22 mm,500 dpi, 256 grey<br />

levels. Includes a 13.56 MHz<br />

reader f<strong>or</strong> use with Mifare.<br />

Supp<strong>or</strong>ts templ<strong>at</strong>es st<strong>or</strong>ed<br />

on a proximity tag f<strong>or</strong><br />

unlimited users. Supp<strong>or</strong>ts<br />

Wiegand in f<strong>or</strong> use with<br />

a proximity reader. Supp<strong>or</strong>ts 26-bit Wiegand out f<strong>or</strong> use with<br />

third-party systems.<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t off ered by supplier:<br />

• Planning • Technical design<br />

• Repairs<br />

<strong>Contact</strong> details: Elvey Security Technologies, +27 (0)11 401 6700,<br />

Info@elvey.<strong>co</strong>.<strong>za</strong>, www.elvey.<strong>co</strong>.<strong>za</strong><br />

Manufacturer/ brand name:<br />

NIT920 – Nitgen Biometric Readers<br />

Distribut<strong>or</strong>/Supplier:<br />

Elvey Security Technologies<br />

Biometric technology: Fingerprint<br />

Hardware description: Up to<br />

2 500 users per terminal (1 fi nger<br />

per user). Live fi nger detection.<br />

Supp<strong>or</strong>ts on-board enrolment.<br />

Three choices of authentic<strong>at</strong>ion<br />

mechanisms Any two of the<br />

authentic<strong>at</strong>ion methods can be<br />

used <strong>co</strong>ncurrently: Fingerprint, card,<br />

individual PIN. 500dpi optical scanner<br />

and less than 1 se<strong>co</strong>nd identifi c<strong>at</strong>ion<br />

time f<strong>or</strong> up to 4 000 templ<strong>at</strong>es.<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol<br />

• Time and <strong>at</strong>tendance<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t off ered by<br />

supplier:<br />

• Planning<br />

• Technical design<br />

• Repairs<br />

<strong>Contact</strong> details: Elvey Security Technologies,<br />

+27 (0)11 401 6700, Info@elvey.<strong>co</strong>.<strong>za</strong>,<br />

www.elvey.<strong>co</strong>.<strong>za</strong><br />

www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 47


BIOMETRICS SELECTION GUIDE<br />

Elvey Security Technologies G2<br />

Manufacturer/ brand<br />

name: GSC 647-80<br />

Distribut<strong>or</strong>/Supplier:<br />

Elvey Security<br />

Technologies<br />

Biometric technology:<br />

Fingerprint, facial<br />

Hardware description:<br />

The 647-80 fi ngerprint<br />

and facial re<strong>co</strong>gnition<br />

system is ideal f<strong>or</strong><br />

access <strong>co</strong>ntrol and T&A<br />

applic<strong>at</strong>ions. The unit<br />

can identify the user by fi ngerprint, face <strong>or</strong> face + fi ngerprint. Multiple<br />

fi ngerprints per employee can be enrolled. Supp<strong>or</strong>ts 700 face templ<strong>at</strong>es<br />

<strong>or</strong> 3 000 with fi ngerprint + face <strong>or</strong> 3000 fi ngerprint templ<strong>at</strong>es. 100 000<br />

transaction capacity.<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol<br />

• Time and Attendance<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t off ered by supplier:<br />

• Planning<br />

• Technical design<br />

• Repairs<br />

<strong>Contact</strong> details:<br />

Elvey Security Technologies, +27 (0)11 401 6700,<br />

Info@elvey.<strong>co</strong>.<strong>za</strong>, www.elvey.<strong>co</strong>.<strong>za</strong><br />

Ide<strong>co</strong> Biometric Security Solutions Ide<strong>co</strong> Biometric Security Solutions<br />

Device/Solution: EVIM Psion<br />

Manufacturer/ brand name:<br />

EVIM Psion<br />

Distribut<strong>or</strong>/Supplier: Ide<strong>co</strong> Biometric<br />

Security Solutions<br />

Biometric technology: Fingerprint<br />

Hardware description: EVIM Psion is<br />

a mobile terminal f<strong>or</strong> identity <strong>co</strong>ntrol<br />

and transaction management. A<br />

person’s ID number and transactionrel<strong>at</strong>ed<br />

d<strong>at</strong>a can be captured and<br />

signed with their fi ngerprint. D<strong>at</strong>a is<br />

transmitted to the EVIM server f<strong>or</strong> ID<br />

number verifi c<strong>at</strong>ion. Identity-linked<br />

transaction d<strong>at</strong>a is processed and<br />

re<strong>co</strong>rded ac<strong>co</strong>rding to pre-specifi ed<br />

business rules.<br />

Applic<strong>at</strong>ion:<br />

• Mobile, time-based access <strong>co</strong>ntrol f<strong>or</strong><br />

people, vehicles and assets<br />

• Confi gurable to capture multiple d<strong>at</strong>a fi elds<br />

• Searchable re<strong>co</strong>rds using secure browser access<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• GPS link to EVIM server<br />

• ID number verifi c<strong>at</strong>ion in under 30 se<strong>co</strong>nds<br />

<strong>Contact</strong> details : Ide<strong>co</strong> Biometric Security Solutions,<br />

0861 0 43326, <strong>co</strong>ntact@ide<strong>co</strong>.<strong>co</strong>.<strong>za</strong>, www.ide<strong>co</strong>.<strong>co</strong>.<strong>za</strong><br />

48 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

Device/Solution: DIGIgarde PLUS<br />

Manufacturer/ brand name: TDSi<br />

Distribut<strong>or</strong>/Supplier: G2 Security<br />

Biometric technology: Fingerprint<br />

Hardware description: DIGIgarde PLUS<br />

<strong>co</strong>mbines all authentic<strong>at</strong>ion modes,<br />

something you know (PIN) something<br />

you have (MIFARE card) and something<br />

you are (fi nger) in one <strong>at</strong>tractive and <strong>co</strong>steff<br />

ective unit. Fe<strong>at</strong>uring a high-resolution<br />

optical sens<strong>or</strong> and an extremely quick<br />

m<strong>at</strong>ching alg<strong>or</strong>ithm, DIGIgarde PLUS gives<br />

maximum usability and is suitable f<strong>or</strong> <strong>co</strong>ntrol l<br />

of access points, particularly those requiring a<br />

large number of users and subject to a high<br />

throughput of traffi c. Ideal f<strong>or</strong> time and <strong>at</strong>tendance dance<br />

clocking st<strong>at</strong>ions. IP r<strong>at</strong>ed f<strong>or</strong> external mounting and<br />

PoE powered f<strong>or</strong> easy install<strong>at</strong>ion.<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol • Single do<strong>or</strong> standalone <strong>co</strong>ntrol<br />

• Time and <strong>at</strong>tendance<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Design supp<strong>or</strong>t, especially with TDSI EXgarde access <strong>co</strong>ntrol<br />

• Software supp<strong>or</strong>t • RMA process f<strong>or</strong> faulty returns<br />

• Technical supp<strong>or</strong>t<br />

<strong>Contact</strong> details: G2 Security, 087 940 9322, info@g2security.<strong>co</strong>.<strong>za</strong>,<br />

www.g2security.<strong>co</strong>.<strong>za</strong><br />

Device/Solution: Ide<strong>co</strong> ES2<br />

Manufacturer/ brand name:<br />

Ide<strong>co</strong> ES2<br />

Distribut<strong>or</strong>/Supplier:<br />

Ide<strong>co</strong> Biometric Security<br />

Solutions<br />

Biometric technology:<br />

Fingerprint<br />

Software description:<br />

Free software solution f<strong>or</strong><br />

managing time-based access<br />

and <strong>at</strong>tendance with M<strong>or</strong>pho<br />

fi ngerprint technology. Ide<strong>co</strong><br />

ES2 access management software is exceptionally easy to use. Access<br />

scheduling and rep<strong>or</strong>ting is based on time and zones and the software<br />

<strong>co</strong>ntrols up to six M<strong>or</strong>pho fi ngerprint scanners <strong>at</strong> separ<strong>at</strong>e loc<strong>at</strong>ions on<br />

a single site.<br />

Applic<strong>at</strong>ion:<br />

• Fingerprint-based access management and rep<strong>or</strong>ting<br />

• Fingerprint-based time and <strong>at</strong>tendance management and rep<strong>or</strong>ting<br />

• Manages access f<strong>or</strong> visit<strong>or</strong>s and <strong>co</strong>ntract<strong>or</strong>s<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• SQL backups • Imp<strong>or</strong>t users from MEMS Access d<strong>at</strong>abase<br />

• Simple visit<strong>or</strong> and <strong>co</strong>ntract<strong>or</strong> enrolment<br />

• M<strong>or</strong>pho tools accessible from within the solution<br />

<strong>Contact</strong> details: Ide<strong>co</strong> Biometric Security Solutions, 0861 0 43326,<br />

<strong>co</strong>ntact@ide<strong>co</strong>.<strong>co</strong>.<strong>za</strong>, www.ide<strong>co</strong>.<strong>co</strong>.<strong>za</strong>


Ide<strong>co</strong> Biometric Security Solutions<br />

Device/Solution: GreenBox<br />

Manufacturer/ brand<br />

name: GreenBox<br />

Distribut<strong>or</strong>/Supplier: Ide<strong>co</strong><br />

Biometric Security Solutions<br />

Biometric technology:<br />

Fingerprint<br />

Hardware description:<br />

Greenbox is a <strong>co</strong>mpact<br />

multi-function device th<strong>at</strong><br />

captures and verifi es identity<br />

d<strong>at</strong>a. Greenbox provides<br />

the found<strong>at</strong>ions f<strong>or</strong> managing identity d<strong>at</strong>a in an exceptional variety<br />

of ways. Digital identity management is <strong>co</strong>mbined in a single unit with<br />

a fi ngerprint scanner, EMV-<strong>co</strong>mpliant smartcard reader, 20 mega-pixel<br />

camera, document scanner and sign<strong>at</strong>ure pad.<br />

Applic<strong>at</strong>ion:<br />

• Processing identity d<strong>at</strong>a f<strong>or</strong> FICA and RICA<br />

• Ac<strong>co</strong>unt opening and ac<strong>co</strong>unt take-on<br />

• Credit applic<strong>at</strong>ions and approvals<br />

• Criminal re<strong>co</strong>rd checking<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• USB <strong>co</strong>nnection<br />

• Device drivers included<br />

• MS-based oper<strong>at</strong>ing system<br />

• Access to GreenF<strong>or</strong>m – digital ID management re<strong>co</strong>rds<br />

<strong>Contact</strong> details: Ide<strong>co</strong> Biometric Security Solutions, 0861 0 43326,<br />

<strong>co</strong>ntact@ide<strong>co</strong>.<strong>co</strong>.<strong>za</strong>, www.ide<strong>co</strong>.<strong>co</strong>.<strong>za</strong><br />

Ide<strong>co</strong> Biometric Security Solutions<br />

Device/Solution: SuperSign<br />

Manufacturer/ brand name: SuperSign<br />

Distribut<strong>or</strong>/Supplier: Ide<strong>co</strong> Biometric Security Solutions<br />

Biometric technology: Fingerprint<br />

Hardware description: SuperSign reinf<strong>or</strong>ces IT security by replacing<br />

traditional cards, PINS and passw<strong>or</strong>ds with fi ngerprint-based<br />

authentic<strong>at</strong>ion of IT users. Prevents unauth<strong>or</strong>ised IT access and<br />

activity. Integr<strong>at</strong>es with existing policies th<strong>at</strong> govern IT access and<br />

auth<strong>or</strong>is<strong>at</strong>ions. SuperSign accur<strong>at</strong>ely re<strong>co</strong>rds who did wh<strong>at</strong>, where and<br />

when within IT systems. Supp<strong>or</strong>ts online and offl ine transactions.<br />

Applic<strong>at</strong>ion:<br />

• Fingerprint-based authentic<strong>at</strong>ion f<strong>or</strong> initial IT sign-on<br />

• Fingerprint-based authentic<strong>at</strong>ion f<strong>or</strong> applic<strong>at</strong>ion log-on<br />

• Fingerprint-based authentic<strong>at</strong>ion f<strong>or</strong> transaction auth<strong>or</strong>is<strong>at</strong>ion<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Windows sign-on<br />

• Synchronises with MS Active Direct<strong>or</strong>y<br />

• Comp<strong>at</strong>ible with existing IdM solutions, e.g. Novell<br />

• Real-time audit logs of IT access and activity<br />

<strong>Contact</strong> details: Ide<strong>co</strong> Biometric Security Solutions, 0861 0 43326,<br />

<strong>co</strong>ntact@ide<strong>co</strong>.<strong>co</strong>.<strong>za</strong>, www.ide<strong>co</strong>.<strong>co</strong>.<strong>za</strong><br />

To capitalise fully on the extensive capabilities of M<strong>or</strong>pho<br />

technology in new integr<strong>at</strong>ion and development projects, Ide<strong>co</strong><br />

off ers a structured range of f<strong>or</strong>mal supp<strong>or</strong>t programs. Backed by<br />

the Ide<strong>co</strong> technical team, these programs provide highly practical<br />

assistance to ensure th<strong>at</strong> M<strong>or</strong>pho applic<strong>at</strong>ions deliver the best<br />

possible oper<strong>at</strong>ional and<strong>co</strong>mmercial results.<br />

Ide<strong>co</strong> Biometric Security Solutions<br />

Tel: 0861 0 43326<br />

e-mail: <strong>co</strong>ntact@ide<strong>co</strong>.<strong>co</strong>.<strong>za</strong><br />

www.ide<strong>co</strong>.<strong>co</strong>.<strong>za</strong><br />

To maintain our industry-leading standards of customer service, Ide<strong>co</strong><br />

provides a range of warranty and repair programs f<strong>or</strong> all M<strong>or</strong>pho<br />

products supplied by us. The programs provide repair <strong>or</strong> replacement<br />

services th<strong>at</strong> minimise on-site downtime and ensure agreed levels of<br />

oper<strong>at</strong>ional stability within our customers’ M<strong>or</strong>pho-based systems.<br />

Ide<strong>co</strong> Biometric Security Solutions<br />

Tel: 0861 0 43326<br />

e-mail: <strong>co</strong>ntact@ide<strong>co</strong>.<strong>co</strong>.<strong>za</strong><br />

www.ide<strong>co</strong>.<strong>co</strong>.<strong>za</strong><br />

www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 49


BIOMETRICS SELECTION GUIDE<br />

Ide<strong>co</strong> Biometric Security urity Solu Solutions Impro Technologies<br />

Device/Solution: SurgeTek<br />

Manufacturer/ brand name:<br />

SurgeTek<br />

Distribut<strong>or</strong>/Supplier:<br />

Ide<strong>co</strong> Biometric Security<br />

Solutions<br />

Biometric technology:<br />

Biometric Protection<br />

Hardware description:<br />

Lightning and<br />

surge protection f<strong>or</strong><br />

M<strong>or</strong>phoAccess solutions.<br />

SurgeTek protects the<br />

Wiegand p<strong>or</strong>t and/<strong>or</strong><br />

power p<strong>or</strong>t of M<strong>or</strong>pho terminals by preventing high voltage surges,<br />

spikes and sags. It w<strong>or</strong>ks by channelling over-voltage into the electrical<br />

outlet’s earth <strong>or</strong> ground wire, stopping it from reaching the M<strong>or</strong>pho<br />

terminal by maintaining n<strong>or</strong>mal voltage.<br />

Applic<strong>at</strong>ion:<br />

• Protects M<strong>or</strong>pho terminals by preventing high voltage surges,<br />

spikes and sags<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Suitable f<strong>or</strong> all M<strong>or</strong>pho terminals<br />

<strong>Contact</strong> details:<br />

Ide<strong>co</strong> Biometric Security Solutions,<br />

0861 0 43326, <strong>co</strong>ntact@ide<strong>co</strong>.<strong>co</strong>.<strong>za</strong>,<br />

www.ide<strong>co</strong>.<strong>co</strong>.<strong>za</strong><br />

Impro Technologies M<strong>or</strong>pho<br />

Device/Solution: Biometric Multidiscipline<br />

Time Attendance Reader<br />

Manufacturer/ brand name:<br />

Impro Technologies<br />

Distribut<strong>or</strong>/Supplier:<br />

Access & Beyond, Elvey Security<br />

Technologies, Powell Tronics<br />

Hardware description:<br />

The (BMTA) Biometric Multi-discipline Time Attendance Reader is<br />

designed and manufactured by Impro Technologies, designed to<br />

include all authentic<strong>at</strong>ion types (Fingerprint, Tag and PIN). Seamlessly<br />

integr<strong>at</strong>ed into Impro IXP220 and IXP400i systems, supp<strong>or</strong>ting access<br />

fe<strong>at</strong>ures such as do<strong>or</strong> mode p<strong>at</strong>terns and advance messaging. In<br />

addition to reading fi ngerprints, new technology allows the BMTA<br />

to read a multitude of tag types in both 125 kHz and 13.56 MHz<br />

frequencies. These terminals fi t seamlessly into new <strong>or</strong> existing<br />

applic<strong>at</strong>ions allowing you to upgrade tag technology without replacing<br />

existing tags.<br />

Applic<strong>at</strong>ions:<br />

• Access <strong>co</strong>ntrol • Time and <strong>at</strong>tendance<br />

• Large <strong>co</strong>mmercial sites • Residential apartments<br />

• Fully integr<strong>at</strong>ed <strong>co</strong>ntrol<br />

Supp<strong>or</strong>t off ered by manufacturer/distribut<strong>or</strong>:<br />

• 24hr local advanced supp<strong>or</strong>t • Training<br />

• 12-month warranty • Stock holding<br />

<strong>Contact</strong> details:<br />

Impro Technologies , 08600 IMPRO (46776), www.impro.net<br />

50 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

Device/Solution: Fingkey Access<br />

Manufacturer/ Supplier Name:<br />

Impro Technologies<br />

Distribut<strong>or</strong>/Supplier: Dis<br />

Access & Beyond,<br />

Elvey El Security Technologies, Powell Tronics<br />

Hardware description: Fingkey Access is a<br />

<strong>co</strong>st-eff ective fi ngerprint reader capable of<br />

st<strong>or</strong>ing up to 1 000 users (1 fi nger per user) <strong>or</strong><br />

500 users (2 fi ngers per user) and prompt<br />

authentic<strong>at</strong>ion with (LFD) Live Finger<br />

Detection function. Designed f<strong>or</strong> outdo<strong>or</strong> use<br />

with an IP65 equivalent r<strong>at</strong>ing (must be<br />

shielded from direct sunlight and rain).<br />

Comp<strong>at</strong>ible with Impro IXP20 and fully integr<strong>at</strong>ed<br />

with IXP220 and IXP400i systems, supp<strong>or</strong>ts advanced access<br />

<strong>co</strong>ntrol and time and <strong>at</strong>tendance management. Fingkey Access<br />

also available in standalone and netw<strong>or</strong>k modes with free Access<br />

Manager software.<br />

Applic<strong>at</strong>ions:<br />

• Access <strong>co</strong>ntrol • Time and <strong>at</strong>tendance<br />

• Residential apartments • Small business<br />

• Fully integr<strong>at</strong>ed <strong>co</strong>ntrol<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• 24hr local advanced supp<strong>or</strong>t • Training<br />

• 12 month warranty • Stock holding<br />

<strong>Contact</strong> details: Impro Technologies , 08600 IMPRO (46776),<br />

www.impro.net.<br />

Device/Solution: MA-J Series<br />

Manufacturer/ brand name:<br />

M<strong>or</strong>pho<br />

Distribut<strong>or</strong>/Supplier: Ide<strong>co</strong><br />

Biometric Security Solutions, EOH,<br />

Powell Tronics, Impro, Gallagher<br />

Biometric technology:<br />

Fingerprint<br />

Hardware description:<br />

The MA-J Series is an access<br />

<strong>co</strong>ntrol device available as J-Bio<br />

(fi ngerprint only) <strong>or</strong> J-Dual<br />

(fi ngerprint + Mifare <strong>or</strong> Desfi re<br />

cards). It can st<strong>or</strong>e up to 3 000 users<br />

(6 000 fi ngerprint templ<strong>at</strong>es). The<br />

reader is IP65 r<strong>at</strong>ed and can be<br />

used indo<strong>or</strong> <strong>or</strong> outdo<strong>or</strong>. It is PoE (Power over Ethernet) <strong>co</strong>mpliant<br />

f<strong>or</strong> easy use and can be <strong>co</strong>nnected via WiFi netw<strong>or</strong>k (optional). With<br />

a modern and elegant design the MA-J Series is perfectly suited f<strong>or</strong><br />

<strong>co</strong>rp<strong>or</strong><strong>at</strong>e environment.<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Available from Distribut<strong>or</strong>s, M<strong>or</strong>pho as 2nd level technical supp<strong>or</strong>t.<br />

<strong>Contact</strong> details:<br />

M<strong>or</strong>pho, +27 (0)11 286 <strong>5800</strong>,<br />

sec.san.<strong>co</strong>ntact@m<strong>or</strong>pho.<strong>co</strong>m


M<strong>or</strong>pho M<strong>or</strong>pho<br />

Device/Solution:<br />

M<strong>or</strong>phoAccess 500+ Series<br />

Manufacturer/ brand name:<br />

M<strong>or</strong>pho<br />

Distribut<strong>or</strong>/Supplier:<br />

Ide<strong>co</strong> Biometric Security Solutions,<br />

EOH, Powelltronics, Impro, Gallagher<br />

Biometric technology:<br />

Fingerprint<br />

Hardware description:<br />

The MA500+ Series is a fi ngerprint<br />

reader designed f<strong>or</strong> access <strong>co</strong>ntrol<br />

and T&A applic<strong>at</strong>ion. It can st<strong>or</strong>e two fi ngerprints per person f<strong>or</strong> a<br />

maximum of 100 000 templ<strong>at</strong>es. MA520+D model can oper<strong>at</strong>e in<br />

multifact<strong>or</strong> mode (all <strong>co</strong>mbin<strong>at</strong>ion between fi ngerprint, PIN <strong>co</strong>de and<br />

Desfi re <strong>or</strong> Mifare Cards). MA500+ Series is <strong>co</strong>mp<strong>at</strong>ible with PoE (Power<br />

Over Ethernet) and can also be <strong>co</strong>nnected to a WiFi netw<strong>or</strong>k with an<br />

optional WiFi dongle. Display can be set-up in multiple languages if<br />

needed.<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol<br />

• Time and <strong>at</strong>tendance<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Available from distribut<strong>or</strong>s, M<strong>or</strong>pho, as se<strong>co</strong>nd-level technical supp<strong>or</strong>t.<br />

<strong>Contact</strong> details:<br />

M<strong>or</strong>pho, +27 (0)11 286 <strong>5800</strong>,<br />

sec.san.<strong>co</strong>ntact@m<strong>or</strong>pho.<strong>co</strong>m.<br />

M<strong>or</strong>pho M<strong>or</strong>pho<br />

Device/Solution: M<strong>or</strong>phoAccess s<br />

VP Series<br />

Manufacturer/ brand name:<br />

M<strong>or</strong>pho<br />

Distribut<strong>or</strong>/Supplier: Ide<strong>co</strong><br />

Biometric Security Solutions,<br />

EOH, Powelltronics, Impro, Gallagher her<br />

Biometric technology:<br />

Fingerprint + vein<br />

Hardware description:<br />

The MA-VP Series is an access<br />

<strong>co</strong>ntrol device available as<br />

MA-VP Bio (fi ngerprint/vein<br />

only) <strong>or</strong> MA-VP Dual (fi ngerprint/<br />

vein + Mifare/Desfi re cards). It can st<strong>or</strong>e t<br />

up to 10 000 users (20 000 templ<strong>at</strong>es). The reader<br />

is IP65 r<strong>at</strong>ed and suited f<strong>or</strong> indo<strong>or</strong> <strong>or</strong> outdo<strong>or</strong> use. It is PoE (Power<br />

over Ethernet) <strong>co</strong>mpliant f<strong>or</strong> easy use and can be <strong>co</strong>nnected via WiFi<br />

(optional). The MA-VP can be used where higher security is required<br />

<strong>or</strong> where fi ngerprint alone is not suitable.<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Available from distribut<strong>or</strong>s, M<strong>or</strong>pho, as se<strong>co</strong>nd-level technical<br />

supp<strong>or</strong>t.<br />

<strong>Contact</strong> details:<br />

M<strong>or</strong>pho, +27 (0)11 286 <strong>5800</strong>, sec.san.<strong>co</strong>ntact@m<strong>or</strong>pho.<strong>co</strong>m<br />

Device/Solution:<br />

Outdo<strong>or</strong> M<strong>or</strong>phoAccess 520D<br />

Manufacturer/ brand name:<br />

M<strong>or</strong>pho<br />

Distribut<strong>or</strong>/Supplier: Ide<strong>co</strong><br />

Biometric Security Solutions,<br />

EOH, Powelltronics, Impro,<br />

Gallagher<br />

Biometric technology:<br />

Fingerprint<br />

Hardware description:<br />

The OMA520D is an<br />

outdo<strong>or</strong> version of the<br />

MA500+ series. It shares<br />

all the characteristics of the<br />

MA520D (multifact<strong>or</strong> verifi c<strong>at</strong>ion with Mifare <strong>or</strong><br />

Desfi re Cards) and is IP65 r<strong>at</strong>ed. Its ruggedised casing makes it vandal<br />

resistant. The OMA520D can be used in rough environments like mines,<br />

oil refi neries, etc. <strong>or</strong> in environments th<strong>at</strong> require high hygiene like<br />

ab<strong>at</strong>toirs where they can be washed regularly. It is PoE (Power over<br />

Ethernet) <strong>co</strong>mpliant which makes it easy to install.<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol • Time and <strong>at</strong>tendance<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Available from distribut<strong>or</strong>s, M<strong>or</strong>pho, as se<strong>co</strong>nd-level technical supp<strong>or</strong>t.<br />

<strong>Contact</strong> details:<br />

M<strong>or</strong>pho, +27 (0)11 286 <strong>5800</strong>, sec.san.<strong>co</strong>ntact@m<strong>or</strong>pho.<strong>co</strong>m<br />

Device/Solution: M<strong>or</strong>phoSmart<br />

Optical 300 Series<br />

Manufacturer/ brand name:<br />

M<strong>or</strong>pho<br />

Distribut<strong>or</strong>/Supplier: Ide<strong>co</strong><br />

Biometric Security Solutions, EOH,<br />

Powelltronics, Impro, Gallagher<br />

Biometric technology:<br />

Fingerprint<br />

Hardware description: The MSO300<br />

Series is a family of high-end USB<br />

optical sens<strong>or</strong>s. It is based on M<strong>or</strong>pho’s 25-year experience, in the<br />

fi elds of electro-optics and f<strong>or</strong>ensic quality fi ngerprint processing<br />

alg<strong>or</strong>ithms. The MSO300 Series <strong>co</strong>vers a wide range of applic<strong>at</strong>ions:<br />

enrolment, authentic<strong>at</strong>ion and identifi c<strong>at</strong>ion in industrial/<br />

<strong>co</strong>mmercial and governmental environments, PC Login, etc. The<br />

MSO300 is also available with a serial <strong>co</strong>nnect<strong>or</strong> (MSO200) and with<br />

an embedded smartcard reader (MSO350). The MSO300 integr<strong>at</strong>es 2<br />

LEDs to guide and inf<strong>or</strong>m users about ongoing oper<strong>at</strong>ions.<br />

Applic<strong>at</strong>ion:<br />

• Enrolment • System integr<strong>at</strong>ion<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Available from distribut<strong>or</strong>s, M<strong>or</strong>pho, as se<strong>co</strong>nd-level technical<br />

supp<strong>or</strong>t.<br />

<strong>Contact</strong> details:<br />

M<strong>or</strong>pho, +27 (0)11 286 <strong>5800</strong>,<br />

sec.san.<strong>co</strong>ntact@m<strong>or</strong>pho.<strong>co</strong>m<br />

www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 51


BIOMETRICS SELECTION GUIDE<br />

M<strong>or</strong>pho M<strong>or</strong>pho<br />

Device/Solution:<br />

M<strong>or</strong>phoSmart Optical<br />

1300 series<br />

Manufacturer/ brand<br />

name: M<strong>or</strong>pho<br />

Distribut<strong>or</strong>/Supplier:<br />

Ide<strong>co</strong> Biometric<br />

Security Solutions, EOH,<br />

Powelltronics, Impro,<br />

Gallagher<br />

Biometric technology:<br />

Fingerprint<br />

Hardware description): The MSO1300 (USB)<br />

has been specially designed to address the needs (security, user,<br />

friendliness) of logical access <strong>co</strong>ntrol to highly secured desktop PC<br />

applic<strong>at</strong>ions, in industrial, <strong>co</strong>rp<strong>or</strong><strong>at</strong>e <strong>or</strong> governmental environments.<br />

The MSO 1300 Series is based on a fast and <strong>co</strong>st-eff ective optical<br />

sens<strong>or</strong> and have an embedded st<strong>or</strong>age capacity of up to 500 users<br />

(1 000 templ<strong>at</strong>es). It is available with serial <strong>co</strong>nnection (MSO1200).<br />

Multifact<strong>or</strong> authentic<strong>at</strong>ion can be achieved by using fi ngerprint and<br />

smart card technologies on MSO1350/1250 models.<br />

Applic<strong>at</strong>ion:<br />

• Enrolment • System integr<strong>at</strong>ion<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Available from distribut<strong>or</strong>s, M<strong>or</strong>pho, as se<strong>co</strong>nd-level technical supp<strong>or</strong>t.<br />

<strong>Contact</strong> details:<br />

M<strong>or</strong>pho, +27 (0)11 286 <strong>5800</strong>, sec.san.<strong>co</strong>ntact@m<strong>or</strong>pho.<strong>co</strong>m<br />

N<strong>at</strong>ech Universal Technology neaMetrics/Suprema<br />

Device/Solution: T50M<br />

Manufacturer / brand name: ANVIZ<br />

Biometric type: Fingerprint<br />

Distribut<strong>or</strong>/supplier: N<strong>at</strong>ech Universal<br />

Technology<br />

Hardware description: T50M is a new<br />

gener<strong>at</strong>ion of simple standalone access<br />

<strong>co</strong>ntrol. With metal case and w<strong>at</strong>erproof<br />

<strong>co</strong>ver high level of protection suitable<br />

f<strong>or</strong> outdo<strong>or</strong> install. L<strong>at</strong>est TI hardware<br />

pl<strong>at</strong>f<strong>or</strong>m of high perf<strong>or</strong>mance, highspeed<br />

fi ngerprint identifi c<strong>at</strong>ion can<br />

be easily realised. T50M has the most<br />

<strong>co</strong>mpact design in the w<strong>or</strong>ld. Easy<br />

netw<strong>or</strong>k management through RS485<br />

<strong>or</strong> TCP/IP, adopts Anviz develops and<br />

designs touch active optical fi ngerprint sens<strong>or</strong> and BioNano <strong>co</strong>re<br />

fi ngerprint alg<strong>or</strong>ithm. Powerful access <strong>co</strong>ntrol function with do<strong>or</strong> open<br />

sens<strong>or</strong>, direct lock <strong>co</strong>ntrol.<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol • Time and <strong>at</strong>tendance<br />

Integr<strong>at</strong>ion Supp<strong>or</strong>t:<br />

• Consult<strong>at</strong>ion (to integr<strong>at</strong><strong>or</strong>) • Training (f<strong>or</strong> integr<strong>at</strong><strong>or</strong>)<br />

• System design (f<strong>or</strong> integr<strong>at</strong><strong>or</strong>) • Service and repair<br />

<strong>Contact</strong> details:<br />

N<strong>at</strong>ech Universal Technology, +27 (0)73 601 6652,<br />

dean@n<strong>at</strong>ech.<strong>co</strong>.<strong>za</strong><br />

52 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

Device/Solution: M<strong>or</strong>phoSmart<br />

FingerVP Series<br />

Manufacturer/ brand name:<br />

M<strong>or</strong>pho<br />

Distribut<strong>or</strong>/Supplier:<br />

Ide<strong>co</strong> Biometric Security Solutions,<br />

EOH, Powelltronics, Impro,<br />

Gallagher<br />

Biometric technology:<br />

Fingerprint + vein<br />

Hardware description:<br />

The MSO FVP is a FBI PIV IQS<br />

certifi ed USB biometric reader using<br />

the best of l<strong>at</strong>est technologies.<br />

It simultaneously captures the fi ngerprint as well as the vein and<br />

<strong>co</strong>mbined the best of both templ<strong>at</strong>es to ensure the highest security<br />

and the best possible perf<strong>or</strong>mance. The MSO FVP is very well<br />

suited f<strong>or</strong> tough environments where fi ngerprint capture remains<br />

a challenge. The MSO FVP uses LED indic<strong>at</strong><strong>or</strong> and fi nger presence<br />

detection to guide and inf<strong>or</strong>m users about ongoing oper<strong>at</strong>ions.<br />

Applic<strong>at</strong>ion:<br />

• Enrolment • System integr<strong>at</strong>ion<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Available from distribut<strong>or</strong>s, M<strong>or</strong>pho, as se<strong>co</strong>nd-level technical<br />

supp<strong>or</strong>t.<br />

<strong>Contact</strong> details:<br />

M<strong>or</strong>pho, +27 (0)11 286 <strong>5800</strong>, sec.san.<strong>co</strong>ntact@m<strong>or</strong>pho.<strong>co</strong>m<br />

Manufacturer/ brand name: Suprema<br />

FaceSt<strong>at</strong>ion<br />

Distribut<strong>or</strong>/Supplier: neaMetrics<br />

Biometric technology: Face<br />

Hardware description: The new<br />

FaceSt<strong>at</strong>ion is a dedic<strong>at</strong>ed face<br />

re<strong>co</strong>gnition terminal. Using Suprema’s<br />

proprietary alg<strong>or</strong>ithms <strong>co</strong>mbined with<br />

st<strong>at</strong>e-of-the-art hardware, FaceSt<strong>at</strong>ion<br />

provides near real-time templ<strong>at</strong>e<br />

m<strong>at</strong>ching results (1:1 000


neaMetrics/Suprema neaMetrics/Suprema<br />

Manufacturer/ brand name:<br />

Manufacturer/ brand name:<br />

Suprema BioSt<strong>at</strong>ion T2<br />

Suprema BioSt<strong>at</strong>ion<br />

Distribut<strong>or</strong>/Supplier: neaMetrics<br />

Distribut<strong>or</strong>/Supplier:<br />

Biometric technology:<br />

neaMetrics<br />

Fingerprint, face<br />

Biometric technology:<br />

Hardware description: A high-end<br />

Fingerprint<br />

access and <strong>at</strong>tendance terminal<br />

Hardware description:<br />

off ering fi ngerprint, RFID and PIN<br />

BioSt<strong>at</strong>on is a full-fe<strong>at</strong>ured high-<br />

authentic<strong>at</strong>ion with built-in camera<br />

end fi ngerprint terminal th<strong>at</strong><br />

f<strong>or</strong> face image capturing (snap shots)<br />

<strong>co</strong>mbines the advantages of TCP/<br />

f<strong>or</strong> an extra level of security, and video phone interface. interface T2 T2sp<strong>or</strong>ts sp<strong>or</strong>ts<br />

IP with Suprema’s renowned biometric ic technology to provide the optimal<br />

an interactive 5-inch touchscreen LCD with intuitive GUI, st<strong>or</strong>es<br />

solution f<strong>or</strong> both access <strong>co</strong>ntrol and time <strong>at</strong>tendance. BioSt<strong>at</strong>ion <strong>co</strong>mes<br />

200 000 fi ngerprints (1:1, 10 000 1:M), off ers extensive <strong>co</strong>mmunic<strong>at</strong>ion with a massive 1GB of mem<strong>or</strong>y th<strong>at</strong> supplies st<strong>or</strong>age f<strong>or</strong> up to 200 000<br />

interfaces including TCP/IP, WiFi, PoE, RS485 and Wiegand and fe<strong>at</strong>ures users (1:1, 10 000 1:M) and a staggering 1 million event logs. Its powerful<br />

an embedded web-server which <strong>co</strong>ntrols up to 10 Suprema IP access processing engine and alg<strong>or</strong>ithms provide an un<strong>co</strong>mpromisingly high-<br />

terminals on a web browser without installing any software.<br />

level of biometric security with fl exibility and ease of use.<br />

Applic<strong>at</strong>ion:<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol • Time and <strong>at</strong>tendance<br />

• Access <strong>co</strong>ntrol • Time and <strong>at</strong>tendance<br />

• Applic<strong>at</strong>ions requiring function selection<br />

• Applic<strong>at</strong>ions requiring function selection<br />

• Hi-end security applic<strong>at</strong>ions<br />

• Hi-end security applic<strong>at</strong>ions<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Technical and sales training<br />

• Technical and sales training<br />

• Architectural system design <strong>co</strong>nsulting<br />

• Architectural system design <strong>co</strong>nsulting<br />

• Remote, telephonic and onsite supp<strong>or</strong>t<br />

• Remote, telephonic and onsite supp<strong>or</strong>t<br />

• Software development integr<strong>at</strong>ion supp<strong>or</strong>t<br />

• Software development integr<strong>at</strong>ion supp<strong>or</strong>t<br />

• Customised solution development<br />

• Customised solution development<br />

<strong>Contact</strong> details: Suprema, 0860 SUPREMA (0860 787 736),<br />

<strong>Contact</strong> details: Suprema, 0860 SUPREMA (0860 787 736),<br />

enquiry@suprema.<strong>co</strong>.<strong>za</strong>, www.suprema.<strong>co</strong>.<strong>za</strong><br />

enquiry@suprema.<strong>co</strong>.<strong>za</strong>, www.suprema.<strong>co</strong>.<strong>za</strong><br />

neaMetrics/Suprema neaMetrics/Suprema<br />

Manufacturer/ brand name:<br />

Suprema BioLite Net<br />

Distribut<strong>or</strong>/Supplier: neaMetrics<br />

Biometric technology:<br />

Fingerprint<br />

Hardware description: Extra<br />

durable IP-based fi ngerprint<br />

terminal with IP65 r<strong>at</strong>ed structure<br />

<strong>co</strong>mprehensively sealing it against<br />

invasive moisture, dust and liquid,<br />

making it perfect f<strong>or</strong> outdo<strong>or</strong> <strong>or</strong><br />

indo<strong>or</strong> install<strong>at</strong>ions. From simple do<strong>or</strong> <strong>co</strong>ntrol to <strong>co</strong>mplex netw<strong>or</strong>ked<br />

environments, BioLite Net supp<strong>or</strong>ts full TandA and access <strong>co</strong>ntrol<br />

functionality f<strong>or</strong> up to 5 000 users. It also fe<strong>at</strong>ures an illumin<strong>at</strong>ed keypad,<br />

LCD back light and LED indic<strong>at</strong><strong>or</strong> f<strong>or</strong> excellent visibility, integr<strong>at</strong>ed RFID and<br />

off ers secure do<strong>or</strong> <strong>co</strong>ntrol, I/O expansion and anti-passback.<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol • Time and <strong>at</strong>tendance<br />

• Applic<strong>at</strong>ions requiring function selection • Outdo<strong>or</strong> environments<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Technical and sales training<br />

• Architectural system design <strong>co</strong>nsulting<br />

• Remote, telephonic and onsite supp<strong>or</strong>t<br />

• Software development integr<strong>at</strong>ion supp<strong>or</strong>t<br />

• Customised solution development<br />

<strong>Contact</strong> details: Suprema, 0860 SUPREMA (0860 787 736),<br />

enquiry@suprema.<strong>co</strong>.<strong>za</strong>, www.suprema.<strong>co</strong>.<strong>za</strong><br />

Manufacturer/ brand name: Suprema<br />

BioEntryPlus Series<br />

Distribut<strong>or</strong>/Supplier: neaMetrics<br />

Biometric technology: Fingerprint<br />

Hardware description: Suprema’s BioEntry<br />

series blends next gener<strong>at</strong>ion IP with biometrics<br />

f<strong>or</strong> elev<strong>at</strong>ed security. Off ering<br />

unrivalled quality with exceptional<br />

engineering, BioEntry Series is integr<strong>at</strong>ed with<br />

fi ngerprint and card and <strong>co</strong>vers a full range<br />

of access <strong>co</strong>ntrol applic<strong>at</strong>ions from simple<br />

standalone do<strong>or</strong> <strong>co</strong>ntrol to <strong>co</strong>mplex netw<strong>or</strong>ked access <strong>co</strong>ntrol systems.<br />

BioEntry W takes the series further by encasing a product into an IK08 vandalresistant<br />

housing and adding PoE f<strong>or</strong> easy and <strong>co</strong>st eff ective install<strong>at</strong>ion.<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol<br />

• Applic<strong>at</strong>ions requiring function selection<br />

• Outdo<strong>or</strong> environments (W)<br />

• Environments requiring vandal protection (W)<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Technical and sales training<br />

• Architectural system design <strong>co</strong>nsulting<br />

• Remote, telephonic and onsite supp<strong>or</strong>t<br />

• Software development integr<strong>at</strong>ion supp<strong>or</strong>t<br />

• Customised solution development<br />

<strong>Contact</strong> details: Suprema, 0860 SUPREMA (0860 787 736),<br />

enquiry@suprema.<strong>co</strong>.<strong>za</strong>, www.suprema.<strong>co</strong>.<strong>za</strong><br />

www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 53


BIOMETRICS SELECTION GUIDE<br />

neaMetrics/Suprema neaMetrics/Suprema<br />

Manufacturer/ brand name:<br />

Suprema SupreMOBILE<br />

Distribut<strong>or</strong>/Supplier: neaMetrics ccs<br />

Biometric technology: Fingerprint rint<br />

Hardware description: A <strong>co</strong>mpact aact<br />

p<strong>or</strong>table biometric terminal th<strong>at</strong> is<br />

aesthetically pleasing and off ers<br />

outstanding perf<strong>or</strong>mance – even<br />

in the harshest we<strong>at</strong>her environments. ments<br />

Sealed to keep out dust, dirt and rain, SupreMOBILE is the perfect<br />

solution where rugged mobility is a must. One charge gives you <strong>at</strong> least<br />

10 hours uptime. (An extended b<strong>at</strong>tery is available, doubling usage.)<br />

SupreMOBILE <strong>co</strong>mes standard with an RJ45 f<strong>or</strong> LAN <strong>co</strong>nnectivity;<br />

optional Wi-Fi, GPRS/Edge <strong>or</strong> 3G routers are available. SupreMOBILE<br />

<strong>co</strong>mes fi tted with Suprema’s BioLite Net, BioEntry Plus <strong>or</strong> BioSt<strong>at</strong>ion.<br />

Applic<strong>at</strong>ion:<br />

• Mobile time and <strong>at</strong>tendance • Random and emergency roll call<br />

• On demand identifi c<strong>at</strong>ion (exams, random visit<strong>or</strong>)<br />

• Applic<strong>at</strong>ions requiring function selection<br />

• Outdo<strong>or</strong> environments<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Technical and sales training<br />

• Architectural system design <strong>co</strong>nsulting<br />

• Remote, telephonic and onsite supp<strong>or</strong>t<br />

• Software development integr<strong>at</strong>ion supp<strong>or</strong>t<br />

• Customised solution development<br />

<strong>Contact</strong> details: Suprema, 0860 SUPREMA (0860 787 736),<br />

enquiry@suprema.<strong>co</strong>.<strong>za</strong>, www.suprema.<strong>co</strong>.<strong>za</strong><br />

neaMetrics/Suprema neaMetrics/Suprema<br />

Manufacturer/ brand name:<br />

Suprema RealScan-G1<br />

Distribut<strong>or</strong>/Supplier:<br />

neaMetrics<br />

Biometric technology:<br />

Fingerprint<br />

Hardware description: FBI certifi rtifi ed<br />

single-fi nger live scanner with Suprema’s<br />

advanced live fi nger detection (LFD) technology.<br />

Combining superi<strong>or</strong> optical engineering with slim and <strong>co</strong>mpact f<strong>or</strong>m<br />

fact<strong>or</strong>, RealScan-G1 off ers every essential fe<strong>at</strong>ure f<strong>or</strong> high-speed<br />

fi ngerprint capturing in civil and criminal ID projects. The device ensures<br />

high quality image capturing with halo eff ect elimin<strong>at</strong>ion, ghost image<br />

elimin<strong>at</strong>ion and autom<strong>at</strong>ed image quality check processes. It fe<strong>at</strong>ures<br />

a rugged IP54 structure, providing extra durability; captures 500dpi<br />

greyscale images and has a wide pl<strong>at</strong>en (1.0 x 1.0 inch).<br />

Applic<strong>at</strong>ion:<br />

• N<strong>at</strong>ional ID • Immigr<strong>at</strong>ion and b<strong>or</strong>der <strong>co</strong>ntrol<br />

• Criminal clearance • Civil identifi c<strong>at</strong>ion<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Technical and sales training<br />

• Architectural system design <strong>co</strong>nsulting<br />

• Remote, telephonic and onsite supp<strong>or</strong>t<br />

• Software development integr<strong>at</strong>ion supp<strong>or</strong>t<br />

• Customised solution development<br />

<strong>Contact</strong> details: Suprema, 0860 SUPREMA (0860 787 736),<br />

enquiry@suprema.<strong>co</strong>.<strong>za</strong>, www.suprema.<strong>co</strong>.<strong>za</strong><br />

54 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

Manufacturer/ brand name:<br />

Suprema BioMini and plus<br />

Distribut<strong>or</strong>/Supplier: neaMetrics<br />

Biometric technology: Fingerprint nnt<br />

Hardware description: Designed<br />

specially to provide a high level of<br />

security f<strong>or</strong> desktop PC and<br />

<strong>co</strong>mplex netw<strong>or</strong>k environments.<br />

Packed in a sleek and ergonomic design, eesign,<br />

it<br />

fe<strong>at</strong>ures a 500 dpi optical fi ngerprint nt sens<strong>or</strong>,<br />

scr<strong>at</strong>ch free sens<strong>or</strong> surface and fast t m<strong>at</strong>ching speed: 1:100 000/<br />

se<strong>co</strong>nd. Also, high speed USB2.0 interface and Suprema’s multiaward<br />

winning Alg<strong>or</strong>ithm. BioMini Plus fe<strong>at</strong>ures advanced hybridtype<br />

live fi nger detection (LFD) technology and FBI certifi c<strong>at</strong>ion.<br />

Combined with its <strong>co</strong>mprehensive SDK solution, BioMini off ers<br />

superb hardware and software <strong>co</strong>mp<strong>at</strong>ibility making it an ideal<br />

pl<strong>at</strong>f<strong>or</strong>m f<strong>or</strong> developers.<br />

Applic<strong>at</strong>ion:<br />

• Fingerprint enrolment • Biometric identity<br />

• Applic<strong>at</strong>ion user security • Time and <strong>at</strong>tendance<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Technical and sales training<br />

• Architectural system design <strong>co</strong>nsulting<br />

• Remote, telephonic and onsite supp<strong>or</strong>t<br />

• Software development integr<strong>at</strong>ion supp<strong>or</strong>t<br />

• Customised solution development<br />

<strong>Contact</strong> details: Suprema, 0860 SUPREMA (0860 787 736),<br />

enquiry@suprema.<strong>co</strong>.<strong>za</strong>, www.suprema.<strong>co</strong>.<strong>za</strong><br />

Manufacturer/ brand name: me:<br />

Suprema RealScan-D<br />

Distribut<strong>or</strong>/Supplier:<br />

neaMetrics<br />

Biometric technology:<br />

Fingerprint<br />

Hardware description: FBI BI certifi ed<br />

p<strong>or</strong>table dual-fi nger live scanner anner fe<strong>at</strong>uring<br />

Suprema’s leading optical image-processing mage-processing technology. technology RealScan-D<br />

off ers maximum perf<strong>or</strong>mance under harsh environments and guarantees<br />

precise image capturing f<strong>or</strong> wet and dry fi ngers. It has a sleek and<br />

ergonomic design with built-in buttons f<strong>or</strong> on-device oper<strong>at</strong>ion and its<br />

extra wide pl<strong>at</strong>en allows f<strong>or</strong> high-speed image capturing of single fi nger<br />

fl <strong>at</strong>s, rolls and two-fi nger fl <strong>at</strong>s. It also off ers auto-capture by sensing fi nger<br />

placement, slippage detection (f<strong>or</strong> rolls), halo and ghost image elimin<strong>at</strong>ion,<br />

image quality checks, sequence check and autom<strong>at</strong>ic segment<strong>at</strong>ion.<br />

Applic<strong>at</strong>ion:<br />

• N<strong>at</strong>ional ID • Immigr<strong>at</strong>ion and b<strong>or</strong>der <strong>co</strong>ntrol<br />

• Criminal clearance • Civil and criminal applic<strong>at</strong>ions (police)<br />

• High-speed fi ngerprint capturing<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Technical and sales training • Architectural system design <strong>co</strong>nsulting<br />

• Remote, telephonic and onsite supp<strong>or</strong>t<br />

• Software development integr<strong>at</strong>ion supp<strong>or</strong>t<br />

• Customised solution development<br />

<strong>Contact</strong> details: Suprema, 0860 SUPREMA (0860 787 736),<br />

enquiry@suprema.<strong>co</strong>.<strong>za</strong>, www.suprema.<strong>co</strong>.<strong>za</strong>


neaMetrics/Suprema Soft<strong>co</strong>n<br />

Manufacturer/ brand name:<br />

Suprema RealScan-G10<br />

Distribut<strong>or</strong>/Supplier: neaMetrics cs<br />

Biometric technology:<br />

Fingerprint<br />

Hardware description:<br />

FBI certifi ed <strong>co</strong>mpact live-scanner er<br />

f<strong>or</strong> single and ten-print capture<br />

(single fi nger fl <strong>at</strong>s, rolls and four<br />

fi nger slaps). Suprema’s advanced d<br />

optical technology allows high-speed peed<br />

image capturing and seamless image mage<br />

processing. Its IP54-r<strong>at</strong>ed dust and w<strong>at</strong>er resistant housing makes it<br />

suitable f<strong>or</strong> indo<strong>or</strong> and mobile environments. RealScan-G10 provides<br />

fast and easy capture of wet and dry fi ngers, autom<strong>at</strong>ic image quality<br />

checks, sequence check, slippage checks and autom<strong>at</strong>ic segment<strong>at</strong>ion.<br />

Applic<strong>at</strong>ion:<br />

• N<strong>at</strong>ional ID • Immigr<strong>at</strong>ion and b<strong>or</strong>der <strong>co</strong>ntrol<br />

• Criminal clearance • Civil and criminal applic<strong>at</strong>ions (police)<br />

• High-speed fi ngerprint capturing<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Technical and sales training<br />

• Architectural system design <strong>co</strong>nsulting<br />

• Remote, telephonic and onsite supp<strong>or</strong>t<br />

• Software development integr<strong>at</strong>ion supp<strong>or</strong>t<br />

• Customised solution development<br />

<strong>Contact</strong> details: Suprema, 0860 SUPREMA (0860 787 736),<br />

enquiry@suprema.<strong>co</strong>.<strong>za</strong>, www.suprema.<strong>co</strong>.<strong>za</strong><br />

Soft<strong>co</strong>n Uniclox Technologies<br />

Manufacturer: Soft<strong>co</strong>n<br />

Brand name: mKnock<br />

Distribut<strong>or</strong>/Supplier: Soft<strong>co</strong>n<br />

Hardware description: Soft<strong>co</strong>n’s<br />

l<strong>at</strong>est access <strong>co</strong>ntrol software, mKnock,<br />

off ers an all-en<strong>co</strong>mpassing access<br />

and identity management solution to<br />

clients across multiple industry sect<strong>or</strong>s.<br />

Using the l<strong>at</strong>est in development<br />

technology, mKnock provides a<br />

fl exible, vers<strong>at</strong>ile as well as a powerful<br />

tool to empower <strong>co</strong>mpanies with<br />

actionable d<strong>at</strong>a as well as autom<strong>at</strong>ing<br />

various processes within the <strong>or</strong>ganis<strong>at</strong>ion. Integr<strong>at</strong>ion with third-party<br />

systems is made easy using Soft<strong>co</strong>n’s mLink module.<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol and identity management • Resource management<br />

• Biometric integr<strong>at</strong>ion • Smart card solution<br />

• Integr<strong>at</strong>ion pl<strong>at</strong>f<strong>or</strong>m<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Project design and s<strong>co</strong>pe assistance<br />

• Custom software and hardware development<br />

• Installer training<br />

• Repair facility<br />

<strong>Contact</strong> details:<br />

Soft<strong>co</strong>n Software Control Services, +27 (0)12 348 7301,<br />

sales@soft<strong>co</strong>nserv.<strong>co</strong>m, www.soft<strong>co</strong>nserv.<strong>co</strong>m<br />

Manufacturer/ brand name: M<strong>or</strong>pho o<br />

M<strong>or</strong>phoAccess VP Reader<br />

Distribut<strong>or</strong>/Supplier: Soft<strong>co</strong>n<br />

Biometric technology:<br />

Fingerprint, vein<br />

Hardware description:<br />

The M<strong>or</strong>phoAccess VP terminals bring g<br />

f<strong>or</strong> the fi rst time the benefi ts of the<br />

fi nger vein/fi ngerprint multimodal<br />

technology, developed to<br />

oper<strong>at</strong>e in any kind of<br />

environment. The M<strong>or</strong>phoAccess<br />

VP Finger Vein readers are seamlessly integr<strong>at</strong>ed with the mKnock<br />

software and Soft<strong>co</strong>n hardware. Soft<strong>co</strong>n’s l<strong>at</strong>est access <strong>co</strong>ntrol software,<br />

mKnock, off ers an all-en<strong>co</strong>mpassing access and identity management<br />

solution to clients across multiple industry sect<strong>or</strong>s.<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol and identity management<br />

• Resource management<br />

• Biometric integr<strong>at</strong>ion to M<strong>or</strong>phoAccess VP<br />

• Integr<strong>at</strong>ion pl<strong>at</strong>f<strong>or</strong>m<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Project design and s<strong>co</strong>pe assistance<br />

• Custom software and hardware development<br />

• Installer training<br />

<strong>Contact</strong> details:<br />

Soft<strong>co</strong>n Software Control Services, +27 (0)12 348 7301,<br />

sales@soft<strong>co</strong>nserv.<strong>co</strong>m, www.soft<strong>co</strong>nserv.<strong>co</strong>m<br />

Device: HandPunch Series<br />

Manufacturer/ brand name:<br />

Ingersoll Rand<br />

Distribut<strong>or</strong>/Supplier: Uniclox<br />

Technologies<br />

Biometric technology: Hand<br />

geometry<br />

Hardware description: The Hand<br />

Punch Series from Uniclox is popular r<br />

in many industrial <strong>co</strong>mpanies who<br />

fi nd th<strong>at</strong> hand geometry is faster<br />

and m<strong>or</strong>e <strong>co</strong>nsistent because it<br />

is unaff ected by dirt, paint, oil <strong>or</strong> damage tto th the fi ngertips. ti Employees<br />

E l<br />

enter their number and place their hand on the pl<strong>at</strong>en of the HandPunch<br />

terminal. It autom<strong>at</strong>ically takes a three-dimensional reading of the size and<br />

shape of the hand and verifi es the user’s identity in less than one se<strong>co</strong>nd.<br />

Anti-microbial pl<strong>at</strong>en provides a hygienic fi nish th<strong>at</strong> resists bacterial<br />

degrad<strong>at</strong>ion using silver nano-technology.<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol • Time and <strong>at</strong>tendance<br />

• Ring a siren/bell<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Full technical supp<strong>or</strong>t in all maj<strong>or</strong> centres, including <strong>co</strong>nsulting,<br />

install<strong>at</strong>ion, training and call centre.<br />

<strong>Contact</strong> details:<br />

Uniclox Technologies, 0861 UNICLOX, www.uniclox.<strong>co</strong>m,<br />

sales@uniclox.<strong>co</strong>m<br />

www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 55


BIOMETRICS SELECTION GUIDE<br />

Uniclox Technologies Virdi Distribution SA<br />

Device: Face ID<br />

Manufacturer/ brand name:<br />

Hanvon<br />

Distribut<strong>or</strong>/Supplier:<br />

Uniclox Technologies<br />

Biometric technology:<br />

Face<br />

Hardware description:<br />

Uniclox FaceID terminals are<br />

suitable f<strong>or</strong> offi ces and high-end retail<br />

environments <strong>or</strong> where religious and cultural traditions making<br />

touching off ensive. Employees simply look <strong>at</strong> the clock and within a<br />

se<strong>co</strong>nd they are identifi ed and clocked in f<strong>or</strong> w<strong>or</strong>k. Facial re<strong>co</strong>gnition<br />

is a hygienic altern<strong>at</strong>ive to a fi ngerprint terminal has specialised<br />

dual camera sens<strong>or</strong>s th<strong>at</strong> perf<strong>or</strong>m three dimension facial analysis,<br />

providing the fastest and most reliable verifi c<strong>at</strong>ion even under<br />

low lighting <strong>co</strong>nditions. They cannot be fooled by 2D images and<br />

photographs.<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol<br />

• Time and <strong>at</strong>tendance<br />

• Job <strong>co</strong>sting<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Full technical supp<strong>or</strong>t in all maj<strong>or</strong> centres, including <strong>co</strong>nsulting,<br />

install<strong>at</strong>ion, training and call centre.<br />

<strong>Contact</strong> details:<br />

Uniclox Technologies, 0861 UNICLOX, www.uniclox.<strong>co</strong>m,<br />

sales@uniclox.<strong>co</strong>m<br />

Virdi Distribution SA Virdi Distribution SA<br />

Device: AC 5000<br />

Manufacturer/ brand name:<br />

Virdi<br />

Distribut<strong>or</strong>/Supplier:<br />

Virdi Distribution SA<br />

Biometric technology:<br />

Fingerprint<br />

Hardware description:<br />

We<strong>at</strong>herproof IP65 terminal,<br />

supp<strong>or</strong>ts up to 20 000 users,<br />

<strong>co</strong>lour LCD with custom<br />

messaging, live and fake<br />

fi nger detection optical scanner,<br />

touch keypad, RFID <strong>or</strong> Mifare card reader,<br />

on board multi i/O <strong>co</strong>ntroller, TCP/IP with<br />

Wiegand output and PoE.<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol<br />

• Time and <strong>at</strong>tendance<br />

• P<strong>or</strong>table time and <strong>at</strong>tendance<br />

<strong>Contact</strong> details:<br />

Virdi Distribution SA, +27 (0)21 404 4690,<br />

info@virditech.<strong>co</strong>.<strong>za</strong>, www.virditech.<strong>co</strong>.<strong>za</strong><br />

56 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

Device: SR 100<br />

Manufacturer/ brand name:<br />

Virdi<br />

Distribut<strong>or</strong>/Supplier:<br />

Virdi Distribution SA<br />

Biometric technology:<br />

Fingerprint<br />

Hardware description:<br />

Fingerprint slave reader, live<br />

and fake fi nger detection<br />

optical scanner, RFID <strong>or</strong> Mifare<br />

card reader, tri-<strong>co</strong>lour LED and<br />

buzzer, w<strong>or</strong>ks with AC 2100 / AC 2500 00<br />

and AC 4000.<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol<br />

• Time and <strong>at</strong>tendance<br />

<strong>Contact</strong> details:<br />

Virdi Distribution SA, +27 (0)21 404 4690,<br />

info@virditech.<strong>co</strong>.<strong>za</strong>, www.virditech.<strong>co</strong>.<strong>za</strong><br />

Device: SMART-i<br />

Manufacturer/ brand name:<br />

Virdi<br />

Distribut<strong>or</strong>/Supplier:<br />

Virdi Distribution SA<br />

Biometric technology:<br />

Fingerprint<br />

Hardware description:<br />

Smartphone / tablet<br />

managed we<strong>at</strong>herproof<br />

IP65 terminal with<br />

integr<strong>at</strong>ed camera, supp<strong>or</strong>ts<br />

up to 1 000 users, live and fake<br />

fi nger detection optical scanner,<br />

touch function keys, WiFi and<br />

RS-485 and Wiegand outputs.<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol<br />

• Time and <strong>at</strong>tendance<br />

• P<strong>or</strong>table time and <strong>at</strong>tendance<br />

<strong>Contact</strong> details:<br />

Virdi Distribution SA, +27 (0)21 404 4690,<br />

info@virditech.<strong>co</strong>.<strong>za</strong>, www.virditech.<strong>co</strong>.<strong>za</strong>


Virdi Distribution SA ZKSoftware<br />

Device: AC 2500<br />

Manufacturer/ brand<br />

name: Virdi<br />

Distribut<strong>or</strong>/Supplier: Virdi<br />

Distribution SA<br />

Biometric technology:<br />

Fingerprint<br />

Hardware description:<br />

Powerful low <strong>co</strong>st terminal,<br />

supp<strong>or</strong>ts up to 1 500 users,<br />

live and fake fi nger detection<br />

optical scanner, RFID <strong>or</strong><br />

Mifare card reader, on board<br />

multi I/O <strong>co</strong>ntroller, TCP/IP<br />

with Wiegand output and<br />

optional wireless module.<br />

supp<strong>or</strong>ts SR100 slave reader.<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol<br />

• Time and <strong>at</strong>tendance<br />

• P<strong>or</strong>table time and <strong>at</strong>tendance<br />

<strong>Contact</strong> details:<br />

Virdi Distribution SA, +27 (0)21 404 4690,<br />

info@virditech.<strong>co</strong>.<strong>za</strong>, www.virditech.<strong>co</strong>.<strong>za</strong><br />

ZKSoftware ZKSoftware<br />

Manufacturer/ brand<br />

name: ZKTe<strong>co</strong> / T5-C<br />

Distribut<strong>or</strong>/Supplier:<br />

ACT Tech Services<br />

Biometric technology:<br />

Fingerprint<br />

Hardware description:<br />

The T5-C not only off ers<br />

ease but functionality as<br />

well. Time and <strong>at</strong>tendance<br />

has never been this<br />

simple <strong>co</strong>mbining an easy to use sens<strong>or</strong> with a very practical <strong>co</strong>lour<br />

screen. The polished fi nish to the unit off ers an un<strong>co</strong>mplic<strong>at</strong>ed choice<br />

to where the unit should be installed suiting an offi ce <strong>or</strong> a <strong>co</strong>rp<strong>or</strong><strong>at</strong>e<br />

environment. The unit off ers a wide variety of options with regards to<br />

the <strong>co</strong>mmunic<strong>at</strong>ion options including USB and TCP/IP.<br />

Applic<strong>at</strong>ion:<br />

• Colour TFT screen • St<strong>or</strong>es 3000 templ<strong>at</strong>es<br />

• Built-in serial and Ethernet p<strong>or</strong>ts<br />

• USB p<strong>or</strong>t f<strong>or</strong> manual d<strong>at</strong>a transfer<br />

• Reads fi ngerprints and/<strong>or</strong> PINS<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Repairs • Logistics<br />

• Technical supp<strong>or</strong>t • Training<br />

• Maitenance<br />

<strong>Contact</strong> details: ACT Tech Services, +27 (0)11 023 8789,<br />

anthony@acttechservices.<strong>co</strong>.<strong>za</strong>, www.acttechservices.<strong>co</strong>.<strong>za</strong><br />

Manufacturer/ brand name:<br />

ZKTe<strong>co</strong> / MultiBio 700<br />

Distribut<strong>or</strong>/Supplier: Accsys<br />

Biometric technology: Face, fi ngerprint gerprint<br />

Hardware description: The TFT <strong>co</strong>lour touch<br />

screen of MulitiBio 700 provides ease ase of use<br />

and a rich user experience. The MultiBio ultiBio 700<br />

uses st<strong>at</strong>e of the art 3D imaging technology<br />

echnology<br />

while also providing hygienic 100% % touch-free<br />

biometric authentic<strong>at</strong>ion. The MultiBio tiBio 700<br />

uses ZK’s l<strong>at</strong>est face and fi ngerprint nt<br />

m<strong>at</strong>ching alg<strong>or</strong>ithms which are even ven<br />

faster than its predecess<strong>or</strong>. MultiBio io 700<br />

can do one to many (1:N) m<strong>at</strong>ch up p to<br />

400 faces and 2 000 fi ngerprints. This<br />

vers<strong>at</strong>ile unit can ac<strong>co</strong>mmod<strong>at</strong>e face, ace,<br />

fi ngerprint and RFID card access <strong>co</strong>ntrol. ontrol.<br />

Applic<strong>at</strong>ion:<br />

• Accsys PeopleWare – Time and <strong>at</strong>tendance, ttendance, access <strong>co</strong>ntrol, <strong>co</strong>ntrol, payroll,<br />

HR and ESS server and cloud solution ution on a single d<strong>at</strong>abase. d<strong>at</strong>abase<br />

• Fe<strong>at</strong>ures include managing do<strong>or</strong>s, booms, turnstiles and interfaces<br />

to OEM payrolls.<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Install<strong>at</strong>ion • Implement<strong>at</strong>ion<br />

• Training • Supp<strong>or</strong>t<br />

• Maintenance<br />

<strong>Contact</strong> details: Accsys, +27 (0)11 719 8000, pr@accsys.<strong>co</strong>.<strong>za</strong>,<br />

www.accsys.<strong>co</strong>.<strong>za</strong>.<br />

Manufacturer/ brand name:<br />

ZKTe<strong>co</strong> / L5000 Biometric Do<strong>or</strong>lock<br />

Distribut<strong>or</strong>/Supplier: Assa Abloy<br />

Biometric technology: Fingerprint<br />

Hardware description: The L5000 series<br />

of do<strong>or</strong> locks off ers peace of mind not<br />

only to a house owner but also to any<br />

business enterprise wanting to secure<br />

access <strong>co</strong>ntrol to their premises. With ease<br />

of install<strong>at</strong>ion this st<strong>at</strong>e of the art unit<br />

provides sophistic<strong>at</strong>ion th<strong>at</strong> is easy on the<br />

eye. A 1.2-inch screen th<strong>at</strong> provides all<br />

the <strong>co</strong>mf<strong>or</strong>t of transaction verifi c<strong>at</strong>ions.<br />

The L5000 is manufactured with a robust<br />

casing and also a backup system of<br />

b<strong>at</strong>tery override and key entry.<br />

Applic<strong>at</strong>ion:<br />

• Fingerprint lock<br />

• Vers<strong>at</strong>ile and reliable<br />

• Easy Install<strong>at</strong>ion<br />

• USB interface f<strong>or</strong> d<strong>at</strong>a <strong>co</strong>llection<br />

• 1.2-inch Screen Indic<strong>at</strong>ions<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• In house specifi c<strong>at</strong>ion service • Technical back up<br />

• Repairs<br />

<strong>Contact</strong> details: Assa Abloy, +27(0)11 761 5000,<br />

alistair.thackeray@assaabloy.<strong>co</strong>m, www.assaabloy.<strong>co</strong>m<br />

www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 57


BIOMETRICS SELECTION GUIDE<br />

ZKSoftware ZK Software<br />

Manufacturer/<br />

brand name:<br />

ZKTe<strong>co</strong> / HL100<br />

Dead Bolt Lock<br />

Distribut<strong>or</strong>/<br />

Supplier: Assa Abloy<br />

Biometric<br />

technology:<br />

Fingerprint<br />

Hardware<br />

description:<br />

A unique add-on<br />

security device<br />

with the HL100<br />

Dead Bolt Lock, suited f<strong>or</strong> your offi ce <strong>or</strong> home do<strong>or</strong>s. The device<br />

is manufactured from high density steel and standard American<br />

Cylinder to secure the locking mechanism. External b<strong>at</strong>tery override<br />

is provided to access when b<strong>at</strong>teries have run out. Access methods<br />

include fi ngerprint, PIN and key entry. It’s easy to install with no<br />

wiring and a reversible lock (left and right). The illumin<strong>at</strong>ed keypad<br />

adds value to the small, durable do<strong>or</strong> lock.<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• In house specifi c<strong>at</strong>ion service • Technical back up<br />

• Repairs<br />

<strong>Contact</strong> details: Assa Abloy, +27(0)11 761 5000,<br />

alistair.thackeray@assaabloy.<strong>co</strong>m, www.assaabloy.<strong>co</strong>m<br />

ZKSoftware ZKSoftware<br />

Manufacturer/ brand name: ame:<br />

ZKTe<strong>co</strong> / iFace302<br />

Distribut<strong>or</strong>/Supplier:<br />

Biotrace Business Solutions ns s<br />

Biometric technology:<br />

Fingerprint, face<br />

Hardware description:<br />

This multi-biometric<br />

device is the perfect<br />

Time & Attendance<br />

device, th<strong>at</strong> can also be<br />

<strong>co</strong>mbined f<strong>or</strong> access <strong>co</strong>ntrol. rol.<br />

The iFace302 fe<strong>at</strong>ures a massive 4.3 inch<br />

touch screen, and can ac<strong>co</strong>mmod<strong>at</strong>e 500 facial templ<strong>at</strong>es and<br />

3000 fi ngerprint templ<strong>at</strong>es. Standard fe<strong>at</strong>ures include: SMS, W<strong>or</strong>k<strong>co</strong>de,<br />

DST, Scheduled Bell etc. Communic<strong>at</strong>ion mediums includes TCP/IP, USB<br />

Host, RS-232/485 and Wiegand Out. Easy <strong>co</strong>mmunic<strong>at</strong>ion setup with<br />

third-party <strong>co</strong>ntrollers are an added fe<strong>at</strong>ure of the device.<br />

Applic<strong>at</strong>ion:<br />

• Time and <strong>at</strong>tendance • Access <strong>co</strong>ntrol<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Install<strong>at</strong>ions<br />

• Training<br />

• Technical supp<strong>or</strong>t<br />

<strong>Contact</strong> details:<br />

Biotrace Business Solutions, +27 (0)12 662 2721,<br />

biotrace@w<strong>or</strong>kmail.<strong>co</strong>.<strong>za</strong><br />

58 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

Manufacturer/ brand ndd<br />

name:<br />

ZKTe<strong>co</strong> / L7000 Biometric meetric<br />

Do<strong>or</strong>lock<br />

Distribut<strong>or</strong>/Supplier: er r: Assa Abloy<br />

Biometric technology: oggy:<br />

Fingerprint<br />

Hardware description: ioon:<br />

Elegant, ergonomic an and nd easy are the<br />

three w<strong>or</strong>ds best describing scribing<br />

the L7000<br />

Biometric Fingerprint t Do<strong>or</strong>lock. With an<br />

easy interchangeable e handle from left to<br />

right, it’s easy to install. all.<br />

LCD screen<br />

enhances the stylish<br />

look on the unit, and d<br />

packed with multifact<strong>or</strong><br />

identifi c<strong>at</strong>ion<br />

methods, rugged<br />

sens<strong>or</strong> technology<br />

and a robust mechanical<br />

structure. Standard fe<strong>at</strong>ures include: 500 fi ngerprint templ<strong>at</strong>es,<br />

100 PIN passw<strong>or</strong>ds, 30 000 transaction logs and a USB Host<br />

<strong>co</strong>mmunic<strong>at</strong>ion p<strong>or</strong>t.<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t :<br />

• In house specifi c<strong>at</strong>ion service • Technical back up<br />

• Repairs<br />

<strong>Contact</strong> details:<br />

Assa Abloy, +27(0)11 761 5000, Alistair.thackeray@assaabloy.<strong>co</strong>m,<br />

www.assaabloy.<strong>co</strong>m<br />

Manufacturer/ brand name:<br />

ZKTe<strong>co</strong> / F8-T<br />

Distribut<strong>or</strong>/Supplier: EOH ii<br />

Biometric technology: Fingerprint<br />

Hardware description: The F8-T is a<br />

sleek T&A, with simple access <strong>co</strong>ntrol,<br />

terminal. It integr<strong>at</strong>es the reliable<br />

and durable ZK optical sens<strong>or</strong> and<br />

is available with fi ngerprint, PIN and<br />

RFID re<strong>co</strong>gnition modes.<br />

• 1 500 fi ngerprint templ<strong>at</strong>es<br />

• 50 000 log capacity<br />

• 1 touch 1 se<strong>co</strong>nd re<strong>co</strong>gnition<br />

• Black and White screen with Keypad<br />

• Ethernet, USB (host), RS-232/485 and<br />

Wiegand input/output p<strong>or</strong>ts f<strong>or</strong><br />

<strong>co</strong>mmunic<strong>at</strong>ions<br />

• Fingerprint, PIN and RFID<br />

(125 kHz proximity)<br />

• Supp<strong>or</strong>ts 50 time zones, 5 access <strong>co</strong>ntrol groups and 10<br />

unlock <strong>co</strong>mbin<strong>at</strong>ions<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol • Time and <strong>at</strong>tendance<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Full SDK available f<strong>or</strong> integr<strong>at</strong>ion<br />

<strong>Contact</strong> details:<br />

EOH ii, +27 (0)11 844 3200, siresen.naidoo@eoh.<strong>co</strong>.<strong>za</strong>, www.eohii.<strong>co</strong>.<strong>za</strong>


ZKSoftware ZKSoftware<br />

Manufacturer/ brand<br />

name: ZKTe<strong>co</strong> / IN01-A<br />

Distribut<strong>or</strong>/Supplier:<br />

EOH ii<br />

Biometric technology:<br />

Fingerprint<br />

Hardware description:<br />

The IN01-A is the most<br />

<strong>co</strong>st eff ective and fe<strong>at</strong>ure<br />

packed T&A, with simple<br />

access <strong>co</strong>ntrol, terminal.<br />

Fingerprint, PIN and RFID<br />

re<strong>co</strong>gnition modes are<br />

available.<br />

• 3 000 fi ngerprint templ<strong>at</strong>es<br />

• 100 000 log capacity<br />

• < 1 se<strong>co</strong>nd user re<strong>co</strong>gnition<br />

• 3.5-inch <strong>co</strong>lour touch screen<br />

• Ethernet, USB (host), RS-232/485 and Wiegand input/output p<strong>or</strong>ts f<strong>or</strong><br />

<strong>co</strong>mmunic<strong>at</strong>ions<br />

• Fingerprint, PIN and RFID (125 kHz proximity)<br />

• Built-in b<strong>at</strong>tery backup and power supply included<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol • Time and <strong>at</strong>tendance<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Full SDK available f<strong>or</strong> integr<strong>at</strong>ion<br />

<strong>Contact</strong> details:<br />

EOH ii, +27 (0)11 844 3200, siresen.naidoo@eoh.<strong>co</strong>.<strong>za</strong>, www.eohii.<strong>co</strong>.<strong>za</strong><br />

ZKSoftware ZKSoftware<br />

Manufacturer/ brand name:<br />

ZKTe<strong>co</strong>/ ZK 54<br />

Distribut<strong>or</strong>/Supplier: EOH ii<br />

Biometric technology:<br />

Fingerprint<br />

Hardware description: The ZK<br />

54 is a reliable, durable and highly<br />

accur<strong>at</strong>e access <strong>co</strong>ntrol terminal.<br />

It has an IP54 metal case and is<br />

available in fi ngerprint and RFID<br />

re<strong>co</strong>gnition modes.<br />

• 1 500 fi ngerprint templ<strong>at</strong>es<br />

• 50 000 log transactions<br />

• < 1 se<strong>co</strong>nd user re<strong>co</strong>gnition<br />

• Ethernet, USB (host), Serial and<br />

Wiegand input/output p<strong>or</strong>ts f<strong>or</strong><br />

<strong>co</strong>mmunic<strong>at</strong>ions<br />

• Supp<strong>or</strong>ts 50 time zones, 5 access<br />

<strong>co</strong>ntrol groups and 10 unlock<br />

<strong>co</strong>mbin<strong>at</strong>ions<br />

• Fingerprint and RFID (125 kHz proximity)<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Full SDK available f<strong>or</strong> integr<strong>at</strong>ion<br />

<strong>Contact</strong> details:<br />

EOH ii, +27 (0)11 844 3200, siresen.naidoo@eoh.<strong>co</strong>.<strong>za</strong>, www.eohii.<strong>co</strong>.<strong>za</strong><br />

Manufacturer/ brand name: e:<br />

ZKTe<strong>co</strong> / VF 380<br />

Distribut<strong>or</strong>/Supplier:<br />

EOH ii<br />

Biometric technology:<br />

Facial<br />

Hardware description:<br />

The VF380 is a facial<br />

identifi c<strong>at</strong>ion T&A terminal<br />

with simple access <strong>co</strong>ntrol.<br />

Face, PIN and RFID re<strong>co</strong>gnition on<br />

modes are available. With a<br />

VF380 you can easily manage e<br />

your w<strong>or</strong>kf<strong>or</strong>ce and access <strong>co</strong>ntrol ontrol<br />

effi ciently with an elegant<br />

ergonomic design.<br />

• 200 Facial Templ<strong>at</strong>es<br />

• 100 000 log capacity<br />

• < 1 se<strong>co</strong>nd Verifi c<strong>at</strong>ion speed<br />

• 3” Colour touch screen<br />

• Ethernet and USB (host and client) <strong>co</strong>mmunic<strong>at</strong>ions<br />

• Face, RFID and optional Mifare card<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol • Time and <strong>at</strong>tendance<br />

Integr<strong>at</strong>ion Supp<strong>or</strong>t:<br />

• Full SDK available f<strong>or</strong> integr<strong>at</strong>ion<br />

<strong>Contact</strong> details:<br />

EOH ii, +27 (0)11 844 3200, siresen.naidoo@eoh.<strong>co</strong>.<strong>za</strong>, www.eohii.<strong>co</strong>.<strong>za</strong><br />

Manufacturer/<br />

brand name:<br />

ZKTe<strong>co</strong> / S900 GPRS<br />

Distributer/Supplier:<br />

ERS Biometrics<br />

Biometric technology: :<br />

Fingerprint<br />

Hardware description: :<br />

An advanced fi ngerprint t<br />

reader, can be mounted o<strong>or</strong><br />

r p<strong>or</strong>table.<br />

Built-in card reader (RF, Mifare, ifare iif<br />

HID) HID). D) 33.5-inch 5-inch i h LCD CD ffull full ll <strong>co</strong>lour <strong>co</strong>lour l di display l<br />

clearly indic<strong>at</strong>es d<strong>at</strong>e and time and acceptance <strong>or</strong> rejection of an<br />

employee’s fi nger. Reader can enroll up to 10 fi ngers, re<strong>co</strong>gnition in<br />

under 1 se<strong>co</strong>nd, st<strong>or</strong>ing up to 8 000 fi ngerprints per device as well as<br />

200 000 re<strong>co</strong>rds. Communic<strong>at</strong>es with server via GPRS <strong>or</strong> LAN. Built-in<br />

relay f<strong>or</strong> access <strong>co</strong>ntrol, integr<strong>at</strong>ing with maglocks, turnstiles, etc.<br />

Built-in siren functionality.<br />

Applic<strong>at</strong>ion:<br />

• Time and <strong>at</strong>tendance • Access <strong>co</strong>ntrol<br />

• Job <strong>co</strong>sting<br />

Integr<strong>at</strong>ion Supp<strong>or</strong>t:<br />

• Call centre to c<strong>at</strong>er f<strong>or</strong> inbound queries<br />

• 48-month swap-out warranty on hardware<br />

• Comprehensive service level agreement<br />

• N<strong>at</strong>ionwide supp<strong>or</strong>t <strong>co</strong>verage<br />

<strong>Contact</strong> details: ERS Biometrics, +27 (0)10 593 0593,<br />

www.ersbiometrics.<strong>co</strong>.<strong>za</strong>, sales@ersbiometrics.<strong>co</strong>.<strong>za</strong><br />

www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 59


BIOMETRICS SELECTION GUIDE<br />

ZKSoftware ZKSoftware<br />

Manufacturer/ brand<br />

name: ZKTe<strong>co</strong> / iClock580<br />

Distribut<strong>or</strong>/Supplier:<br />

Pinnacle<br />

Biometric technology:<br />

Fingerprint<br />

Hardware description:<br />

The iclock 580 off ers<br />

sophistic<strong>at</strong>ion with<br />

practicality. The unit<br />

can c<strong>at</strong>er f<strong>or</strong> time and<br />

<strong>at</strong>tendance as well as an access <strong>co</strong>ntrol applic<strong>at</strong>ion. This ensures<br />

value f<strong>or</strong> money giving you a duel applic<strong>at</strong>ion f<strong>or</strong> the price of one.<br />

The device is equipped with the l<strong>at</strong>est technology of the ZK Sens<strong>or</strong><br />

and Version 10 alg<strong>or</strong>ithm. This sophistic<strong>at</strong>ion m<strong>at</strong>ched with its st<strong>at</strong>e<br />

of the art alg<strong>or</strong>ithm off ers speed, accuracy and peace of mind.<br />

Applic<strong>at</strong>ion:<br />

• Colour TFT screen<br />

• St<strong>or</strong>es 8000 templ<strong>at</strong>es<br />

• Built-in serial and Ethernet p<strong>or</strong>ts<br />

• USB p<strong>or</strong>t f<strong>or</strong> manual d<strong>at</strong>a transfer<br />

• Reads fi ngerprints and/<strong>or</strong> PINS<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Repairs • Logistics<br />

• Technical supp<strong>or</strong>t • Training<br />

• Maitenance<br />

<strong>Contact</strong> details: Pinnacle, +27 (0)11 265 3323, jeanc@pinnacle.<strong>co</strong>.<strong>za</strong>,<br />

www.pinnacleafrica.<strong>co</strong>.<strong>za</strong><br />

ZKSoftware ZKSoftware<br />

Manufacturer/ brand name:<br />

ZKTe<strong>co</strong>/LK170<br />

Distribut<strong>or</strong>/Supplier: Regal Security<br />

Biometric technology: Fingerprint<br />

Hardware description: The LK170 is<br />

a fi ngerprint device f<strong>or</strong> access <strong>co</strong>ntrol<br />

and time and <strong>at</strong>tendance with proven<br />

reliability and accuracy. Can be used as<br />

a stand-alone unit <strong>or</strong> <strong>co</strong>nnected to a<br />

PC. Internal relay can be used to <strong>co</strong>ntrol<br />

an electronic lock. Wiegand output<br />

allows f<strong>or</strong> easy interface to third-party<br />

access <strong>co</strong>ntrol panels. The unit fe<strong>at</strong>ures a<br />

mem<strong>or</strong>y th<strong>at</strong> can hold 3 000 fi ngerprint<br />

templ<strong>at</strong>es and 50 000 transaction logs.<br />

Tamper switch on the back f<strong>or</strong> added<br />

vandalism protection.<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol<br />

• Time and <strong>at</strong>tendance<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Biometric devices<br />

• Time and <strong>at</strong>tendance devices<br />

• Training<br />

<strong>Contact</strong> details:<br />

Regal Security, +27 (0)11 553 3300,<br />

sales@regalsecurity.<strong>co</strong>.<strong>za</strong>, www.regalsecurity.<strong>co</strong>.<strong>za</strong><br />

60 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

Manufacturer/ brand<br />

name: ZKTe<strong>co</strong>/LK173<br />

Distribut<strong>or</strong>/Supplier:<br />

Regal Security<br />

Biometric<br />

technology:<br />

Fingerprint<br />

Hardware<br />

description: The<br />

LK173 is a small<br />

rugged, metal housed<br />

fi ngerprint reader.<br />

The we<strong>at</strong>her-resistant housing makes it suitable f<strong>or</strong> outdo<strong>or</strong><br />

applic<strong>at</strong>ions. Suited to both access <strong>co</strong>ntrol and T&A applic<strong>at</strong>ions.<br />

Running on the l<strong>at</strong>est alg<strong>or</strong>ithm of version 10, makes this reader<br />

an extreme <strong>co</strong>ntender in the market. An internal relay can <strong>co</strong>ntrol<br />

electronic locks, includes Wiegand output. Stand-alone <strong>or</strong> PC<br />

oper<strong>at</strong>ion. St<strong>or</strong>es up to 1 500 fi ngerprint templ<strong>at</strong>es and 30 000 logs.<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol<br />

• Time and <strong>at</strong>tendance<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Biometric devices<br />

• Time and <strong>at</strong>tendance devices<br />

• Training<br />

<strong>Contact</strong> details: Regal Security, +27 (0)11 553 3300,<br />

sales@regalsecurity.<strong>co</strong>.<strong>za</strong>, www.regalsecurity.<strong>co</strong>.<strong>za</strong><br />

Manufacturer/ brand name:<br />

ZKTe<strong>co</strong> / F4 GPRS<br />

Distribut<strong>or</strong>/Supplier: SAPROnet<br />

Biometric technology: Fingerprint nt<br />

Hardware Description: The only<br />

true biometric p<strong>or</strong>table solution with th<br />

the added benefi t of proximity card d<br />

technology, tail<strong>or</strong> made f<strong>or</strong> the<br />

<strong>co</strong>nstruction/farming <strong>co</strong>mmunity.<br />

Oper<strong>at</strong>ing in <strong>co</strong>njunction with the<br />

Viper Product Suite, you can now use se<br />

cell phone technology (GPRS). Trans-<br />

actions are autom<strong>at</strong>ically upd<strong>at</strong>ed to o<br />

our dedic<strong>at</strong>ed cloud server with a<br />

st<strong>or</strong>age capacity of 100 000 transactions onsper per reader reader. User inf<strong>or</strong>m<strong>at</strong>ion<br />

including fi ngerprint templ<strong>at</strong>es are upd<strong>at</strong>ed via the Internet (up to 3 000<br />

templ<strong>at</strong>es per reader) and backups retained on our cloud server.<br />

Applic<strong>at</strong>ion:<br />

• Time and <strong>at</strong>tendance • Access <strong>co</strong>ntrol<br />

• Piecew<strong>or</strong>k • Wage calcul<strong>at</strong><strong>or</strong><br />

• Personnel / leave registers<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• All maj<strong>or</strong> payrolls (i.e. VIP, Pastel etc.) • SAP<br />

• SQL • Cloud server<br />

• Customised d<strong>at</strong>a <strong>co</strong>llection<br />

<strong>Contact</strong> details: SAPROnet, +27 (0)12 667-6739,<br />

admin@sapronet.<strong>co</strong>.<strong>za</strong>, www.sapronet.<strong>co</strong>.<strong>za</strong>


ZKSoftware ZKSoftware<br />

Manufacturer/ brand name:<br />

ZKTe<strong>co</strong> / F9<br />

Distribut<strong>or</strong>/Supplier: SAPROnet<br />

Biometric technology: Fingerprint<br />

Hardware description: The most <strong>co</strong>st<br />

eff ective biometric time and <strong>at</strong>tendance<br />

and access <strong>co</strong>ntrol solution w<strong>or</strong>king<br />

in <strong>co</strong>njunction with the Viper Product<br />

Suite. The F9 Reader not only st<strong>or</strong>es up<br />

to 3 000 fi ngerprint templ<strong>at</strong>es but it can<br />

also retain up to 100 000 transactions<br />

per reader. Upd<strong>at</strong>ing your Viper system<br />

is a breeze either via your local LAN<br />

(IP) <strong>or</strong> via the Internet to our dedic<strong>at</strong>ed<br />

cloud server. The d<strong>at</strong>a is immedi<strong>at</strong>ely<br />

available with the added benefi t of<br />

secure backups.<br />

Applic<strong>at</strong>ion:<br />

• Time and <strong>at</strong>tendance • Access <strong>co</strong>ntrol<br />

• Piecew<strong>or</strong>k • Wage calcul<strong>at</strong><strong>or</strong><br />

• Personnel / leave registers<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• All maj<strong>or</strong> payrolls (i.e. VIP, Pastel etc.) • SAP<br />

• SQL • Cloud Server<br />

• Customised d<strong>at</strong>a <strong>co</strong>llection<br />

<strong>Contact</strong> details: SAPROnet, +27 (0)12 667-6739,<br />

admin@sapronet.<strong>co</strong>.<strong>za</strong>, www.sapronet.<strong>co</strong>.<strong>za</strong><br />

ZKSoftware ZKSoftware are<br />

Manufacturer/ brand name:<br />

ZKTe<strong>co</strong> / F708<br />

Distributer/Supplier: Security<br />

Equipment Centre<br />

Biometric technology: Fingerprint<br />

Hardware description:<br />

• The F708 is a proven fi ngerprint<br />

terminal f<strong>or</strong> access <strong>co</strong>ntrol and time and<br />

<strong>at</strong>tendance.<br />

• Version 9 fi ngerprint alg<strong>or</strong>ithm.<br />

• 1 500 fi ngerprint templ<strong>at</strong>es and 30 000<br />

transaction capacity.<br />

• Built-in relays f<strong>or</strong> locks, do<strong>or</strong> sens<strong>or</strong>s,<br />

open do<strong>or</strong> alarms and exit sens<strong>or</strong>s.<br />

• Wiegand output, TCP/IP, 485 and 232<br />

p<strong>or</strong>ts.<br />

• Stand alone <strong>or</strong> netw<strong>or</strong>kable.<br />

• LCD screen.<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol • Time and <strong>at</strong>tendance<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Two-year warranty • Access <strong>co</strong>ntrol software<br />

• Time and <strong>at</strong>tendance software • Telephonic backup<br />

• Training and repairs<br />

<strong>Contact</strong> details:<br />

Security Equipment Centre, +27 (0)11 452 1410, sales@secsa.<strong>co</strong>.<strong>za</strong>,<br />

www.secsa.<strong>co</strong>.<strong>za</strong><br />

Manufacturer/ brand name:<br />

ZKTe<strong>co</strong> / TA880<br />

Distribut<strong>or</strong>/Supplier: Security<br />

Equipment Centre<br />

Biometric technology: Fingerprint<br />

Hardware description:<br />

• The TA 880 fi ngerprint terminal is<br />

designed f<strong>or</strong> high security access<br />

<strong>co</strong>ntrol and time and <strong>at</strong>tendance<br />

applic<strong>at</strong>ions.<br />

• Version 10 fi ngerprint alg<strong>or</strong>ithm.<br />

• 3 000 fi ngerprint templ<strong>at</strong>es and<br />

100 000 transaction capacity.<br />

• Built-in relays f<strong>or</strong> locks, do<strong>or</strong> sens<strong>or</strong>s,<br />

open do<strong>or</strong> alarms and exit sens<strong>or</strong>s.<br />

• Wiegand input and output, TCP/IP, 485<br />

and 232 p<strong>or</strong>ts.<br />

• Stand alone <strong>or</strong> netw<strong>or</strong>kable.<br />

• F12 slave reader available.<br />

• LCD screen.<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol • Time and <strong>at</strong>tendance<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Two-year warranty • Access <strong>co</strong>ntrol software<br />

• Time and <strong>at</strong>tendance software • Telephonic backup<br />

• Training and repairs<br />

<strong>Contact</strong> details: Security Equipment Centre, +27 (0)11 452 1410,<br />

sales@secsa.<strong>co</strong>.<strong>za</strong>, www.secsa.<strong>co</strong>.<strong>za</strong><br />

Manufacturer/<br />

brand name:<br />

ZKTe<strong>co</strong> / iClock990 990<br />

Distribut<strong>or</strong>/Supplier: pplier:<br />

Sentri Systems<br />

Biometric technology: nology:<br />

Fingerprint.<br />

Hardware description: cription:<br />

This unique device is used f<strong>or</strong><br />

d<strong>at</strong>a capture mainly f<strong>or</strong> tracking job <strong>co</strong>sting. Use the bar<strong>co</strong>de<br />

scanner to scan an employee, job number, then the task: Who is<br />

w<strong>or</strong>king on wh<strong>at</strong> job; Wh<strong>at</strong> is the job st<strong>at</strong>us right now, wh<strong>at</strong> task?<br />

On-board TCP/IP and USB p<strong>or</strong>t. Large mem<strong>or</strong>y of 8 000 fi ngerprint<br />

templ<strong>at</strong>es and 200 000 transactions.<br />

Applic<strong>at</strong>ion:<br />

• Time and <strong>at</strong>tendance • D<strong>at</strong>a <strong>co</strong>llection<br />

• Asset management • Access <strong>co</strong>ntrol<br />

• Fully customisable fi rmware<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Software developer<br />

• Install<strong>at</strong>ions & training (Gauteng)<br />

• Technical supp<strong>or</strong>t<br />

• Reseller planning<br />

• Repairs<br />

<strong>Contact</strong> details:<br />

Sentri Systems, +27 (0)11 704 7000,<br />

Jason@Sentri.<strong>co</strong>.<strong>za</strong>, www.sentri.<strong>co</strong>.<strong>za</strong><br />

www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 61


BIOMETRICS SELECTION GUIDE<br />

ZKSoftware ZKSoftware<br />

Manufacturer/ brand name:<br />

ZKTe<strong>co</strong> / F18<br />

Distribut<strong>or</strong>/Supplier:<br />

Smart Access Projects<br />

Biometric technology: Fingerprint<br />

Hardware description: The F18 is a<br />

fi ngerprint with RFID reader f<strong>or</strong> access<br />

<strong>co</strong>ntrol and time and <strong>at</strong>tendance.<br />

Standard fe<strong>at</strong>ures are: 3 000 fi ngerprint<br />

templ<strong>at</strong>es and 30 000 clocking<br />

transactions. Built-in relays f<strong>or</strong> locks,<br />

do<strong>or</strong> sens<strong>or</strong>s, open do<strong>or</strong> alarms<br />

and exit sens<strong>or</strong>s. Wiegand input/<br />

output p<strong>or</strong>ts, onboard serial, TCP/IP<br />

and USB p<strong>or</strong>ts f<strong>or</strong> <strong>co</strong>mmunic<strong>at</strong>ions.<br />

Two-year warranty. Powered by our<br />

AiXaro time and access software fully<br />

integr<strong>at</strong>ed with ZK hardware. AiXaro<br />

is a <strong>co</strong>mprehensive access <strong>co</strong>ntrol and<br />

time and <strong>at</strong>tendance solution th<strong>at</strong> provides eff ective and effi cient<br />

access <strong>co</strong>ntrol and time and <strong>at</strong>tendance to small <strong>or</strong> large businesses.<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol • Time and <strong>at</strong>tendance<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Consulting • Install<strong>at</strong>ions<br />

• Supp<strong>or</strong>t • Integr<strong>at</strong>ion<br />

<strong>Contact</strong> details: Smart Access Projects, +27 (0)11 475 1210,<br />

smartaccess@lantic.net, www.smartacs.<strong>co</strong>.<strong>za</strong><br />

ZKSoftware ZKSoftware<br />

Manufacturer/ brand<br />

name: ZKTe<strong>co</strong> / X628-C<br />

Distribut<strong>or</strong>/Supplier: Time<br />

Access & Automotive Systems<br />

Biometric technology:<br />

Fingerprint<br />

Hardware description:<br />

The X628-C is an innov<strong>at</strong>ive<br />

biometric fi ngerprint terminal<br />

f<strong>or</strong> time and <strong>at</strong>tendance<br />

applic<strong>at</strong>ions, off ering unparalleled perf<strong>or</strong>mance using an advanced<br />

alg<strong>or</strong>ithm f<strong>or</strong> reliability, precision and excellent m<strong>at</strong>ching speed. The<br />

3-inch TFT can display m<strong>or</strong>e inf<strong>or</strong>m<strong>at</strong>ion vividly, including fi ngerprint<br />

image quality and verifi c<strong>at</strong>ion result etc. TCP/IP <strong>co</strong>mmunic<strong>at</strong>ion is<br />

a standard fe<strong>at</strong>ure and makes sure the d<strong>at</strong>a transmission between<br />

terminal and PC can be easily done within several se<strong>co</strong>nds. Standard<br />

fe<strong>at</strong>ures include 3 000 fi ngerprint templ<strong>at</strong>es and 100 000 transaction<br />

logs.<br />

Applic<strong>at</strong>ion:<br />

• Time and <strong>at</strong>tendance<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Biometric devices<br />

• Time and <strong>at</strong>tendance devices<br />

• Training<br />

• Install<strong>at</strong>ions<br />

<strong>Contact</strong> details: Time Access & Automotive Systems,<br />

+27 (0)11 326 4146, adriang@lantic.net, www.timeandautomotive.<strong>co</strong>.<strong>za</strong><br />

62 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

Manufacturer/ brand raand<br />

name:<br />

ZKTe<strong>co</strong> / DS100<br />

Distribut<strong>or</strong>/Supplier: pliier:<br />

Smart Access<br />

Projects<br />

Biometric<br />

technology:<br />

Fingerprint<br />

Hardware<br />

description: The DS<br />

S 100 is a dual sens<strong>or</strong><br />

time and <strong>at</strong>tendance terminal. The DS100 valid<strong>at</strong>es fi ngerprint<br />

clocking quickly and accur<strong>at</strong>ely via the dedic<strong>at</strong>ed In and Out ZK<br />

crystal sens<strong>or</strong>. A display <strong>co</strong>nfi rms the user’s clocking. Connectivity<br />

is via TCP/IP, built-in b<strong>at</strong>tery backup, onboard USB p<strong>or</strong>t f<strong>or</strong><br />

<strong>co</strong>mmunic<strong>at</strong>ions. Two-year warranty. Powered by our AiXaro time<br />

and access software fully integr<strong>at</strong>ed with ZK hardware. AiXaro is a<br />

<strong>co</strong>mprehensive access <strong>co</strong>ntrol and time and <strong>at</strong>tendance solution<br />

th<strong>at</strong> provides eff ective and effi cient access <strong>co</strong>ntrol and time and<br />

<strong>at</strong>tendance to small <strong>or</strong> large businesses.<br />

Applic<strong>at</strong>ion:<br />

• Time and <strong>at</strong>tendance<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Consulting • Install<strong>at</strong>ions<br />

• Supp<strong>or</strong>t • Integr<strong>at</strong>ion<br />

<strong>Contact</strong> details:<br />

Smart Access Projects, +27 (0)11 475 1210,<br />

smartaccess@lantic.net,<br />

www.smartacs.<strong>co</strong>.<strong>za</strong><br />

Manufacturer/ brand name:<br />

ZKTe<strong>co</strong> /iClock700<br />

Distribut<strong>or</strong>/Supplier: Time<br />

Access & Automotive Systems<br />

Biometric technology:<br />

Fingerprint<br />

Hardware description: The<br />

iClock700 time and <strong>at</strong>tendance<br />

and access <strong>co</strong>ntrol terminal<br />

adopts the l<strong>at</strong>est pl<strong>at</strong>f<strong>or</strong>m with version i 10 fi ngerprint i alg<strong>or</strong>ithm l i h to<br />

improve identifi c<strong>at</strong>ion speed. It can manage 8 000 templ<strong>at</strong>es within 1.5<br />

se<strong>co</strong>nd (I: N identifi c<strong>at</strong>ion). IClock700 fe<strong>at</strong>ures ZK’s high perf<strong>or</strong>mance,<br />

high image quality optical fi ngerprint sens<strong>or</strong>. The iClock700 can be used<br />

in multi-fact<strong>or</strong> authentic<strong>at</strong>ion th<strong>at</strong> supp<strong>or</strong>ts fi ngerprint, passw<strong>or</strong>d and<br />

proximity. It <strong>co</strong>mes standard with TCP/IP, RS-232/485, USB-host, backup<br />

b<strong>at</strong>tery and has access <strong>co</strong>ntrol <strong>co</strong>nnectivity f<strong>or</strong> Wiegand-in/out, do<strong>or</strong><br />

lock <strong>co</strong>nnection, alarm and a bell.<br />

Applic<strong>at</strong>ion:<br />

• Time and <strong>at</strong>tendance<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Biometric devices<br />

• Time and <strong>at</strong>tendance devices<br />

• Training<br />

• Install<strong>at</strong>ions<br />

<strong>Contact</strong> details:<br />

Time Access & Automotive Systems, +27 (0)11 326 4146,<br />

adriang@lantic.net, www.timeandautomotive.<strong>co</strong>.<strong>za</strong>


ZKSoftware ZKSoftware<br />

Manufacturer/ brand name: ame: ZKTe<strong>co</strong> / G<strong>at</strong>emouse<br />

Distribut<strong>or</strong>/Supplier: ZKAccess KKAccess<br />

Biometric technology: FFingerprint<br />

Fingerprint<br />

Hardware description:<br />

Securing your personal<br />

inf<strong>or</strong>m<strong>at</strong>ion on your<br />

<strong>co</strong>mputer has its<br />

limit<strong>at</strong>ions. The<br />

Biometric G<strong>at</strong>emouse is<br />

the perfect solution f<strong>or</strong><br />

home and offi ce security<br />

of personal fi les and Internet net<br />

passw<strong>or</strong>ds. Unlocking your Windows ac<strong>co</strong>unt with a single<br />

press of the fi nger, enhances the <strong>co</strong>mf<strong>or</strong>table use of this product.<br />

The easy to use applic<strong>at</strong>ion will assist with the setup of the passw<strong>or</strong>ds<br />

and users. With a new SDK available the G<strong>at</strong>emouse off ers much m<strong>or</strong>e<br />

than just <strong>co</strong>mputer security.<br />

Applic<strong>at</strong>ion:<br />

• Time and <strong>at</strong>tendance<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Manufacturers of biometric devices<br />

• Time and <strong>at</strong>tendance<br />

• Telephonic supp<strong>or</strong>t<br />

• Local repairs and warranty replacements<br />

<strong>Contact</strong> details:<br />

ZKAccess, +27 (0)12 259 1047, info@zkte<strong>co</strong>.<strong>co</strong>.<strong>za</strong>,<br />

www.zkte<strong>co</strong>.<strong>co</strong>.<strong>za</strong><br />

ZKSoftware ZKSoftware<br />

Manufacturer/ brand name:<br />

ZKTe<strong>co</strong> / F7<br />

Distribut<strong>or</strong>/Supplier: ZKAccess<br />

Biometric technology: Fingerprint<br />

Hardware description: Over time this<br />

unit has proved itself to be a reliable<br />

biometric access <strong>co</strong>ntrol device. The<br />

black and white LCD screen adds value<br />

to the device and is geared to keep<br />

3 000 fi ngerprint templ<strong>at</strong>es. TCP/IP<br />

and Wiegand input / output are the<br />

main <strong>co</strong>mmunic<strong>at</strong>ion methods. The<br />

F7 is manufactured with a tamper<br />

switch to prevent unwanted removal<br />

of the device. A full SDK is available<br />

f<strong>or</strong> integr<strong>at</strong>ion. It’s easy to install<br />

and <strong>co</strong>nnect to third-party access<br />

<strong>co</strong>ntrollers.<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Manufacturers of biometric devices<br />

• Time and <strong>at</strong>tendance<br />

• Telephonic supp<strong>or</strong>t<br />

• Local repairs and warranty replacements<br />

<strong>Contact</strong> details:<br />

ZKAccess, +27 (0)12 259 1047, info@zkte<strong>co</strong>.<strong>co</strong>.<strong>za</strong>, www.zkte<strong>co</strong>.<strong>co</strong>.<strong>za</strong><br />

Manufacturer/ brand name:<br />

ZKTe<strong>co</strong> / F12<br />

Distribut<strong>or</strong>/Supplier: ZKAccess<br />

Biometric technology:<br />

Fingerprint<br />

Hardware description: The<br />

F12 is our fl agship Slave reader<br />

not only can the unit be used<br />

indo<strong>or</strong>s but outdo<strong>or</strong>s as well. This<br />

unit fi ts perfectly into an offi ce<br />

environment as well as giving<br />

access to an area exposed to the<br />

elements. The F12 off ers a unique<br />

opp<strong>or</strong>tunity to w<strong>or</strong>k either with<br />

our multibio <strong>co</strong>ntroller <strong>or</strong> with<br />

some of our select biometric<br />

readers. The unique size of the<br />

unit makes f<strong>or</strong> an easy instill<strong>at</strong>ion using RS-485 as its main source of<br />

<strong>co</strong>mmunic<strong>at</strong>ion.<br />

Applic<strong>at</strong>ion:<br />

• ZK sens<strong>or</strong> • IP 65 r<strong>at</strong>ed<br />

• RS 485<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Repairs • Logistics<br />

• Technical supp<strong>or</strong>t • Training<br />

• Maintenance<br />

<strong>Contact</strong> details: ZKAccess, +27 (0)12 259 1047, info@zkte<strong>co</strong>.<strong>co</strong>.<strong>za</strong>,<br />

www.zkte<strong>co</strong>.<strong>co</strong>.<strong>za</strong><br />

Manufacturer/ brand name:<br />

ZKTe<strong>co</strong> / F6<br />

Distribut<strong>or</strong>/Supplier: ZKAccess<br />

Biometric technology: Fingerprint<br />

Hardware description: The F6 unit<br />

although small and <strong>co</strong>mpact off ers<br />

a wide and dynamic solution to the<br />

South African market. Built to oper<strong>at</strong>e<br />

as a slave reader, the SD card off ers a<br />

suitable option to exp<strong>or</strong>t inf<strong>or</strong>m<strong>at</strong>ion.<br />

This unit not only off ers the version 10<br />

alg<strong>or</strong>ithm but one can use the RFID<br />

function on this unit. The unit provides<br />

f<strong>or</strong> RS-485 <strong>co</strong>mmunic<strong>at</strong>ion th<strong>at</strong> can link<br />

with <strong>co</strong>nsumm<strong>at</strong>e ease to any of our<br />

biometric readers.<br />

Applic<strong>at</strong>ion:<br />

• Version 10 alg<strong>or</strong>ithm • St<strong>or</strong>es 500 templ<strong>at</strong>es<br />

• Wiegand p<strong>or</strong>ts • 30 000 transactions<br />

• SD card<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Repairs • Logistics<br />

• Technical supp<strong>or</strong>t • Training<br />

• Maintenance<br />

<strong>Contact</strong> details:<br />

ZKAccess, +27 (0)12 259 1047, info@zkte<strong>co</strong>.<strong>co</strong>.<strong>za</strong>,<br />

www.zkte<strong>co</strong>.<strong>co</strong>.<strong>za</strong>.<br />

www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 63


BIOMETRICS SELECTION GUIDE<br />

ZKSoftware ZKSoftware<br />

Manufacturer/ brand<br />

name: ZKTe<strong>co</strong> / U160-C<br />

Distribut<strong>or</strong>/Supplier:<br />

ZKSoftware<br />

Biometric technology:<br />

Fingerprint<br />

Hardware description:<br />

Full <strong>co</strong>lour time and<br />

<strong>at</strong>tendance is be<strong>co</strong>ming<br />

m<strong>or</strong>e and m<strong>or</strong>e popular<br />

in the market and this is exactly xactly wh<strong>at</strong> the U160 U160-C C is capable of<br />

doing. Running on the l<strong>at</strong>est Version 10 release of alg<strong>or</strong>ithm with<br />

re<strong>co</strong>gnition of less than 1 se<strong>co</strong>nd, makes this a powerful player in<br />

the market. Standard fe<strong>at</strong>ures f<strong>or</strong> the clients’ needs include 3 000<br />

fi ngerprint templ<strong>at</strong>es, 100 000 transactions and Fingerprint / pin /<br />

RFID card verifi c<strong>at</strong>ion methods. Built-in Ethernet, serial p<strong>or</strong>ts and USB<br />

host adds to the <strong>co</strong>mmunic<strong>at</strong>ion.<br />

Applic<strong>at</strong>ion:<br />

• Time and <strong>at</strong>tendance<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Manufacturers of biometric devices<br />

• Time and <strong>at</strong>tendance<br />

• Telephonic supp<strong>or</strong>t<br />

• Local repairs and warranty replacements<br />

<strong>Contact</strong> details: ZKSoftware, +27 (0)12 259 1047,<br />

info@zkte<strong>co</strong>.<strong>co</strong>.<strong>za</strong>, www.zkte<strong>co</strong>.<strong>co</strong>.<strong>za</strong><br />

64 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

Manufacturer/<br />

brand name:<br />

ZKTe<strong>co</strong> / Biopad 100<br />

Distribut<strong>or</strong>/Supplier:<br />

ZKSoftware<br />

Biometric technology:<br />

Fingerprint<br />

Hardware description:<br />

Size does m<strong>at</strong>ter! The<br />

new 7-inch full <strong>co</strong>lour<br />

touch screen time &<br />

<strong>at</strong>tendance device will<br />

capture a unique audience in the market. The potential of the unit<br />

is unlimited, especially after it’s running on Windows CE. The Open<br />

pl<strong>at</strong>f<strong>or</strong>m will assist with the development of the custom fi rmware<br />

on the unit. The 6000 fi ngerprint templ<strong>at</strong>es will add benefi t when<br />

installed in the <strong>co</strong>rp<strong>or</strong><strong>at</strong>e market.<br />

Applic<strong>at</strong>ion:<br />

• Time and <strong>at</strong>tendance<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Manufacturers of biometric devices • Time and <strong>at</strong>tendance<br />

• Local repairs and warranty replacements • Telephonic supp<strong>or</strong>t<br />

<strong>Contact</strong> details:<br />

ZKSoftware, +27 (0)12 259 1047,<br />

info@zkte<strong>co</strong>.<strong>co</strong>.<strong>za</strong>,<br />

www.zkte<strong>co</strong>.<strong>co</strong>.<strong>za</strong>


www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 65


66 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m


ADI Global Distribution ADI Global Distribution<br />

Device/Solution:<br />

CDVI/ATRIUM<br />

Manufacturer/<br />

brand name:<br />

CDVI/ATRIUM<br />

Distribut<strong>or</strong>/<br />

Supplier: ADI<br />

Global Distribution<br />

Product<br />

description:<br />

ATRIUM is the<br />

l<strong>at</strong>est access<br />

<strong>co</strong>ntrol system f<strong>or</strong><br />

up to 10 Do<strong>or</strong>s.<br />

ATRIUM is fast and<br />

inexpensive to<br />

install thanks to autodetect do<strong>or</strong> expanders and can be wired in alarm<br />

cable. With a built in Web server ATRIUM be<strong>co</strong>mes available online<br />

anytime, anywhere on your PC, smartphone <strong>or</strong> tablet.<br />

Applic<strong>at</strong>ion: Online access <strong>co</strong>ntrol<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t: Product integr<strong>at</strong>es seamlessly with the Sagem<br />

biometrics range and with NUUO and Milestone.<br />

<strong>Contact</strong> details:<br />

ADI Global Distribution,<br />

0860 22 55 23, g<strong>or</strong>don.mo<strong>or</strong>e2@adiglobal.<strong>co</strong>m<br />

Manufacturer/brand f t /b d name: CCentaur t<br />

Distribut<strong>or</strong>/Supplier: ADI Global Distribution<br />

Product description: With over 10 years in the market (w<strong>or</strong>ldwide),<br />

Centaur access <strong>co</strong>ntrol has established itself as one of the industry<br />

leaders f<strong>or</strong> easy to use access <strong>co</strong>ntrol systems.<br />

Applic<strong>at</strong>ion: Online access <strong>co</strong>ntrol<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t: Product integr<strong>at</strong>es seamlessly with the<br />

Sagem biometrics range and with NUUO and Milestone.<br />

<strong>Contact</strong> details:<br />

ADI Global Distribution, 0860 22 55 23,<br />

g<strong>or</strong>don.mo<strong>or</strong>e2@adiglobal.<strong>co</strong>m<br />

ADI Global Distribution ADI Global Distribution<br />

Manufacturer/brand<br />

name: Honeywell<br />

WIN-PAK<br />

Distribut<strong>or</strong>/<br />

Supplier: ADI Global<br />

Distribution<br />

Product description:<br />

Honeywell’s WIN-<br />

PAK software suite<br />

provides a range<br />

of solutions from<br />

access <strong>co</strong>ntrol only<br />

to fully integr<strong>at</strong>ed<br />

security solutions. WIN-PAK’s powerful user interface allows dealers to<br />

install a single software f<strong>or</strong> all of its customers’ security needs. WIN-<br />

PAK XE (Express Edition) is the baseline software package f<strong>or</strong> access<br />

<strong>co</strong>ntrol only. Manage NetAXS and NS2/NS2P <strong>co</strong>ntrollers from a single<br />

w<strong>or</strong>kst<strong>at</strong>ion. WIN-PAK XE is ideal f<strong>or</strong> single w<strong>or</strong>kst<strong>at</strong>ion systems th<strong>at</strong><br />

require access only functionality.<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol • Integr<strong>at</strong>ion with video and intrusion<br />

• Flo<strong>or</strong> plans<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t off ered:<br />

• Planning • Project supp<strong>or</strong>t<br />

• RMA<br />

<strong>Contact</strong> details: ADI Global Distribution,<br />

0860 22 55 23, g<strong>or</strong>don.mo<strong>or</strong>e2@adiglobal.<strong>co</strong>m<br />

ACCESS SELECTION GUIDE<br />

Manufacturer/brand<br />

name: Honeywell<br />

NetAXS-123<br />

Distribut<strong>or</strong>/Supplier:<br />

ADI Global Distribution<br />

Product description:<br />

Honeywell’s<br />

NetAXS-123 is a Webbased<br />

access <strong>co</strong>ntrol<br />

solution f<strong>or</strong> one, two<br />

<strong>or</strong> three do<strong>or</strong>s - f<strong>or</strong><br />

smaller sites such as<br />

restaurants, medical<br />

offi ces <strong>or</strong> daycares, NetAXS-123 off ers the scalability to aff <strong>or</strong>dably<br />

expand the system one do<strong>or</strong> <strong>at</strong> a time. With two available enclosure<br />

options to choose from, you can select the fe<strong>at</strong>ures and capabilities best<br />

suited f<strong>or</strong> each install<strong>at</strong>ion. The user-friendly design makes it simple to<br />

install and easy to oper<strong>at</strong>e and maintain, no need to install any software.<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol • Web based<br />

• Integr<strong>at</strong>e IP video<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t off ered:<br />

• Planning • Project supp<strong>or</strong>t<br />

• RMA<br />

<strong>Contact</strong> details:<br />

ADI Global Distribution, 0860 22 55 23,<br />

g<strong>or</strong>don.mo<strong>or</strong>e2@adiglobal.<strong>co</strong>m<br />

www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 67


ACCESS SELECTION GUIDE<br />

CEM Systems CEM Systems<br />

Device/Solution: AC2000 SE<br />

(Standard Edition)<br />

Distribut<strong>or</strong>/Supplier:<br />

CEM Systems<br />

Product Description:<br />

AC2000 SE (Standard Edition)<br />

is a powerful and fully<br />

integr<strong>at</strong>ed access <strong>co</strong>ntrol,<br />

alarm processing and photo<br />

badging system with a set<br />

of software and hardware<br />

fe<strong>at</strong>ures th<strong>at</strong> make it one<br />

of the most <strong>co</strong>mprehensive<br />

security management<br />

systems available. Innov<strong>at</strong>ive<br />

software fe<strong>at</strong>ures include the<br />

ability to enrol and manage<br />

biometric templ<strong>at</strong>es, visit<strong>or</strong> management, vehicles management and<br />

much m<strong>or</strong>e! AC2000 SE is <strong>co</strong>ntinuously developed to meet the most<br />

diffi cult security needs, providing a fl exible and highly stable solution.<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol<br />

• Central monit<strong>or</strong>ing (alarm & event display)<br />

• Guard tours<br />

• Biometric supp<strong>or</strong>t<br />

• Visit<strong>or</strong> management<br />

<strong>Contact</strong> details: +44 2890 456767, cem.sales@ty<strong>co</strong>in.<strong>co</strong>m<br />

www.cemsys.<strong>co</strong>m<br />

CEM Systems G2 Security<br />

Device/<br />

Solution:<br />

S610 intelligent<br />

IP card reader<br />

Distribut<strong>or</strong>/<br />

Supplier:<br />

CEM Systems<br />

Product<br />

description:<br />

S610 intelligent<br />

IP card reader<br />

is designed<br />

f<strong>or</strong> use as part of an integr<strong>at</strong>ed on-line access <strong>co</strong>ntrol system and is<br />

used to <strong>co</strong>ntrol access to restricted areas. The S610 reader, which has<br />

an on-board 10/100Mbps Ethernet <strong>co</strong>nnection, <strong>co</strong>mmunic<strong>at</strong>es directly<br />

with the CEM AC2000 host server removing the need f<strong>or</strong> an intelligent<br />

<strong>co</strong>ntrol panel in the system design.<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol<br />

• Universal reader - supp<strong>or</strong>ts all card technologies<br />

• IP66 r<strong>at</strong>ed polycarbon<strong>at</strong>e enclosure<br />

<strong>Contact</strong> details:<br />

+44 2890 456767,<br />

cem.sales@ty<strong>co</strong>in.<strong>co</strong>m<br />

www.cemsys.<strong>co</strong>m<br />

68 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

Device/Solution: S3030<br />

P<strong>or</strong>table Reader<br />

Distribut<strong>or</strong>/Supplier: CEM<br />

Systems<br />

Product Description:<br />

S3030 P<strong>or</strong>table Reader is<br />

a lightweight and rugged<br />

hand-held card reading<br />

device f<strong>or</strong> use with the<br />

CEM AC2000 security<br />

management system. It can<br />

be used f<strong>or</strong> ID card valid<strong>at</strong>ion<br />

<strong>at</strong> remote sites <strong>or</strong> temp<strong>or</strong>ary<br />

entrances which have no<br />

power, and can also be used<br />

as a mobile device f<strong>or</strong> random checks within pre-defi ned zones. A<br />

large full <strong>co</strong>lour TFT touch screen provides quick and easy navig<strong>at</strong>ion<br />

and inf<strong>or</strong>m<strong>at</strong>ion about card validity, including Cardholder details e.g.<br />

Cardholder Photograph, Name, Card Valid etc.<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol<br />

• Temp<strong>or</strong>ary entrance g<strong>at</strong>es, guard tours and a variety of<br />

off -site loc<strong>at</strong>ions<br />

• Roaming across pre-defi ned zones<br />

• Mustering <strong>at</strong> safe areas with muster <strong>co</strong>unt and mini-rep<strong>or</strong>t<br />

• Occupancy f<strong>or</strong> head <strong>co</strong>unt in a defi ned area<br />

<strong>Contact</strong> details: +44 2890 456767, cem.sales@ty<strong>co</strong>in.<strong>co</strong>m<br />

www.cemsys.<strong>co</strong>m<br />

Device/Solution: TDSi MicroGarde II<br />

Manufacturer: TDSi<br />

Distribut<strong>or</strong>/Supplier: G2 Security<br />

Product description: Microgarde II is a<br />

<strong>co</strong>st eff ective netw<strong>or</strong>ked access <strong>co</strong>ntrol unit<br />

giving the advantages of central <strong>co</strong>ntrol<br />

and event rep<strong>or</strong>ting. Each <strong>co</strong>ntroller can<br />

run independently <strong>or</strong> as part of a netw<strong>or</strong>k<br />

with up to 400 do<strong>or</strong>s. With a choice of the<br />

TDSi reader range <strong>or</strong> third-party readers<br />

this vers<strong>at</strong>ile system can be used f<strong>or</strong> new<br />

install<strong>at</strong>ions <strong>or</strong> as retrospective fi tting<br />

to existing systems. With extra fe<strong>at</strong>ures such as fi re do<strong>or</strong> release,<br />

mustering and upgradable to the EXgarde Pro software with no<br />

hardware changes the Microgarde II <strong>co</strong>ntroller is an obvious choice<br />

f<strong>or</strong> any size install<strong>at</strong>ion.<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol • Biometric integr<strong>at</strong>ion<br />

• CCTV Integr<strong>at</strong>ion • Time & <strong>at</strong>tendance<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Design supp<strong>or</strong>t • RMA process f<strong>or</strong> faulty returns<br />

• Software supp<strong>or</strong>t • Technical supp<strong>or</strong>t<br />

<strong>Contact</strong> details:<br />

G2 Security, +27 (0)87 940 9322, info@g2security.<strong>co</strong>.<strong>za</strong><br />

www.g2security.<strong>co</strong>.<strong>za</strong>


GSC Systems GSC Systems<br />

Device/Solution:<br />

640 ProxNet Access<br />

Control System<br />

Manufacturer:<br />

GSC Systems<br />

Supplier: Elvey Security<br />

Technologies<br />

Product Description:<br />

640 ProxNet Access<br />

Control System is a<br />

proven, fe<strong>at</strong>ure rich system<br />

th<strong>at</strong> can expand up to<br />

254 readers and supp<strong>or</strong>ts<br />

4 000 tag holders managed<br />

in 64 access levels. Among<br />

the system fe<strong>at</strong>ures are anti-pass-back, card expiry based on d<strong>at</strong>e<br />

<strong>or</strong> <strong>co</strong>unter value, visit<strong>or</strong> card <strong>co</strong>llection and alarm monit<strong>or</strong>ing. The<br />

system includes a selection of readers, interface units, card <strong>co</strong>llect<strong>or</strong><br />

and power supplies. The unit can oper<strong>at</strong>e as a stand-alone unit <strong>or</strong> be<br />

fully <strong>co</strong>ntrolled from the optional Windows software.<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol<br />

• Time and <strong>at</strong>tendance<br />

Integr<strong>at</strong>ion Supp<strong>or</strong>t: Comprehensive d<strong>at</strong>asheets<br />

<strong>Contact</strong> details: Erich Gl<strong>at</strong>z, GSC Systems,<br />

+27 (0)21 712 5130, sales@gsc.<strong>co</strong>.<strong>za</strong>,<br />

GSC Systems GSC Systems<br />

Device/Solution:<br />

737-10 USB Mifare<br />

Keyboard Reader<br />

Manufacturer:<br />

GSC Systems<br />

Distribut<strong>or</strong>/Supplier: :<br />

GSC Systems<br />

Product description:<br />

The 737-10 reader<br />

<strong>co</strong>nnects to a PC via<br />

a USB p<strong>or</strong>t. The unit<br />

perf<strong>or</strong>ms a secure read<br />

from any sect<strong>or</strong> <strong>or</strong> page on a Mifare Ultralight, Std 1k <strong>or</strong> Std 4k card.<br />

D<strong>at</strong>a is output in the f<strong>or</strong>m of keystrokes which enables the user to<br />

capture this into any PC applic<strong>at</strong>ion which accepts keyboard entry.<br />

Models are also available to read only the UID of the Mifare cards<br />

and 125kHz cards. The readers can be supplied in iv<strong>or</strong>y <strong>or</strong> black.<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol<br />

• Time and <strong>at</strong>tendance<br />

• Process <strong>co</strong>ntrol<br />

• D<strong>at</strong>a <strong>co</strong>llection<br />

• Photo<strong>co</strong>pier <strong>co</strong>ntrol<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t: Comprehensive d<strong>at</strong>asheets<br />

<strong>Contact</strong> details: Erich Gl<strong>at</strong>z, GSC Systems,<br />

+27 (0)21 712 5130, sales@gsc.<strong>co</strong>.<strong>za</strong>,<br />

www.gscsystems.<strong>co</strong>m<br />

Device/solution:<br />

380-10 MinitMan-FP Timeclock<br />

Manufacturer:<br />

GSC Systems<br />

Distribut<strong>or</strong>/Supplier: Elvey<br />

Security Technologies<br />

Product description: 380-10<br />

MinitMan-FP Timeclock with MPLite<br />

& TimeMaster. The MinitMan-FP<br />

380-10 fi ngerprint timeclock is a<br />

<strong>co</strong>st-eff ective electronic timeclock<br />

using the employee’s fi ngerprint<br />

f<strong>or</strong> identifi c<strong>at</strong>ion thus preventing<br />

unauth<strong>or</strong>ised clocking. The system<br />

supp<strong>or</strong>ts 1 500 fi ngerprint templ<strong>at</strong>es<br />

and can st<strong>or</strong>e 30 000 transactions.<br />

Transactions are downloaded via<br />

RS-232, RS-485 <strong>or</strong> TCP/IP and<br />

analysed by either the basic MPLite<br />

<strong>or</strong> the <strong>co</strong>mprehensive TimeMaster<br />

T&A software. TimeMaster produces a wide range of rep<strong>or</strong>ts and<br />

exp<strong>or</strong>ts T&A d<strong>at</strong>a to most payroll packages on the market.<br />

Applic<strong>at</strong>ion:<br />

• Time and <strong>at</strong>tendance logging<br />

• D<strong>at</strong>a <strong>co</strong>llection<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t: Comprehensive d<strong>at</strong>asheets and user manuals.<br />

<strong>Contact</strong> details: Erich Gl<strong>at</strong>z, GSC Systems, +27 (0)21 7125130,<br />

sales@gsc.<strong>co</strong>.<strong>za</strong>, www.gscsystems.<strong>co</strong>m<br />

Device/Solution: -716-20 Multi<br />

Sect<strong>or</strong> Mifare OEM Reader<br />

Manufacturer: GSC Systems<br />

Supplier: GSC Systems<br />

Product P Description: 716-20<br />

Multi M Sect<strong>or</strong> Mifare OEM Reader.<br />

This T is an intelligent reader/writer<br />

f<strong>or</strong> f 13.56MHz <strong>co</strong>ntactless cards,<br />

<strong>co</strong>mplies c to ISO 14443A and is<br />

designed d to oper<strong>at</strong>e with the Mifare<br />

Std S 1k, 4k, Mifare PlusX/PlusS (in<br />

security s<br />

level 1mode) <strong>or</strong> Ultralight<br />

cards. GSC’s OEM range includes<br />

UID only readers and readers f<strong>or</strong><br />

125kHz cards. These products<br />

provide system developers an easy<br />

p<strong>at</strong>h to integr<strong>at</strong>e card readers into<br />

their applic<strong>at</strong>ions. Readers have<br />

selectable outputs including Wiegand, Clock D<strong>at</strong>a and RS-232 (TTL).<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol • Time and <strong>at</strong>tendance<br />

• Vending machines • Process <strong>co</strong>ntrol<br />

• D<strong>at</strong>a <strong>co</strong>llection<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t: Comprehensive d<strong>at</strong>asheets and evalu<strong>at</strong>ion kits.<br />

<strong>Contact</strong> details: Erich Gl<strong>at</strong>z, GSC Systems,<br />

+27 (0)21 712 5130, sales@gsc.<strong>co</strong>.<strong>za</strong>,<br />

www.gscsystems.<strong>co</strong>m<br />

www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 69


ACCESS SELECTION GUIDE<br />

Impro Technologies Impro Technologies<br />

Device/Solution: IXP220<br />

Manufactures Name:<br />

Impro Technologies<br />

Distribut<strong>or</strong>: Access & Beyond,<br />

Elvey Security Technologies,<br />

Powell Tronics<br />

Product Description:<br />

The IXP220 Access Control<br />

System from Impro<br />

Technologies off ers<br />

seamless system scalability, allowing users to expand their system<br />

eff <strong>or</strong>tlessly, using the same software and hardware suite throughout.<br />

The fl exibility of the hardware <strong>co</strong>nfi gur<strong>at</strong>ion options and the simplicity<br />

of the software <strong>co</strong>nfi gur<strong>at</strong>ion using the standard wi<strong>za</strong>rds makes the<br />

IXP220 the obvious choice f<strong>or</strong> all your access <strong>co</strong>ntrol applic<strong>at</strong>ions. From<br />

one to 256 anti-passback do<strong>or</strong>s and up to 1 000 independent sites the<br />

IXP220 has the size and capability to meet your every requirement.<br />

Applic<strong>at</strong>ions:<br />

• Access <strong>co</strong>ntrol • Time and <strong>at</strong>tendance<br />

• Small to medium <strong>co</strong>mmercial sites • Integr<strong>at</strong>ed solutions<br />

• Multi site systems • Centralised facility management<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• 24-hour local advanced supp<strong>or</strong>t • Training<br />

• Return & swop out policy • Stock holding<br />

• Extended warranty (3 years upgraded to 5 years)<br />

<strong>Contact</strong> details:<br />

Impro Technologies, 08600 IMPRO (46776), www.impro.net<br />

IP Security Solutions IP Security Solutions<br />

Device: Net2Plus<br />

Manufacturer/ brand<br />

name: Paxton<br />

Distribut<strong>or</strong>/Supplier:<br />

IP Security Solutions<br />

Product description:<br />

Part of the Paxton Net2<br />

system. The Net2Plus is a<br />

single do<strong>or</strong>, 2-reader, TCP/IP<br />

enabled <strong>co</strong>ntroller. Up to<br />

50 000 users per <strong>co</strong>ntroller.<br />

Up to 500 <strong>co</strong>ntrollers per<br />

system. Part of the Net2<br />

system. Connects to Net2 server software<br />

f<strong>or</strong> management.<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• System design<br />

• Commissioning<br />

• Telephonic supp<strong>or</strong>t<br />

<strong>Contact</strong> details:<br />

IP Security Solutions,<br />

+27 (0)11 553 3300,<br />

info@ipsecuritysolutions.<strong>co</strong>.<strong>za</strong>,<br />

www.ipsecuritysolutions.<strong>co</strong>.<strong>za</strong><br />

70 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

Device/solution: IXP400i<br />

Manufactures Name:<br />

Impro Technologies<br />

Distribut<strong>or</strong>: Access & Beyond,<br />

Elvey Security Technologies,<br />

Powell Tronics<br />

Product Description:<br />

The IXP400i has a global track<br />

re<strong>co</strong>rd th<strong>at</strong> speaks f<strong>or</strong> itself.<br />

Securing prestigious sites in<br />

all maj<strong>or</strong> market sect<strong>or</strong>s, with<br />

its industry leading integr<strong>at</strong>ion pl<strong>at</strong>f<strong>or</strong>m. From small <strong>co</strong>mmercial to large<br />

industrial applic<strong>at</strong>ions the IXP400i has the fe<strong>at</strong>ures, fl exibility and ability<br />

to off er un<strong>co</strong>mpromised security. From 1 to 3 000 do<strong>or</strong>s and 300 000<br />

tag holders per site and 256 sites per system, the IXP400i has unrivalled<br />

capacity. Built on a Linux based, embedded hardware pl<strong>at</strong>f<strong>or</strong>m the<br />

IXP400i boasts an impressive selection of hardware options using st<strong>at</strong>e<br />

of the art technology perfectly designed f<strong>or</strong> your applic<strong>at</strong>ion.<br />

Applic<strong>at</strong>ions:<br />

• Access <strong>co</strong>ntrol • Time and <strong>at</strong>tendance<br />

• Large enterprise sites • Integr<strong>at</strong>ed solutions<br />

• Multi site systems • Centralised facility management<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• 24hr local advanced supp<strong>or</strong>t • Training<br />

• Return & swop out policy • Stock holding<br />

• Extended warranty (3 years upgraded to 5 years)<br />

<strong>Contact</strong> details: Impro Technologies, 08600 IMPRO (46776),<br />

www.impro.net<br />

Device: Net2Entry<br />

Manufacturer/ brand name:<br />

Paxton<br />

Distribut<strong>or</strong>/Supplier:<br />

IP Security Solutions<br />

Product description:<br />

Part of the Paxton Net2 system.<br />

Net2Entry is an IP based<br />

inter<strong>co</strong>m system th<strong>at</strong><br />

interfaces seamlessly with<br />

the Net2 access <strong>co</strong>ntrol system.<br />

POE, self <strong>co</strong>nfi guring system.<br />

Entry panel includes inter<strong>co</strong>m,<br />

camera, RFID reader, keypad, LCD.<br />

Monit<strong>or</strong> unit has <strong>co</strong>lour touch<br />

screen. Up to 100 entry st<strong>at</strong>ions and<br />

1 000 monit<strong>or</strong>s on Net2 system.<br />

Applic<strong>at</strong>ion:<br />

• Access Control/Inter<strong>co</strong>m<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• System design<br />

• Commissioning<br />

• Telephonic supp<strong>or</strong>t<br />

<strong>Contact</strong> details: IP Security Solutions,<br />

+27 (0)11 553 3300,<br />

info@ipsecuritysolutions.<strong>co</strong>.<strong>za</strong>, www.ipsecuritysolutions.<strong>co</strong>.<strong>za</strong>


IP Security Solutions Keep Access Control Systems<br />

Device: Paxlock<br />

Manufacturer/ brand name:<br />

Paxton<br />

Distribut<strong>or</strong>/Supplier:<br />

IP Security Solutions<br />

Product description: Part of<br />

the Net2 system. Intelligent do<strong>or</strong><br />

handle/lock. RFID card reader.<br />

Wireless oper<strong>at</strong>ion. Interfaces to<br />

the Net2 access <strong>co</strong>ntrol system.<br />

Managed from Net2 software. Fully<br />

<strong>co</strong>nfi gurable user rights.<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol<br />

• Hotel do<strong>or</strong>s<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• System design<br />

• Commissioning<br />

• Telephonic supp<strong>or</strong>t<br />

<strong>Contact</strong> details:<br />

IP Security Solutions,<br />

+27 (0)11 553 3300, info@ipsecuritysolutions.<strong>co</strong>.<strong>za</strong>,<br />

solutions <strong>co</strong> <strong>za</strong><br />

www.ipsecuritysolutions.<strong>co</strong>.<strong>za</strong><br />

Device/Solution:<br />

ZKBiolock<br />

Manufacturer/ brand<br />

name: ZKBiolock<br />

Distribut<strong>or</strong>/Supplier:<br />

Keep Access Control<br />

Systems<br />

Product description:<br />

The fi ngerprint lock off ers<br />

st<strong>at</strong>e-of-the-art single do<strong>or</strong><br />

management solution<br />

th<strong>at</strong> provides you with<br />

unm<strong>at</strong>ched options th<strong>at</strong><br />

<strong>co</strong>mes with OLED,<br />

standard USB interface.<br />

You can verify a person<br />

and open the do<strong>or</strong> with<br />

fi ngerprint, passw<strong>or</strong>d<br />

and ID/Mifare cards. The<br />

all-in-one fi ngerprint<br />

lock is <strong>co</strong>nvenient to<br />

oper<strong>at</strong>e. Enrolment and<br />

management of users are done on the OLED display. There are<br />

three user levels available to manage the system eff ectively –<br />

administr<strong>at</strong><strong>or</strong>, supervis<strong>or</strong> and user.<br />

<strong>Contact</strong> details: Keep Access Control Systems, +27(0)11 805 0175,<br />

siska@keepacs.<strong>co</strong>.<strong>za</strong>, www.keepacs.<strong>co</strong>.<strong>za</strong><br />

Keep Access Control Systems Keep Access Control Systems<br />

Device/Solution: Guard System<br />

Manufacturer/ brand name: Tomst<br />

Distribut<strong>or</strong>/Supplier: Keep Access Control Systems<br />

Product description: The system of p<strong>or</strong>table electronic sens<strong>or</strong>s (PES),<br />

<strong>co</strong>ntrol and monit<strong>or</strong> movement of persons and objects in rel<strong>at</strong>ion to<br />

time and place.<br />

Key fe<strong>at</strong>ures of the sens<strong>or</strong>s:<br />

• Ergonomic design<br />

• Anti-vandal technology<br />

• Capacity<br />

• Low running <strong>co</strong>sts<br />

• Wide range of possible use<br />

• Extensive product range<br />

• WinKontrol Software<br />

<strong>Contact</strong> details: Keep Access Control Systems, +27 (0)11 805 0175,<br />

siska@keepacs.<strong>co</strong>.<strong>za</strong>, www.keepacs.<strong>co</strong>.<strong>za</strong><br />

Device/Solution:<br />

Turnstile<br />

Manufacturer/<br />

brand name: Im<strong>at</strong><br />

Manufacturing<br />

Distribut<strong>or</strong>/Supplier:<br />

Keep access <strong>co</strong>ntrol<br />

systems<br />

Product description:<br />

Full height turnstiles<br />

off er an eff ective means<br />

of access <strong>co</strong>ntrol and<br />

generally speaking<br />

a higher degree of<br />

security than their half<br />

height <strong>co</strong>unterparts.<br />

They are designed to<br />

only allow one person<br />

to pass through <strong>at</strong> a<br />

time and because of their vers<strong>at</strong>ile n<strong>at</strong>ure, can be installed in a<br />

wide range of loc<strong>at</strong>ions/environments. Our range of turnstile<br />

products are designed to stringent standards.<br />

<strong>Contact</strong> details:<br />

Keep Access Control Systems,<br />

+27 (0)11 805 0175,<br />

siska@keepacs.<strong>co</strong>.<strong>za</strong>,<br />

www.keepacs.<strong>co</strong>.<strong>za</strong><br />

www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 71


ACCESS SELECTION GUIDE<br />

Keep Access Control Systems N<strong>at</strong>ech Universal Technology<br />

Device/Solution: MKII inter<strong>co</strong>m<br />

Manufacturer/ brand name:<br />

Comb Communic<strong>at</strong>ions<br />

Distribut<strong>or</strong>/Supplier: Keep<br />

Access Control Systems<br />

Product description:<br />

The fi rst inter<strong>co</strong>m to use<br />

embedded SIM technology<br />

th<strong>at</strong> makes the system<br />

resistant to vandalism.<br />

• Free resident entry via<br />

PIN numbers<br />

• Time-based access <strong>co</strong>ntrol<br />

permits access <strong>at</strong> userdefi<br />

ned times only<br />

• Able to open multiple g<strong>at</strong>es<br />

• Temp<strong>or</strong>ary access PINs f<strong>or</strong> visit<strong>or</strong>s<br />

• Ability to <strong>co</strong>mmunic<strong>at</strong>e with guard via the guard call function<br />

• Six user defi ned inputs make it easy to <strong>co</strong>nnect your electric<br />

fencing and other security fe<strong>at</strong>ures to the system<br />

• Rapid, painless install<strong>at</strong>ion<br />

<strong>Contact</strong> details:<br />

Keep Access Control Systems,<br />

+27 (0)11 805 0175,<br />

siska@keepacs.<strong>co</strong>.<strong>za</strong>,<br />

www.keepacs.<strong>co</strong>.<strong>za</strong><br />

N<strong>at</strong>ech Universal Technology N<strong>at</strong>ech Universal Technology<br />

Device/Solution: ISONAS Do<strong>or</strong><br />

Access Control<br />

Manufacturer/brand<br />

name: ISONAS<br />

Distribut<strong>or</strong>/supplier: N<strong>at</strong>ech<br />

Universal Technology<br />

Product description: The ISONAS<br />

PowerNet line of panel-free do<strong>or</strong><br />

access <strong>co</strong>ntrol products are sold as reader/<strong>co</strong>ntroller units because the<br />

intelligence built into each and every model is designed to not only<br />

read RFID cards but also to <strong>co</strong>ntrol a do<strong>or</strong> and other devices. All ISONAS<br />

reader models include Crystal M<strong>at</strong>rix Software and fe<strong>at</strong>ure the ability to:<br />

• Sense if a do<strong>or</strong> is open <strong>or</strong> closed<br />

• Process a Request To Exit (REX)<br />

• Process an auxiliary input of the customers choosing<br />

• Set up to 2 output lines.<br />

• Biometric reader supp<strong>or</strong>t<br />

• Integr<strong>at</strong>e into video management software<br />

Applic<strong>at</strong>ion<br />

• Access <strong>co</strong>ntrol • Time and <strong>at</strong>tendance<br />

• Netw<strong>or</strong>ked design • Panel free solution<br />

• CCTV integr<strong>at</strong>ion<br />

Integr<strong>at</strong>ion Supp<strong>or</strong>t<br />

• Consult<strong>at</strong>ion (to integr<strong>at</strong><strong>or</strong>) • Training (f<strong>or</strong> integr<strong>at</strong><strong>or</strong>)<br />

• System design (f<strong>or</strong> integr<strong>at</strong><strong>or</strong>) • Service and repair<br />

<strong>Contact</strong> details: N<strong>at</strong>ech Universal Technology, +27 (0)73 601 6652,<br />

dean@n<strong>at</strong>ech.<strong>co</strong>.<strong>za</strong><br />

•<br />

72 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

Device/Solution: T5 Pro<br />

Manufacturer/brand name:<br />

Anviz<br />

Distribut<strong>or</strong>/supplier: N<strong>at</strong>ech<br />

Universal Technology<br />

Product description: T5 Pro is an<br />

innov<strong>at</strong>ive fi ngerprint card access<br />

<strong>co</strong>ntroller which fully integr<strong>at</strong>es<br />

fi ngerprint and RFID technology.<br />

The <strong>co</strong>mpact design makes it<br />

suitable f<strong>or</strong> install<strong>at</strong>ion on a do<strong>or</strong><br />

frame. T5 Pro has standard Wiegand<br />

output to <strong>co</strong>nnect seamlessly with<br />

access <strong>co</strong>ntrollers and relay output<br />

driver the electric lock directly. T5<br />

Pro can easily upd<strong>at</strong>e the existing<br />

card readers f<strong>or</strong> a higher security<br />

level of fi ngerprint and card.<br />

Applic<strong>at</strong>ion<br />

• Access <strong>co</strong>ntrol<br />

• Time and <strong>at</strong>tendance<br />

Integr<strong>at</strong>ion Supp<strong>or</strong>t<br />

• Consult<strong>at</strong>ion (to integr<strong>at</strong><strong>or</strong>)<br />

• Training (f<strong>or</strong> integr<strong>at</strong><strong>or</strong>)<br />

• System design (f<strong>or</strong> integr<strong>at</strong><strong>or</strong>)<br />

• Service and repair<br />

<strong>Contact</strong> details: N<strong>at</strong>ech Universal Technology, +27 (0)73 601 6652,<br />

dean@n<strong>at</strong>ech.<strong>co</strong>.<strong>za</strong><br />

Device/Solution:<br />

IS1000 Web Appliance<br />

Manufacturer/brand<br />

name: IMRON –<br />

IS1000 Web Appliance<br />

Distribut<strong>or</strong>/supplier:<br />

N<strong>at</strong>ech Universal Technology ology<br />

Product description:<br />

IS1000 is an easy-to-use e Web appliance<br />

used to manage physical al access <strong>co</strong>ntrol and video. video IS1000 integr<strong>at</strong>es<br />

seamlessly with access <strong>co</strong>ntrol hardware from Mercury Security. Manage<br />

up to 64 do<strong>or</strong>s and 250 000 credentials. Connects directly to the access<br />

<strong>co</strong>ntrol sub-<strong>co</strong>ntroller do<strong>or</strong> modules via RS-485. Connections made via<br />

WiFi, Ethernet <strong>co</strong>nnection across a LAN <strong>or</strong> WAN. Real-time monit<strong>or</strong>ing,<br />

credential management, live/re<strong>co</strong>rded video, and system <strong>co</strong>nfi gur<strong>at</strong>ion<br />

are all available via an easy-to-use Web browser interface.<br />

Applic<strong>at</strong>ion<br />

• Access <strong>co</strong>ntrol • Time and <strong>at</strong>tendance<br />

• Web based • Netw<strong>or</strong>ked design<br />

• CCTV integr<strong>at</strong>ion<br />

Integr<strong>at</strong>ion Supp<strong>or</strong>t<br />

• Consult<strong>at</strong>ion (to integr<strong>at</strong><strong>or</strong>)<br />

• Training (f<strong>or</strong> integr<strong>at</strong><strong>or</strong>)<br />

• System design (f<strong>or</strong> integr<strong>at</strong><strong>or</strong>)<br />

• Service and repair<br />

<strong>Contact</strong> details: N<strong>at</strong>ech Universal Technology, +27 (0)73 601 6652,<br />

dean@n<strong>at</strong>ech.<strong>co</strong>.<strong>za</strong>


neaMetrics/Suprema neaMetrics/Suprema<br />

Device/Solution: XSt<strong>at</strong>ion<br />

Manufacturer/ brand name: Suprema<br />

Distribut<strong>or</strong>/Supplier: neaMetrics<br />

Product description: The w<strong>or</strong>ld’s fi rst IP<br />

access <strong>co</strong>ntrol terminal with touchscreen<br />

LCD and face detection technology. Its 3.5<br />

inch touchscreen LCD and intuitive GUI<br />

provide <strong>co</strong>mprehensive access <strong>co</strong>ntrol and<br />

time <strong>at</strong>tendance functions. Fe<strong>at</strong>uring face<br />

detection technology with a megapixel<br />

camera, X- St<strong>at</strong>ion can re<strong>co</strong>rd up to 5 000<br />

face image logs f<strong>or</strong> an extra level of security<br />

and <strong>at</strong>tendance re<strong>co</strong>rds. The built-in camera detects and captures face<br />

images of each entry to prevent unauth<strong>or</strong>ised access and payroll fraud.<br />

X-St<strong>at</strong>ion is set to change the way we use access readers.<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol • Time & <strong>at</strong>tendance<br />

• Applic<strong>at</strong>ions requiring function selection<br />

• Hi-end security applic<strong>at</strong>ions<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Technical & sales training<br />

• Architectural system design <strong>co</strong>nsulting<br />

• Remote, telephonic & onsite supp<strong>or</strong>t<br />

• Software development<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

Customised solution development<br />

<strong>Contact</strong> details: 0860 SUPREMA (0860 787 736),<br />

enquiry@suprema.<strong>co</strong>.<strong>za</strong>, www.suprema.<strong>co</strong>.<strong>za</strong><br />

neaMetrics/Suprema rema e a<br />

Reditron<br />

Device/Solution: RealPass-F<br />

Manufacturer/ brand name: : Suprema<br />

Distribut<strong>or</strong>/Supplier: neaMetrics eetrics<br />

Product description: A multi-functional<br />

--functional<br />

ID document and passp<strong>or</strong>t reader eer<br />

th<strong>at</strong> reads a variety of d<strong>at</strong>a<br />

such as photos, characters,<br />

bar<strong>co</strong>des, <strong>co</strong>ntact/<strong>co</strong>ntactless<br />

smart chips. As an e-passp<strong>or</strong>t<br />

reader, RealPass-F provides full-page, ppage,<br />

one-step reading of visual d<strong>at</strong>a ppage<br />

page<br />

and RF chip d<strong>at</strong>a of ICAO standard rd passp<strong>or</strong>ts.<br />

F<strong>or</strong> high-level security environments such as immigr<strong>at</strong>ions and b<strong>or</strong>der<br />

<strong>co</strong>ntrol, RealPass-F supp<strong>or</strong>ts optional functions including IR, UV, <strong>co</strong>axial, OVD<br />

and dual camera f<strong>or</strong> 800 dpi photo captures. RealPass-F is an ideal all-in-one<br />

device f<strong>or</strong> reading electronic ID cards and travel documents.<br />

Applic<strong>at</strong>ion:<br />

• Immigr<strong>at</strong>ion and b<strong>or</strong>der <strong>co</strong>ntrol • Civil and criminal applic<strong>at</strong>ions (police)<br />

• N<strong>at</strong>ional ID • Hospitality check-in (hotels)<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Technical & sales training<br />

• Architectural system design <strong>co</strong>nsulting<br />

• Remote, telephonic & onsite supp<strong>or</strong>t<br />

• Software development integr<strong>at</strong>ion supp<strong>or</strong>t<br />

• Customised solution development<br />

<strong>Contact</strong> details: 0860 SUPREMA (0860 787 736),<br />

enquiry@suprema.<strong>co</strong>.<strong>za</strong>, www.suprema.<strong>co</strong>.<strong>za</strong><br />

Device/Solution:<br />

XPass Series<br />

Manufacturer/ brand<br />

name: Suprema<br />

Distribut<strong>or</strong>: neaMetrics<br />

Product description:<br />

The Xpass/Xpass Slim<br />

provides all the leadingedge<br />

fe<strong>at</strong>ures of high-end<br />

IP access <strong>co</strong>ntrol products<br />

packed into an ultra<br />

<strong>co</strong>mpact design. These<br />

sleek devices are encased<br />

in an IP65 w<strong>at</strong>erproof<br />

structure and off er PoE (Power over Ethernet) capabilities making it ideal<br />

f<strong>or</strong> outdo<strong>or</strong> IP RF ID access <strong>co</strong>ntrol solutions. The Xpass Slim, designed<br />

to fi t gang boxes, takes the series to the next level by in<strong>co</strong>rp<strong>or</strong><strong>at</strong>ing<br />

multi-smart card reading technology with gang box mounting options.<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Technical & sales training<br />

• Architectural system design <strong>co</strong>nsulting<br />

• Remote, telephonic & onsite supp<strong>or</strong>t<br />

• Software development integr<strong>at</strong>ion supp<strong>or</strong>t<br />

• Customised solution development<br />

<strong>Contact</strong> details: 0860 SUPREMA (0860 787 736),<br />

enquiry@suprema.<strong>co</strong>.<strong>za</strong>, www.suprema.<strong>co</strong>.<strong>za</strong><br />

Device/Solution: Standalone<br />

Keypad / Proximity Reader<br />

Distribut<strong>or</strong>: Reditron<br />

Supplier: Controlsoft<br />

Product description: The KP800<br />

Standalone KeyPad / Proximity<br />

Reader is a <strong>co</strong>st-eff ective,<br />

standalone, single-do<strong>or</strong> access<br />

<strong>co</strong>ntrol solution f<strong>or</strong> up to 1000<br />

users, using either a PIN <strong>co</strong>de,<br />

proximity card / keyfob <strong>or</strong> a<br />

<strong>co</strong>mbin<strong>at</strong>ion of both. This easyto-use<br />

solution is supplied in a<br />

we<strong>at</strong>herproof, vandal resistant<br />

housing with backlit keys.<br />

Applic<strong>at</strong>ion:<br />

• Manages card only, card <strong>or</strong> PIN, <strong>or</strong> CCard d + PIN<br />

PIN.<br />

• Manages 1000 cardholders.<br />

• IP65 housing<br />

• Two inputs f<strong>or</strong> do<strong>or</strong> <strong>co</strong>ntact supervision, RXE/RTE push button<br />

• Built-in Tamper Switch<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t: 3-year warranty<br />

<strong>Contact</strong> details:<br />

Reditron, 087 802 CCTV (2288),<br />

sales@reditron.<strong>co</strong>.<strong>za</strong>,<br />

www.reditron.<strong>co</strong>.<strong>za</strong><br />

www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 73


ACCESS SELECTION GUIDE<br />

Reditron Ty<strong>co</strong> Security Products<br />

Device/Solution: IP Single Do<strong>or</strong><br />

Controller<br />

Distribut<strong>or</strong>: Reditron<br />

Supplier: Controlsoft<br />

Product description: The Edge IP<br />

Access Controller puts <strong>co</strong>ntrol and user<br />

interface right <strong>at</strong> the do<strong>or</strong>. The Edge<br />

is a <strong>co</strong>st-eff ective, standalone, singledo<strong>or</strong><br />

IP access <strong>co</strong>ntrol solution f<strong>or</strong> up<br />

to 1000 users. This easy-to-use solution<br />

enables remote management and rep<strong>or</strong>t<br />

gener<strong>at</strong>ion via standard Web browser.<br />

User inf<strong>or</strong>m<strong>at</strong>ion, administr<strong>at</strong>ion, time schedules, do<strong>or</strong> <strong>co</strong>nfi gur<strong>at</strong>ion<br />

and retrieval of events are done through a user-friendly, instructional<br />

web environment. Providing “Intelligence <strong>at</strong> the Do<strong>or</strong>”, the fl exible Edge<br />

has one onboard reader p<strong>or</strong>t which will supp<strong>or</strong>t a Wiegand <strong>or</strong> Clock &<br />

D<strong>at</strong>a reader, three inputs (Do<strong>or</strong> <strong>Contact</strong>, Exit Button, Tamper) and two<br />

output relays (Lock, Aux Device).<br />

Applic<strong>at</strong>ion:<br />

• On-board 10/100 Base-T p<strong>or</strong>t. DHCP and fi xed IP addressing supp<strong>or</strong>ted.<br />

• Power over Ethernet (POE).<br />

• Manages 1000 cardholders.<br />

• Two inputs f<strong>or</strong> power failure, b<strong>at</strong>tery failure.<br />

• Wiegand Interface<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t: 3-year warranty<br />

<strong>Contact</strong> details: Reditron, 087 802 CCTV (2288),<br />

sales@reditron.<strong>co</strong>.<strong>za</strong>, www.reditron.<strong>co</strong>.<strong>za</strong><br />

Uniclox Technologies Uniclox Technologies<br />

Device/Solution:<br />

HandPunch Series<br />

Manufacturer/ brand name:<br />

Ingersoll Rand<br />

Distribut<strong>or</strong>: Uniclox<br />

Technologies<br />

Product description: The<br />

Hand Punch Series from Uniclox x<br />

is popular in many industrial<br />

<strong>co</strong>mpanies which fi nd th<strong>at</strong><br />

hand geometry is faster and<br />

m<strong>or</strong>e <strong>co</strong>nsistent because it is<br />

unaff ected by dirt, paint, oil<br />

<strong>or</strong> damage to the fi ngertips.<br />

Employees enter their number and place their hand on the pl<strong>at</strong>en of the<br />

HandPunch terminal. It autom<strong>at</strong>ically takes a three-dimensional reading<br />

of the size and shape of the hand and verifi es the user’s identity in less<br />

than one se<strong>co</strong>nd. Anti-microbial pl<strong>at</strong>en provides a hygienic fi nish th<strong>at</strong><br />

resists bacterial degrad<strong>at</strong>ion using silver nano-technology.<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol<br />

• Time and <strong>at</strong>tendance<br />

• Ring a siren/bell<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t: Full technical supp<strong>or</strong>t in all maj<strong>or</strong> centres,<br />

including <strong>co</strong>nsulting, install<strong>at</strong>ion, training and call centre.<br />

<strong>Contact</strong> details: Uniclox Technologies, 0861 UNICLOX,<br />

sales@uniclox.<strong>co</strong>m, www.uniclox.<strong>co</strong>m<br />

74 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

Device/Solution:<br />

INTEVO<br />

Manufacturer/ brand<br />

name: Ty<strong>co</strong> Security<br />

Products<br />

Product description:<br />

INTEVO provides an<br />

ideal pl<strong>at</strong>f<strong>or</strong>m f<strong>or</strong> small<br />

to medium businesses as well as the ability to grow the system<br />

to meet <strong>or</strong>ganis<strong>at</strong>ional needs over time. INTEVO also supp<strong>or</strong>ts<br />

the EntraPass Web client and the EntraPass go Mobile client.<br />

With its embedded Windows 7 OS, l<strong>at</strong>est gener<strong>at</strong>ion Intel<br />

process<strong>or</strong>, a solid-st<strong>at</strong>e drive f<strong>or</strong> applic<strong>at</strong>ions and a separ<strong>at</strong>e<br />

hard drive f<strong>or</strong> st<strong>or</strong>age, INTEVO off ers high perf<strong>or</strong>mance<br />

<strong>co</strong>mputing technology while having only one server to<br />

maintain. Other key fe<strong>at</strong>ures of INTEVO include dual<br />

integr<strong>at</strong>ed Ethernet p<strong>or</strong>ts, 6 USB 2.0 p<strong>or</strong>ts and 1 RS-232<br />

serial p<strong>or</strong>t; dual display outputs f<strong>or</strong> VGA, HDMI and DVI.<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Simple to <strong>co</strong>nfi gure, easy to deploy<br />

• Supp<strong>or</strong>ts EntraPass C<strong>or</strong>p<strong>or</strong><strong>at</strong>e Edition<br />

• DSC MAXSYS alarm panel<br />

• Comp<strong>at</strong>ible with all Kantech <strong>co</strong>ntrollers<br />

• Connect up to 32 IP cameras<br />

<strong>Contact</strong> details:<br />

Ty<strong>co</strong> Security Products, +27 (0)82 566 5274,<br />

emallett@ty<strong>co</strong>int.<strong>co</strong>m, www.ty<strong>co</strong>acvs.<strong>co</strong>m<br />

Device/Solution:<br />

Uniclox Access Control Kit<br />

Manufacturer/<br />

brand name: Uniclox<br />

Technologies<br />

Distribut<strong>or</strong>: Uniclox<br />

Technologies<br />

Product description:<br />

Stop anonymous access<br />

to high-security areas in<br />

your business. Uniclox<br />

Technologies off ers the<br />

new Uniclox Uni110<br />

Access Control Kit – an all-in-one access <strong>co</strong>ntrol solution f<strong>or</strong> a<br />

standalone do<strong>or</strong>. The kit provides everything you need to secure<br />

a standalone do<strong>or</strong>: a top quality RFID terminal, strikerlock,<br />

exit button plus full access <strong>co</strong>ntrol software. The terminal<br />

has a st<strong>or</strong>age capacity of 60 000 RFID cards and<br />

80 000 transactions.<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol<br />

• Time and <strong>at</strong>tendance<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t: Full technical supp<strong>or</strong>t in all maj<strong>or</strong> centres,<br />

including <strong>co</strong>nsulting, install<strong>at</strong>ion, training and call centre.<br />

<strong>Contact</strong> details: Uniclox Technologies,<br />

0861 UNICLOX,<br />

sales@uniclox.<strong>co</strong>m, www.uniclox.<strong>co</strong>m


ZKSoftware ZKSoftware<br />

Device/Solution:<br />

ZKTe<strong>co</strong> / LK183<br />

Distribut<strong>or</strong>/Supplier:<br />

Regal Security<br />

Product description: Speed is of<br />

the essence when using RFID, and<br />

the LK183 is the unit to perfect<br />

it. The stylish RFID reader will not<br />

only enhance the speed of access<br />

<strong>co</strong>ntrol, but also <strong>co</strong>ntribute to<br />

the ambience of your room. With<br />

a seamless and easy to install<br />

device, you are guaranteed of a<br />

market leading product. Reading<br />

range of 5-8cm, built-in relay f<strong>or</strong><br />

locks, alarms and sens<strong>or</strong>s. Capacity<br />

of 30 000 RFID cards and 50 000<br />

transaction logs, <strong>co</strong>mbined with TCP/IP, RS-232/485 <strong>co</strong>mmunic<strong>at</strong>ion.<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol<br />

• Time and <strong>at</strong>tendance<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Biometric devices<br />

• Time and <strong>at</strong>tendance devices<br />

• Training<br />

<strong>Contact</strong> details: Regal Security, +27 (0)11 553 3300,<br />

sales@regalsecurity.<strong>co</strong>.<strong>za</strong>, www.regalsecurity.<strong>co</strong>.<strong>za</strong><br />

ZKSoftware ZKSoftware<br />

Device/Solution: : ZKTe<strong>co</strong> ZKTe<strong>co</strong> / / inBio inBio Controller<br />

Controller<br />

160/260/460<br />

Distribut<strong>or</strong>/Supplier: pl lier:<br />

Regal Security<br />

Product<br />

description:<br />

F<strong>or</strong> the fi rst time<br />

in the hist<strong>or</strong>y of<br />

Biometric Access Control, Coontrol,<br />

<strong>co</strong>mbine a biometric tric<br />

fi ngerprint reader and RIFD device onto a <strong>co</strong>ntroller, where the<br />

templ<strong>at</strong>es are st<strong>or</strong>ed on the <strong>co</strong>ntroller and not on the units.<br />

It keeps your d<strong>at</strong>a safe and makes it easier to manage. The<br />

inBio is available in 1-do<strong>or</strong>, 2-do<strong>or</strong> and 4-do<strong>or</strong> <strong>co</strong>ntrollers. With<br />

capacities of 3 000 fi ngerprint templ<strong>at</strong>es and 30 000 RFID<br />

cards on the <strong>co</strong>ntroller.<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol<br />

• Biometric and RFID <strong>co</strong>mbined<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Biometric devices<br />

• Time and <strong>at</strong>tendance devices<br />

• Training<br />

<strong>Contact</strong> details: Regal Security,<br />

+27 (0)11 553 3300, sales@regalsecurity.<strong>co</strong>.<strong>za</strong>,<br />

www.regalsecurity.<strong>co</strong>.<strong>za</strong><br />

Device/Solution:<br />

ZKTe<strong>co</strong> / C3<br />

Controller<br />

100/200/400<br />

Distribut<strong>or</strong>/<br />

Supplier:<br />

Regal Security<br />

Product<br />

description:<br />

Multiple do<strong>or</strong>s access <strong>co</strong>ntrol problem? Use the C3 <strong>co</strong>ntrollers<br />

to <strong>co</strong>ntrol the access. The C3 is available in 1-do<strong>or</strong>, 2-do<strong>or</strong> and<br />

4-do<strong>or</strong> <strong>co</strong>ntrollers from Regal Security. It’s an easy install<strong>at</strong>ion<br />

with RFID readers using TCP/IP, RS-485 and Wiegand f<strong>or</strong><br />

<strong>co</strong>mmunic<strong>at</strong>ion. Some of the fe<strong>at</strong>ures are anti-pass back,<br />

interlock function and duress mode. Includes capacity of 30 000<br />

users and 100 000 transactions. Easy integr<strong>at</strong>ion with various<br />

security systems and supp<strong>or</strong>ts diff erent Wiegand readers.<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol<br />

• RFID<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Biometric devices<br />

• Time and <strong>at</strong>tendance devices<br />

• Training<br />

<strong>Contact</strong> details: Regal Security,<br />

+27 (0)11 553 3300, sales@regalsecurity.<strong>co</strong>.<strong>za</strong>,<br />

www.regalsecurity.<strong>co</strong>.<strong>za</strong><br />

Device/Solution:<br />

ZKTe<strong>co</strong> / SC103<br />

Distribut<strong>or</strong>/Supplier:<br />

Security Equipment Centre<br />

Product description:<br />

The SC103 is a vers<strong>at</strong>ile RFID<br />

access <strong>co</strong>ntrol terminal with<br />

up to 30 000 card templ<strong>at</strong>es<br />

and 50 000 transaction capacity.<br />

Built-in relays f<strong>or</strong> locks, do<strong>or</strong><br />

sens<strong>or</strong>s, open do<strong>or</strong> alarms and<br />

exit sens<strong>or</strong>s; Wiegand output,<br />

TCP/IP, 485 and 232 p<strong>or</strong>ts. Stand<br />

alone <strong>or</strong> netw<strong>or</strong>kable, 10cm<br />

read range with LCD screen. KR 201 slave reader available.<br />

Applic<strong>at</strong>ion:<br />

• Access <strong>co</strong>ntrol<br />

• Time and <strong>at</strong>tendance<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t:<br />

• Two-year warranty<br />

• Access <strong>co</strong>ntrol software<br />

• Time and <strong>at</strong>tendance software<br />

• Telephonic backup<br />

• Training and repairs<br />

<strong>Contact</strong> Details: Security Equipment Centre,<br />

+27 (0)11 452 1410, sales@secsa.<strong>co</strong>.<strong>za</strong>,<br />

www.secsa.<strong>co</strong>.<strong>za</strong><br />

www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 75


SYSTEM INTEGRATION<br />

EOH Intelligent Infrastructure<br />

delivers smarter mining solutions<br />

The mining industries requirement regarding w<strong>or</strong>kf<strong>or</strong>ce management has<br />

evolved from standalone systems to fully integr<strong>at</strong>ed turnkey solutions.<br />

The mining industries requirement regarding w<strong>or</strong>kf<strong>or</strong>ce management<br />

has evolved from standalone systems to fully integr<strong>at</strong>ed turnkey solutions.<br />

These solutions are now required to <strong>co</strong>ver all aspects of w<strong>or</strong>kf<strong>or</strong>ce<br />

management from pre-engagement, engagement, value add while<br />

employed, payroll and third-party systems integr<strong>at</strong>ion with health and<br />

safety being a pri<strong>or</strong>ity throughout all these processes. EOH Intelligent<br />

Infrastructure Technologies <strong>co</strong>ntinues to deliver and further develop<br />

innov<strong>at</strong>ive solutions by integr<strong>at</strong>ing<br />

existing onsite infrastructure with new<br />

technologies to answer the industry’s<br />

needs.<br />

“A start-to-end solution, based on<br />

a single <strong>co</strong>nfi gurable d<strong>at</strong>abase th<strong>at</strong> is<br />

capable of talking to an entire pl<strong>at</strong>f<strong>or</strong>m<br />

and in<strong>co</strong>rp<strong>or</strong><strong>at</strong>ing all of the essential<br />

technologies, such as biometrics, asset<br />

tracking, surveillance and so f<strong>or</strong>th, is the<br />

main focus of our activities,” explains<br />

EOH Intelligent Infrastructure W<strong>or</strong>kf<strong>or</strong>ce<br />

Technology Lead, Glen Baptiste. The<br />

broad skill set available within EOH<br />

means th<strong>at</strong> all w<strong>or</strong>kf<strong>or</strong>ce rel<strong>at</strong>ed functions,<br />

such as health management,<br />

absenteeism, legal <strong>co</strong>mpliance and<br />

<strong>co</strong>mpens<strong>at</strong>ion are included in solutions<br />

th<strong>at</strong> are designed to add value, manage<br />

<strong>co</strong>sts, synchronise supply chain processes<br />

and ultim<strong>at</strong>ely enhance customer<br />

value. With technology mut<strong>at</strong>ing so<br />

rapidly and <strong>co</strong>ntinuously be<strong>co</strong>ming<br />

m<strong>or</strong>e sophistic<strong>at</strong>ed, big businesses have<br />

also begun to shy away from outright<br />

purchase <strong>co</strong>mmitments and are moving Glen Baptiste<br />

towards rental agreements.<br />

“We are seeing a growing trend<br />

indic<strong>at</strong>ing th<strong>at</strong> the market expects the availability of a full-supp<strong>or</strong>t rental<br />

option on almost all of our equipment and systems,” says Baptiste.<br />

One of the key industries th<strong>at</strong> benefi ts from these turnkey solutions<br />

is the mining sect<strong>or</strong>. With its massive labour f<strong>or</strong>ce and remote, process<br />

driven oper<strong>at</strong>ions, mining <strong>co</strong>ntains many elements of <strong>co</strong>ntrol and<br />

regul<strong>at</strong>ion th<strong>at</strong> can be streamlined with the right <strong>co</strong>mbin<strong>at</strong>ion of technology,<br />

dedic<strong>at</strong>ed supp<strong>or</strong>t and specialised knowledge. EOH Intelligent<br />

Infrastructure re<strong>co</strong>gnises th<strong>at</strong> the requirement f<strong>or</strong> swift inf<strong>or</strong>m<strong>at</strong>ion<br />

transfer is be<strong>co</strong>ming m<strong>or</strong>e prevalent, particularly in the mining arena.<br />

The days of a single purpose time and <strong>at</strong>tendance system th<strong>at</strong> simply<br />

<strong>co</strong>ntrols payroll and off ers no further advantages are long gone, integr<strong>at</strong>ion<br />

has be<strong>co</strong>me the n<strong>or</strong>m. Biometric technologies are no longer just f<strong>or</strong><br />

tracking, they are now being linked to business intelligence, ac<strong>co</strong>unting<br />

systems; surveillance cameras are being used f<strong>or</strong> stock <strong>co</strong>ntrol<br />

76 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

and modest rep<strong>or</strong>ts in the f<strong>or</strong>m of pie charts and bar graphs are being<br />

replaced with 3D visual represent<strong>at</strong>ions in<strong>co</strong>rp<strong>or</strong><strong>at</strong>ing inf<strong>or</strong>m<strong>at</strong>ion from<br />

multiple business functions.<br />

EOH Intelligent Infrastructure Technologies has recently introduced<br />

a number of new products specifi cally intended to improve the safety<br />

of mine w<strong>or</strong>kers and to add value to mining <strong>or</strong> manufacturing oper<strong>at</strong>ions.<br />

These include a real-time electronic manning board th<strong>at</strong> shows in<br />

real-time the actual versus planned production<br />

resource alloc<strong>at</strong>ion and presence <strong>at</strong> the<br />

w<strong>or</strong>kplace. It also functions as an <strong>or</strong>ganis<strong>at</strong>ional<br />

tool th<strong>at</strong> allows <strong>co</strong>mplete groups to<br />

be assembled bef<strong>or</strong>e the start of production<br />

and then serves to manage and <strong>co</strong>ntrol<br />

these units during the process.<br />

Se<strong>co</strong>ndly, EOH Intelligent Infrastructure<br />

has identifi ed radio-frequency identifi c<strong>at</strong>ion<br />

(RFID) as an excellent health and safety<br />

tool. RFID involves the use of a wireless<br />

non-<strong>co</strong>ntact system th<strong>at</strong> employs radiofrequency<br />

electromagnetic fi elds to transfer<br />

d<strong>at</strong>a from a tag <strong>at</strong>tached to an object<br />

<strong>or</strong> person, f<strong>or</strong> the purpose of autom<strong>at</strong>ic<br />

tracking and identifi c<strong>at</strong>ion. In the mining<br />

environment this has <strong>co</strong>untless applic<strong>at</strong>ions.<br />

F<strong>or</strong> example, RFID can be used to<br />

ensure th<strong>at</strong> miners have all of the required<br />

equipment bef<strong>or</strong>e entering the w<strong>or</strong>k site <strong>or</strong><br />

during the extremely dangerous blasting<br />

process, when up to four diff erent technologies<br />

are used to ensure th<strong>at</strong> shafts are<br />

clear. All this inf<strong>or</strong>m<strong>at</strong>ion <strong>co</strong>mbined in real<br />

-time on a manning board to give a visual<br />

represent<strong>at</strong>ion of the st<strong>at</strong>us resources and<br />

safety equipment<br />

Another valuable innov<strong>at</strong>ion involves<br />

the linking of a smart mobile device to a fi ngerprint reader. This cre<strong>at</strong>es<br />

a mobile reader <strong>co</strong>ntaining biometric and cellular technology th<strong>at</strong> is not<br />

only capable of being used to accur<strong>at</strong>ely pinpoint the whereabouts of<br />

w<strong>or</strong>kers but also f<strong>or</strong> bio-directional <strong>co</strong>mmunic<strong>at</strong>ion. This product has a<br />

market in any <strong>or</strong>ganis<strong>at</strong>ion th<strong>at</strong> is responsible f<strong>or</strong> mobile staff , such as in<br />

the instance of security guards. In remote areas where a lack of suffi cient<br />

infrastructure is a particular challenge, mobile, self-<strong>co</strong>ntained systems<br />

can mean the diff erence between success and failure.<br />

“EOH Intelligent Infrastructure believes th<strong>at</strong> integr<strong>at</strong>ion is the key to<br />

providing an eff ective, <strong>co</strong>mprehensive solution. There is no margin f<strong>or</strong><br />

err<strong>or</strong> when lives depend on technology,” <strong>co</strong>ncludes Baptiste.<br />

F<strong>or</strong> m<strong>or</strong>e inf<strong>or</strong>m<strong>at</strong>ion <strong>co</strong>ntact EOH Intelligent Infrastructure,<br />

0861 500 500, sales.ii@eoh.<strong>co</strong>.<strong>za</strong>, www.eohii.<strong>co</strong>.<strong>za</strong>


System integr<strong>at</strong><strong>or</strong>s<br />

Basix Group Bidvest Magnum<br />

Card Control Systems<br />

The Basix Group, security system integr<strong>at</strong><strong>or</strong>s<br />

and solution providers with over 20 years’<br />

experience, and a strong presence throughout<br />

RSA, serves government and priv<strong>at</strong>e sect<strong>or</strong><br />

customers in the fi nancial, transp<strong>or</strong>t<strong>at</strong>ion,<br />

<strong>co</strong>mmercial-industrial and infrastructure<br />

markets. Basix is the agent f<strong>or</strong> March Netw<strong>or</strong>ks,<br />

a global provider of intelligent IP video<br />

solutions.<br />

Tel: +27 (0)11 210 3500 Head Offi ce<br />

info@basixgroup.<strong>co</strong>.<strong>za</strong><br />

www.basixtech.<strong>co</strong>.<strong>za</strong><br />

EOH Intelligent Infrastructure<br />

EOH Intelligent Infrastructure is a wholly<br />

owned subsidiary of EOH, and is responsible<br />

f<strong>or</strong> sales, install<strong>at</strong>ion and supp<strong>or</strong>t of products<br />

on the African <strong>co</strong>ntinent. EOH Intelligent<br />

Infrastructure supplies and installs security,<br />

CCTV, access <strong>co</strong>ntrol, <strong>co</strong>mmunic<strong>at</strong>ions and<br />

time management solutions, building management,<br />

fi re detection and off er a range of<br />

leasing solutions.<br />

Tel: 0861 500 500<br />

Fax: +27 (0)11 844 3500<br />

www.eohii.<strong>co</strong>.<strong>za</strong><br />

Jas<strong>co</strong> Security Solutions<br />

Jas<strong>co</strong> Security Solutions (in<strong>co</strong>rp<strong>or</strong><strong>at</strong>ing Scafell and<br />

Multivid) designs, installs and maintains security<br />

technology solutions. The business possesses<br />

gre<strong>at</strong> depth of skill and experience, along with<br />

a true understanding of the security challenges<br />

faced by <strong>or</strong>ganis<strong>at</strong>ions of all sizes. Together with<br />

the Jas<strong>co</strong> Group’s expertise in the ICT and Energy<br />

sect<strong>or</strong>s, we provide turnkey solutions.<br />

Tel: +27 (0)11 894 7127<br />

kleroux@multivid.<strong>co</strong>.<strong>za</strong><br />

www.jas<strong>co</strong>.<strong>co</strong>.<strong>za</strong><br />

Our solutions protect and enhance your<br />

investments and profi ts as well as reduce risk.<br />

We provide holistic security technology solutions<br />

th<strong>at</strong> enable you to <strong>co</strong>ncentr<strong>at</strong>e on your<br />

<strong>co</strong>re business. From design, install<strong>at</strong>ion and<br />

maintenance to monit<strong>or</strong>ing, TVMS off ers peace<br />

of mind with value f<strong>or</strong> money solutions and<br />

exceptional service delivery.<br />

Tel: 0861 867 8867 (TVMS)<br />

sales@tvms.<strong>co</strong>.<strong>za</strong><br />

www.tvms.<strong>co</strong>.<strong>za</strong><br />

Technology, software, products, specifi c<strong>at</strong>ions, str<strong>at</strong>egies, services, <strong>co</strong>nsultants are all key aspects of<br />

eff ective security.<br />

But it takes appropri<strong>at</strong>e knowledge and experience to put it all together to cre<strong>at</strong>e<br />

solutions th<strong>at</strong> protect people, profi ts and assets and deliver<br />

business benefi ts.<br />

Skilled system integr<strong>at</strong><strong>or</strong>s with a proven<br />

track re<strong>co</strong>rd are the link between<br />

technology and solutions<br />

th<strong>at</strong> w<strong>or</strong>k.<br />

We design, install and maintain integr<strong>at</strong>ed<br />

security solutions. As client requirements are<br />

unique, Bidvest Magnum Technology does not<br />

have off -the-shelf security solutions. Instead,<br />

we analyse the client’s needs, advise on optimum<br />

solutions, design the required system and<br />

then install it based on clearly defi ned project<br />

guidelines as well as a detailed s<strong>co</strong>pe-of-w<strong>or</strong>k<br />

document.<br />

Tel: +27 (0)11 555 4949<br />

kevinm@bidvestmagnum.<strong>co</strong>.<strong>za</strong><br />

www.bidvestmagnum.<strong>co</strong>.<strong>za</strong><br />

Your <strong>co</strong>mpany<br />

here?<br />

<strong>Contact</strong><br />

<strong>Vivienne</strong> <strong>at</strong><br />

<strong>vivienne@</strong><br />

<strong>technews</strong>.<strong>co</strong>.<strong>za</strong><br />

<strong>or</strong> <strong>011543</strong> <strong>5800</strong><br />

To list your <strong>co</strong>mpany here, <strong>co</strong>ntact <strong>Vivienne</strong> <strong>at</strong> <strong>vivienne@</strong><strong>technews</strong>.<strong>co</strong>.<strong>za</strong> <strong>or</strong> 011 543 <strong>5800</strong>.<br />

We provide total project solutions based<br />

on specialist design, engineering and maintenance<br />

services. CCS can design and install<br />

systems to suit your needs and budget. And<br />

we can evalu<strong>at</strong>e, upgrade, repair and maintain<br />

your existing system. Specialise in surveillance:<br />

access <strong>co</strong>ntrol and T&A, fi re detection: audio<br />

evacu<strong>at</strong>ion and public address, as well as parking<br />

<strong>co</strong>ntrol systems.<br />

Tel (011) 907 3192<br />

card<strong>co</strong>n@mweb.<strong>co</strong>.<strong>za</strong><br />

www.card<strong>co</strong>ntrolsystems.<strong>co</strong>.<strong>za</strong><br />

Honeywell Building Solutions<br />

Honeywell Building Solutions is a leading<br />

provider of integr<strong>at</strong>ed technology solutions<br />

th<strong>at</strong> supp<strong>or</strong>t innov<strong>at</strong>ive ways of w<strong>or</strong>king. We<br />

develop, install and maintain critical building<br />

systems th<strong>at</strong> help keep customer w<strong>or</strong>kplaces<br />

safe, secure, <strong>co</strong>mf<strong>or</strong>table and <strong>co</strong>st-effi cient.<br />

Global experience across diverse markets<br />

positions Honeywell as a technology leader<br />

renowned f<strong>or</strong> delivering value.<br />

Tel: +27 (0)11 695 8000<br />

servicehbs<strong>za</strong>@honeywell.<strong>co</strong>m<br />

www.honeywell.<strong>co</strong>.<strong>za</strong><br />

TVMS UTM Group<br />

UTM Group is a provider of end-to-end total<br />

security management services with integr<strong>at</strong>ed<br />

solutions. These include managed surveillance,<br />

access <strong>co</strong>ntrol, time and <strong>at</strong>tendance, video<br />

analytics, d<strong>at</strong>a mining and meaningful business<br />

intelligence. UTM delivers security<br />

management services by taking your entire<br />

risk value chain into <strong>co</strong>nsider<strong>at</strong>ion.<br />

Tel: 086 022 2266<br />

info@utmgroup.<strong>co</strong>.<strong>za</strong><br />

www.utmgroup.<strong>co</strong>.<strong>za</strong><br />

www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 77


SYSTEM INTEGRATION<br />

T&A solution guide turnstiles.<br />

General<br />

1.) Describe the solution in general: The client was experiencing<br />

problems with access <strong>co</strong>ntrol as well as calcul<strong>at</strong>ing the payment of<br />

both <strong>co</strong>ntract and fulltime staff . Common issues included excessive<br />

overtime payment as well as buddy clocking and the onerous<br />

manual <strong>co</strong>mpletion of timesheets.<br />

EOHii devised a solution based on Safran M<strong>or</strong>pho biometric readers<br />

integr<strong>at</strong>ed into BESAccess and BESTime<br />

to ensure an end-to-end solution from<br />

EOHii.<br />

The system is rolled out in phases.<br />

Rollout <strong>co</strong>mmenced early 2011 <strong>at</strong> the<br />

Germiston facility.<br />

Challenges included the setting up of shifts<br />

as there are many vari<strong>at</strong>ions available <strong>at</strong><br />

the various depots. EOHii has deployed<br />

a permanent resource to the client<br />

to assist with not only system rel<strong>at</strong>ed<br />

functions, but also advice on a business<br />

and best practice capacity.<br />

The result of the solution implemented is th<strong>at</strong> millions in unac<strong>co</strong>untable<br />

overtime pay has been saved.<br />

2.) In wh<strong>at</strong> industry sect<strong>or</strong> was the solution implemented? Logistics<br />

3.) Name of customer/user: TFD Netw<strong>or</strong>k Africa<br />

4.) Name of SI/partner: EOH Intelligent Infrastructure<br />

5.) Name of Vend<strong>or</strong>/distribut<strong>or</strong>: EOH Intelligent Infrastructure<br />

6.) Primary biometric product used: Safran M<strong>or</strong>pho fi ngerprint<br />

readers<br />

Customer/User<br />

1.) Describe the solution installed and wh<strong>at</strong> were you hoping to<br />

gain from it: The solution in<strong>co</strong>rp<strong>or</strong><strong>at</strong>es a Safran M<strong>or</strong>pho biometric<br />

reader <strong>co</strong>nnected via the netw<strong>or</strong>k to a T&A and access <strong>co</strong>ntrol<br />

system. Blue Line and S-CUBE is the <strong>co</strong>ntrolling unit. It allows f<strong>or</strong> fast<br />

and reliable fi ngerprint re<strong>co</strong>gnition. Needed to decrease issues with<br />

access <strong>co</strong>ntrol as well as better <strong>co</strong>ntrol of overtime pay.<br />

2.) Which department was the primary driver behind the solution?<br />

Seni<strong>or</strong> management.<br />

3.) Did you integr<strong>at</strong>e the solution with other access/identity management<br />

systems <strong>or</strong> other business processes (HR/fi nance/<br />

warehousing/etc.)? Integr<strong>at</strong>ion to VIP Payroll system was required to<br />

ensure minimum user and manual inf<strong>or</strong>m<strong>at</strong>ion capture throughout<br />

the process. An interface back to the ERP system (drivers and vehicles)<br />

is currently underway and will be <strong>co</strong>mpleted by March 2013.<br />

4.) Which <strong>co</strong>mpany did you select to handle the <strong>co</strong>nsulting, install<strong>at</strong>ion<br />

and maintenance of the solution? EOHii was selected f<strong>or</strong><br />

its proven track re<strong>co</strong>rd in successful install<strong>at</strong>ions of similar solutions.<br />

Other <strong>co</strong>ntributing fact<strong>or</strong>s include: choice of product superi<strong>or</strong>ity,<br />

after-sales service, on-site supp<strong>or</strong>t technician, SLAs and help desk.<br />

5.) Has the solution delivered ac<strong>co</strong>rding to your expect<strong>at</strong>ions?<br />

Delivered beyond client expect<strong>at</strong>ions. Presence of EOHii onsite technical<br />

specialist is an advantage.<br />

System Integr<strong>at</strong><strong>or</strong><br />

1.) Wh<strong>at</strong> technology did you use in designing the solution? Various<br />

Safran M<strong>or</strong>pho biometric readers. MA100 f<strong>or</strong> indo<strong>or</strong> use and MA500<br />

f<strong>or</strong> outdo<strong>or</strong> use; integr<strong>at</strong>ing to a variety of electronic locks and<br />

78 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

BESTime is a time and <strong>at</strong>tendance program f<strong>or</strong> calcul<strong>at</strong>ing<br />

hours w<strong>or</strong>ked and exp<strong>or</strong>ting to VIP Payroll. BESAccess is an access<br />

<strong>co</strong>ntrol program.<br />

2.) Why did you select the products you did? Perfectly suited and<br />

proven to the needs of the client. The Safran M<strong>or</strong>pho readers can<br />

integr<strong>at</strong>e to most systems on the market. The software is fl exible to<br />

ac<strong>co</strong>mmod<strong>at</strong>e customer-specifi c needs.<br />

3.) Wh<strong>at</strong> products did you integr<strong>at</strong>e with?<br />

EOHii BESTime and BESAccess software as<br />

well as the turnstiles. This is all standard<br />

integr<strong>at</strong>ions f<strong>or</strong> EOHii. The only issue was<br />

netw<strong>or</strong>k and cable rel<strong>at</strong>ed, but this was<br />

resolved almost immedi<strong>at</strong>ely.<br />

4.) Was the <strong>or</strong>iginal manufacturer /<br />

vend<strong>or</strong> / local distribut<strong>or</strong> involved in the<br />

install<strong>at</strong>ion? Wh<strong>at</strong> part did they play?<br />

Were you s<strong>at</strong>isfi ed with their delivery?<br />

Yes – EOHii.<br />

Vend<strong>or</strong>/Distribut<strong>or</strong><br />

1.) Wh<strong>at</strong> facilities/applic<strong>at</strong>ions are available to supp<strong>or</strong>t integr<strong>at</strong>ion<br />

with these products? Permanent onsite technical team member<br />

from EOHii.<br />

2.) Wh<strong>at</strong> skills do you have onboard to assist partners in integr<strong>at</strong>ion<br />

exercises? Inf<strong>or</strong>m<strong>at</strong>ion technology, software and d<strong>at</strong>abase development;<br />

electronic hardware development and supp<strong>or</strong>t. Netw<strong>or</strong>king<br />

infrastructure; high level supp<strong>or</strong>t; service level agreements; helpdesk;<br />

rentals.<br />

Biometric Device<br />

Manufacturer/ brand name: Safran M<strong>or</strong>pho<br />

Biometric Readers<br />

Biometric technology: Fingerprint<br />

Hardware description: The solution in<strong>co</strong>rp<strong>or</strong><strong>at</strong>es a Safran<br />

M<strong>or</strong>pho biometric reader <strong>co</strong>nnected<br />

via the netw<strong>or</strong>k to a T&A and access<br />

<strong>co</strong>ntrol system. Blue Line and S-CUBE<br />

is the <strong>co</strong>ntrolling unit. It allows f<strong>or</strong><br />

fast and reliable fi ngerprint re<strong>co</strong>g<br />

nition. The readers are robust and<br />

<strong>co</strong>me in two variants – one f<strong>or</strong> outdo<strong>or</strong><br />

and one f<strong>or</strong> indo<strong>or</strong> use.<br />

Applic<strong>at</strong>ion: • Time and <strong>at</strong>tendance – 1 500 users<br />

on fi ve sites<br />

• Access <strong>co</strong>ntrol – used f<strong>or</strong> security in<br />

<strong>co</strong>njunction with magnetic locks <strong>or</strong><br />

turnstiles.<br />

Integr<strong>at</strong>ion supp<strong>or</strong>t off ered • Site survey<br />

by supplier: • Planning<br />

• Solutions design<br />

• Onsite technician<br />

• Maintenance and supp<strong>or</strong>t (SLA)<br />

<strong>Contact</strong> details f<strong>or</strong> supplier: EOH Intelligent Infrastructure<br />

Tel: +27 (0)11 844 3200<br />

e-mail: sales.ii@eoh.<strong>co</strong>.<strong>za</strong><br />

www.eohii.<strong>co</strong>.<strong>za</strong>


SYSTEM INTEGRATION<br />

W<strong>or</strong>kf<strong>or</strong>ce Management<br />

Solution Guide<br />

General<br />

1. Describe the solution in general: The lack of eff ective w<strong>or</strong>kf<strong>or</strong>ce<br />

management solutions are <strong>co</strong>sting <strong>co</strong>mpanies dearly, especially in<br />

large oper<strong>at</strong>ional deployments. The utilis<strong>at</strong>ion of paper rosters causes<br />

administr<strong>at</strong>ive overhead and is unreliable. Manual processes can also<br />

not provide a real-time view of oper<strong>at</strong>ions and deployment of staff .<br />

ProSync f<strong>or</strong> EasyRoster is a biometric identity management solution<br />

specifi cally f<strong>or</strong> w<strong>or</strong>kf<strong>or</strong>ce management. It provides a practical<br />

biometric interface th<strong>at</strong>, through its biometric d<strong>at</strong>a distribution<br />

engine, seamlessly transfers personnel biometric and card inf<strong>or</strong>m<strong>at</strong>ion<br />

across oper<strong>at</strong>ions of any size over fi xed IP <strong>or</strong> 3G/GPRS infrastructure.<br />

The seamless integr<strong>at</strong>ion with EasyRoster delivers eff ective w<strong>or</strong>kf<strong>or</strong>ce<br />

management with fully<br />

synchronised branch, personnel<br />

and site d<strong>at</strong>a th<strong>at</strong> prevents<br />

duplic<strong>at</strong>e d<strong>at</strong>a capture.<br />

EasyRoster is a w<strong>or</strong>kf<strong>or</strong>ce<br />

management system th<strong>at</strong> helps<br />

to ensure effi cient rostering<br />

of staff ac<strong>co</strong>rding to <strong>co</strong>ntract<br />

requirements and re<strong>co</strong>rding<br />

of <strong>at</strong>tendance (as well as the<br />

exp<strong>or</strong>ting of <strong>at</strong>tendance details<br />

to diff erent payroll systems).<br />

The real strength of the system<br />

is the management rep<strong>or</strong>ting<br />

and the fact th<strong>at</strong> it allows f<strong>or</strong><br />

management by exception.<br />

EasyRoster Deployment Manager empowers oper<strong>at</strong>ional managers<br />

to manage distributed staff deployments in real-time from a central<br />

loc<strong>at</strong>ion. Deployment Manager is developed to interface seamlessly<br />

with existing reader technologies. The integr<strong>at</strong>ion with biometric and<br />

proximity card readers ensures m<strong>or</strong>e accur<strong>at</strong>e <strong>at</strong>tendance d<strong>at</strong>a, better<br />

management of staff deployments and a reduced wage bill through<br />

accur<strong>at</strong>e and real-time inf<strong>or</strong>m<strong>at</strong>ion.<br />

ProSync was developed by neaMetrics, as the distribut<strong>or</strong> of<br />

Suprema in Africa, and has been proven, in <strong>co</strong>njunction with<br />

EasyRoster, to provide oper<strong>at</strong>ional managers with the business<br />

insight and tools to perf<strong>or</strong>m their functions better, resulting in<br />

optimised oper<strong>at</strong>ional <strong>co</strong>st by minimising administr<strong>at</strong>ive functions,<br />

reduced overtime and eff ective response times with under and over<br />

staff ed sites.<br />

2. In wh<strong>at</strong> industry sect<strong>or</strong> was the solution implemented? EasyRoster<br />

Deployment Manager, ProSync and the Suprema range of reader<br />

technologies can be applied in any environment where a <strong>co</strong>mpany<br />

is making use of shift w<strong>or</strong>kers. Current install<strong>at</strong>ions include security<br />

(manned guarding), cleaning services, outsourced service <strong>co</strong>mpliance<br />

in the property investment (retail) sect<strong>or</strong>s.<br />

3. Name of customer/user? Currently utilised by an intern<strong>at</strong>ional security<br />

<strong>co</strong>mpany as well as two well-known shopping centres.<br />

4. Name of SI/partner? Suprema hardware (distributed by neaMetrics),<br />

ProSync software (developed and distributed by neaMetrics)<br />

and EasyRoster software (developed and distributed by Easy Roster<br />

Software). Both EasyRoster and neaMetrics were responsible f<strong>or</strong><br />

80 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

development and integr<strong>at</strong>ion resulting in ProSync f<strong>or</strong> EasyRoster.<br />

5. Name of vend<strong>or</strong>/distribut<strong>or</strong>? EasyRoster is developed, distributed<br />

and supp<strong>or</strong>ted by EasyRoster Software. ProSync is developed, distributed<br />

and supp<strong>or</strong>ted by neaMetrics. The Suprema range of biometric<br />

devices are available through the neaMetrics reseller netw<strong>or</strong>k.<br />

6. Primary biometric product used? The BioLite Net is an extra-durable<br />

IP-based fi ngerprint terminal with IP65-r<strong>at</strong>ed structure, <strong>co</strong>mprehensively<br />

sealing it against invasive moisture, dust and liquid, making it<br />

perfect f<strong>or</strong> outdo<strong>or</strong> <strong>or</strong> indo<strong>or</strong> install<strong>at</strong>ions. From simple do<strong>or</strong> <strong>co</strong>ntrol<br />

to <strong>co</strong>mplex netw<strong>or</strong>ked environments, BioLite Net supp<strong>or</strong>ts full T&A<br />

and access <strong>co</strong>ntrol functionality f<strong>or</strong> up to 5 000 users. It also fe<strong>at</strong>ures<br />

an illumin<strong>at</strong>ed keypad, LCD backlight and LED indic<strong>at</strong><strong>or</strong> f<strong>or</strong> excellent<br />

visibility, off ers secure do<strong>or</strong> <strong>co</strong>ntrol and I/O<br />

expansion (secure reader mode) 128 access<br />

groups and 256 time schedules and supp<strong>or</strong>ts<br />

anti-passback do<strong>or</strong> zones f<strong>or</strong> 64 readers.<br />

Customer/user<br />

1. Describe the solution installed and<br />

wh<strong>at</strong> were you hoping to gain from it? T&A<br />

inf<strong>or</strong>m<strong>at</strong>ion is routed in real-time via an IP <strong>or</strong><br />

GPRS netw<strong>or</strong>k to the EasyRoster Deployment<br />

Manager (ERDM) system, which processes<br />

time events, applies business rules and eventually<br />

upd<strong>at</strong>es the <strong>at</strong>tendance details in the<br />

EasyRoster d<strong>at</strong>abase ac<strong>co</strong>rding to user-defi nable<br />

business rules. The advantage of the<br />

solution is th<strong>at</strong> you have m<strong>or</strong>e accur<strong>at</strong>e time<br />

and <strong>at</strong>tendance d<strong>at</strong>a <strong>at</strong> your disposal, with the fl exibility of ensuring<br />

th<strong>at</strong> the right person is doing the job.<br />

The <strong>co</strong>mbin<strong>at</strong>ion of EasyRoster and ProSync integr<strong>at</strong>ion also<br />

ensures no duplic<strong>at</strong>e d<strong>at</strong>a capture, from initial registr<strong>at</strong>ion of a new<br />

employee, scheduling of employees, clocking of employees, through<br />

to payroll.<br />

2. Which department was the primary driver behind the solution?<br />

In most cases the solution was driven by oper<strong>at</strong>ional divisions.<br />

They beauty of the solution is th<strong>at</strong> it allows f<strong>or</strong> seamless integr<strong>at</strong>ion<br />

between HR, oper<strong>at</strong>ions and IT.<br />

3. Did you integr<strong>at</strong>e the solution with other access/identity management<br />

systems <strong>or</strong> other business processes (HR/fi nance/warehousing/etc.)?<br />

The solution f<strong>or</strong>ms a biometric identity management<br />

solution, off ering seamless integr<strong>at</strong>ion of biometric and proximity<br />

readers, payroll and w<strong>or</strong>kf<strong>or</strong>ce management on one pl<strong>at</strong>f<strong>or</strong>m.<br />

4. Which <strong>co</strong>mpany did you select to handle the <strong>co</strong>nsulting, install<strong>at</strong>ion<br />

and maintenance of the solution? Why did you choose<br />

this <strong>co</strong>mpany/these <strong>co</strong>mpanies? Consult<strong>at</strong>ion and maintenance<br />

of the solution is managed directly by EasyRoster and neaMetrics as<br />

part of the software as a service model applied by both <strong>co</strong>mpanies.<br />

Install<strong>at</strong>ion of hardware is sometimes managed by external <strong>co</strong>ntract<strong>or</strong>s<br />

but, in the case of enterprise deployments, the <strong>co</strong>mpanies<br />

themselves are trained to install and expand as they require.<br />

External installers are selected based on the n<strong>at</strong>ional <strong>or</strong><br />

intern<strong>at</strong>ional footprint required as well as the ability to adhere<br />

Continued on page 83


Continued from page 80<br />

meaning th<strong>at</strong> one SDK <strong>co</strong>mmunic<strong>at</strong>es with<br />

to the end user’s SLA requirements.<br />

12 diff erent types of terminals. The SDK is<br />

5. Has the solution delivered ac<strong>co</strong>rding to upd<strong>at</strong>ed with each release of new hardware<br />

your expect<strong>at</strong>ions? Client expect<strong>at</strong>ions are and allows f<strong>or</strong> the addition of new terminals<br />

n<strong>or</strong>mally met within the fi rst three months with a few lines of <strong>co</strong>de, ensuring easy ongo-<br />

of implement<strong>at</strong>ion. The integr<strong>at</strong>ion between ing enhancement of the solution.<br />

the Suprema range of readers, ProSync<br />

ProSync and EasyRoster integr<strong>at</strong>e through<br />

and EasyRoster Deployment Manager<br />

shared d<strong>at</strong>a management, the MS SQL<br />

Software technologies enables clients to get server, MS Message queuing and the .NET<br />

wh<strong>at</strong> they pay f<strong>or</strong>. The fl exible integr<strong>at</strong>ion framew<strong>or</strong>k. As these pl<strong>at</strong>f<strong>or</strong>ms are evolving<br />

between these systems allows f<strong>or</strong> better<br />

and getting better on an ongoing basis, so<br />

planning (rostering), m<strong>or</strong>e accur<strong>at</strong>e time and does the ProSync f<strong>or</strong> EasyRoster solution.<br />

<strong>at</strong>tendance details and eventually, a lower 4. Was the <strong>or</strong>iginal manufacturer/vend<strong>or</strong>/<br />

wage bill. The most imp<strong>or</strong>tant functionality local distribut<strong>or</strong> involved in the installa-<br />

provided by these systems is the power of tion? Suprema was directly involved with<br />

the management inf<strong>or</strong>m<strong>at</strong>ion and rep<strong>or</strong>ts fi rmware enhancements to allow f<strong>or</strong> addi-<br />

th<strong>at</strong> are provided. These rep<strong>or</strong>ts highlight tional device functionality required specifi c<br />

in<strong>co</strong>rrect rostering in terms of the number to w<strong>or</strong>kf<strong>or</strong>ce management.<br />

and/<strong>or</strong> grades of personnel rostered <strong>at</strong> a site,<br />

projected and actual<br />

Both EasyRoster and neaMetrics are<br />

wage <strong>co</strong>sts and<br />

personnel perf<strong>or</strong>mance.<br />

These rep<strong>or</strong>ts<br />

enable an oper<strong>at</strong>ions<br />

manager to keep<br />

day-to-day <strong>co</strong>ntrol of<br />

oper<strong>at</strong>ions in <strong>or</strong>der<br />

to ensure th<strong>at</strong> <strong>co</strong>sts<br />

are kept to a minimum<br />

and personnel<br />

Company:<br />

Web:<br />

Email:<br />

Phone:<br />

Company:<br />

Web:<br />

Email:<br />

Phone:<br />

neaMetrics / Suprema<br />

www.Suprema.<strong>co</strong>.<strong>za</strong><br />

Enquiry@Suprema.<strong>co</strong>.<strong>za</strong><br />

+27 (0)11 781 9964<br />

EasyRoster<br />

www.easyroster.net<br />

info@easyroster.net<br />

+27 (0)12 809 4270<br />

requirements are precisely met.<br />

involved with the architectural planning and<br />

The biggest potential f<strong>or</strong> failure lies in<br />

design, back-end install<strong>at</strong>ion, product train-<br />

implement<strong>at</strong>ions where deployment of staff ing and oper<strong>at</strong>ional supp<strong>or</strong>t. The EasyRoster<br />

is inf<strong>or</strong>mal and where f<strong>or</strong>mal rostering is not and neaMetrics team functions as a unit<br />

utilised.<br />

focused on addressing end user needs.<br />

System integr<strong>at</strong><strong>or</strong><br />

1. Wh<strong>at</strong> technology did you use in designing<br />

the solution? The integr<strong>at</strong>ed solution was<br />

developed utilising a variety of Microsoft<br />

design and development tools and lower<br />

level proprietary SDKs f<strong>or</strong> device interface.<br />

2. Why did you select the products you<br />

did? We utilised these technologies due<br />

to the fl exibility of integr<strong>at</strong>ion, availability<br />

of resources to maintain and enhance into<br />

the future and the fl exibility it provided to<br />

perf<strong>or</strong>m customis<strong>at</strong>ion f<strong>or</strong> our clients.<br />

3. Wh<strong>at</strong> products did you integr<strong>at</strong>e with?<br />

The solution seamlessly integr<strong>at</strong>es with the<br />

Suprema range of biometric and proximity<br />

terminals. No specifi c device integr<strong>at</strong>ion was<br />

required as the ProSync biometric engine<br />

manages device integr<strong>at</strong>ion independent<br />

to the EasyRoster integr<strong>at</strong>ion. The ProSync<br />

engine, developed by neaMetrics, interfaces<br />

with Suprema hardware through Suprema’s<br />

device SDK. This integr<strong>at</strong>ion in itself is easy,<br />

due to the fact th<strong>at</strong> one SDK is used to interface<br />

with all available Suprema terminals,<br />

Vend<strong>or</strong>/distribut<strong>or</strong><br />

1. Provide specifi cs on the products used<br />

in the above project? EasyRoster and<br />

EasyRoster Deployment Manager is utilised<br />

as the w<strong>or</strong>kf<strong>or</strong>ce management solution.<br />

The ProSync solution is the biometric d<strong>at</strong>a<br />

management and identity solution designed<br />

f<strong>or</strong> integr<strong>at</strong>ion of Suprema’s terminals into<br />

EasyRoster.<br />

2. Wh<strong>at</strong> facilities/applic<strong>at</strong>ions are available to<br />

supp<strong>or</strong>t integr<strong>at</strong>ion with these products?<br />

Integr<strong>at</strong>ion with all Suprema’s terminals are<br />

done through the BioStar SDK. This SDK allows<br />

f<strong>or</strong> seamless integr<strong>at</strong>ion with the full range of<br />

Suprema’s T&A and access terminals.<br />

3. Wh<strong>at</strong> skills do you have onboard to assist<br />

partners in integr<strong>at</strong>ion exercises? neaMetrics<br />

have a dedic<strong>at</strong>ed software development<br />

team focused on assisting integr<strong>at</strong><strong>or</strong>s with<br />

the integr<strong>at</strong>ion of the Suprema range of<br />

products into their solutions. The Suprema<br />

distribution team provides full product training,<br />

architectural system design and hardware<br />

integr<strong>at</strong>ion supp<strong>or</strong>t.<br />

www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 83


SYSTEM INTEGRATION<br />

Protect your business’s most<br />

imp<strong>or</strong>tant assets and<br />

Access <strong>co</strong>ntrol is a vital aspect of any security solution. However, in<br />

today’s technologically <strong>co</strong>nnected w<strong>or</strong>ld it has evolved to include so<br />

much m<strong>or</strong>e than simply permitting certain people into certain areas.<br />

“People fl ow” is the next gener<strong>at</strong>ion of access <strong>co</strong>ntrol technology,<br />

off ering solutions th<strong>at</strong> enable enterprises to <strong>or</strong>ganise the movement<br />

and fl ow of people throughout a premises, building <strong>or</strong> site. This not<br />

only helps you to protect your site, your property and your inf<strong>or</strong>m<strong>at</strong>ion<br />

onsite, but also your most<br />

imp<strong>or</strong>tant asset – your people.<br />

People fl ow solutions are<br />

all about securing the assets of<br />

a business, r<strong>at</strong>her than simply<br />

securing certain areas. By<br />

in<strong>co</strong>rp<strong>or</strong><strong>at</strong>ing intelligence and<br />

by designing solutions to meet<br />

the specifi c needs of individual<br />

enterprises, people fl ow solutions<br />

help to improve productivity<br />

and ensure people’s safety.<br />

From mines where people<br />

should not be allowed in certain<br />

areas while blasting is happening,<br />

to fact<strong>or</strong>ies th<strong>at</strong> require<br />

people to be evacu<strong>at</strong>ed when<br />

dangerous chemicals are used,<br />

to standard offi ces th<strong>at</strong> need<br />

to know who is in the building,<br />

where and when <strong>at</strong> any given<br />

time in case of fi re <strong>or</strong> other<br />

emergencies, people fl ow solutions<br />

help to make people safer.<br />

Jas<strong>co</strong> Security Solutions are<br />

experts <strong>at</strong> designing, building<br />

and integr<strong>at</strong>ing people fl ow<br />

solutions th<strong>at</strong> w<strong>or</strong>k f<strong>or</strong> businesses,<br />

regardless of industry<br />

and in a product and brandagnostic<br />

fashion. We don’t<br />

just install products, <strong>or</strong> supply<br />

Marius Maré<br />

access <strong>co</strong>ntrol <strong>or</strong> CCTV. We<br />

integr<strong>at</strong>e security technology systems to ensure th<strong>at</strong> they w<strong>or</strong>k optimally<br />

together, and to ensure th<strong>at</strong> solutions deliver maximum value and<br />

benefi t f<strong>or</strong> all of our customers.<br />

We believe th<strong>at</strong> access <strong>co</strong>ntrol is a primary technology th<strong>at</strong> should<br />

interface seamlessly into other security environments, including CCTV,<br />

fi re detection, intrusion detection and even public address systems, to<br />

ensure th<strong>at</strong> maximum functionality is obtained. Using these systems, we<br />

cre<strong>at</strong>e people fl ow solutions th<strong>at</strong> decrease the risk of unwanted individuals<br />

on your site <strong>or</strong> in your building, and allow you to accur<strong>at</strong>ely monit<strong>or</strong><br />

both staff and visit<strong>or</strong>s.<br />

We have many years of experience in the security industry, and have<br />

w<strong>at</strong>ched technologies grow and change. This has given us depth of<br />

experience and taught us valuable lessons, including the value of listening<br />

to our customers. Long bef<strong>or</strong>e we start designing systems we listen<br />

84 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

evalu<strong>at</strong>e the customers’ needs. We then w<strong>or</strong>k with our customers to<br />

understand and accur<strong>at</strong>ely defi ne their needs, so th<strong>at</strong> we can design and<br />

build the right system to meet them.<br />

We can integr<strong>at</strong>e and install any access <strong>co</strong>ntrol solution, regardless of<br />

the vend<strong>or</strong> <strong>or</strong> brand, from biometrics to cards to smart cards, and integr<strong>at</strong>e<br />

these into existing systems <strong>or</strong> any new systems you may require,<br />

so we can make sure th<strong>at</strong> our solutions not only fi t your needs but your<br />

budget as well.<br />

Backed by the off erings<br />

of Jas<strong>co</strong> Industry Solutions<br />

as well as our other security<br />

off erings, we can integr<strong>at</strong>e<br />

security and fi re solutions<br />

with building management<br />

<strong>co</strong>ntrols. By harnessing the<br />

power of building management<br />

systems, people fl ow<br />

and access <strong>co</strong>ntrol can<br />

be<strong>co</strong>me ever m<strong>or</strong>e intelligent,<br />

turning off lights and he<strong>at</strong>ing<br />

when people leave rooms<br />

and locking the do<strong>or</strong>s autom<strong>at</strong>ically<br />

when the building<br />

<strong>or</strong> site is empty. We can also<br />

integr<strong>at</strong>e security with power<br />

quality and power assurance<br />

solutions to help secure and<br />

protect mission-critical business<br />

technologies such as the<br />

d<strong>at</strong>a centre.<br />

As part of the Jas<strong>co</strong> Group,<br />

we can also leverage solutions<br />

across ICT and Energy, supplying<br />

the physical cables along<br />

with the IT and tele<strong>co</strong>ms<br />

infrastructure th<strong>at</strong> enterprises<br />

need to make their business<br />

w<strong>or</strong>k. Today’s technology<br />

relies on <strong>co</strong>nnectivity, and<br />

security, access <strong>co</strong>ntrol and<br />

people fl ow solutions are no diff erent. From the backbone and <strong>co</strong>nnectivity,<br />

to <strong>co</strong>ntact centres and applic<strong>at</strong>ions, right through to access and<br />

security, the Jas<strong>co</strong> Group supplies it all, off ering true <strong>co</strong>nverged end-toend<br />

technology solutions.<br />

Security is critical f<strong>or</strong> protecting your business, but security is no<br />

longer a standalone facet of the <strong>or</strong>ganis<strong>at</strong>ion. Today, security solutions<br />

and access <strong>co</strong>ntrol need to integr<strong>at</strong>e into a host of other systems and<br />

solutions to ensure adequ<strong>at</strong>e protection. Jas<strong>co</strong> Security Solutions, as<br />

part of the Jas<strong>co</strong> Group, off ers the holistic, all en<strong>co</strong>mpassing solutions<br />

tail<strong>or</strong>ed to meet the individual needs of each and every one of our<br />

clients.<br />

F<strong>or</strong> m<strong>or</strong>e inf<strong>or</strong>m<strong>at</strong>ion <strong>co</strong>ntact Jas<strong>co</strong>, +27 (0)11 894 7127/8,<br />

mmare@multivid.<strong>co</strong>.<strong>za</strong>, www.jas<strong>co</strong>.<strong>co</strong>.<strong>za</strong>


W<strong>or</strong>kf<strong>or</strong>ce management effi ciency<br />

By Walter Rautenbach, neaMetrics.<br />

We have seen a renewed interest the past 18 months in the area of effi -<br />

cient w<strong>or</strong>kf<strong>or</strong>ce management. Since the term w<strong>or</strong>kf<strong>or</strong>ce management<br />

seems to have fallen in to the trap of be<strong>co</strong>ming a <strong>co</strong>mmon buzzw<strong>or</strong>d, a<br />

clear defi nition is needed.<br />

In essence, it is a solution th<strong>at</strong>:<br />

• Enables planning and rostering of required staff ,<br />

• Ensures the <strong>co</strong>rrect rank and skill level is deployed,<br />

• Provides real-time upd<strong>at</strong>es of the current st<strong>at</strong>us of your diff erent sites<br />

<strong>or</strong> loc<strong>at</strong>ions to assist with oper<strong>at</strong>ional management, and<br />

• Limits overtime and wage <strong>co</strong>st to achieve optimal profi tability.<br />

It is our belief th<strong>at</strong> the reason f<strong>or</strong> this renewed interest can be<br />

<strong>at</strong>tributed to the e<strong>co</strong>nomic situ<strong>at</strong>ion. Companies need to ensure th<strong>at</strong><br />

employees are <strong>at</strong> w<strong>or</strong>k when they claim they are. This goes hand in hand<br />

with overtime claimed where w<strong>or</strong>k has not actually been perf<strong>or</strong>med, as<br />

well as the issues around ghost employees.<br />

Aside from these obvious reasons, <strong>co</strong>mpanies also need to ensure<br />

they can secure clients and th<strong>at</strong> the client gets wh<strong>at</strong> he pays f<strong>or</strong>. Tenders<br />

are price-sensitive and theref<strong>or</strong>e suppliers need to price f<strong>or</strong> the <strong>co</strong>rrect<br />

amount of employees in <strong>or</strong>der to fulfi l requirements.<br />

With outsourced services such as cleaning and guarding services, we fi nd<br />

th<strong>at</strong> service level agreements (SLAs) are be<strong>co</strong>ming stricter. Penalties infl icted<br />

when <strong>co</strong>mpanies do not provide the <strong>co</strong>rrect staff required f<strong>or</strong> a job have a<br />

neg<strong>at</strong>ive fi nancial and reput<strong>at</strong>ional eff ect on <strong>co</strong>mpanies th<strong>at</strong> do not <strong>co</strong>mply.<br />

W<strong>or</strong>kf<strong>or</strong>ce management is not a new <strong>co</strong>ncept, but the tools available<br />

to do this eff ectively, most of the time, rely on planning and re<strong>co</strong>rding<br />

systems th<strong>at</strong> are only as reliable and authentic as the staff providing the<br />

input. As with most <strong>co</strong>mpanies th<strong>at</strong> need to <strong>co</strong>unt every penny, so too<br />

do individuals. Unf<strong>or</strong>tun<strong>at</strong>ely, some of these individuals will fi nd any<br />

means possible to get as much out of the system as possible in their<br />

fi ght f<strong>or</strong> survival. Most of them do not understand the neg<strong>at</strong>ive impact<br />

on their employer’s profi t, their ability to expand business and to provide<br />

jobs. Manual timesheets, telephonic check-in of remote staff and<br />

trust are tools th<strong>at</strong> are ineffi cient f<strong>or</strong> today’s businesses.<br />

neaMetrics has <strong>co</strong>ncentr<strong>at</strong>ed its eff <strong>or</strong>ts on a solution th<strong>at</strong> can fi t into<br />

the required parameters f<strong>or</strong> delivering accur<strong>at</strong>e and effi cient w<strong>or</strong>kf<strong>or</strong>ce<br />

management. This entails integr<strong>at</strong>ion with EasyRoster to enable m<strong>or</strong>e<br />

accur<strong>at</strong>e time and <strong>at</strong>tendance (T&A) details via biometric technologies.<br />

EasyRoster has been involved in optimising w<strong>or</strong>kf<strong>or</strong>ce management since<br />

1996. The <strong>co</strong>mpany has 530 install<strong>at</strong>ions in 24 <strong>co</strong>untries, with a strong<br />

focus on the manned guarding, cleaning and labour broking industries.<br />

Although the initial product development focused mainly on the<br />

guarding environment, some other areas of interest are also apparent.<br />

Attraction from large retail environments th<strong>at</strong> carefully need to plan<br />

their staff deployment is one. Another one is property investment <strong>co</strong>mpanies<br />

th<strong>at</strong> utilise third parties to service their investments.<br />

F<strong>or</strong> m<strong>or</strong>e inf<strong>or</strong>m<strong>at</strong>ion <strong>co</strong>ntact neaMetrics, 0861 632 638,<br />

info@neametrics.<strong>co</strong>m, www.neametrics.<strong>co</strong>m<br />

TRENDS<br />

www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 85


TRENDS<br />

Identity in Africa, the mobile<br />

upwards<br />

By Sanjay Dharwadker.<br />

The mobile is m<strong>or</strong>e than a phone in Africa.<br />

In Africa, many m<strong>or</strong>e people are likely to reap the benefi ts of mobile<br />

telephony, in many m<strong>or</strong>e ways, than any other <strong>co</strong>ntinent bef<strong>or</strong>e. It may<br />

sound like a <strong>co</strong>ntradiction, but these are the facts. Today, a little over<br />

500 million people on the <strong>co</strong>ntinent, possibly <strong>co</strong>nstituting 60% of its<br />

popul<strong>at</strong>ion, have a personal mobile <strong>co</strong>nnection, in many cases their only<br />

institutionalised identifi c<strong>at</strong>ion.<br />

Besides this, it is often the only means of <strong>co</strong>mmunic<strong>at</strong>ion – f<strong>or</strong> business,<br />

family and socialising – the PC and the Internet being still sparsely<br />

available. F<strong>or</strong> millions still, it is the only way of banking, and where<br />

educ<strong>at</strong>ion is an urgent and imp<strong>or</strong>tant need, the only source of sharing<br />

knowledge. All this makes the need to securely identify the subscriber,<br />

of paramount imp<strong>or</strong>tance.<br />

The tele<strong>co</strong>m oper<strong>at</strong><strong>or</strong>s th<strong>at</strong><br />

have made its widespread use<br />

possible <strong>co</strong>me from different<br />

backgrounds, and with <strong>co</strong>ntrasting<br />

marketing ideologies. Voda<strong>co</strong>m<br />

has followed the predominantly<br />

western n<strong>or</strong>m, and has <strong>co</strong>nnected<br />

the African elite with a w<strong>or</strong>ld-class<br />

service. Airtel has arrived from the<br />

East, with products and services<br />

th<strong>at</strong> have mass appeal.<br />

By repe<strong>at</strong>edly breaking price<br />

barriers, they have hoped to<br />

increase talk times. But in Africa,<br />

if the subscribers saved talk-time<br />

money, they would r<strong>at</strong>her buy<br />

a bicycle, <strong>or</strong> even daily necessities.<br />

Such are the <strong>co</strong>mplex socioe<strong>co</strong>nomic<br />

pressures in much of the<br />

<strong>co</strong>ntinent. Nevertheless, they were<br />

to get on with the arduous climb to<br />

e<strong>co</strong>nomic prosperity, just as Asia did<br />

in the previous decades, it would be<br />

heavily dependent on the mobile<br />

telephone.<br />

M<strong>or</strong>e than a phone<br />

Sanjay Dharwadker.<br />

But herein lies a crucial c<strong>at</strong>ch and<br />

this was m<strong>or</strong>e than highlighted<br />

recently in an East African <strong>co</strong>untry, where its n<strong>at</strong>ional ID card program<br />

fl oundered and because of the absence of any other means of f<strong>or</strong>mal<br />

identifi c<strong>at</strong>ion, the much needed tele<strong>co</strong>m expansion, has <strong>co</strong>me almost to<br />

a halt. At one time, technologies associ<strong>at</strong>ed with identity management,<br />

such as biometrics and smart cards, were often jocularly referred to as<br />

“solutions looking f<strong>or</strong> a problem”, but somehow in the African <strong>co</strong>ntext<br />

we may have fi nally <strong>co</strong>me full circle.<br />

In many <strong>co</strong>untries, the mobile netw<strong>or</strong>k oper<strong>at</strong><strong>or</strong>s (MNOs) are already<br />

86 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

w<strong>or</strong>king with banks. Both, besides being well-established <strong>co</strong>rp<strong>or</strong><strong>at</strong>e<br />

entities, are <strong>co</strong>ntinuously monit<strong>or</strong>ed by regul<strong>at</strong><strong>or</strong>s from the government<br />

<strong>or</strong> quasi-government bodies.<br />

To establish the subscriber identity, two missing pieces need to be<br />

put in place. First is the establishment of unique identity, <strong>at</strong> the time of<br />

enrolment. Deployment of a one-to-many biometric search engine is<br />

ideal, and this can easily be institutionalised (on behalf of the st<strong>at</strong>e, so to<br />

say) by the netw<strong>or</strong>k oper<strong>at</strong><strong>or</strong> and / <strong>or</strong> the bank. This <strong>co</strong>uld well be their<br />

<strong>co</strong>st of “owning the customer”.<br />

The se<strong>co</strong>nd is to enhance the current standard two-fact<strong>or</strong> authentic<strong>at</strong>ion<br />

(SIM and PIN / PUK), th<strong>at</strong> ensures the uniqueness of the instrument,<br />

but not of the subscriber. With<br />

recent developments in voice re<strong>co</strong>gnition<br />

this <strong>co</strong>uld change. However,<br />

this technology is new, and both its<br />

reliability and <strong>co</strong>st would require<br />

some time to settle in.<br />

A paradigm shift<br />

However, if it does in the <strong>co</strong>ming<br />

years, it <strong>co</strong>uld be a wel<strong>co</strong>me breakthrough<br />

and <strong>co</strong>uld even cause a paradigm<br />

shift in systems like the pension<br />

payouts th<strong>at</strong> have been pioneered<br />

in South Africa and are being implemented<br />

elsewhere in Africa. Reliable<br />

voice re<strong>co</strong>gnition would provide the<br />

crucial missing piece in the entire<br />

jigsaw and elimin<strong>at</strong>e altogether the<br />

need f<strong>or</strong> the old and the infi rm to<br />

(even if it once a month) to queue<br />

up and be re<strong>co</strong>gnised f<strong>or</strong> a physical<br />

payout. It <strong>co</strong>uld all be done on a<br />

mobile phone then.<br />

F<strong>or</strong> a moment then, let us just<br />

imagine, even if it sounds like fantasy<br />

– th<strong>at</strong> instead of elect<strong>or</strong>al rolls, and<br />

citizen registr<strong>at</strong>ion systems, and<br />

health insurance, and pensions,<br />

and welfare – if it is only the mobile<br />

phone with each citizen!<br />

It would indeed be a win-win f<strong>or</strong> all – the citizen will have a trusted<br />

identity (and a voice) – s/he can transact, learn and socialise, the <strong>co</strong>st<br />

can be m<strong>or</strong>e than re<strong>co</strong>vered by the service providers, and millions m<strong>or</strong>e<br />

can be<strong>co</strong>me part of the global mainstream of <strong>co</strong>mmerce and <strong>co</strong>mmunic<strong>at</strong>ion,<br />

while the st<strong>at</strong>e can have a means of listening in to their citizens,<br />

all <strong>at</strong> the same time.<br />

A case seems certainly to be there, but maybe we have to all think it<br />

through. Any takers?


Points to <strong>co</strong>nsider in<br />

selecting biometrics<br />

By Kelly McLintock, UTM Group.<br />

The landscape in access <strong>co</strong>ntrol is <strong>co</strong>nstantly changing with respect to<br />

the technologies, products, <strong>co</strong>sts and end-user requirements As South<br />

Africa be<strong>co</strong>mes a m<strong>or</strong>e dangerous place, heightened security starts to<br />

make m<strong>or</strong>e sense.<br />

There are a number of biometric scanning technologies available,<br />

but which one is best is the subject of much <strong>co</strong>ntention between not<br />

only vend<strong>or</strong>s, but also manufacturers.<br />

Biometrics-based access <strong>co</strong>ntrol is a way in which UTM Group<br />

believes South African businesses can further secure their premises<br />

elimin<strong>at</strong>ing lost card, stolen PIN <strong>co</strong>des and, in the case of time and <strong>at</strong>tendance,<br />

elimin<strong>at</strong>e buddy clocking.<br />

With so much <strong>at</strong> stake, end users should carefully <strong>co</strong>nsider who gets<br />

involved with biometric technologies. Do you want to rely on cheap<br />

knock-off biometric products whose alg<strong>or</strong>ithms and design may not<br />

have been subjected to adequ<strong>at</strong>e evalu<strong>at</strong>ion and testing?<br />

UTM Group has put together a list of requirements th<strong>at</strong> should be<br />

<strong>co</strong>nsidered, when investig<strong>at</strong>ing biometric technologies.<br />

Site <strong>co</strong>nditions: These play an imp<strong>or</strong>tant role. Each biometric technology<br />

has characteristics which diff erenti<strong>at</strong>e it from the others. Indo<strong>or</strong> as<br />

opposed to outdo<strong>or</strong>, and specifi cally, the IP r<strong>at</strong>ing (Ingress Progression).<br />

This r<strong>at</strong>ing classifi es the degrees of protection against dust, w<strong>at</strong>er and<br />

impact th<strong>at</strong> electrical equipment and enclosures can aff <strong>or</strong>d.<br />

Existing system capabilities: Biometric upgrades are totally possible<br />

without having to rerun cabling <strong>or</strong> changing other system assets.<br />

Throughput required: This means how many individuals the system<br />

will be required to screen, <strong>or</strong> scan, and how fast must this be ac<strong>co</strong>mplished<br />

to avoid cre<strong>at</strong>ing delays and user frustr<strong>at</strong>ion.<br />

Reliability and effi ciency of the reader: Every person who uses the<br />

system will have to be enrolled and verifi ed. Misreads <strong>or</strong> malfunctions<br />

will cause issues.<br />

Price: The <strong>co</strong>st of the hardware and the amount of technical supp<strong>or</strong>t<br />

required to keep biometrics functioning. Essentially, the total <strong>co</strong>st of<br />

ownership f<strong>or</strong> the solution.<br />

Ease of deployment: Biometric systems and readers are m<strong>or</strong>e robust<br />

and modular; software is written to interface m<strong>or</strong>e readily, and the readers<br />

are designed to withstand harsh environments – once again depending<br />

on the IP r<strong>at</strong>ing.<br />

Reliability: Improved technology results in fewer hardware failures and<br />

security lapses.<br />

Convenience: Newer biometrics are less intimid<strong>at</strong>ing and easier to use.<br />

Unlike keys, PINs, keypads, picture IDs <strong>or</strong> magnetic swipe cards,<br />

biometric technology and identities cannot be transferred to another<br />

person, stolen, <strong>co</strong>pied <strong>or</strong> <strong>co</strong>unterfeited. UTM Group believes the applic<strong>at</strong>ion<br />

of biometric technology elimin<strong>at</strong>es <strong>or</strong> gre<strong>at</strong>ly reduces the opp<strong>or</strong>tunity<br />

f<strong>or</strong> identity theft, unauth<strong>or</strong>ised access and the potentially disastrous<br />

<strong>co</strong>nsequences to safety and security.<br />

www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 87


OPINION<br />

Access <strong>co</strong>ntrol does not equal time<br />

and <strong>at</strong>tendance<br />

By Michael H<strong>or</strong>vitch, n<strong>at</strong>ional technical adviser, Regal Security.<br />

A T&A system requires a lot m<strong>or</strong>e than simple IN/OUT transactions.<br />

There is a strong mis<strong>co</strong>nception, both by installers and end users, th<strong>at</strong><br />

any access <strong>co</strong>ntrol system th<strong>at</strong> can <strong>co</strong>nnect to a PC is autom<strong>at</strong>ically a<br />

time and <strong>at</strong>tendance (T&A) system. Just download the logs and you<br />

have a T&A rep<strong>or</strong>t.<br />

While the inf<strong>or</strong>m<strong>at</strong>ion retrieved from an access <strong>co</strong>ntrol system can<br />

be used to gener<strong>at</strong>e suitable T&A rep<strong>or</strong>ts, a large amount of processing<br />

is required to do this – especially if one wants to <strong>co</strong>mply with the Basic<br />

Conditions of Employment Act!<br />

An access <strong>co</strong>ntrol system is, as the name implies, a system to <strong>co</strong>ntrol<br />

and manage access of people to specifi c areas <strong>at</strong> design<strong>at</strong>ed times. The<br />

logs th<strong>at</strong> the system keeps are intended f<strong>or</strong> security auditing purposes<br />

only. A T&A system requires a<br />

lot m<strong>or</strong>e than simple IN/OUT<br />

transactions.<br />

A proper T&A system, will take<br />

logs, usually from a dedic<strong>at</strong>ed T&A<br />

reader, and process these logs<br />

ac<strong>co</strong>rding to a strict set of rules.<br />

These rules are based on how<br />

the <strong>co</strong>mpany w<strong>or</strong>ks – wh<strong>at</strong> time<br />

they start, wh<strong>at</strong> time they end,<br />

lunch breaks, permissible overtime<br />

etc. These rules are largely<br />

dict<strong>at</strong>ed by the Basic Conditions<br />

of Employment Act. However, the<br />

rules will vary from <strong>co</strong>mpany to<br />

<strong>co</strong>mpany depending on their own<br />

environment, requirements and<br />

hist<strong>or</strong>y.<br />

Typically, a T&A system will be able to gener<strong>at</strong>e a number of useful<br />

management rep<strong>or</strong>ts to assist, not only f<strong>or</strong> payroll, but also daily management.<br />

These rep<strong>or</strong>ts should include a l<strong>at</strong>e <strong>co</strong>mers rep<strong>or</strong>t and absenteeism<br />

rep<strong>or</strong>t. These would allow the management to get an immedi<strong>at</strong>e<br />

snap-shot of <strong>at</strong>tendance f<strong>or</strong> the day. Rep<strong>or</strong>ts such as Clocking<br />

Exceptions, Clocking Adjustments, Leave and Early leaving are also very<br />

useful f<strong>or</strong> the day to day management of a business and f<strong>or</strong> cases of<br />

disciplinary action.<br />

Obviously, the main function of a T&A system is to gener<strong>at</strong>e rep<strong>or</strong>ts<br />

of hours w<strong>or</strong>ked. These rep<strong>or</strong>t need to be able to refl ect N<strong>or</strong>mal Time,<br />

Time-and-a-Half, Double Time and any other special time alloc<strong>at</strong>ions<br />

th<strong>at</strong> the <strong>co</strong>mpany may require. These rep<strong>or</strong>ts need to be able to be<br />

fi ltered by person, department, d<strong>at</strong>e, day, week <strong>or</strong> month. These rep<strong>or</strong>ts<br />

must be calcul<strong>at</strong>ed based on w<strong>or</strong>k rules, as well as requirements and<br />

leniency of the law.<br />

South African law is diff erent from the rest of the w<strong>or</strong>ld in the rules<br />

th<strong>at</strong> govern our w<strong>or</strong>king hours. Typically w<strong>or</strong>king m<strong>or</strong>e than a certain<br />

number of hours of n<strong>or</strong>mal time a month would autom<strong>at</strong>ically role up<br />

into overtime. Conversely, if there is a sh<strong>or</strong>tfall in n<strong>or</strong>mal time, but the<br />

person has w<strong>or</strong>ked overtime, th<strong>at</strong> can be fl owed down to fi ll the sh<strong>or</strong>t<br />

fall in n<strong>or</strong>mal time. Unlike the rest of the w<strong>or</strong>ld which only has N<strong>or</strong>mal<br />

88 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

Time and Overtime, South Africa requires <strong>at</strong> least N<strong>or</strong>mal Time, Timeand-a-Half<br />

and Double Time, each with its own <strong>co</strong>nditions <strong>at</strong>tached.<br />

A suitable rep<strong>or</strong>t f<strong>or</strong> use as a timesheet should include Clock-In and<br />

Clock-Out times f<strong>or</strong> each day, as well as daily totals. At the bottom of the<br />

timesheet the <strong>co</strong>lumns should be totalled up and then re-calcul<strong>at</strong>ed in<br />

line with the required rules f<strong>or</strong> the rep<strong>or</strong>ted period. This should all be<br />

clearly and logically laid out on each timesheet. Get these calcul<strong>at</strong>ions<br />

wrong and a visit to the CCMA may be on the cards <strong>or</strong> staff may go on<br />

strike.<br />

As mentioned above, South Africa has special requirements f<strong>or</strong><br />

T&A systems. As such, it is highly re<strong>co</strong>mmended th<strong>at</strong> when selecting<br />

software f<strong>or</strong> a T&A system a local<br />

software house th<strong>at</strong> specialises<br />

in time management software<br />

should be <strong>co</strong>nsidered. This has a<br />

number of advantages :<br />

• the software will <strong>co</strong>mply with<br />

the requirements of South<br />

African law,<br />

• the software house will be able<br />

to quickly adapt the software<br />

in the case of changing laws,<br />

• the software house will be able<br />

to customise the software to<br />

meet individual requirements,<br />

and<br />

• supp<strong>or</strong>t is only a phone call<br />

away.<br />

Also, South African T&A<br />

software will off er a payroll exp<strong>or</strong>t fe<strong>at</strong>ure th<strong>at</strong> supp<strong>or</strong>ts the <strong>co</strong>mmonly<br />

used, local payroll packages. Flexibility is imp<strong>or</strong>tant as well as every<br />

South African <strong>co</strong>mpany w<strong>or</strong>ks diff erently, but must still <strong>co</strong>mply with<br />

unique legal requirements.<br />

Most of the available software packages are integr<strong>at</strong>ed with a<br />

number of hardware pl<strong>at</strong>f<strong>or</strong>ms. One would be able to select the clocking<br />

reader of preference – RFID, fi ngerprint, facial etc from your preferred<br />

hardware supplier. Various brands are widely supp<strong>or</strong>ted by the diff erent<br />

software houses.<br />

There are a huge number of T&A options out there and it is imp<strong>or</strong>tant<br />

th<strong>at</strong> the system selected be <strong>co</strong>mpliant with the laws, be fl exible<br />

enough to meet the requirements of the <strong>co</strong>mpany, and be supp<strong>or</strong>ted<br />

and backed up by all suppliers. Always remember th<strong>at</strong> time and <strong>at</strong>tendance<br />

is a service. Also, remember to get a few people to advise and<br />

quote, as not all solutions may suit your particular environment. Choose<br />

carefully and you will have a valuable business tool th<strong>at</strong> will save the<br />

<strong>co</strong>mpany signifi cant amounts of time and money with a speedy ROI. Get<br />

it wrong and the <strong>co</strong>sts <strong>co</strong>uld be devast<strong>at</strong>ing.<br />

F<strong>or</strong> m<strong>or</strong>e inf<strong>or</strong>m<strong>at</strong>ion <strong>co</strong>ntact Regal Distribut<strong>or</strong>s, +27 (0)11 553 3300,<br />

mel.labuschagne@regalsecurity.<strong>co</strong>.<strong>za</strong>, www.regalsecurity.<strong>co</strong>.<strong>za</strong>


Local digital identity innov<strong>at</strong>ion<br />

A technology w<strong>or</strong>ld-fi rst is set to revolutionise the process of managing identity.<br />

The recent Identity Indaba saw, among other present<strong>at</strong>ions, the introduction<br />

of a new South African innov<strong>at</strong>ion in digital identity management.<br />

It’s called GreenBox and it takes identity management to a new<br />

level.<br />

Th<strong>at</strong>’s ac<strong>co</strong>rding to Alan Goodway, business development executive:<br />

Innov<strong>at</strong>ion <strong>at</strong> Business Connexion who says th<strong>at</strong> not only does GreenBox<br />

capture multiple types of identity d<strong>at</strong>a; it also provides an identity-verifi -<br />

c<strong>at</strong>ion pl<strong>at</strong>f<strong>or</strong>m – all from a single device.<br />

GreenBox <strong>co</strong>mbines a camera, fi ngerprint reader, document scanner,<br />

digital sign<strong>at</strong>ure pad with an interactive touch-screen, EMV-<strong>co</strong>mpliant<br />

smartcard reader, USB <strong>co</strong>nnection,<br />

device drivers and plugand-play<br />

capabilities straight<br />

into Microsoft-based oper<strong>at</strong>ing<br />

systems.<br />

All this <strong>co</strong>mes in a desktop<br />

unit th<strong>at</strong> weighs under 2 kg and<br />

has a footprint less than an A4<br />

notepad.<br />

Multiple applic<strong>at</strong>ions f<strong>or</strong><br />

secure ID management<br />

Goodway says th<strong>at</strong> the process<br />

of ac<strong>co</strong>unt take-on provides<br />

an example th<strong>at</strong> illustr<strong>at</strong>es<br />

the extensive capabilities of<br />

GreenBox.<br />

“Let’s say I want to open an<br />

ac<strong>co</strong>unt <strong>at</strong> Supa-Dupa St<strong>or</strong>es.<br />

First, GreenBox takes a 20 megapixel<br />

picture of me. It then scans<br />

my SA ID book – <strong>or</strong> my driver’s licence <strong>or</strong> even my passp<strong>or</strong>t. Next on the<br />

ID d<strong>at</strong>a-capture list <strong>co</strong>mes my fi ngerprints, followed by my sign<strong>at</strong>ure on<br />

the digital pad. The interactive touch screen also gives me a choice of<br />

ac<strong>co</strong>unt-services th<strong>at</strong> I might want.<br />

“Supa-Dupa now has a picture of me, a digital fi ngerprint re<strong>co</strong>rd, a<br />

<strong>co</strong>py of my ID book and my digitised sign<strong>at</strong>ure. They also know wh<strong>at</strong><br />

type of ac<strong>co</strong>unt I want and the services I’d like to have associ<strong>at</strong>ed with<br />

it – st<strong>at</strong>ements by e-mail <strong>or</strong> in the post, f<strong>or</strong> example.”<br />

Once the <strong>co</strong>mprehensive d<strong>at</strong>a-capture process is <strong>co</strong>mpleted,<br />

GreenBox can run the new customer’s ID details through a credit bureau<br />

to make sure they’re good f<strong>or</strong> the money. It can verify the details against<br />

the N<strong>at</strong>ional Centre f<strong>or</strong> Certifi ed Identities (NCCI). It can even link up<br />

with a smart card printer to make a temp<strong>or</strong>ary Supa-Dupa st<strong>or</strong>e card.<br />

And the customer can then swipe th<strong>at</strong> through the GreenBox smartcard<br />

reader to pay f<strong>or</strong> all their purchases.<br />

In summary of the out<strong>co</strong>mes from this process, Goodway says, “In<br />

the space of a few minutes, the new customer has been FICA’d <strong>or</strong> RICA’d<br />

all in one go. Supa-Dupa has got a new, trusted and credit-approved<br />

customer with all the supp<strong>or</strong>ting documents in their digital document<br />

archive. And the customer has jumped <strong>at</strong> their special off er on a new<br />

smart-phone and bought one.”<br />

Case study: micro-lending industry<br />

Goodway says th<strong>at</strong> Business Connexion have already developed a<br />

blueprint solution f<strong>or</strong> the fi nancial services sect<strong>or</strong> – in particular f<strong>or</strong> the<br />

rapidly expanding local business of micro-lending.<br />

One objective was to structure a solution th<strong>at</strong> <strong>co</strong>uld acceler<strong>at</strong>e and<br />

reinf<strong>or</strong>ce security within the existing process th<strong>at</strong> manages the lender’s<br />

sales represent<strong>at</strong>ives across a distributed geographical environment. F<strong>or</strong><br />

new represent<strong>at</strong>ives, this process begins with a take-on and background<br />

screening function. The BCX solution reduces the time taken to <strong>co</strong>mplete<br />

this from around two weeks to just two days.<br />

Simultaneously, it cre<strong>at</strong>es a de-duplic<strong>at</strong>ed d<strong>at</strong>abase of represent<strong>at</strong>ives<br />

whose access to the lenders’ IT systems is then <strong>co</strong>ntrolled by<br />

fi ngerprint-based authentic<strong>at</strong>ion<br />

through the SuperSign software<br />

pl<strong>at</strong>f<strong>or</strong>m. F<strong>or</strong> example, when an<br />

approved represent<strong>at</strong>ive wants<br />

to load new loan agreements,<br />

system-access is no longer based<br />

on a passw<strong>or</strong>d, PIN <strong>or</strong> card but<br />

through fi ngerprint identifi c<strong>at</strong>ion<br />

of the agent.<br />

Using GreenBox, the new<br />

represent<strong>at</strong>ive’s identity d<strong>at</strong>a and<br />

fi ngerprints are captured and<br />

a validity-check is run through<br />

the N<strong>at</strong>ional Centre f<strong>or</strong> Certifi ed<br />

Identities – the NCCI. This initial<br />

‘quick-check’ <strong>co</strong>nfi rms gender,<br />

telephone numbers, name and SA<br />

ID number.<br />

If all is in <strong>or</strong>der, a m<strong>or</strong>e detailed<br />

background check is autom<strong>at</strong>ically<br />

run through MIE. “The initial<br />

quick-check avoids the expense of having to <strong>co</strong>nduct MIE screening<br />

on new personnel whose ID d<strong>at</strong>a might be clearly problem<strong>at</strong>ic,” says<br />

Goodway, “And the solution’s fi ngerprint <strong>co</strong>mponent also ensures th<strong>at</strong><br />

staff are enrolled only once across the enterprise.”<br />

By cre<strong>at</strong>ing a centralised biometric d<strong>at</strong>abase, Business Connexion<br />

is also able to use this identity d<strong>at</strong>a to manage physical access to the<br />

<strong>or</strong>ganis<strong>at</strong>ion’s offi ces. Goodway says, “This capability provides true <strong>co</strong>nvergence<br />

between HR’s take-on function, physical access <strong>co</strong>ntrol, time<br />

and <strong>at</strong>tendance monit<strong>or</strong>ing and <strong>co</strong>ntrol of IT access and activity – all<br />

within a single, centrally-managed solution.”<br />

Architecture of the micro-lending solution<br />

In terms of environmental m<strong>at</strong>urity, GreenBox is also advanced<br />

because of its paperless management of identity d<strong>at</strong>a and all the<br />

associ<strong>at</strong>ed paperw<strong>or</strong>k f<strong>or</strong> identifi c<strong>at</strong>ion-<strong>co</strong>mpliances such as FICA and<br />

RICA.<br />

As Goodway points out, “Conventional f<strong>or</strong>ms do not have to be<br />

designed, printed, packaged, distributed, fi lled-in, photo<strong>co</strong>pied <strong>or</strong><br />

physically st<strong>or</strong>ed. The whole process can be autom<strong>at</strong>ed with GreenBox<br />

and the traditional <strong>co</strong>sts associ<strong>at</strong>ed with all this are elimin<strong>at</strong>ed by digital<br />

management of identity-rel<strong>at</strong>ed d<strong>at</strong>a.”<br />

F<strong>or</strong> m<strong>or</strong>e inf<strong>or</strong>m<strong>at</strong>ion <strong>co</strong>ntact Alan Goodway,<br />

Business Connexion, +27 (0)11 266 1483.<br />

TRENDS<br />

www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 89


TRENDS<br />

St<strong>at</strong>e of the access <strong>co</strong>ntrol market<br />

S<strong>co</strong>tt McNulty answers a few questions about the changing access<br />

<strong>co</strong>ntrol landscape.<br />

The access <strong>co</strong>ntrol market has evolved <strong>co</strong>nsistently over the last fi ve<br />

to eight years, with new solutions being introduced th<strong>at</strong> have taken<br />

technology <strong>or</strong>iginally designed f<strong>or</strong> the <strong>co</strong>mmercial market and making<br />

it viable f<strong>or</strong> the small business market. Easier to install solutions th<strong>at</strong><br />

can now be managed by the end user, improved integr<strong>at</strong>ion between<br />

systems from diff erent manufacturers and the introduction of mobile<br />

apps are just a few of the recent developments.<br />

In this article, S<strong>co</strong>tt McNulty, product manager f<strong>or</strong> Kantech, a Ty<strong>co</strong><br />

Security Products brand, answers a few questions about the changing<br />

access <strong>co</strong>ntrol landscape, wh<strong>at</strong> these changes mean f<strong>or</strong> dealers.<br />

Wh<strong>at</strong> are some of the l<strong>at</strong>est and most innov<strong>at</strong>ive<br />

developments to happen in the access <strong>co</strong>ntrol market?<br />

S<strong>co</strong>tt McNulty: Integr<strong>at</strong>ion has been and <strong>co</strong>ntinues to be one of the<br />

biggest topics in the access <strong>co</strong>ntrol market. People want to see m<strong>or</strong>e and<br />

m<strong>or</strong>e integr<strong>at</strong>ion between their access <strong>co</strong>ntrol system and all kinds of<br />

other applic<strong>at</strong>ions used, not only to secure their buildings, but to run their<br />

business. Those applic<strong>at</strong>ions can include integr<strong>at</strong>ion of security pl<strong>at</strong>f<strong>or</strong>ms,<br />

such as security access <strong>co</strong>ntrol with video <strong>or</strong> intrusion, as well as human<br />

resources systems, fi re systems, time and<br />

<strong>at</strong>tendance systems and systems th<strong>at</strong> <strong>co</strong>ntrol<br />

logging into <strong>co</strong>mputers. It is currently a very<br />

big trend amongst manufacturers to trade<br />

SDKs (software development kits) and to<br />

enable linking systems together.<br />

Who is driving integr<strong>at</strong>ion?<br />

McNulty: This trend is primarily being driven<br />

by the end user who wants simplicity, but the<br />

security industry as a whole has embraced<br />

this movement and integr<strong>at</strong>ed solutions are<br />

be<strong>co</strong>ming the n<strong>or</strong>m versus the exception.<br />

How has this evolved?<br />

McNulty: Previously you had an intrusion<br />

system, a card access system and a video<br />

surveillance system and you managed three<br />

separ<strong>at</strong>e systems without any interoper- S<strong>co</strong>tt McNulty<br />

ability. In fact, in many cases you would have<br />

three separ<strong>at</strong>e monit<strong>or</strong>s on your desk. Where<br />

we are going is now you have m<strong>or</strong>e inf<strong>or</strong>m<strong>at</strong>ion in one central loc<strong>at</strong>ion<br />

and each solution is linked together, making the d<strong>at</strong>a easier to manage.<br />

How long has this been happening?<br />

McNulty: An integr<strong>at</strong>ed system is not a new <strong>co</strong>ncept. A decade ago,<br />

systems were “bolted” together, but it was r<strong>at</strong>her clunky. Within the last<br />

two years, technology has evolved to allow a m<strong>or</strong>e seamless integr<strong>at</strong>ion.<br />

The shift is thanks to m<strong>or</strong>e manufacturers being willing to off er their<br />

SDKs and make their systems m<strong>or</strong>e open. In the past, you had to use one<br />

brand of camera with the same brand of re<strong>co</strong>rder and the same brand<br />

of software. Today, you can use a camera from one manufacturer with a<br />

re<strong>co</strong>rder f<strong>or</strong>m another <strong>co</strong>mpany. Manufacturers today are re<strong>co</strong>gnising<br />

this is where the market has to go.<br />

90 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

How has the perception of access <strong>co</strong>ntrol changed in<br />

the last few years?<br />

McNulty: Years ago, access <strong>co</strong>ntrol systems, and particularly integr<strong>at</strong>ed<br />

solutions, were not regarded as either being easy to install f<strong>or</strong> the integr<strong>at</strong><strong>or</strong><br />

<strong>or</strong> intuitive to manage f<strong>or</strong> the end user. It’s imp<strong>or</strong>tant to make it<br />

as simple as possible f<strong>or</strong> the integr<strong>at</strong><strong>or</strong> and the end user. The integr<strong>at</strong><strong>or</strong><br />

wants to off er a <strong>co</strong>mpetitive price, then easily install the system to get in<br />

and out, while the end user needs a reliable security system, th<strong>at</strong> allows<br />

him to present his card and walk through a do<strong>or</strong> without any hassle.<br />

How are mobile apps changing access <strong>co</strong>ntrol?<br />

McNulty: Mobile apps are gener<strong>at</strong>ing a lot of interest and they have the<br />

wow fact<strong>or</strong>. People are excited about mobile apps and, as a result, when<br />

you off er an access <strong>co</strong>ntrol system th<strong>at</strong> off ers a mobile app <strong>co</strong>mponent it<br />

helps a dealer close the deal. With most mobile apps, people can lock <strong>or</strong><br />

unlock do<strong>or</strong>s and monit<strong>or</strong> their system. Th<strong>at</strong>’s the basic stuff . Our recently<br />

introduced EntraPass Go takes it a step further to include every function<br />

th<strong>at</strong>’s imp<strong>or</strong>tant to the end user, such as deleting a card if an employee is<br />

let go <strong>or</strong> gener<strong>at</strong>ing rep<strong>or</strong>ts and remotely sending them to the appropri<strong>at</strong>e<br />

staff person.<br />

Beyond software, cards and readers,<br />

wh<strong>at</strong> new solutions have been<br />

developed in the access <strong>co</strong>ntrol fi eld?<br />

McNulty: One new development is an all-in-one<br />

integr<strong>at</strong>ed server <strong>co</strong>mprised of access <strong>co</strong>ntrol,<br />

IP video surveillance and intrusion with one<br />

<strong>co</strong>mmon interface. This simplifi es the process f<strong>or</strong><br />

the end user because it’s a secured, tucked away<br />

box th<strong>at</strong> is protected from viruses and integr<strong>at</strong>ed<br />

with other systems. Kantech’s Intevo provides an<br />

integr<strong>at</strong>ed security pl<strong>at</strong>f<strong>or</strong>m based on EntraPass<br />

software and includes American Dynamics IP<br />

video management software and DSC intrusion<br />

alarm integr<strong>at</strong>ion – managed in a single user<br />

interface. The benefi t of this f<strong>or</strong> the installer is<br />

the simplicity of a plug and play appliance th<strong>at</strong> is<br />

already integr<strong>at</strong>ed. F<strong>or</strong> the end user it’s the ease<br />

of use of having one <strong>co</strong>mmon interface.<br />

How has the access <strong>co</strong>ntrol sale evolved?<br />

McNulty: The sales cycle f<strong>or</strong> access <strong>co</strong>ntrol has changed quite a bit in<br />

the last 10 years. It used to be quite long because, generally, only larger<br />

buildings implemented access <strong>co</strong>ntrol systems, so it was a long process<br />

because of the size and <strong>co</strong>st. The sales cycle has be<strong>co</strong>me sh<strong>or</strong>ter with<br />

the introduction of smaller and less expensive access <strong>co</strong>ntrol systems,<br />

meaning th<strong>at</strong> an integr<strong>at</strong><strong>or</strong> can turn around a project within a sh<strong>or</strong>ter<br />

period of time. Today, card access is accessible to a much larger market,<br />

making access <strong>co</strong>ntrol a benefi cial investment f<strong>or</strong> the systems integr<strong>at</strong><strong>or</strong><br />

and end user alike.<br />

F<strong>or</strong> m<strong>or</strong>e inf<strong>or</strong>m<strong>at</strong>ion <strong>co</strong>ntact Ty<strong>co</strong> Security Products,<br />

+27 (0)82 566 5274, emallett@ty<strong>co</strong>int.<strong>co</strong>m, www.ty<strong>co</strong>acvs.<strong>co</strong>m


A guide to access <strong>co</strong>ntrol<br />

and sustainability<br />

BSIA white paper.<br />

Access <strong>co</strong>ntrol provides the ability to <strong>co</strong>ntrol, monit<strong>or</strong> and restrict the movement<br />

of people, assets <strong>or</strong> vehicles, in, out and round a building <strong>or</strong> site.<br />

The system is essential f<strong>or</strong> all businesses to protect people and assets<br />

and has the added benefi t of being expanded from <strong>co</strong>ntrolling, f<strong>or</strong><br />

example, a single entrance do<strong>or</strong>, to a large integr<strong>at</strong>ed security netw<strong>or</strong>k.<br />

There are also huge potentials in terms of integr<strong>at</strong>ing this technology to<br />

other systems, such as time and <strong>at</strong>tendance, visit<strong>or</strong> management, ANPR,<br />

fi re, intruder and CCTV, which can cut <strong>co</strong>sts and streamline administr<strong>at</strong>ion<br />

<strong>co</strong>sts.<br />

The s<strong>co</strong>pe of the technology is certainly impressive, and with<br />

sustainability and fi nancial <strong>co</strong>ncerns high on the agenda of many businesses,<br />

it is imp<strong>or</strong>tant to understand the many<br />

ways in which an eff ective access <strong>co</strong>ntrol system<br />

can also help cut energy bills by both reducing<br />

energy wastage and improving an <strong>or</strong>ganis<strong>at</strong>ion’s<br />

environmental footprint.<br />

Wh<strong>at</strong> are the <strong>co</strong>mponents of access<br />

<strong>co</strong>ntrol systems?<br />

Access <strong>co</strong>ntrol systems are all designed to allow<br />

access only to people with the necessary auth<strong>or</strong>ity<br />

to ensure th<strong>at</strong> goods and staff are protected, while<br />

helping manage known <strong>or</strong> anticip<strong>at</strong>ed thre<strong>at</strong>s. In general, access <strong>co</strong>ntrol<br />

systems f<strong>or</strong>m part of a <strong>co</strong>mprehensive and integr<strong>at</strong>ed security str<strong>at</strong>egy.<br />

Generally, systems <strong>co</strong>mprise three <strong>co</strong>mponent parts:<br />

1. The physical barrier – to physically restrict access to a building <strong>or</strong><br />

loc<strong>at</strong>ion via such methods as:<br />

• Do<strong>or</strong>s; secured by either a magnetic <strong>or</strong> strike lock <strong>or</strong> can be revolving<br />

<strong>or</strong> sliding.<br />

• Turnstiles and speedg<strong>at</strong>es; designed to limit access to one person f<strong>or</strong><br />

one card presented.<br />

2. The identifi c<strong>at</strong>ion device – There are a number of diff erent technologies<br />

used to identify users of an access <strong>co</strong>ntrol system, such as:<br />

• A proximity card and reader using RFID – cards can be programmed to<br />

w<strong>or</strong>k <strong>at</strong> a sh<strong>or</strong>t read range <strong>or</strong> a long read range.<br />

• A smart card and reader.<br />

• A swipe card and reader.<br />

• PIN pads.<br />

• Biometric (e.g. fi ngerprint, facial, iris scanning).<br />

3. The do<strong>or</strong> <strong>co</strong>ntroller and software – The do<strong>or</strong> <strong>co</strong>ntroller and software<br />

are <strong>at</strong> the heart of the system and are used to decide who can gain<br />

access through which access point <strong>at</strong> wh<strong>at</strong> time of the day. These can<br />

vary dependent on the size of the system and how many readers <strong>or</strong> sites<br />

you are trying to <strong>co</strong>ntrol from one point. Some of the options include:<br />

• A stand-alone do<strong>or</strong> <strong>co</strong>ntroller linked to a single do<strong>or</strong> with no software.<br />

• A number of do<strong>or</strong> <strong>co</strong>ntrollers all linked together to a single PC to<br />

<strong>co</strong>ntrol one site.<br />

• A number of sites all interlinked together over a wide netw<strong>or</strong>k area.<br />

Reducing a <strong>co</strong>mpany’s environmental footprint<br />

Despite the widespread fi nancial cutbacks, <strong>co</strong>rp<strong>or</strong><strong>at</strong>e social responsibility<br />

and being able to demonstr<strong>at</strong>e environmental credentials remains a<br />

The BSIA is off ering<br />

insight into using<br />

access <strong>co</strong>ntrol<br />

systems to enhance<br />

sustainability.<br />

BEST PRACTICES<br />

pri<strong>or</strong>ity f<strong>or</strong> many businesses. Wh<strong>at</strong> many often fail to realise, however, is<br />

the crucial role th<strong>at</strong> their security provider can play in helping to <strong>co</strong>mbine<br />

<strong>co</strong>st savings and environmental <strong>co</strong>mmitments, whilst reducing the<br />

risk of theft and vandalism.<br />

Access <strong>co</strong>ntrol has long held a valued place within <strong>or</strong>ganis<strong>at</strong>ions of<br />

all types, helping to monit<strong>or</strong> the fl ow of auth<strong>or</strong>ised personnel around<br />

the premises while playing a vital role in health and safety and visit<strong>or</strong><br />

registr<strong>at</strong>ion.<br />

Recent developments in technology within the security industry<br />

means th<strong>at</strong> access <strong>co</strong>ntrol measures can now also play a favoured role<br />

in reducing your premises’ environmental footprint. Perhaps the primary<br />

and most <strong>co</strong>mmon way to achieve this is by<br />

carefully looking <strong>at</strong> the wealth of inf<strong>or</strong>m<strong>at</strong>ion th<strong>at</strong><br />

access <strong>co</strong>ntrol technology can provide.<br />

The building <strong>or</strong> area occupancy d<strong>at</strong>a provided by<br />

the system can highlight which areas of a building<br />

are occupied and when, and which are not being<br />

utilised to their full potential. Identifying this can<br />

lead to a number of imp<strong>or</strong>tant decisions which<br />

will go a long way towards reducing your environmental<br />

footprint and producing substantial <strong>co</strong>st<br />

savings.<br />

Examples include the decision to adjust lighting and HVAC (he<strong>at</strong>ing,<br />

ventil<strong>at</strong>ion and air <strong>co</strong>nditioning) requirements depending on<br />

whether <strong>or</strong> not the area will be used <strong>at</strong> a certain time of the day, as<br />

well as to realloc<strong>at</strong>e any unused space, either internally <strong>or</strong> by renting<br />

it out.<br />

Other ways in which access <strong>co</strong>ntrol can help reduce the environmental<br />

footprint of a <strong>co</strong>mpany is by integr<strong>at</strong>ing it with Building Energy<br />

Management Systems (BEMS), <strong>or</strong> avoiding he<strong>at</strong> wastage by isol<strong>at</strong>ing<br />

indo<strong>or</strong> spaces with the use of security revolving do<strong>or</strong>s. The access <strong>co</strong>ntrol<br />

system itself can be energy effi cient, f<strong>or</strong> example using low voltage<br />

turnstiles.<br />

Access <strong>co</strong>ntrol and sustainability in practice<br />

The fi gures behind building energy management systems<br />

While traditionally Building Energy Management Systems (BEMS) were<br />

focused on <strong>co</strong>ntrolling the building’s internal environment, it is now<br />

<strong>co</strong>mmonplace f<strong>or</strong> it to be integr<strong>at</strong>ed with the fi re and security systems in<br />

place, including CCTV and access <strong>co</strong>ntrol.<br />

BSIA member ADT provided BT’s site in Castle Wharf, Nottingham,<br />

with a BEMS system which slashed the electricity bill of the site by 77%,<br />

by implementing a better <strong>co</strong>ntrol system.<br />

BT’s energy manager f<strong>or</strong> the Castle Wharf site, spoke about how<br />

this w<strong>or</strong>ked in practice: “We needed to refurbish the HVAC system and<br />

wanted to install variable speed drives because we knew there was a<br />

potential f<strong>or</strong> energy saving. Out of hours, there are only a few occupants.<br />

As the fans were not speed <strong>co</strong>ntrolled, this led to a large waste<br />

of energy. Also, the car park ventil<strong>at</strong>ion was not needed <strong>at</strong> night and<br />

needed to be <strong>co</strong>ntrolled as well.<br />

“Additionally, our Building Management System was not set up the<br />

way we wanted and so we decided to use a BACnet based system. This<br />

www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 91


BEST PRACTICES<br />

would allow us to zone the building and introduce time <strong>co</strong>ntrols to take<br />

ac<strong>co</strong>unt of occupancy p<strong>at</strong>terns.”<br />

A BEMS can typically <strong>co</strong>ntrol up to 80% of a building’s energy usage, so<br />

it’s clear to see how using access <strong>co</strong>ntrol to optimise the system to suit the<br />

variable usage and occup<strong>at</strong>ion of a building can streamline energy usage.<br />

In such systems, d<strong>at</strong>a g<strong>at</strong>hered by access <strong>co</strong>ntrol and visit<strong>or</strong> monit<strong>or</strong>ing<br />

systems is used to inf<strong>or</strong>m the BEMS of the n<strong>at</strong>ure and function of the<br />

people occupying a he<strong>at</strong>ing zone. Knowing wh<strong>at</strong> roles are being fulfi lled<br />

by individuals oper<strong>at</strong>ing within a he<strong>at</strong>ing zone also allows the BEMS to<br />

make adjustments and lower the amount of fuel <strong>co</strong>nsumed.<br />

This inf<strong>or</strong>m<strong>at</strong>ion is applied by the BEMS to he<strong>at</strong>-loss alg<strong>or</strong>ithms to<br />

determine the minimum amount of he<strong>at</strong> to be applied to a particular<br />

area, reducing the amount of energy <strong>co</strong>nsumed and avoiding unnecessary<br />

wastage. F<strong>or</strong> example, a small group of students perf<strong>or</strong>ming largely<br />

sedentary activities<br />

will require<br />

m<strong>or</strong>e he<strong>at</strong>ing<br />

than a large<br />

group of manual<br />

w<strong>or</strong>kers <strong>co</strong>nducting<br />

m<strong>or</strong>e<br />

physical activity<br />

in a rel<strong>at</strong>ively<br />

small area.<br />

Identifying<br />

p<strong>at</strong>terns in<br />

visit<strong>or</strong> behaviour<br />

can stop the<br />

unnecessary<br />

he<strong>at</strong>ing of unoccupied<br />

he<strong>at</strong>ing<br />

zones, saving<br />

fuel and reducing<br />

CO emis-<br />

2<br />

sions. This w<strong>or</strong>ks<br />

intelligently,<br />

using past d<strong>at</strong>a<br />

to assess when<br />

a certain area of<br />

the building is likely to be occupied, activ<strong>at</strong>ing he<strong>at</strong>ing in time f<strong>or</strong> visit<strong>or</strong>s’<br />

arrival and reducing temper<strong>at</strong>ure <strong>or</strong> turning off the he<strong>at</strong>ing entirely<br />

during periods of inactivity. This can be particularly useful f<strong>or</strong> university<br />

buildings, where oper<strong>at</strong>ions and activities adhere to a regular schedule<br />

which is easily ‘learned’ by the BEMS to assess the timing and level of<br />

he<strong>at</strong>ing required to adjust the systems ac<strong>co</strong>rdingly.<br />

Insul<strong>at</strong>ing access points <strong>at</strong> Redbridge College<br />

One of the gre<strong>at</strong>est challenges f<strong>or</strong> any educ<strong>at</strong>ion establishment is<br />

balancing the need to cre<strong>at</strong>e an open, stimul<strong>at</strong>ing and <strong>co</strong>mf<strong>or</strong>table<br />

environment, while ensuring th<strong>at</strong> people and equipment are protected<br />

from the thre<strong>at</strong> of theft, vandalism and physical <strong>at</strong>tack.<br />

BSIA member, Kaba, was approached by Redbridge College to tackle<br />

the issue around the autom<strong>at</strong>ic sliding do<strong>or</strong>s currently in place <strong>at</strong> the<br />

<strong>co</strong>llege.<br />

It was explained to the BSIA member th<strong>at</strong> the do<strong>or</strong>s were allowing a<br />

<strong>co</strong>ld ingress into the reception area and throughout the building each<br />

time the do<strong>or</strong>s opened. With the frequent <strong>co</strong>mings and goings of all site<br />

personnel and in light of today’s <strong>co</strong>ntinually rising utility r<strong>at</strong>es, this was<br />

proving to be both impractical and <strong>co</strong>stly.<br />

92 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

After listening to the client’s requirements, Kaba proposed and<br />

subsequently installed a fully autom<strong>at</strong>ic revolving do<strong>or</strong> with bil<strong>at</strong>eral<br />

autom<strong>at</strong>ic pass do<strong>or</strong>s. The autom<strong>at</strong>ic pass do<strong>or</strong>s were installed either<br />

side to provide seamless access f<strong>or</strong> people with reduced mobility and f<strong>or</strong><br />

the transp<strong>or</strong>t<strong>at</strong>ion of goods via the reception area.<br />

The product provides an energy effi cient solution f<strong>or</strong> entrance areas<br />

thanks to the thermal separ<strong>at</strong>ion design in<strong>co</strong>rp<strong>or</strong><strong>at</strong>ed into the façade of<br />

a building. This allowed the <strong>co</strong>llege to achieve excellent thermal insul<strong>at</strong>ion,<br />

whilst having a customised design fi tted and being provided with a<br />

solution f<strong>or</strong> emergency escape routes.<br />

Increasing the effi ciency of access <strong>co</strong>ntrol itself<br />

As well as integr<strong>at</strong>ing with systems such as BEMS to reduce energy<br />

wastages, recent developments in technology mean the access <strong>co</strong>ntrol<br />

systems themselves<br />

are now<br />

proving to be<br />

increasingly<br />

sustainable.<br />

Access<br />

<strong>co</strong>ntrol systems<br />

can in fact off er<br />

energy savings<br />

while maintaining<br />

reliability<br />

and perf<strong>or</strong>mance<br />

by utilising low<br />

energy light<br />

sources in offi ce<br />

environments,<br />

resulting in an<br />

immedi<strong>at</strong>e cut<br />

down on energy<br />

use. As opposed<br />

to utilising a<br />

m<strong>or</strong>e traditional<br />

linear power<br />

supply, switchedmode<br />

power<br />

supplies are theref<strong>or</strong>e gaining in popularity in the access <strong>co</strong>ntrol market.<br />

Such supplies can in fact off er si<strong>za</strong>ble savings in energy <strong>co</strong>nsumption by<br />

in<strong>co</strong>rp<strong>or</strong><strong>at</strong>ing a switching regul<strong>at</strong><strong>or</strong> in <strong>or</strong>der to be highly effi cient in the<br />

<strong>co</strong>nversion of electrical power.<br />

To prove the benefi ts associ<strong>at</strong>ed with adopting the switch-mode<br />

power supply as opposed to linear systems, BSIA member TDSi tested<br />

both approaches. They calcul<strong>at</strong>ed th<strong>at</strong> using the switch mode power<br />

supplies in place of linear systems with transf<strong>or</strong>mers would save users,<br />

on average, an impressive £50 per <strong>co</strong>ntroller per year in energy <strong>co</strong>sts.<br />

Saving energy on each appliance theref<strong>or</strong>e provides a solid found<strong>at</strong>ion<br />

on which to cut oper<strong>at</strong>ional <strong>co</strong>sts.<br />

However, to build on this requires the integr<strong>at</strong>ion of all the diff erent<br />

system <strong>co</strong>mponents so as to off er a m<strong>or</strong>e effi cient solution.<br />

Thames Valley introduces integr<strong>at</strong>ed access <strong>co</strong>ntrol system<br />

BSIA member Integr<strong>at</strong>ed Design <strong>co</strong>mpleted an install<strong>at</strong>ion of Fastlane<br />

speedg<strong>at</strong>es (pedestrian turnstiles with tailg<strong>at</strong>e detection) f<strong>or</strong> Thames<br />

W<strong>at</strong>er, having been proposed by a UK based n<strong>at</strong>ional systems integr<strong>at</strong><strong>or</strong><br />

providing high-end systems.<br />

The install<strong>at</strong>ion integr<strong>at</strong>ed retracting glass barrier g<strong>at</strong>es and


<strong>co</strong>ntactless smart-card readers, along with cashless<br />

payment canteen systems to cre<strong>at</strong>e a seamless<br />

and sustainable experience f<strong>or</strong> staff and<br />

visit<strong>or</strong>s. The install<strong>at</strong>ion is designed to reinf<strong>or</strong>ce<br />

the use of staff access <strong>co</strong>ntrol cards without<br />

restricting access to auth<strong>or</strong>ised users.<br />

The system’s cards allow access to the building<br />

via the turnstiles and to zones relevant to<br />

the card holder, as well as carrying funds f<strong>or</strong><br />

purchasing food and beverages in the restaurant<br />

and vending facilities along with a ‘follow<br />

me’ printing solution.<br />

The aesthetics and eff ectiveness of the<br />

secure solution were praised by the client,<br />

as was its extra low power <strong>co</strong>nsumption. The<br />

BSIA member in fact produced and installed its<br />

turnstiles with extra low power <strong>co</strong>nsumption of<br />

less than 50 W<strong>at</strong>ts per pedestal. A fi tting choice<br />

<strong>co</strong>nsidering the theme of the business park is<br />

based around its green credentials.<br />

Wh<strong>at</strong> other benefi ts can access<br />

<strong>co</strong>ntrol systems bring?<br />

In addition to ensuring the security of premises<br />

and being able to positively impact on an<br />

<strong>or</strong>ganis<strong>at</strong>ion’s environmental footprint, there<br />

are many m<strong>or</strong>e functions th<strong>at</strong> access <strong>co</strong>ntrol systems<br />

can <strong>co</strong>ver to help with business oper<strong>at</strong>ions.<br />

Time and <strong>at</strong>tendance<br />

With both staff and visit<strong>or</strong>s entering and leaving<br />

the premises, badge/token technology can be<br />

used to re<strong>co</strong>rd employee hours and monit<strong>or</strong> visit<strong>or</strong><br />

movement within a specifi c site. If<br />

appropri<strong>at</strong>e, these can be processed against<br />

w<strong>or</strong>king hours, applicable f<strong>or</strong> both temp<strong>or</strong>ary<br />

and permanent staff , which can w<strong>or</strong>k in real-time<br />

to feed transactions through to the <strong>co</strong>mpany’s<br />

payroll. Time and <strong>at</strong>tendance systems also<br />

accur<strong>at</strong>ely help keep employers on the right side<br />

of the European W<strong>or</strong>king Time regul<strong>at</strong>ions and<br />

manage holidays and absences eff ectively. Fast,<br />

accur<strong>at</strong>e and easy-to-use, these systems are suitable<br />

f<strong>or</strong> businesses employing just a few people,<br />

right up to large multin<strong>at</strong>ional <strong>co</strong>mpanies.<br />

Visit<strong>or</strong> monit<strong>or</strong>ing<br />

In <strong>co</strong>ntexts where visit<strong>or</strong>s can easily blend in<br />

with the high volume of staff present, the use of<br />

PC and <strong>co</strong>mputer netw<strong>or</strong>ks should be <strong>co</strong>nsidered.<br />

These systems can print photographic ID<br />

and allow access to be restricted to certain areas<br />

within the site. Moving to a software solution f<strong>or</strong><br />

visit<strong>or</strong> management is an easy and inexpensive<br />

solution and can provide a number of added<br />

benefi ts.<br />

Autom<strong>at</strong>ic Number Pl<strong>at</strong>e Re<strong>co</strong>gnition<br />

To monit<strong>or</strong> the movement of vehicles on site,<br />

CCTV-style cameras and <strong>co</strong>mputer software can<br />

be used to identify number pl<strong>at</strong>es of vehicles.<br />

Some systems can also st<strong>or</strong>e photographs of the<br />

driver and vehicle f<strong>or</strong> subsequent analysis. This<br />

sophistic<strong>at</strong>ed software allows critical inf<strong>or</strong>m<strong>at</strong>ion<br />

to be passed to the police to assist in the<br />

pursuit, identifi c<strong>at</strong>ion and capture of off enders<br />

should an incident occur. Visual proof of parking<br />

off ences with the <strong>co</strong>rresponding time and<br />

d<strong>at</strong>e inf<strong>or</strong>m<strong>at</strong>ion is provided as evidence and<br />

to avoid disputes. Using a Driver and Vehicle<br />

Licensing Agency (DVLA) link, monit<strong>or</strong>s are<br />

then able to identify the owner of a vehicle and<br />

process the off ence autom<strong>at</strong>ically.<br />

Fire roll call<br />

Fire roll call software will autom<strong>at</strong>ically gener<strong>at</strong>e<br />

a rep<strong>or</strong>t in the event of a fi re <strong>or</strong> other emergency<br />

<strong>co</strong>ntaining crucial inf<strong>or</strong>m<strong>at</strong>ion in rel<strong>at</strong>ion<br />

to who is within the building and their movements<br />

around the site. This software oper<strong>at</strong>es<br />

via the access <strong>co</strong>ntrol smart card <strong>or</strong> fob th<strong>at</strong> an<br />

employee uses to gain access/exit to a building.<br />

In the event of an emergency, the fi re roll call<br />

software alerts occupants to the emergency<br />

whilst simultaneously activ<strong>at</strong>ing the rep<strong>or</strong>t <strong>at</strong> a<br />

safe pre-determined remote point.<br />

Please note th<strong>at</strong> in <strong>or</strong>der f<strong>or</strong> the fi re roll call<br />

software to eff ectively carry out its function,<br />

employees and visit<strong>or</strong>s must always present<br />

their card <strong>or</strong> badge. The use of smart card<br />

<strong>or</strong> RFID <strong>co</strong>ntrolled turnstiles can help in this<br />

situ<strong>at</strong>ion.<br />

Integr<strong>at</strong>ed security systems<br />

Sites can benefi t from a fully integr<strong>at</strong>ed access<br />

<strong>co</strong>ntrol system with CCTV, intruder alarm, turnstiles,<br />

fi re detection and building management<br />

systems. One way to <strong>at</strong>tain this is by adopting<br />

the use of Internet Proto<strong>co</strong>l (IP) technology,<br />

which allows these systems to ‘talk’ to each<br />

other to maximise their eff ectiveness.<br />

Separ<strong>at</strong>e access <strong>co</strong>ntrol and intruder alarm<br />

systems, f<strong>or</strong> example, <strong>co</strong>uld allow an employee to<br />

access an area, through an external do<strong>or</strong>, th<strong>at</strong> is<br />

set with an alarm. However, unless the employee<br />

has the auth<strong>or</strong>ity to unset the system, the access<br />

would result in a false alarm being activ<strong>at</strong>ed. An<br />

eff ectively integr<strong>at</strong>ed system would re<strong>co</strong>gnise<br />

th<strong>at</strong> the user does not have the auth<strong>or</strong>ity to unset<br />

the system, so would not allow them in the area<br />

to begin with, until someone auth<strong>or</strong>ised grants<br />

them access by unsetting the alarm.<br />

About the BSIA<br />

The British Security Industry Associ<strong>at</strong>ion (BSIA) is the<br />

trade associ<strong>at</strong>ion f<strong>or</strong> the professional security industry<br />

in the UK. Its members provide over 70% of UK security<br />

products and services and adhere to strict quality<br />

standards.<br />

www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 93


CASE STUDY: GOVERNMENT<br />

High security access <strong>at</strong> nuclear site<br />

Protecting the centre of Australia’s nuclear research and development expertise.<br />

The Australian Nuclear Science and Technology Organis<strong>at</strong>ion (ANSTO)<br />

is Australia’s n<strong>at</strong>ional nuclear research and development <strong>or</strong>ganis<strong>at</strong>ion<br />

and the centre of Australian nuclear expertise. Its main site is loc<strong>at</strong>ed<br />

<strong>at</strong> Lucas Heights Science and Technology Centre (LHSTC), 40 km southwest<br />

of Sydney’s CDB. The Centre occupies 70 hectares and is surrounded<br />

by a 1.6 km buff er zone.<br />

Prescribed by the Australian Nuclear Science and Technology<br />

Organis<strong>at</strong>ion Act 1987, its purpose is to deliver specialised advice, scientifi<br />

c services and products to government, industry, academia and other<br />

research <strong>or</strong>ganis<strong>at</strong>ions.<br />

ANSTO’s nuclear infrastructure includes the OPAL (Open Pool<br />

Australian Lightw<strong>at</strong>er) Research React<strong>or</strong>. OPAL is Australia’s only nuclear<br />

react<strong>or</strong>. It provides industrial radioisotopes and facilities f<strong>or</strong> neutron<br />

activ<strong>at</strong>ion analysis, irradi<strong>at</strong>ion of m<strong>at</strong>erials and neutron radiography<br />

to service the needs of agriculture and<br />

industry, particularly with regards to electronics,<br />

the environment and resource<br />

and mineral processing.<br />

In November 2006 OPAL reached its<br />

full oper<strong>at</strong>ing power of 20 Mega W<strong>at</strong>ts f<strong>or</strong><br />

the fi rst time as part of the react<strong>or</strong>’s <strong>co</strong>mmissioning<br />

process. ANSTO’s infrastructure<br />

also <strong>co</strong>nsists of particle acceler<strong>at</strong><strong>or</strong>s,<br />

and a range of other unique research<br />

facilities including radiopharmaceutical<br />

production facilities f<strong>or</strong> Australasia.<br />

ANSTO is responsible f<strong>or</strong> implementing<br />

security <strong>at</strong> LHSTC in ac<strong>co</strong>rdance with<br />

stringent intern<strong>at</strong>ional and Australian<br />

oblig<strong>at</strong>ions. These include Australian Government’s nuclear non-prolifer<strong>at</strong>ion<br />

Safeguards agreements.<br />

Layered security<br />

As a result, security is layered throughout the <strong>or</strong>ganis<strong>at</strong>ion and is structured<br />

around various security grades of facilities. The Gallagher security<br />

integr<strong>at</strong>ion pl<strong>at</strong>f<strong>or</strong>m (f<strong>or</strong>merly Cardax FT) is the backbone of electronic<br />

access <strong>co</strong>ntrol and intruder alarms <strong>at</strong> ANSTO. Many of the other security<br />

measures employed on site are interfaced to the Gallagher system. At<br />

the perimeter, Gallagher <strong>co</strong>ntrols g<strong>at</strong>es, turnstiles, bollards, and boom<br />

g<strong>at</strong>es. Long range readers have been implemented <strong>at</strong> the main entrance<br />

g<strong>at</strong>es f<strong>or</strong> <strong>co</strong>nvenient vehicle access.<br />

The HIFAR protected area and facilities are surrounded by a Gallagher<br />

security electric fence system to deter and detect any would-be intruders.<br />

Future plans include introducing high level integr<strong>at</strong>ion between<br />

Gallagher Command Centre and the Trophy FT perimeter security<br />

system f<strong>or</strong> seamless <strong>co</strong>nfi gur<strong>at</strong>ion and monit<strong>or</strong>ing of perimeter security<br />

through Gallagher Command Centre.<br />

The OPAL Research React<strong>or</strong> building <strong>co</strong>ntains all the nuclear systems,<br />

the react<strong>or</strong> and the service pools. It protects the react<strong>or</strong> from all external<br />

events and also provides the structural basis f<strong>or</strong> react<strong>or</strong> <strong>co</strong>ntainment.<br />

Made of reinf<strong>or</strong>ced <strong>co</strong>ncrete, it is seismically qualifi ed and has a metallic<br />

grillage f<strong>or</strong> protection from an aircraft crash. In design<strong>at</strong>ed high security<br />

areas <strong>at</strong> ANSTO, the Australian Government’s Type One intruder alarm<br />

standard applies.<br />

94 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

Type One security<br />

UltraSec, a high security variant of the Gallagher system, meets Type<br />

One requirements f<strong>or</strong> securing these areas. UltraSec provides endto-end<br />

system security through very high levels of d<strong>at</strong>a encryption<br />

and monit<strong>or</strong>ed <strong>co</strong>mmunic<strong>at</strong>ions. The system signifi cantly exceeds the<br />

Australian Government’s requirement of 56-bit DES by using a minimum<br />

encryption key length of 128-bits <strong>co</strong>upled together with stronger<br />

encryption alg<strong>or</strong>ithms.<br />

UltraSec also supp<strong>or</strong>ts access <strong>co</strong>ntrol. Alongside 870 staff , access is<br />

also required f<strong>or</strong> 150 research students and 1 000 <strong>co</strong>ntract<strong>or</strong>s, not to<br />

mention numerous visit<strong>or</strong>s.<br />

Having migr<strong>at</strong>ed from a legacy Commander-based Cardax system,<br />

ANSTO re<strong>co</strong>gnises th<strong>at</strong> there are signifi cant benefi ts of moving onto the<br />

Gallagher pl<strong>at</strong>f<strong>or</strong>m:<br />

• Meets the Australian SCEC Type One<br />

security requirements f<strong>or</strong> high security<br />

areas including the OPAL research<br />

react<strong>or</strong> through UltraSec.<br />

• Integr<strong>at</strong>es both access <strong>co</strong>ntrol and<br />

intruder alarms f<strong>or</strong> high and medium<br />

security areas through the system division<br />

partitioning fe<strong>at</strong>ure.<br />

• Achieves seamless integr<strong>at</strong>ion with<br />

DVR systems.<br />

• Supp<strong>or</strong>ts backwards <strong>co</strong>mp<strong>at</strong>ibility<br />

with their Cardax Commander II hardware,<br />

enabling them to upgrade to<br />

Gallagher Controllers while retaining<br />

their existing readers and cards.<br />

• Interfaces with the Gallagher perimeter security system f<strong>or</strong> alarm<br />

monit<strong>or</strong>ing.<br />

• Allows oper<strong>at</strong><strong>or</strong>s the fl exibility to arm (set) disarm (unset) <strong>or</strong> isol<strong>at</strong>e<br />

various alarm zones (areas of the intruder alarm system) in the fi eld<br />

through the Gallagher Remote Arming Terminal.<br />

An ANSTO represent<strong>at</strong>ive says th<strong>at</strong> Gallagher is much m<strong>or</strong>e of a global<br />

security management system. “The <strong>co</strong>mprehensive rep<strong>or</strong>ting options<br />

enable us to provide timely management inf<strong>or</strong>m<strong>at</strong>ion.” The integr<strong>at</strong>ed<br />

PhotoID option also makes cardholder management and the production<br />

of photo ID cards much easier to <strong>co</strong>ntrol. ANSTO utilises the Gallagher<br />

Challenge fe<strong>at</strong>ure in high security areas such as the OPAL Research<br />

React<strong>or</strong>. This fe<strong>at</strong>ure enables the oper<strong>at</strong><strong>or</strong> to check the identity of a cardholder<br />

by <strong>co</strong>mparing the cardholder’s image in the system against a live<br />

image from a third party CCTV/DVR system and provide <strong>or</strong> deny access.<br />

Guard staff are also able to grant visit<strong>or</strong>s access to the site via a<br />

remote link to the Gallagher system. F<strong>or</strong> example, if a bus full of people<br />

<strong>co</strong>mes to visit the site they can badge their access cards to a hand-held<br />

reader while onboard the bus, f<strong>or</strong> quick and effi cient access <strong>co</strong>ntrol.<br />

As part of its plan to maintain site security, ANSTO has <strong>co</strong>mmitted<br />

to annual Gallagher software maintenance th<strong>at</strong> enables them to elect<br />

new optional fe<strong>at</strong>ures as they are developed as well as benefi t from the<br />

general improvements made to system perf<strong>or</strong>mance.<br />

F<strong>or</strong> m<strong>or</strong>e inf<strong>or</strong>m<strong>at</strong>ion <strong>co</strong>ntact Gallagher, +27 (0)11 974 4740,<br />

lyn.dupreez@gallagher.<strong>co</strong> , www.gallagher.<strong>co</strong>


Integr<strong>at</strong>ed security<br />

defends the prosecution<br />

UTC Fire & Security off ers Botswana’s Department of<br />

Public Prosecution a fully integr<strong>at</strong>ed solution.<br />

F<strong>or</strong>merly the British protect<strong>or</strong><strong>at</strong>e<br />

of Bechuanaland,<br />

Botswana, adopted its<br />

new name after be<strong>co</strong>ming<br />

independent within<br />

the Commonwealth on<br />

30 September 1966. It<br />

has held free and fair<br />

democr<strong>at</strong>ic elections since<br />

independence.<br />

Botswana is up to 70%<br />

<strong>co</strong>vered by the Kalahari<br />

Desert. It is b<strong>or</strong>dered by<br />

South Africa, Namibia and<br />

Zimbabwe. Its b<strong>or</strong>der with<br />

Zambia to the n<strong>or</strong>th is<br />

po<strong>or</strong>ly defi ned but <strong>at</strong> most<br />

is a few hundred metres long. A mid-sized, landlocked<br />

<strong>co</strong>untry of just over two million people,<br />

Botswana is one of the most sparsely popul<strong>at</strong>ed<br />

<strong>co</strong>untries in the w<strong>or</strong>ld. The <strong>co</strong>untry also has a<br />

strong tradition as a represent<strong>at</strong>ive democracy.<br />

In 2009, when a local <strong>co</strong>ntract<strong>or</strong> started<br />

building the new Head Offi ce of the Botswana<br />

Department of Public Prosecution, it needed<br />

a security manufacturer th<strong>at</strong> <strong>co</strong>uld provide<br />

a modern solution capable of delivering fi re<br />

detection, access <strong>co</strong>ntrol, intrusion detection<br />

and video surveillance.<br />

The future system had to be effi cient and integr<strong>at</strong>e<br />

all functions across the site. In addition to<br />

the previous demands, Botswana’s Department<br />

of Public Prosecution needed an easy to manage<br />

solution f<strong>or</strong> its own security personnel. UTC Fire<br />

& Security’s experience and re<strong>co</strong>rd of success,<br />

<strong>co</strong>mbined with a strong standing rel<strong>at</strong>ionship<br />

between both parties, allowed it to win the bid<br />

and <strong>co</strong>mmence w<strong>or</strong>k on the site.<br />

The solution<br />

UTC Fire & Security off ered<br />

Botswana’s Department of<br />

Public Prosecution a strong<br />

proposal th<strong>at</strong> met their high<br />

demands. Covering intrusion<br />

detection and access<br />

<strong>co</strong>ntrol, the ATS Master solution<br />

off ers not only a secure,<br />

but also a <strong>co</strong>st eff ective<br />

solution.<br />

Throughout the site, over<br />

30 detect<strong>or</strong>s make sure no<br />

unwanted action <strong>or</strong> movement<br />

goes undetected.<br />

To address access <strong>co</strong>ntrol,<br />

over 30 readers have been<br />

placed <strong>at</strong> key access points throughout the site,<br />

<strong>co</strong>ntrolled by standard badge readers.<br />

UTC Fire & Security’s DVRs <strong>co</strong>ver the video<br />

surveillance needs. Four DVR units <strong>co</strong>nnect<br />

close to 50 analogue cameras. Finally, the FP<br />

fi re detection system is in place, <strong>co</strong>nnecting<br />

over 200 smoke detect<strong>or</strong>s, enabling security<br />

staff to detect fi res <strong>at</strong> an early stage and take<br />

necessary action.<br />

All systems are linked to the central <strong>co</strong>ntrol<br />

room where the Alliance security management<br />

pl<strong>at</strong>f<strong>or</strong>m enables full integr<strong>at</strong>ion between the<br />

diff erent systems, allowing security administr<strong>at</strong><strong>or</strong>s<br />

to oper<strong>at</strong>e, monit<strong>or</strong> and maintain the<br />

<strong>co</strong>mplete security suite in an easy and effi cient<br />

way.<br />

F<strong>or</strong> m<strong>or</strong>e inf<strong>or</strong>m<strong>at</strong>ion <strong>co</strong>ntact UTC Fire<br />

& Security, +27 (0)11 579 7300,<br />

Gretchen.Geldenhuys@fs.utc.<strong>co</strong>m,<br />

www.utcfi reandsecurity.<strong>co</strong>m<br />

www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 95


CASE STUDY: COMMERCIAL<br />

Access to mixed-use development<br />

By Allyson Koekhoven.<br />

40 on Oak is an upmarket apartment block within the Melrose Arch<br />

mixed use development in Johannesburg. The fi ve-st<strong>or</strong>ey building has<br />

54 units ranging from one to four bedrooms, and fi ve penthouses on the<br />

top fl o<strong>or</strong>.<br />

The developers decided th<strong>at</strong> any access <strong>co</strong>ntrol systems installed in<br />

40 on Oak would need to be able to integr<strong>at</strong>e with the systems already<br />

running <strong>at</strong> Melrose Arch. In addition, the systems needed to <strong>co</strong>nf<strong>or</strong>m<br />

to the planned future expansion and upgrading of the precinct-wide<br />

access <strong>co</strong>ntrol and building management system (BMS) requirements.<br />

The UTM Group was approached in November 2011 to assess,<br />

determine and design an access <strong>co</strong>ntrol system th<strong>at</strong> would achieve all<br />

the client stipul<strong>at</strong>ions in terms of both future proofi ng and backwards<br />

<strong>co</strong>mp<strong>at</strong>ibility. At the same time, due to the n<strong>at</strong>ure of the fi nal development,<br />

aesthetics played a large role.<br />

Kelly McLintock, Group Managing Direct<strong>or</strong> of the UTM Group, said of<br />

the existing access <strong>co</strong>ntrol system <strong>at</strong> Melrose Arch: “A total of over 450<br />

do<strong>or</strong>s are <strong>co</strong>ntrolled across all areas of the Melrose Arch precinct. Our<br />

challenge was to provide a solution th<strong>at</strong> would integr<strong>at</strong>e with all existing<br />

bespoke systems, and which will also be <strong>co</strong>mp<strong>at</strong>ible with any future<br />

expansion of the precinct. We also looked to streamline the administr<strong>at</strong>ion<br />

process and off er improved monit<strong>or</strong>ing and <strong>co</strong>ntrol.”<br />

Cost and quality were weighed up against the pressing security<br />

requirements <strong>at</strong> 40 on Oak. “As the security integr<strong>at</strong><strong>or</strong> and solution<br />

provider f<strong>or</strong> the project, our fi rst plan of action entailed <strong>co</strong>nsolid<strong>at</strong>ing<br />

and mapping the existing system to determine areas requiring <strong>at</strong>tention.<br />

It was imp<strong>or</strong>tant to then design and implement a system f<strong>or</strong> both<br />

40 on Oak and the rest of the Melrose Arch precinct th<strong>at</strong> will provide the<br />

end user with a st<strong>at</strong>e-of-the-art and user-friendly solution,” McLintock<br />

explained.<br />

“The solution <strong>co</strong>mprised three main <strong>co</strong>mponents: an access <strong>co</strong>ntrol<br />

system, Stentofon IP inte<strong>co</strong>m system and Bosch BVMS CCTV system. The<br />

selection allows us to integr<strong>at</strong>e with the site-wide system, with a view<br />

to future proofi ng. The systems will <strong>co</strong>ntrol access to the general areas<br />

of the building via all external entrances, as well as individualised access<br />

f<strong>or</strong> the lifts.”<br />

The biggest challenge faced by UTM was the software and fi rmware<br />

in<strong>co</strong>mp<strong>at</strong>ibility between the systems th<strong>at</strong> are currently in place, and the<br />

new system proposed f<strong>or</strong> 40 on Oak. “In <strong>or</strong>der to provide a truly integr<strong>at</strong>ed<br />

solution, it was necessary to institute upgrades across the board<br />

which would not only benefi t the 40 on Oak residents, but also all the<br />

users across the precinct. The entire project is being tackled in a phased<br />

approach over the next three years and UTM is currently on deadline<br />

f<strong>or</strong> <strong>co</strong>mpletion of the 40 on Oak section of the project in early 2013,”<br />

McLintock added.<br />

The access <strong>co</strong>ntrol system <strong>at</strong> 40 on Oak <strong>co</strong>mprises the <strong>co</strong>ntrol of 74<br />

access <strong>co</strong>ntrolled do<strong>or</strong>s and over 100 monit<strong>or</strong>ed do<strong>or</strong>s, using a <strong>co</strong>mbin<strong>at</strong>ion<br />

of readers. Each user is enrolled f<strong>or</strong> a specifi c zone, f<strong>or</strong> example<br />

‘4th fl o<strong>or</strong>’, with the ability to customise each user f<strong>or</strong> multi-zone access<br />

levels. This not only applies to 40 on Oak but, once again, to the entire<br />

precinct. Readers <strong>at</strong> the lifts ensure th<strong>at</strong> when a user tags in the lift, they<br />

will only be able to access their design<strong>at</strong>ed fl o<strong>or</strong>.<br />

The building, which has received ac<strong>co</strong>lades f<strong>or</strong> its green <strong>co</strong>mpliance,<br />

will possibly in the long term utilise the access <strong>co</strong>ntrol system to <strong>co</strong>ntrol<br />

power usage. “When a tenant leaves their unit, the system <strong>co</strong>uld switch<br />

all non-essential powered items off to elimin<strong>at</strong>e unnecessary power<br />

96 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

<strong>co</strong>nsumption. When the tenant swipes his card to enter his unit, full<br />

power would be rest<strong>or</strong>ed to his unit,” explained McLintock.<br />

Visit<strong>or</strong>s to the building will be required to interact with tenants via<br />

the Stentofon IP system. This system interfaces with a building-wide<br />

PABX system. Each unit is equipped with a SIP phone th<strong>at</strong> doubles as a<br />

VoIP telephone and an inter<strong>co</strong>m handset.<br />

“UTM’s input from the design stage ensured th<strong>at</strong> all <strong>co</strong>nduit and<br />

electrical requirements were in place pri<strong>or</strong> to fi rst fi x <strong>co</strong>mmencement.<br />

This meant th<strong>at</strong> there were no surprises <strong>or</strong> unf<strong>or</strong>eseen problems as the<br />

install<strong>at</strong>ion progressed,” said McLintock.<br />

The feedback received from the client has been extremely en<strong>co</strong>uraging.<br />

“We have been told th<strong>at</strong> the install<strong>at</strong>ion and service exceeds their<br />

initial expect<strong>at</strong>ions and based on the success of the project to d<strong>at</strong>e, the<br />

customer has extended the s<strong>co</strong>pe of the project and <strong>co</strong>ntract period,”<br />

McLintock <strong>co</strong>ncluded.<br />

Once the project is <strong>co</strong>mpleted, UTM will provide all onsite supp<strong>or</strong>t,<br />

maintenance and servicing requirements.<br />

F<strong>or</strong> m<strong>or</strong>e inf<strong>or</strong>m<strong>at</strong>ion <strong>co</strong>ntact UTM Group, 0860 22 22 66,<br />

kelly@utmgroup.<strong>co</strong>.<strong>za</strong>, www.utmgroup.<strong>co</strong>.<strong>za</strong>


A taste of<br />

integr<strong>at</strong>ed<br />

access <strong>co</strong>ntrol<br />

A BSIA case study.<br />

Integr<strong>at</strong>ed access <strong>co</strong>ntrol, time and<br />

<strong>at</strong>tendance and HR system f<strong>or</strong> food<br />

packaging <strong>co</strong>mpany.<br />

A BSIA member was used to install a fully integr<strong>at</strong>ed access <strong>co</strong>ntrol, time<br />

and <strong>at</strong>tendance and HR system f<strong>or</strong> Ultim<strong>at</strong>e Packaging. The system took<br />

advantage of non-<strong>co</strong>ntact smart cards to allow easy access f<strong>or</strong> auth<strong>or</strong>ised<br />

personnel. The system was also interfaced with the <strong>co</strong>mpany’s existing<br />

intruder alarm and CCTV systems.<br />

Ultim<strong>at</strong>e Packaging is one of the most powerful independent f<strong>or</strong>ces in<br />

the food packaging industry today. It has made gre<strong>at</strong> strides in a rel<strong>at</strong>ively<br />

sh<strong>or</strong>t time and since the millennium has produced year-on-year growth.<br />

The <strong>co</strong>mpany now employs some 200 people <strong>at</strong> their fact<strong>or</strong>y in Grimsby. In<br />

2005, direct<strong>or</strong>, John Shaw, and IT manager, Jeremy Hodson, were in search<br />

of a fi rst class <strong>co</strong>mbined access <strong>co</strong>ntrol, time and <strong>at</strong>tendance, fi re roll call<br />

and personnel system<br />

“The system we fi nally chose was a fully integr<strong>at</strong>ed access <strong>co</strong>ntrol<br />

system,” said Hodson. “The main advantage of this system was th<strong>at</strong> it used<br />

non-<strong>co</strong>ntact smart cards which are very easy to use. The software also had<br />

excellent rep<strong>or</strong>ting facilities. Compared to other systems I have used in the<br />

past, the integr<strong>at</strong>ed system we chose was easy to manage and was infi -<br />

nitely expandable. In essence, it is a scalable product th<strong>at</strong> can grow as the<br />

business grows.”<br />

No problems were en<strong>co</strong>untered during the install<strong>at</strong>ion of the hardware.<br />

There were some initial software teething problems, but these were min<strong>or</strong><br />

and soon fi xed with a software upgrade. Interfaces between the integr<strong>at</strong>ed<br />

access <strong>co</strong>ntrol system and Ultim<strong>at</strong>e’s existing intruder alarm and CCTV<br />

system were also installed. Staff were also trained in the use of the new<br />

system. Some of this was <strong>at</strong> the Ultim<strong>at</strong>e site and some <strong>at</strong> the vend<strong>or</strong>’s<br />

training centre.<br />

Hodson said th<strong>at</strong> Ultim<strong>at</strong>e probably doesn’t use its access <strong>co</strong>ntrol system<br />

to its full potential, but th<strong>at</strong> he intended to roll out m<strong>or</strong>e of the system in<br />

the <strong>co</strong>ming months, especially in the area of access <strong>co</strong>ntrol and personnel.<br />

Asked wh<strong>at</strong> he liked most about the system, he said: “reliability and ease of<br />

use, I am not sure how we managed bef<strong>or</strong>e we had the new system”. He also<br />

explained th<strong>at</strong> they use smart key fobs as opposed to the usual smart cards.<br />

“We fi nd them extremely reliable and unobtrusive”, he remarked.<br />

Hodson said th<strong>at</strong> they have used the vend<strong>or</strong>’s helpdesk facility and were<br />

pleased with the level of supp<strong>or</strong>t. He was glad to rep<strong>or</strong>t th<strong>at</strong> Ultim<strong>at</strong>e has<br />

not had to use the fi re roll call system “f<strong>or</strong> real”, but th<strong>at</strong> they do test it every<br />

week and audit the printout. Ultim<strong>at</strong>e is looking to deploy another smart<br />

card <strong>at</strong>tendance clock and extra access <strong>co</strong>ntrol do<strong>or</strong>s to a new unit adjacent<br />

to the main site and th<strong>at</strong> the netw<strong>or</strong>k had also been extended via a fi bre<br />

optic cable.<br />

When asked if he would re<strong>co</strong>mmend BSIA registered <strong>co</strong>mpanies to other<br />

businesses, he replied: “The <strong>co</strong>mpany we chose has given us a good product<br />

and excellent service. The advantage of using a BSIA member <strong>co</strong>mpany<br />

is th<strong>at</strong> you know you are buying from an ISO 9000 accredited <strong>or</strong>ganis<strong>at</strong>ion<br />

with the backing of the security industry’s trade associ<strong>at</strong>ion.”<br />

www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 97


CASE STUDY: MANUFACTURING<br />

Carrol Boyes reduces downtime<br />

with Trac-Tech system<br />

The brand name Carrol Boyes is synonymous with quality and <strong>at</strong>tention<br />

to detail. Managing absenteeism and accur<strong>at</strong>ely calcul<strong>at</strong>ing hours<br />

w<strong>or</strong>ked had be<strong>co</strong>me a pressing issue <strong>at</strong> the <strong>co</strong>mpany’s Cape Town and<br />

Paarden Eiland facilities. Trac-Tech stepped in to tackle the problem.<br />

Carrol Boyes was established 20 years ago by its namesake and<br />

has grown into a household name as a manufacturer of upmarket<br />

homeware and tabletop items. The <strong>co</strong>mpany is headquartered in Cape<br />

Town with manufacturing facilities in Paarden Eiland and T<strong>za</strong>neen,<br />

retail shops in Johannesburg, Cape Town and New Y<strong>or</strong>k, and outlets<br />

throughout the w<strong>or</strong>ld.<br />

“The <strong>co</strong>mpany has grown substantially since its f<strong>or</strong>m<strong>at</strong>ion, so keeping<br />

track of all employees has be<strong>co</strong>me a logistical nightmare. We have<br />

always had a very fl exible approach to starting and fi nishing times,<br />

but l<strong>at</strong>ely we had found certain employees taking advantage of the<br />

system,” said the <strong>co</strong>mpany’s human resources manager, Merle Kemp.<br />

Kemp explained th<strong>at</strong> the <strong>co</strong>mpany’s existing time and <strong>at</strong>tendance<br />

(T&A) system was old and unreliable. “We recently implemented a<br />

40-hour w<strong>or</strong>king week, in ac<strong>co</strong>rdance with legisl<strong>at</strong>ion, so we required<br />

a T&A system th<strong>at</strong> would allow us to accur<strong>at</strong>ely track the exact hours<br />

w<strong>or</strong>ked by each employee. At the same time, the system needed to<br />

be able to track the hours w<strong>or</strong>ked by certain employees when they<br />

moved between our branches.<br />

“We reviewed the requirements of the Carrol Boyes facilities and<br />

decided to install a ViRDI biometric fi ngerprint reader <strong>at</strong> both the Cape<br />

Town head offi ce and the Paarden Eiland fact<strong>or</strong>y. These are <strong>co</strong>mplemented<br />

by Unis and Time Register T & A software,” said Trac-Tech sales<br />

manager, Marj Valasek.<br />

The ViRDI biometric fi ngerprint reader lends itself to reading<br />

Carrol Boyes’ human resources manager, Merle Kemp, with the ViRDI biometric fi ngerprint reader<br />

98 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

damaged and almost invisible fi ngerprints. Virdi uses calibr<strong>at</strong>ion of<br />

minutia points and others to enrol the fi ngerprint, thus elimin<strong>at</strong>ing the<br />

problems n<strong>or</strong>mally associ<strong>at</strong>ed with damaged fi ngerprints.<br />

“We required the system to in<strong>co</strong>rp<strong>or</strong><strong>at</strong>e specifi c rules and it needed<br />

to allow f<strong>or</strong> fl exible start and fi nish w<strong>or</strong>king times and shifts,” said<br />

Kemp. The Unis software allows real-time viewing of all clocking d<strong>at</strong>a<br />

and enables the management to ascertain exactly who is on the two<br />

premises <strong>at</strong> any time.<br />

“I was provided with training on the Unis system and Time Register<br />

software <strong>at</strong> Trac-Tech’s offi ces. The facilit<strong>at</strong><strong>or</strong> ensured th<strong>at</strong> I would<br />

be able to quickly and easily enrol each user on the system and th<strong>at</strong><br />

maximised rep<strong>or</strong>ting results were available to me instantaneously. The<br />

service levels from Trac-Tech, from the initial planning stages through<br />

to the system implement<strong>at</strong>ion, have been of an exceptionally high<br />

standard,” said Kemp.<br />

The system currently monit<strong>or</strong>s the time and <strong>at</strong>tendance of<br />

43employees in Cape Town and 77 employees <strong>at</strong> the Paarden Eiland<br />

manufacturing facility. “Plans are underway to link the system to our<br />

VIP Payroll system and we are currently investig<strong>at</strong>ing the possibility of<br />

extending the T&A system, together with biometric fi ngerprint readers,<br />

<strong>at</strong> all the retail st<strong>or</strong>es,” said Kemp.<br />

“This user-friendly, reliable and very accur<strong>at</strong>e system has reduced<br />

the absenteeism r<strong>at</strong>e and made life much easier f<strong>or</strong> the HR department,<br />

by the direct reduction of the time needed to perf<strong>or</strong>m the<br />

calcul<strong>at</strong>ion of employee w<strong>or</strong>king hours,” Kemp <strong>co</strong>ncluded.<br />

F<strong>or</strong> m<strong>or</strong>e inf<strong>or</strong>m<strong>at</strong>ion <strong>co</strong>ntact Trac-Tech, 0861 100 199,<br />

info@trac-tech.<strong>co</strong>.<strong>za</strong>, www.trac-tech.<strong>co</strong>.<strong>za</strong>


Compliance via biometrics<br />

Environ, local manufacturers of a range of active-ingredient beauty<br />

products, is in the process of building new Cape Town facilities with<br />

high-end biometric access <strong>co</strong>ntrol and time and <strong>at</strong>tendance.<br />

The Medicines Control Council (MCC) has very strict regul<strong>at</strong>ions<br />

around access into the facilities of <strong>co</strong>mpanies manufacturing health and<br />

beauty products th<strong>at</strong> <strong>co</strong>ntain <strong>co</strong>ntrolled substances. Non-<strong>co</strong>mpliance<br />

can result in fi nes and even temp<strong>or</strong>ary <strong>or</strong> permanent closure.<br />

“Our current facilities use access <strong>co</strong>ntrol f<strong>or</strong> the m<strong>or</strong>ning and evening<br />

fl ow of employees. However, there is little indic<strong>at</strong>ion of the actual<br />

movements of the employees once they enter the premises. When we<br />

embarked on the plan to build our new 10 000-square-metre production<br />

facilities, we decided to upgrade our access <strong>co</strong>ntrol and time and <strong>at</strong>tendance<br />

systems to provide m<strong>or</strong>e functionality, <strong>co</strong>ntrol and feedback,” says<br />

Danie de Jager, Environ’s IT manager.<br />

Environ has <strong>co</strong>nsistently produced a number of market-leading<br />

vitamin-based skincare products over the past 21 years. Quality and productivity<br />

play a predominant role in the <strong>co</strong>mpany’s business ethos. “We<br />

cannot aff <strong>or</strong>d to <strong>co</strong>mpromise any section of our production facilities, so<br />

the implement<strong>at</strong>ion of a superi<strong>or</strong> access <strong>co</strong>ntrol system is paramount,”<br />

says De Jager.<br />

Environ was fi rst exposed to Trac-Tech’s products <strong>at</strong> a trade show<br />

in Johannesburg in 2011. “We were very impressed by the <strong>co</strong>mpany’s<br />

approach and the high service levels they exhibited. The product off ering<br />

<strong>co</strong>nsistently receives good reviews and we were impressed with the<br />

fact th<strong>at</strong> the systems cannot be circumvented. We put the <strong>co</strong>ntract out<br />

to tender and we were further impressed <strong>at</strong> the <strong>co</strong>mpany’s <strong>co</strong>st-eff ective<br />

proposal,” says De Jager.<br />

“Trac-Tech upgraded the time and <strong>at</strong>tendance (T&A) system <strong>at</strong> the<br />

existing Environ fact<strong>or</strong>y. In essence, the upgraded T&A system allows<br />

the Environ team to familiarise themselves with the system th<strong>at</strong> will<br />

be installed <strong>at</strong> their new building. To d<strong>at</strong>e we have received favourable<br />

Environ’s new facilities.<br />

feedback from the human resources department, which cited gre<strong>at</strong><br />

improvements in the accuracy of employee time keeping,” says Trac-Tech<br />

sales manager, Marj Valasek.<br />

Valasek explained th<strong>at</strong> the new system <strong>co</strong>mprises Trac-Tech’s proprietary<br />

Time Register software as well as a number of biometric fi ngerprint<br />

readers and ancillary equipment. “We are supplying seven ViRDI AC2100<br />

biometric fi ngerprint readers with ViRDI SR100 slave readers; six ViRDI<br />

AC2500 biometric fi ngerprint readers; 22 ViRDI AC2100 biometric fi ngerprint<br />

readers; 43 booth <strong>co</strong>ntrollers; as well as one waist-height single<br />

iMAT turnstile and one waist-height double iMAT turnstile f<strong>or</strong> the fact<strong>or</strong>y<br />

and security checkpoint respectively, both with emergency pedestrian<br />

g<strong>at</strong>es.”<br />

The biometric fi ngerprint readers will be installed <strong>at</strong> the entrances to<br />

the primary manufacturing area, the entrances to the se<strong>co</strong>ndary manufacturing<br />

area, the fi nal goods st<strong>or</strong>e, the disp<strong>at</strong>ch area and the entrance<br />

to the building. Time and <strong>at</strong>tendance capabilities are provided <strong>at</strong> the<br />

entrance point <strong>at</strong> the administr<strong>at</strong>ion building and the manufacturing<br />

facility.<br />

“We have deliber<strong>at</strong>ely designed the canteen so it is loc<strong>at</strong>ed outside<br />

the manufacturing and administr<strong>at</strong>ion buildings. In this way, we are able<br />

to monit<strong>or</strong> the time th<strong>at</strong> employees spend productively within the main<br />

facilities,” says De Jager.<br />

Because the MCC rules and regul<strong>at</strong>ions change, Environ required a<br />

system th<strong>at</strong> had built-in fl exibility in the critical p<strong>at</strong>hs. “Trac-Tech has<br />

been incredibly p<strong>at</strong>ient and ac<strong>co</strong>mmod<strong>at</strong>ing with the frequent changes<br />

we have had to make to the specifi c<strong>at</strong>ions on the <strong>co</strong>ntract, in <strong>or</strong>der to<br />

<strong>co</strong>mply with both the MCC’s stipul<strong>at</strong>ions as well as with changes in the<br />

building programme and design,” De Jager <strong>co</strong>ncluded.<br />

F<strong>or</strong> m<strong>or</strong>e inf<strong>or</strong>m<strong>at</strong>ion <strong>co</strong>ntact Trac-Tech, 0861 100 199,<br />

info@trac-tech.<strong>co</strong>.<strong>za</strong>, www.trac-tech.<strong>co</strong>.<strong>za</strong><br />

www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 99


CASE STUDY: MANUFACTURING<br />

Xpanding access <strong>co</strong>ntrol<br />

Impro solves T&A and access <strong>co</strong>ntrol issues f<strong>or</strong> security barrier manufacturer.<br />

Xpanda is a manufacturer of trellis<br />

do<strong>or</strong>s, burglar guards, roller shutter<br />

do<strong>or</strong>s and other barrier security<br />

products. The existing access/time<br />

and <strong>at</strong>tendance system (T&A) <strong>co</strong>mprised<br />

old mechanical locks, which<br />

were used to calcul<strong>at</strong>e the times <strong>at</strong><br />

which employees arrived <strong>at</strong> w<strong>or</strong>k.<br />

In addition to reviewing the<br />

T&A aspect of the facilities, Xpanda<br />

had various access points th<strong>at</strong> also<br />

required biometric access <strong>co</strong>ntrol<br />

to facilit<strong>at</strong>e better management of<br />

their employees.<br />

The product proposed by Impro<br />

Technologies was the IXP400 access<br />

<strong>co</strong>ntrol system. This was deemed<br />

best fi t because of its powerful software,<br />

strict access <strong>co</strong>ntrol parameters<br />

and zone routing.<br />

From a T&A perspective, Xpanda<br />

required a system th<strong>at</strong> would seamlessly<br />

and effi ciently replace the old<br />

existing mechanical clocking system<br />

and th<strong>at</strong> <strong>co</strong>uld be used in <strong>co</strong>njunction<br />

with Payroll software.<br />

Xpanda also required the system<br />

to be set up to <strong>co</strong>mpel the employees to follow a pre-defi ned p<strong>at</strong>h<br />

in <strong>or</strong>der f<strong>or</strong> them to enter and exit the site. Biometric readers were<br />

installed <strong>at</strong> several access points f<strong>or</strong> strict access <strong>co</strong>ntrol as well as <strong>at</strong><br />

the clocking st<strong>at</strong>ions where they were used together with the Time<br />

Manager software.<br />

On entering the site, employees have to rep<strong>or</strong>t to the ablution<br />

blocks bef<strong>or</strong>e being permitted entry to their w<strong>or</strong>kst<strong>at</strong>ions. Similarly,<br />

when they fi nish w<strong>or</strong>king f<strong>or</strong> the day, they have to clock out of their<br />

100 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

w<strong>or</strong>kst<strong>at</strong>ions bef<strong>or</strong>e proceeding to<br />

the ablution area. Thereafter, they<br />

are able to leave the premises. This<br />

practice of zone routing ensures th<strong>at</strong><br />

the employees follow a logical route,<br />

thereby preventing them from accessing<br />

unauth<strong>or</strong>ised sections of the site.<br />

The requirements were f<strong>or</strong> 10<br />

access points, <strong>co</strong>mprising seven<br />

clocking points f<strong>or</strong> T&A purposes;<br />

and one each f<strong>or</strong> men, women and<br />

a main turnstile. Approxim<strong>at</strong>ely 400<br />

tagholders are registered on the<br />

system.<br />

The system includes third-party<br />

software and devices; M<strong>or</strong>pho MA100<br />

biometrics reader f<strong>or</strong> the secure<br />

clocking <strong>at</strong> the T&A points and access<br />

<strong>co</strong>ntrol points, and Time Manager<br />

software, which was integr<strong>at</strong>ed back<br />

into the IXP400 to provide m<strong>or</strong>e<br />

accur<strong>at</strong>e times f<strong>or</strong> payroll purposes.<br />

In addition to streamlining access<br />

<strong>co</strong>ntrol and increasing the reliability<br />

of T&A d<strong>at</strong>a, the new system has<br />

elimin<strong>at</strong>ed the infamous method of<br />

buddy clocking.<br />

Client details<br />

Client details<br />

Company Xpanda<br />

<strong>Contact</strong> person Gregg Lennon<br />

Telephone No. +27 (031) 791 0061<br />

Email xpanda2@argent.<strong>co</strong>.<strong>za</strong><br />

Website www.xpanda.<strong>co</strong>.<strong>za</strong><br />

Sect<strong>or</strong> Manufacturer


Pepk<strong>or</strong> opts f<strong>or</strong> turnstile access<br />

Pepk<strong>or</strong> is undertaking a maj<strong>or</strong> expansion of its warehouse facility in Isando.<br />

The Pepk<strong>or</strong> Group, established in 1965, manages a p<strong>or</strong>tfolio of retail<br />

chains focused on the selling of clothing, footwear and textiles. Its main<br />

oper<strong>at</strong>ing subsidiaries are Pep, Ackermans and Dunns, among others.<br />

The group trades from m<strong>or</strong>e than 2 800 st<strong>or</strong>es and employs over 28 000<br />

people.<br />

Pepk<strong>or</strong> is currently undertaking a maj<strong>or</strong> expansion of its warehouse<br />

facility in Isando and has <strong>co</strong>nstructed a 66 475-square-metre premises.<br />

The warehouse, which is customised to meet Peps oper<strong>at</strong>ional requirements,<br />

has been developed in line with intern<strong>at</strong>ional warehousing standards<br />

and trends. The warehouse will provide a st<strong>at</strong>e-of-the-art backbone<br />

f<strong>or</strong> the entire Pepk<strong>or</strong> distribution netw<strong>or</strong>k.<br />

A number of diffi culties had to be over<strong>co</strong>me in <strong>or</strong>der to ensure the successful<br />

oper<strong>at</strong>ion of the new warehouse.<br />

• Safe st<strong>or</strong>age of high value goods.<br />

• Prevention of internal theft.<br />

• Accur<strong>at</strong>e employee time and <strong>at</strong>tendance monit<strong>or</strong>ing.<br />

• Securing the canteen and ablution facilities and preventing time and<br />

<strong>at</strong>tendance fraud rel<strong>at</strong>ed to those areas.<br />

The ultim<strong>at</strong>e goal was to cre<strong>at</strong>e a secure solution which took into<br />

ac<strong>co</strong>unt the unique requirements of Pep’s situ<strong>at</strong>ion. Theft and time and<br />

<strong>at</strong>tendance fraud had to be limited. However, the access <strong>co</strong>ntrol solution<br />

should not hinder the day-to-day oper<strong>at</strong>ions of the warehouse, n<strong>or</strong> the<br />

fl ow of goods through the distribution centre.<br />

The warehouse solution<br />

The sheer size of the warehouse with its diff erent distribution channels<br />

had to be analysed in terms of stock <strong>co</strong>ntrol as well as employee access. It<br />

was also necessary to carefully plan the turnstile install<strong>at</strong>ion ac<strong>co</strong>rding to<br />

the building programme of the <strong>co</strong>ntract<strong>or</strong>.<br />

Turnstar was the choice when it came to the turnstile install<strong>at</strong>ion.<br />

Turnstar has a proven track re<strong>co</strong>rd when it <strong>co</strong>mes to large scale projects<br />

and its products are particularly suited f<strong>or</strong> warehouse applic<strong>at</strong>ions. A<br />

number of turnstiles were manufactured and installed <strong>at</strong> various pedestrian<br />

entrances around the warehouse.<br />

Six Triumph 3 full height turnstiles were installed <strong>at</strong> the employee<br />

entrance from the street. The install<strong>at</strong>ion represents the fi rst line of security<br />

f<strong>or</strong> the warehouse. As these turnstiles were installed outdo<strong>or</strong>s, Turnstar<br />

re<strong>co</strong>mmended supplying them with a hot dip galvanised fi nish. A hot dip<br />

galvanised fi nish provides a high level <strong>co</strong>rrosion resistance and is suitable<br />

f<strong>or</strong> external environmental <strong>co</strong>nditions.<br />

Another six Triumph 3 full height turnstiles were installed <strong>at</strong> the entrance<br />

to the warehouse canteen and the ablution areas. These turnstiles were supplied<br />

with an aesthetically pleasing char<strong>co</strong>al blue powder <strong>co</strong><strong>at</strong>ed fi nish.<br />

The Triumph 3 full height turnstile is fi tted with both the Turnstar<br />

Rotalok rot<strong>at</strong>ion locking mechanism and Rotarun perpetual base bearing<br />

which are guaranteed f<strong>or</strong> a period of fi ve years and are designed to provide<br />

maintenance free oper<strong>at</strong>ion. All wearing parts are case hardened and self<br />

lubric<strong>at</strong>ing industrial plastics are in<strong>co</strong>rp<strong>or</strong><strong>at</strong>ed into the turnstile mechanism<br />

f<strong>or</strong> longevity.<br />

The manufacture of the turnstiles was <strong>co</strong>mplete within three weeks of<br />

receipt of the <strong>or</strong>der and install<strong>at</strong>ion was carried out over a period of two<br />

weeks.<br />

Client details<br />

Company Turnstar Systems<br />

<strong>Contact</strong> person Craig Sacks<br />

Telephone No. +27 (0)11 786 1633<br />

Fax No. +27 (0)11 440 5839<br />

E-mail info@turnstar.<strong>co</strong>.<strong>za</strong><br />

Sect<strong>or</strong> Warehousing<br />

www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 101


CASE STUDY: MANUFACTURING<br />

Integr<strong>at</strong>ed access roars<br />

with fl avour<br />

Pepsi<strong>co</strong> Simba derives multiple business benefi ts from access <strong>co</strong>ntrol and<br />

<strong>at</strong>tendance management solution.<br />

Pepsi<strong>co</strong> Simba, the i<strong>co</strong>nic South African snack brand th<strong>at</strong> has<br />

captured around 70% of this enthusiastic <strong>co</strong>nsumer market, began<br />

looking f<strong>or</strong> a new solution to its production management systems<br />

in 2010.<br />

Reshigan Govender, business solutions manager <strong>at</strong> Pepsi<strong>co</strong><br />

Simba, <strong>co</strong>mments: “The time was right to take advantage of the new<br />

technology and sophistic<strong>at</strong>ed software systems<br />

th<strong>at</strong> had be<strong>co</strong>me available in the access <strong>co</strong>ntrol<br />

(AC) and time & <strong>at</strong>tendance (T&A) systems. We<br />

also wanted to standardise the associ<strong>at</strong>ed<br />

business processes across all our production<br />

units in Isando (Gauteng), Durban and<br />

Cape Town.”<br />

The initial plan was simply to replace<br />

an outd<strong>at</strong>ed card-based manual system,<br />

but the <strong>co</strong>mpany rapidly decided to<br />

maximise the business development<br />

opp<strong>or</strong>tunities off ered by Bytes Systems<br />

Integr<strong>at</strong>ion’s solution. Andre du Plessis,<br />

Business Consultant <strong>at</strong> Bytes, explains:<br />

“The advent of accur<strong>at</strong>e and reliable<br />

biometric fi ngerprint scanners<br />

<strong>co</strong>mbined with the ability to extract<br />

further value from the d<strong>at</strong>a through<br />

customised analysis and rep<strong>or</strong>ting<br />

has changed the n<strong>at</strong>ure of AC and<br />

T&A systems.<br />

“These advances resolved serious<br />

problems inherent in older systems<br />

such as the detection and prevention of<br />

ghost w<strong>or</strong>kers, buddy clocking and other scams which infl <strong>at</strong>e<br />

production <strong>co</strong>sts”.<br />

Pepsi<strong>co</strong> Simba looked <strong>at</strong> a variety of solutions on off er but<br />

the Bytes proposal, utilising a <strong>co</strong>mbin<strong>at</strong>ion of Safl ec SACS Access<br />

Control and Kronos Time & Attendance systems powered by input<br />

from M<strong>or</strong>pho fi ngerprint readers was the obvious choice. Safl ec’s<br />

integr<strong>at</strong>ion into SAP business analysis software was another maj<strong>or</strong><br />

<strong>co</strong>ntributing fact<strong>or</strong> in this decision. Pepsi<strong>co</strong>’s positive global experience<br />

with Kronos T&A systems was equally infl uential.<br />

A fl exible w<strong>or</strong>kf<strong>or</strong>ce<br />

The seasonal aspects of Pepsi<strong>co</strong> Simba business presented some<br />

interesting challenges in the fi rst-phase of the implement<strong>at</strong>ion to<br />

replace the AC and T&A functionality. “Demand fl uctu<strong>at</strong>es in the<br />

Pepsi<strong>co</strong> Simba business cycle, with huge peaks around December<br />

and April, the maj<strong>or</strong> holiday seasons, and other smaller but signifi -<br />

cant peaks <strong>at</strong> various times throughout the year. Maj<strong>or</strong> sp<strong>or</strong>ts events<br />

and long-weekends are typical examples,” explains Govender. He<br />

102 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

adds: “Our T&A usage is <strong>co</strong>nfi ned to about 2 600 permanent staff<br />

members and our AC systems handles around 5 000 staff members<br />

under average oper<strong>at</strong>ing <strong>co</strong>nditions. However, <strong>at</strong> times of peak<br />

demand, AC numbers can rise by as much as 30% across our three<br />

production units.”<br />

Pepsi<strong>co</strong> Simba has onsite labour brokers who w<strong>or</strong>k to meet<br />

the <strong>co</strong>mpany’s fl uctu<strong>at</strong>ing labour requirements from a pool of<br />

pre-authentic<strong>at</strong>ed outsourced labour. Du Plessis explains: “Prescreening<br />

is obviously an imp<strong>or</strong>tant part of the planning<br />

process but rapid enrolment, together with ease and<br />

speed of upd<strong>at</strong>ing AC permissions, is absolutely crucial<br />

in such a vol<strong>at</strong>ile situ<strong>at</strong>ion.” The fi ngerprint enrolment<br />

process has been streamlined to the point<br />

where 2 to 3 minutes are suffi cient to enrol<br />

each additional w<strong>or</strong>ker on the AC and T&A<br />

system.<br />

Decisions also have to be taken<br />

regarding the production volume<br />

points <strong>at</strong> which it be<strong>co</strong>mes m<strong>or</strong>e<br />

e<strong>co</strong>nomical to outsource additional<br />

labour versus auth<strong>or</strong>ising overtime<br />

f<strong>or</strong> permanent staff members.<br />

“This aspect of the system is<br />

imp<strong>or</strong>tant to Pepsi<strong>co</strong> Simba because of<br />

the <strong>co</strong>st implic<strong>at</strong>ions. The pay rules we<br />

designed provide the required rep<strong>or</strong>ting<br />

functions to monit<strong>or</strong> and accur<strong>at</strong>ely f<strong>or</strong>ecast<br />

the production points where the balance<br />

tips in favour of each option,” explains du Plessis.<br />

“Pay rule development has actually been the maj<strong>or</strong> fe<strong>at</strong>ure of<br />

the customis<strong>at</strong>ion process. There are many fact<strong>or</strong>s to <strong>co</strong>nsider in pay<br />

rules. A key fe<strong>at</strong>ure of the success of the Pepsi<strong>co</strong> Simba system is the<br />

fl exibility of the Kronos d<strong>at</strong>a <strong>co</strong>llection and Safl ec integr<strong>at</strong>ion into<br />

SAP rep<strong>or</strong>ting functions.”<br />

Some of this <strong>co</strong>mplexity results from the <strong>co</strong>mpany’s rapid<br />

<strong>or</strong>ganic growth where each division of the <strong>co</strong>mpany had to make<br />

their own decisions given the existing <strong>co</strong>nditions in the local labour<br />

market.<br />

Govender <strong>co</strong>mments: “Standardis<strong>at</strong>ion has gener<strong>at</strong>ed signifi cant<br />

<strong>co</strong>st savings f<strong>or</strong> Pepsi<strong>co</strong> Simba and we anticip<strong>at</strong>e further improvements<br />

as this process spreads throughout the <strong>co</strong>mpany over time.<br />

We were very impressed by the way Bytes were able to customise<br />

the system to handle the realities of our existing situ<strong>at</strong>ion. Further<br />

<strong>co</strong>st savings will be gener<strong>at</strong>ed as standardis<strong>at</strong>ion occurs across all<br />

our divisions.”<br />

But some of the other fact<strong>or</strong>s th<strong>at</strong> will always have to be taken<br />

into ac<strong>co</strong>unt include basic pay, overtime and shift r<strong>at</strong>es f<strong>or</strong> a<br />

variety of diff erent functions (f<strong>or</strong> example distribution, warehouse,


production), number of hours w<strong>or</strong>ked, leave alloc<strong>at</strong>ion, time allowed<br />

f<strong>or</strong> lunch breaks, and a variety of travel and shift allowances.<br />

Going f<strong>or</strong> gold on implement<strong>at</strong>ion<br />

Implement<strong>at</strong>ion took place in two phases distinct phases. The initial<br />

phase, started in December 2010, was aimed <strong>at</strong> installing and testing<br />

the required equipment over all three sites and getting the basic<br />

system functionality up and running.<br />

Essentially, the d<strong>at</strong>a is captured by a range of M<strong>or</strong>pho biometric<br />

fi ngerprint readers (T&A using MA 500 readers, AC using J Series<br />

readers f<strong>or</strong> interi<strong>or</strong> and 520 readers f<strong>or</strong> external loc<strong>at</strong>ions). The d<strong>at</strong>a is<br />

fed into Safl ec’s SACS, which sends it to a centralised d<strong>at</strong>abase server<br />

in Johannesburg f<strong>or</strong> further processing in Kronos (T&A) and SAP<br />

(fi nancial, HR and payroll).<br />

But much of the success of implement<strong>at</strong>ion relied on careful<br />

and accur<strong>at</strong>e planning and d<strong>at</strong>a design. Du Plessis says: “We feel it<br />

is crucial, especially in situ<strong>at</strong>ions such as this where there is no pri<strong>or</strong><br />

rel<strong>at</strong>ionship and a <strong>co</strong>mplex set of requirements to be met, to w<strong>or</strong>k<br />

together with all the stakeholders to produce a f<strong>or</strong>mal system design<br />

and specifi c<strong>at</strong>ion.”<br />

Oper<strong>at</strong>ions, IT, HR and fi nance personnel from Pepsi<strong>co</strong> Simba<br />

w<strong>or</strong>ked closely with the Bytes team to establish a precise set of<br />

parameters f<strong>or</strong> system functionality and to determine the <strong>co</strong>mpany’s<br />

<strong>or</strong>ganis<strong>at</strong>ional structures f<strong>or</strong> management processes and rep<strong>or</strong>ting<br />

functions. Regular meetings were scheduled to re<strong>co</strong>rd issues and<br />

provide project upd<strong>at</strong>es. “These meetings are vital f<strong>or</strong> a successful<br />

project. Everybody benefi ts from being kept up-to-speed on the<br />

developments and changes th<strong>at</strong> are inevitable given the <strong>co</strong>mplex<br />

user requirements of Pepsi<strong>co</strong> Simba. Everybody needs to stay<br />

inf<strong>or</strong>med,” explains du Plessis.<br />

One of the maj<strong>or</strong> issues th<strong>at</strong> was revealed and addressed because<br />

of this <strong>co</strong>nsult<strong>at</strong>ive process was an under-estim<strong>at</strong>ion of the scale<br />

of the project: the initial estim<strong>at</strong>e of 1600 users grew to an actual<br />

2600 users, which transl<strong>at</strong>es, in systems terms, into additional access<br />

points. But m<strong>or</strong>e imp<strong>or</strong>tantly, these meetings led to the development<br />

of Pepsi<strong>co</strong> Simba business processes based on the improved<br />

inf<strong>or</strong>m<strong>at</strong>ion <strong>co</strong>ming out of the Kronos T&A applic<strong>at</strong>ion.<br />

The se<strong>co</strong>nd phase, lasting over 8 months, was devoted to refi ning<br />

systems oper<strong>at</strong>ion and expanding and developing the management<br />

rep<strong>or</strong>ting functions. As already noted, pay rules f<strong>or</strong>mul<strong>at</strong>ion required<br />

a gre<strong>at</strong> deal of eff <strong>or</strong>t to <strong>co</strong>ver all the diff erences between paying<br />

permanent employees (with all their many varieties of skills, allowances<br />

and benefi ts) and re<strong>co</strong>ncili<strong>at</strong>ion of labour brokers invoices<br />

f<strong>or</strong> outsourced labour from the <strong>co</strong>mpany’s T&A rep<strong>or</strong>ts. Autom<strong>at</strong>ic<br />

balance-of-leave-owing fi gures assist managers with leave alloc<strong>at</strong>ion.<br />

The AC system was <strong>co</strong>nfi gured to prevent exit of personnel until<br />

they had clocked out of the T&A system.<br />

Health and safety requirements also had to be addressed f<strong>or</strong><br />

emergency situ<strong>at</strong>ions where a head <strong>co</strong>unt is required – knowing how<br />

many people are in each section of the premises be<strong>co</strong>mes vital. So<br />

the system was adapted to prevent re-entry of personnel who have<br />

exited without re<strong>co</strong>rding their fi ngerprint on the AC system.<br />

Currently, enhancements are in progress to address visit<strong>or</strong> access<br />

<strong>co</strong>ntrol utilising a bar-<strong>co</strong>de scanning system to re<strong>co</strong>rd driver’s<br />

licences <strong>or</strong> ID documents.<br />

“Evolution is a key <strong>co</strong>ncept in this type of system. As Pepsi<strong>co</strong><br />

Simba business requirements change and develop, Bytes will<br />

<strong>co</strong>ntinue to respond with new ways to mine the d<strong>at</strong>a f<strong>or</strong> new and<br />

improved rep<strong>or</strong>ting functionality designed to extract further value<br />

f<strong>or</strong> Pepsi<strong>co</strong> Simba. A good example of how this has already occurred<br />

is in using hist<strong>or</strong>ical d<strong>at</strong>a to build shift-p<strong>at</strong>tern analysis and developing<br />

st<strong>at</strong>istics to provide m<strong>or</strong>e accur<strong>at</strong>e f<strong>or</strong>ecasting of required w<strong>or</strong>k<br />

f<strong>or</strong>ce levels”, explains du Plessis.<br />

Does 20/20 hindsight reveal any keys to success?<br />

Du Plessis <strong>co</strong>nsiders this to be a tricky question: “My answer<br />

would have to be both ‘yes’ and ‘no’: on the one hand, prepar<strong>at</strong>ion,<br />

especially in terms of developing an accur<strong>at</strong>e <strong>or</strong>ganis<strong>at</strong>ional<br />

structure and defi ning business processes, is undoubtedly useful.<br />

However, there have been many advantages gained from new ideas<br />

th<strong>at</strong> evolved from playing around with the system and thinking<br />

‘wh<strong>at</strong> if . . .’<br />

“You have to <strong>co</strong>mmit to the <strong>co</strong>nstant evolution model. Thinking<br />

th<strong>at</strong> the system will be fi nished when current requirements are<br />

met will lead to missed opp<strong>or</strong>tunities as the business grows and<br />

develops. New ideas and new technologies will arrive. The real key<br />

to ongoing success to lies in w<strong>or</strong>king out how to maximise these<br />

developments to benefi t the business.<br />

“We have been extremely f<strong>or</strong>tun<strong>at</strong>e in w<strong>or</strong>king with Reshigan<br />

Govender on this project. He knows wh<strong>at</strong> he wants but he has an<br />

open mind and is always prepared to listen to wh<strong>at</strong> we have to say.<br />

This enables us to f<strong>or</strong>mul<strong>at</strong>e the options, assess the risks, and select<br />

the best solution. When you have this type of excellent w<strong>or</strong>king<br />

rel<strong>at</strong>ionship between supplier and customer, it n<strong>at</strong>urally cre<strong>at</strong>es a<br />

win-win situ<strong>at</strong>ion f<strong>or</strong> all <strong>co</strong>ncerned.”<br />

Govender <strong>co</strong>ncludes: “Bytes’ <strong>co</strong>nsistent focus on business benefi ts<br />

has produced substantial <strong>co</strong>st reductions f<strong>or</strong> Pepsi<strong>co</strong> Simba. We were<br />

impressed th<strong>at</strong> we got a ROI on this system within one year and we<br />

anticip<strong>at</strong>e further improvements as we <strong>co</strong>ntinue to develop and<br />

refi ne the system.<br />

“The high levels of customer service we experience from Andre<br />

du Plessis and the entire Bytes team make it a pleasure to do business<br />

with them and we look f<strong>or</strong>ward to <strong>co</strong>ntinuing this benefi cial<br />

rel<strong>at</strong>ionship.”<br />

Client details<br />

Company Pepsi<strong>co</strong> Simba<br />

<strong>Contact</strong> person Reshigan Govender – Business Solutions Manager<br />

E-mail reshigan.govender@pepsi<strong>co</strong>.<strong>co</strong>m<br />

Sect<strong>or</strong> Food Manufacturing<br />

Scale of project All Production Units. T&A: 2,600, AC:±5 000<br />

Key elements Safl ec <strong>co</strong>ntrollers & SACS AC software.<br />

Kronos T&A software integr<strong>at</strong>ed into SAP business<br />

analysis software.<br />

M<strong>or</strong>pho fi ngerprint readers: J Series (AC internal);<br />

OMA 520 (AC exteri<strong>or</strong>); MA 500 (T&A).<br />

Benefi ts Accur<strong>at</strong>e access <strong>co</strong>ntrol and time management,<br />

delivering substantial <strong>co</strong>st savings across all<br />

production units.<br />

Detailed rep<strong>or</strong>ting on labour, procurement and<br />

fi nancial analysis refl ecting current & f<strong>or</strong>ecast<br />

business requirements.<br />

Solution supplier Bytes Systems Integr<strong>at</strong>ion, Andre du Plessis,<br />

+27(0)73 569 7574<br />

www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 103


CASE STUDY: MANUFACTURING<br />

Biometrics: returns beyond access<br />

Omnia cultiv<strong>at</strong>es healthy business results from its large-scale access <strong>co</strong>ntrol and<br />

<strong>at</strong>tendance management solution.<br />

Jarrison Systems w<strong>or</strong>ked with one of SA’s leading fertiliser manufacturers,<br />

Omnia Fertiliser, to implement a fi ngerprint-based solution th<strong>at</strong> has<br />

been cutting <strong>co</strong>sts and acceler<strong>at</strong>ing business processes from day one.<br />

Leon Leimecke, seni<strong>or</strong> systems analyst <strong>at</strong> Omnia’s plant in Sasolburg is<br />

delighted with the <strong>co</strong>mmercial results th<strong>at</strong> have been delivered by the<br />

Jarrison solution. “We achieved everything we hoped to achieve and<br />

much m<strong>or</strong>e. The fi ngerprint readers are amazing, we don’t have problems.”<br />

Over the years, Omnia have implemented a number of on-going<br />

upgrades to their access <strong>co</strong>ntrol systems. Pri<strong>or</strong> to introducing the system<br />

from Jarrison, the last of these upgrades was based on using handgeometry<br />

scanners to identify employees.<br />

Jason M<strong>at</strong>thews of Jarrison Systems says th<strong>at</strong> although biometrics<br />

can off er signifi cant advantages in <strong>co</strong>mparison to card-based access<br />

and time and <strong>at</strong>tendance (T&A) systems, it is imp<strong>or</strong>tant to re<strong>co</strong>gnise<br />

th<strong>at</strong> not all biometric technology off ers the same level of perf<strong>or</strong>mance.<br />

“First of all, one needs to select the right biometric methodology. Based<br />

on our practical experience of w<strong>or</strong>king with biometrics over the past<br />

six <strong>or</strong> so years, fi ngerprint is clearly the right choice. All our oper<strong>at</strong>ional<br />

experience of on-site perf<strong>or</strong>mance means th<strong>at</strong> we only re<strong>co</strong>mmend the<br />

M<strong>or</strong>pho range of fi ngerprint scanners.”<br />

Employee identifi c<strong>at</strong>ion in a manufacturing facility<br />

Leimecke says th<strong>at</strong> the hand-geometry scanners <strong>co</strong>nsistently failed<br />

to meet the challenges of w<strong>or</strong>king in an industrial environment.<br />

“Maintenance on the scanners was high and the sens<strong>or</strong>s had to be<br />

cleaned almost weekly. The guide pins on the pl<strong>at</strong>ens of the handgeometry<br />

units were also very susceptible to electro-st<strong>at</strong>ic discharge, <strong>or</strong><br />

ESD, which kept causing the units to fail.<br />

“These problems resulted in high False Rejection R<strong>at</strong>es which meant<br />

th<strong>at</strong> access was repe<strong>at</strong>edly denied to properly auth<strong>or</strong>ised employees,<br />

undermining the whole purpose of trying to achieve <strong>co</strong>nsistently accur<strong>at</strong>e<br />

identifi c<strong>at</strong>ion.”<br />

Bef<strong>or</strong>e hand-geometry readers were implemented, Omnia Sasolburg<br />

used an HID card-based access <strong>co</strong>ntrol system. Leimecke says th<strong>at</strong> the<br />

104 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

HID card-based system was also problem<strong>at</strong>ic because the dusty environment<br />

meant th<strong>at</strong> the exit drop-boxes kept jamming and also cre<strong>at</strong>ed the<br />

administr<strong>at</strong>ive task of being emptied of their cards each day. “Aside from<br />

the security <strong>co</strong>ncerns rel<strong>at</strong>ing to <strong>co</strong>ntrolling access, we knew th<strong>at</strong> buddy<br />

clocking was causing us big problems.<br />

“Wh<strong>at</strong> was needed was a proven, robust solution th<strong>at</strong> <strong>co</strong>uld<br />

address all the access <strong>co</strong>ntrol aggrav<strong>at</strong>ions with a single identifi c<strong>at</strong>ion<br />

technology.”<br />

Accur<strong>at</strong>e identifi c<strong>at</strong>ion in a large enterprise<br />

Leimecke says th<strong>at</strong> Omnia’s fi rst pri<strong>or</strong>ity was to s<strong>or</strong>t out all the access<br />

<strong>co</strong>ntrol issues, followed by resolving the <strong>at</strong>tendance management challenges.<br />

“We fi rst needed to install a solution th<strong>at</strong> would provide us with<br />

a <strong>co</strong>nsistently reliable way to identify our employees and all the people<br />

visiting our site. Having s<strong>or</strong>ted th<strong>at</strong> out, we then intended to use th<strong>at</strong> as<br />

the found<strong>at</strong>ion f<strong>or</strong> our time management and payroll systems.”<br />

M<strong>at</strong>thews’ view <strong>co</strong>ncerning the choice of biometric technology is supp<strong>or</strong>ted<br />

by Leimecke who says th<strong>at</strong> Omnia did <strong>co</strong>nsider altern<strong>at</strong>ives to<br />

fi ngerprint-based identifi c<strong>at</strong>ion – including solutions like iris re<strong>co</strong>gnition<br />

– but their choice was heavily infl uenced by the fact th<strong>at</strong> they needed a<br />

robust identifi c<strong>at</strong>ion solution th<strong>at</strong> would w<strong>or</strong>k fi rst time, every time f<strong>or</strong><br />

all employees and visit<strong>or</strong>s.<br />

M<strong>at</strong>thews says, “From past experience, we were certain th<strong>at</strong> M<strong>or</strong>pho<br />

fi ngerprint readers would provide the necessary levels of perf<strong>or</strong>mance<br />

in the various w<strong>or</strong>king environments across Omnia’s site. This gave us<br />

the starting point f<strong>or</strong> identifi c<strong>at</strong>ion, providing a solid found<strong>at</strong>ion f<strong>or</strong><br />

building a multi-purpose solution.”<br />

Having established a clear understanding of the out<strong>co</strong>mes required,<br />

Jarrison ran an on-site proof-of-<strong>co</strong>ncept th<strong>at</strong> lasted f<strong>or</strong> a month.<br />

Leimecke says, “While we accepted Jarrison’s re<strong>co</strong>mmend<strong>at</strong>ions, we<br />

needed to see f<strong>or</strong> ourselves th<strong>at</strong> the key elements of the solution <strong>co</strong>uld<br />

deliver on expect<strong>at</strong>ions. The success of the trial meant we were <strong>co</strong>nfi -<br />

dent to rollout the full solution.<br />

“Wh<strong>at</strong> was even better is th<strong>at</strong> within a month of beginning w<strong>or</strong>k on


site, Jarrison’s solution was oper<strong>at</strong>ional. We needed to resolve some of<br />

our netw<strong>or</strong>k issues to <strong>co</strong>pe with the distances between some readers<br />

because of the size of our plant. Other than th<strong>at</strong>, I’m delighted with the<br />

solutions’ perf<strong>or</strong>mance and the results it’s delivering.”<br />

Multiple business rewards from a single identity<br />

solution<br />

In addition to providing accur<strong>at</strong>e identifi c<strong>at</strong>ion of Omnia employees f<strong>or</strong><br />

access <strong>co</strong>ntrol, the Jarrison system can also process and exp<strong>or</strong>t d<strong>at</strong>a f<strong>or</strong><br />

payroll management which means th<strong>at</strong> problems and <strong>co</strong>sts rel<strong>at</strong>ing to<br />

buddy-clocking are now a thing of the past.<br />

The solution is also leveraging accur<strong>at</strong>e identifi c<strong>at</strong>ion within Omnia’s<br />

systems th<strong>at</strong> manage their personal protective equipment st<strong>or</strong>e, tracking<br />

wh<strong>at</strong> items were issued and to whom they were issued. Finally, the<br />

M<strong>or</strong>pho-based solution is also providing identity <strong>co</strong>ntrol within Omnia’s<br />

on-site induction process, ensuring th<strong>at</strong> all the necessary <strong>co</strong>mpliances<br />

are met f<strong>or</strong> visit<strong>or</strong>s entering certain areas of the Sasolburg plant.<br />

Back to school<br />

School chooses Impronet and M<strong>or</strong>pho biometrics to <strong>co</strong>ntrol access to facilities.<br />

Somerset College is a school with a boys and girls boarding houses. All<br />

students and staff are loaded on to the Windows Active Direct<strong>or</strong>y and<br />

it was imp<strong>or</strong>tant f<strong>or</strong> the effi cient functioning of the school to have a<br />

single, accur<strong>at</strong>e d<strong>at</strong>abase to <strong>co</strong>ntrol users. It was imp<strong>or</strong>tant to the school<br />

th<strong>at</strong> if a user’s Active Direct<strong>or</strong>y login details were no longer valid, then<br />

access to the <strong>co</strong>mputer lab<strong>or</strong><strong>at</strong><strong>or</strong>y, as well as the residences, should be<br />

simultaneously disabled.<br />

F<strong>or</strong> these reasons, the client chose the Impronet with Windows<br />

Active Direct<strong>or</strong>y integr<strong>at</strong>ion to <strong>co</strong>ntrol the d<strong>at</strong>abase of active users.<br />

Further, physical access <strong>co</strong>ntrol was provided by M<strong>or</strong>pho biometric<br />

readers, which replaced the previously used proximity tags.<br />

The benefi t of using this system is th<strong>at</strong> all of the hard w<strong>or</strong>k has<br />

already been done in Windows Active Direct<strong>or</strong>y. A grouping f<strong>or</strong> the<br />

students and f<strong>or</strong> the residences was already set up so there was no<br />

duplic<strong>at</strong>ion in implement<strong>at</strong>ion. Additional <strong>co</strong>nsider<strong>at</strong>ion was needed f<strong>or</strong><br />

cleaners and <strong>co</strong>ntract<strong>or</strong>s in terms of access <strong>co</strong>ntrol. User groups had to<br />

be added f<strong>or</strong> those people who were not already loaded onto the Active<br />

Direct<strong>or</strong>y.<br />

A specifi c<strong>at</strong>ion was drawn up and, on approval, the applic<strong>at</strong>ion was<br />

designed and implemented. The client set milestones, which were readily<br />

achieved by service providers Integr<strong>at</strong>ek and Powell Tronics, resulting<br />

in the speedy implement<strong>at</strong>ion of the solution.<br />

The aim of the solution, besides <strong>co</strong>ntrolling access, was to<br />

Client details<br />

Company Omnia Fertiliser, Sasolburg<br />

<strong>Contact</strong> person Leon Leimecke – Seni<strong>or</strong> Systems Analyst<br />

E-mail lleimecke@omnia.<strong>co</strong>.<strong>za</strong><br />

Sect<strong>or</strong> Manufacturing: Chemical and Fertiliser<br />

Scale of project Enterprise. 5 000 users<br />

Key elements Jarrison Time software pl<strong>at</strong>f<strong>or</strong>m integr<strong>at</strong>ed<br />

with a range of M<strong>or</strong>pho fi ngerprint scanners<br />

f<strong>or</strong>: employee access <strong>co</strong>ntrol and T&A; visit<strong>or</strong> &<br />

<strong>co</strong>ntract<strong>or</strong> access <strong>co</strong>ntrol; identity <strong>co</strong>ntrol within<br />

the Personal Protective Equipment (PPE) st<strong>or</strong>e;<br />

and to manage on-site induction training.<br />

Benefi ts Highly accur<strong>at</strong>e access and time management,<br />

delivering <strong>co</strong>st savings across all aspects of AC<br />

and T&A<br />

Solution supplier Jarrison Systems, Jason M<strong>at</strong>thews, 083 556 9259<br />

Client details<br />

Company Somerset College<br />

<strong>Contact</strong> person Mynhardt Loubser, IT Manager<br />

Telephone No. +27 (0)21 842 8000<br />

Fax No. +27 (0)21 842 3908<br />

Email m.loubser@som<strong>co</strong>l.<strong>co</strong>.<strong>za</strong><br />

Sect<strong>or</strong> Educ<strong>at</strong>ion<br />

Scale of project 900 students, 184 staff<br />

Key elements IXP 400 hardware<br />

Impronet software suite<br />

M<strong>or</strong>pho J-series biometric readers<br />

Windows Active Direct<strong>or</strong>y integr<strong>at</strong>ion<br />

elimin<strong>at</strong>e issuing keys to staff , as replacements were quite <strong>co</strong>stly. Using<br />

biometrics was theref<strong>or</strong>e an obvious option.<br />

The client admits th<strong>at</strong> timing of the implement<strong>at</strong>ion was of the utmost<br />

imp<strong>or</strong>tance as one had to <strong>co</strong>nsider th<strong>at</strong>, although all student and staff inf<strong>or</strong>m<strong>at</strong>ion<br />

was integr<strong>at</strong>ed into the Impronet d<strong>at</strong>abase, enrolment of fi ngerprint<br />

templ<strong>at</strong>es still had to be undertaken. This proved to be time <strong>co</strong>nsuming.<br />

Biometric access <strong>co</strong>ntrol using the M<strong>or</strong>pho readers <strong>at</strong> the <strong>co</strong>mputer<br />

lab<strong>or</strong><strong>at</strong><strong>or</strong>y provided the client with a good overview of the seamless<br />

n<strong>at</strong>ure of the integr<strong>at</strong>ion implement<strong>at</strong>ion. The install<strong>at</strong>ion has exceeded<br />

the client’s expect<strong>at</strong>ions of the proposed solution.<br />

www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 105


CASE STUDY: CONSTRUCTION<br />

Controlled access f<strong>or</strong> 15 000<br />

people each day<br />

Over 15 000 w<strong>or</strong>kers arrive <strong>at</strong> the main g<strong>at</strong>e every day.<br />

Construction of the Kusile <strong>co</strong>al-fired power st<strong>at</strong>ion in<br />

Mpumalanga is well under way and w<strong>or</strong>k is being carried out<br />

<strong>at</strong> a furious pace. The first power gener<strong>at</strong>ing unit is expected<br />

to go online in 2014 and this additional capacity is desper<strong>at</strong>ely<br />

needed to relieve the Eskom grid, which is currently under tremendous<br />

strain. All six power gener<strong>at</strong>ing units are planned to<br />

be oper<strong>at</strong>ional by the end of 2018 with a total capacity of 4 800<br />

megaw<strong>at</strong>ts.<br />

The Kusile site is approxim<strong>at</strong>ely 5 200 hectares and clearing of<br />

the site began in April 2008. The power st<strong>at</strong>ion is expected to use<br />

up to 17 million tons of <strong>co</strong>al per annum f<strong>or</strong> a period of 47 years.<br />

This makes Kusile one of the biggest <strong>co</strong>al fired power st<strong>at</strong>ions in<br />

the w<strong>or</strong>ld.<br />

A number of issues had to be c<strong>at</strong>ered f<strong>or</strong> in the <strong>co</strong>nstruction of<br />

the plant:<br />

• A <strong>co</strong>ns<strong>or</strong>tium of large <strong>co</strong>nstruction <strong>co</strong>mpanies is w<strong>or</strong>king on<br />

the Kusile project: Stefanutti Stocks, Basil Read, Group Five and<br />

WBHO were jointly awarded the civil w<strong>or</strong>ks <strong>co</strong>ntract. Securing a<br />

site of this magnitude has been a maj<strong>or</strong> challenge.<br />

• Over 15 000 w<strong>or</strong>kers arrive <strong>at</strong> the main g<strong>at</strong>e every day. Any turnstile<br />

solution must not be<strong>co</strong>me a bottleneck where unproductive<br />

time is wasted while waiting to enter the <strong>co</strong>nstruction site.<br />

• Administr<strong>at</strong>ively, there is the challenge of accur<strong>at</strong>ely managing<br />

employee clocking and avoiding time and <strong>at</strong>tendance fraud.<br />

• Occup<strong>at</strong>ional health and safety is a serious legal requirement<br />

and no w<strong>or</strong>ker can be allowed onto the site if intoxic<strong>at</strong>ed and<br />

without the <strong>co</strong>rrect PPE.<br />

• Opp<strong>or</strong>tunities f<strong>or</strong> industrial espionage must be limited. The<br />

power gener<strong>at</strong>ion industry is domin<strong>at</strong>ed by American, French<br />

and Japanese firms. Each firm has its own industrial secrets and<br />

technologies which give it a <strong>co</strong>mpetitive advantage. No cameras<br />

can be allowed into the <strong>co</strong>nstruction site.<br />

• A <strong>co</strong>nstruction site, by its very n<strong>at</strong>ure, is a fluid and temp<strong>or</strong>ary<br />

arrangement. An area which is a <strong>co</strong>nvenient entrance one day<br />

can be<strong>co</strong>me an obstacle on another day. A temp<strong>or</strong>ary access<br />

<strong>co</strong>ntrolled solution would be required which can be easily<br />

moved and positioned.<br />

The prepar<strong>at</strong>ion<br />

Turnstar w<strong>or</strong>ked closely with the Eskom management <strong>at</strong> Kusile to fi nd<br />

the right temp<strong>or</strong>ary access <strong>co</strong>ntrolled solution. Turnstar suggested<br />

th<strong>at</strong> a bank of turnstiles be installed in <strong>co</strong>nverted shipping <strong>co</strong>ntainers.<br />

Recently, Turnstar supplied 48 Titan half height turnstiles which were<br />

installed in <strong>co</strong>ntainers to the <strong>co</strong>nstruction site of the London Olympic<br />

Stadium. The <strong>co</strong>ntainers would be fi tted with their own DB board and<br />

all access <strong>co</strong>ntrol paraphernalia required f<strong>or</strong> time & <strong>at</strong>tendance.<br />

The solution<br />

Eskom placed an <strong>or</strong>der with Turnstar f<strong>or</strong> 56 Triumph 4 full height<br />

single turnstiles and 7 f<strong>or</strong>ty-foot shipping <strong>co</strong>ntainers. The Triumph<br />

was chosen due to its durability in harsh and dusty environments.<br />

It is also supplied with a 5-year guarantee. Each <strong>co</strong>ntainer would be<br />

106 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

fi tted with 8 turnstiles. 15 000 employees will be using these turnstiles,<br />

which means ±270 employees per turnstile. On average, it would take 30<br />

minutes f<strong>or</strong> all employees to enter the <strong>co</strong>nstruction site, which is within<br />

Eksom’s requirements. Bef<strong>or</strong>e entry through the turnstile, all employees<br />

are checked f<strong>or</strong> intoxic<strong>at</strong>ion by means of an al<strong>co</strong>hol sniff er and are<br />

checked f<strong>or</strong> cameras.<br />

The shipping <strong>co</strong>ntainers were w<strong>at</strong>erproofed, painted and <strong>co</strong>nverted<br />

by removing the side panels. The removal of the side panels cre<strong>at</strong>es<br />

a large entrance through which the employees can pass through the<br />

8 turnstiles. Lighting and an Eskom approved DB board were fi tted.<br />

The turnstiles were bolted to the wooden fl o<strong>or</strong>. Once <strong>co</strong>mpleted, the<br />

<strong>co</strong>ntainers were taken from the depot through to Kusile by means of a<br />

crane truck. The crane then placed the <strong>co</strong>ntainer <strong>at</strong> the area to be access<br />

<strong>co</strong>ntrolled.<br />

The project took a total of eight weeks from d<strong>at</strong>e of <strong>or</strong>der to fi nal<br />

delivery to <strong>co</strong>mplete.<br />

Company Turnstar Systems<br />

<strong>Contact</strong> person Craig Sacks<br />

Business sect<strong>or</strong> Construction<br />

Tel +27 (0)11 786 1633<br />

Fax +27 (0)11 440 5839<br />

Email info@turnstar.<strong>co</strong>.<strong>za</strong>


New Y<strong>or</strong>k City Transit<br />

New Y<strong>or</strong>k City Transit is the largest agency of the Metropolitan<br />

Transp<strong>or</strong>t<strong>at</strong>ion Auth<strong>or</strong>ity (MTA) in New Y<strong>or</strong>k, the largest transp<strong>or</strong>t<strong>at</strong>ion<br />

netw<strong>or</strong>k in N<strong>or</strong>th America serving 14.6 million people. New<br />

Y<strong>or</strong>k City Transit has the w<strong>or</strong>ld’s largest fleet of subway cars and the<br />

largest public bus agency.<br />

As New Y<strong>or</strong>k City Transit moves from manual train <strong>co</strong>ntrol to a<br />

m<strong>or</strong>e <strong>co</strong>mputerised environment, providing secure access to applic<strong>at</strong>ions<br />

and buildings is critical. The agency has 49 000 employees<br />

across 500 loc<strong>at</strong>ions, and also manages benefits f<strong>or</strong> 36 000 retirees<br />

and spouses.<br />

F<strong>or</strong> the IT staff, provisioning new users was a lengthy manual<br />

process, often requiring a few weeks to give users access to the<br />

right applic<strong>at</strong>ions. Revoking netw<strong>or</strong>k and building access f<strong>or</strong> termin<strong>at</strong>ed<br />

employees was also time-<strong>co</strong>nsuming, and posed security<br />

risks. Autom<strong>at</strong>ing identity management would allow the IT staff to<br />

decrease administr<strong>at</strong>ion time, while gre<strong>at</strong>ly improving security.<br />

The agency also needed a security and identity management<br />

solution th<strong>at</strong> would w<strong>or</strong>k across a mixed oper<strong>at</strong>ing environment<br />

<strong>co</strong>nsisting of Microsoft Windows, NetWare, Unix and a variety of<br />

mainframe and mid-range servers.<br />

Selecting NetIQ<br />

After evalu<strong>at</strong>ing identity management solutions including Oracle, IBM,<br />

and Microsoft, New Y<strong>or</strong>k City Transit selected a NetIQ solution <strong>co</strong>nsisting<br />

of Identity Manager and NetIQ Access Manager. With API supp<strong>or</strong>t<br />

f<strong>or</strong> dispar<strong>at</strong>e systems, the <strong>or</strong>ganis<strong>at</strong>ion can <strong>co</strong>nnect to Microsoft Active<br />

Direct<strong>or</strong>y and RACF across a variety of oper<strong>at</strong>ing pl<strong>at</strong>f<strong>or</strong>ms.<br />

New Y<strong>or</strong>k City Transit implemented Identity Manager to autom<strong>at</strong>ically<br />

synchronise user identities across multiple systems, including its<br />

time keeping and building access systems. Access Manager allows the<br />

IT staff to give employees and <strong>co</strong>ntract<strong>or</strong>s role-based access to applic<strong>at</strong>ions,<br />

based on auth<strong>or</strong>it<strong>at</strong>ive user d<strong>at</strong>a in the agency’s employee<br />

inf<strong>or</strong>m<strong>at</strong>ion system.<br />

An identity management solution has also helped New Y<strong>or</strong>k City<br />

Transit with its governance, risk and <strong>co</strong>mpliance (GRC) str<strong>at</strong>egy. The IT<br />

staff can manage risk by ensuring th<strong>at</strong> the right people have access to<br />

the right inf<strong>or</strong>m<strong>at</strong>ion.<br />

CASE STUDY: IDENTITY MANAGEMENT<br />

New Y<strong>or</strong>k City Transit autom<strong>at</strong>ed identity management f<strong>or</strong> 85 000 users.<br />

With Identity Manager, the agency has elimin<strong>at</strong>ed the manual<br />

processes associ<strong>at</strong>ed with user provisioning and can set up new user<br />

ac<strong>co</strong>unts in a few hours, r<strong>at</strong>her than a few weeks. The IT staff can also<br />

revoke access as soon as employees leave the <strong>or</strong>ganis<strong>at</strong>ion to safeguard<br />

the security of its netw<strong>or</strong>k, as well as access to its 1 500 critical infrastructure<br />

<strong>co</strong>ntrol rooms.<br />

With a NetIQ solution, the staff can ensure th<strong>at</strong> users have access<br />

only to auth<strong>or</strong>ised applic<strong>at</strong>ions and building, which is critical when<br />

managing a large transp<strong>or</strong>t<strong>at</strong>ion system. Autom<strong>at</strong>ing identity management<br />

has also freed up the IT staff to w<strong>or</strong>k on m<strong>or</strong>e challenging projects,<br />

r<strong>at</strong>her than routine administr<strong>at</strong>ion.<br />

Cost savings<br />

With centralised identity management, the IT staff can give users a<br />

single ID and passw<strong>or</strong>d to access applic<strong>at</strong>ions. This has dram<strong>at</strong>ically<br />

reduced the number of passw<strong>or</strong>ds users had to remember, as well as the<br />

number of passw<strong>or</strong>d-rel<strong>at</strong>ed helpdesk calls. Passw<strong>or</strong>d self-service also<br />

allows users to manage their own passw<strong>or</strong>ds.<br />

F<strong>or</strong> its 36 000 retirees and spouses, New Y<strong>or</strong>k City Transit provides<br />

VPN access to its netw<strong>or</strong>k and uses SecureLogin to provide secure,<br />

single sign-on access. Once users have netw<strong>or</strong>k access, Access Manager<br />

provides auth<strong>or</strong>ised access to a Web p<strong>or</strong>tal where they can access and<br />

change their benefi t inf<strong>or</strong>m<strong>at</strong>ion.<br />

New Y<strong>or</strong>k City Transit runs its NetIQ identity management solution<br />

on SUSE Linux Enterprise Server f<strong>or</strong> gre<strong>at</strong>er stability and has had zero<br />

downtime to d<strong>at</strong>e.<br />

With a NetIQ identity management solution, New Y<strong>or</strong>k City Transit<br />

centralised and autom<strong>at</strong>ed identity management f<strong>or</strong> 85 000 employees,<br />

<strong>co</strong>ntract<strong>or</strong>s and retirees. The IT staff has reduced time spent on user<br />

provisioning by 60% and can provision new users 90% faster. Users now<br />

have secure, single sign-on access to applic<strong>at</strong>ions which has improved<br />

security, as well as employee productivity.<br />

Making its benefi ts program available online to 85 000 users has dram<strong>at</strong>ically<br />

reduced the mailing and administr<strong>at</strong>ive <strong>co</strong>sts of managing the<br />

agency’s benefi ts program. New Y<strong>or</strong>k City Transit has autom<strong>at</strong>ed identity<br />

management and cre<strong>at</strong>ed new services f<strong>or</strong> users, all without the need<br />

f<strong>or</strong> additional IT resources.<br />

www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 107


CASE STUDY: HEALTHCARE<br />

Hospital access <strong>co</strong>ntrolled<br />

Centralised management and advanced access <strong>co</strong>ntrol.<br />

The First Affili<strong>at</strong>ed Hospital of Jinan University Medical College was<br />

established to provide medical and healthcare services to Chinese<br />

citizens. It is also responsible f<strong>or</strong> nurturing medical professionals<br />

and spearheading medical research in China. The hospital includes<br />

43 departments and 850 beds, delivering quality medical, rehabilit<strong>at</strong>ion<br />

and healthcare services through a team of 1 100 medical<br />

professionals.<br />

The hospital is undergoing an extension project th<strong>at</strong> includes<br />

the <strong>co</strong>nstruction of a 72 000 metre in-p<strong>at</strong>ient building. The new<br />

building will be equipped with advanced medical equipment<br />

and a new security management<br />

system to enhance the<br />

clinical services and ensure<br />

the security of its medical<br />

facilities.<br />

The large influx of<br />

p<strong>at</strong>ients, visit<strong>or</strong>s and staff<br />

poses challenges to the<br />

hospital‘s security management.<br />

In the past, it has been<br />

rel<strong>at</strong>ively easy f<strong>or</strong> an intruder<br />

to walk around a hospital<br />

unchallenged, accessing<br />

areas meant only f<strong>or</strong> auth<strong>or</strong>ised<br />

staff. In rare cases, this <strong>co</strong>uld lead to security breaches where<br />

infants are removed from paedi<strong>at</strong>ric wards. Theref<strong>or</strong>e, it is critical<br />

to safeguard key zones th<strong>at</strong> also include the dispensary, oper<strong>at</strong>ion<br />

rooms and intensive care units.<br />

As a result, the First Affili<strong>at</strong>ed Hospital of<br />

Jinan University needed a multi-layered<br />

access <strong>co</strong>ntrol system to dram<strong>at</strong>ically<br />

increase overall security. With the hospital’s<br />

plans to renov<strong>at</strong>e its<br />

old buildings and<br />

<strong>co</strong>nstruct a new<br />

in-p<strong>at</strong>ient building,<br />

the new access<br />

<strong>co</strong>ntrol system also<br />

needed to be scalable<br />

to address this<br />

expansion.<br />

HID solution<br />

In <strong>or</strong>der to achieve<br />

central monit<strong>or</strong>ing and<br />

multi-layered security,<br />

HID Global’s VertX V1000<br />

netw<strong>or</strong>k <strong>co</strong>ntroller, VertX V100 reader interfaces and<br />

iCLASS R10 readers were installed on the premises. By<br />

<strong>co</strong>nnecting VertX V1000 <strong>co</strong>ntrollers to the host <strong>co</strong>mputer via<br />

a TCP/IP netw<strong>or</strong>k, the centralised, Web-based IP access <strong>co</strong>ntrol<br />

solution perf<strong>or</strong>ms remote monit<strong>or</strong>ing and area <strong>co</strong>ntrol f<strong>or</strong> key<br />

zones while restricting staff access based on their job functions.<br />

iCLASS R10 readers were installed <strong>at</strong> each entry point and all<br />

staff must now present their iCLASS cards to verify their identities.<br />

108 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

“After <strong>co</strong>mparing several local and intern<strong>at</strong>ional<br />

brands, we selected HID Global’s<br />

solutions f<strong>or</strong> its leading technology,<br />

w<strong>or</strong>ldwide agency certifi c<strong>at</strong>ions, <strong>co</strong>mprehensive<br />

post-sales supp<strong>or</strong>t and lifetime<br />

warranty.”<br />

Mr. Zhao, Project Engineer First Affi li<strong>at</strong>ed<br />

Hospital of Jinan University.<br />

Heightened physical security throughout the hospital was<br />

achieved by enabling different levels of building access to certain<br />

staff. F<strong>or</strong> example, only doct<strong>or</strong>s and nurses in charge of intensive<br />

care units and oper<strong>at</strong>ing rooms are granted access to these areas.<br />

Similarly, only on-duty staff members are permitted to enter the<br />

dispensary, preventing accidents and malicious intrusions.<br />

F<strong>or</strong> system management, HID iCLASS R10 readers were <strong>co</strong>nnected<br />

to a VertX V100 reader interface and VertX V1000 <strong>co</strong>ntrollers<br />

to transfer the entry re<strong>co</strong>rds to the central st<strong>at</strong>ion. By in<strong>co</strong>rp<strong>or</strong><strong>at</strong>ing<br />

HID’s netw<strong>or</strong>ked access solutions with system software, the<br />

central st<strong>at</strong>ion administr<strong>at</strong><strong>or</strong><br />

can perf<strong>or</strong>m all execution<br />

<strong>co</strong>mmands, including tracking<br />

and changing security<br />

levels and access rights, as<br />

well as d<strong>at</strong>a backup and<br />

rep<strong>or</strong>t gener<strong>at</strong>ion. In the case<br />

of <strong>co</strong>mmunic<strong>at</strong>ion failures,<br />

each entry point is able to<br />

execute all <strong>co</strong>mmands offline,<br />

and once <strong>co</strong>mmunic<strong>at</strong>ions are<br />

rest<strong>or</strong>ed, all buffered transactions<br />

are uploaded to the host<br />

f<strong>or</strong> real-time monit<strong>or</strong>ing and<br />

d<strong>at</strong>a transmission.<br />

Lastly, the system can <strong>co</strong>llect cardholders’ entry re<strong>co</strong>rds and<br />

inf<strong>or</strong>m<strong>at</strong>ion including the employee number, name, department<br />

and title f<strong>or</strong> time and <strong>at</strong>tendance purposes.<br />

“After <strong>co</strong>mparing several local and intern<strong>at</strong>ional brands, we<br />

selected HID Global’s solutions f<strong>or</strong> its leading technology,<br />

w<strong>or</strong>ldwide agency certific<strong>at</strong>ions,<br />

<strong>co</strong>mprehensive post-sales supp<strong>or</strong>t<br />

and lifetime warranty,”<br />

says Mr. Zhao, Project<br />

Engineer of the First<br />

Affili<strong>at</strong>ed Hospital<br />

of Jinan University.<br />

“M<strong>or</strong>eover, iCLASS<br />

technology delivers<br />

enhanced security<br />

through d<strong>at</strong>a encryption<br />

and mutual authentic<strong>at</strong>ion<br />

technologies, addressing our<br />

needs f<strong>or</strong> maximum security <strong>at</strong><br />

key zones.”<br />

In addition, HID Global’s open<br />

architecture netw<strong>or</strong>ked access<br />

<strong>co</strong>ntrol solutions meet the hospital’s<br />

evolving requirements through simple<br />

firmware upgrades. The solutions are also scalable,<br />

enabling additional applic<strong>at</strong>ions such as fire alarm, biometrics and<br />

logical access f<strong>or</strong> future system expansion.<br />

F<strong>or</strong> m<strong>or</strong>e inf<strong>or</strong>m<strong>at</strong>ion <strong>co</strong>ntact HID Global, +27 (0)82 449 9398,<br />

rtruter@hidglobal.<strong>co</strong>m, www.hidglobal.<strong>co</strong>m


The Ministry of Finance, Nigeria, oversees various fi nancial and e<strong>co</strong>-<br />

nomic aff airs of the federal government of Nigeria including managing,<br />

<strong>co</strong>ntrolling, and monit<strong>or</strong>ing all federal revenues and expenditures. The<br />

CEM AC2000 SE (Standard Edition) provides high-end security f<strong>or</strong> the<br />

site and was installed by CEM Approved Resellers Acti-Tech.<br />

AC2000 SE off ers the Ministry of<br />

Finance a fully integr<strong>at</strong>ed and <strong>co</strong>mprehensive<br />

access <strong>co</strong>ntrol, alarms processing,<br />

and photo ID badging system. The<br />

system <strong>co</strong>mes with a suite of applic<strong>at</strong>ions<br />

including AC2000 VIPPS (Visual Imaging<br />

Pass Production System) which the<br />

Ministry of Finance found particularly<br />

benefi cial. AC2000 VIPPS applic<strong>at</strong>ion<br />

allows the Ministry of Finance to design<br />

its own ID badges and issue over 1 500<br />

permanent and temp<strong>or</strong>ary ID cards to<br />

staff and visit<strong>or</strong>s.<br />

IP card readers<br />

A range of CEM IP card readers were<br />

installed throughout the building, including<br />

the CEM S610f fi ngerprint card reader.<br />

The S610f off ers increased security by providing<br />

three levels of identity checks – ID<br />

card authentic<strong>at</strong>ion, PIN check, and fi ngerprint verifi c<strong>at</strong>ion. The reader<br />

allows the Ministry of Finance the opp<strong>or</strong>tunity to add an additional layer<br />

of biometric security where necessary.<br />

Fe<strong>at</strong>uring a <strong>co</strong>ntroller, card reader, and fi ngerprint solution in one<br />

device, the S610f is a fully integr<strong>at</strong>ed biometric and access <strong>co</strong>ntrol<br />

reader th<strong>at</strong> is used as part of the AC2000 SE system. Fingerprint templ<strong>at</strong>es<br />

are captured on the AC2000 enrolment st<strong>at</strong>ion <strong>at</strong> the same time<br />

CASE STUDY: FINANCE<br />

Ministry of Finance, Nigeria<br />

AC2000 SE off ers the Ministry of Finance an integr<strong>at</strong>ed access <strong>co</strong>ntrol, alarms<br />

processing, and photo ID badging system.<br />

as a cardholder’s personnel details and images are captured and are<br />

then saved to the AC2000 server.<br />

Cards can then be issued and biometric templ<strong>at</strong>es distributed via the<br />

access <strong>co</strong>ntrol netw<strong>or</strong>k, elimin<strong>at</strong>ing the need f<strong>or</strong> an additional biometric<br />

netw<strong>or</strong>k and software enrolment process.The S610f off ers advanced fe<strong>at</strong>ures<br />

such as an LCD to show user messages<br />

such as ‘Access Granted’, ‘Card<br />

Expiring’, and ‘Wrong TimeZone’. S610f<br />

also fe<strong>at</strong>ures an internal d<strong>at</strong>abase<br />

enabling intelligent decision making <strong>at</strong><br />

do<strong>or</strong>s <strong>at</strong> all times; even when <strong>co</strong>mmunic<strong>at</strong>ion<br />

has been temp<strong>or</strong>arily lost with<br />

the host system.<br />

“CEM Systems off ered gre<strong>at</strong><br />

supp<strong>or</strong>t throughout the project<br />

and provided an excellent<br />

solution to secure the Ministry<br />

of Finance. The fully integr<strong>at</strong>ed<br />

solution will allow the premises<br />

to run eff ectively and<br />

effi ciently with the highest of<br />

security measures”.<br />

Peter Madu, managing<br />

direct<strong>or</strong>, Acti-Tech<br />

Power over Ethernet<br />

“Utilising CEM’s advanced range of<br />

hardware, the Ministry of Finance<br />

also chose CEM’s high Power over<br />

Ethernet solution, the fi rst of its kind<br />

in the industry,” says Andrew Fulton,<br />

business development direct<strong>or</strong>, CEM<br />

Systems. The CEM DIU 230 (High Power<br />

over Ethernet Do<strong>or</strong> Interface Unit)<br />

elimin<strong>at</strong>es the need f<strong>or</strong> both a main<br />

<strong>co</strong>nnection and a local power supply<br />

to the do<strong>or</strong>. Utilising Ethernet infrastructure throughout the Ministry<br />

of Finance, the DIU 230 supplies suffi cient power via the same C<strong>at</strong> 5e/6<br />

cable th<strong>at</strong> powers CEM card readers, as well as reliably powers double<br />

magnetic locks th<strong>at</strong> secure the do<strong>or</strong>s.<br />

F<strong>or</strong> m<strong>or</strong>e inf<strong>or</strong>m<strong>at</strong>ion <strong>co</strong>ntact Ty<strong>co</strong> Security Products,<br />

+27 (0)82 566 5274, emallett@ty<strong>co</strong>int.<strong>co</strong>m, www.ty<strong>co</strong>acvs.<strong>co</strong>m.<br />

www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 109


PRODUCT UPDATE<br />

Access <strong>co</strong>ntrol fi ngerprint<br />

management with Unis<br />

Trac-Tech’s Unis access <strong>co</strong>ntrol fi ngerprint management software allows users<br />

to maximise the functionality of their access <strong>co</strong>ntrol hardware. The software<br />

has a number of value added management fe<strong>at</strong>ures and provides real-time<br />

st<strong>or</strong>age of a user’s fi ngerprints in <strong>co</strong>njunction with a clocking device. An<br />

optional time and <strong>at</strong>tendance (T&A) module is available as a USB dongle.<br />

“Preceded by Trac-Tech’s Access Manager, Unis was developed<br />

after requests from our customers f<strong>or</strong> further management, fl exibility<br />

and functionality of the terminals on a high end basis,” Trac-Tech’s Ian<br />

Kellerman explained.<br />

The software has a number of special fe<strong>at</strong>ures such as meal ticket<br />

management. “This is ideal f<strong>or</strong> <strong>or</strong>ganis<strong>at</strong>ions th<strong>at</strong> have canteens and<br />

allows management to alloc<strong>at</strong>e vouchers based on predetermined time<br />

periods. The vouchers will be invalid<strong>at</strong>ed should<br />

the user <strong>at</strong>tempt to use them outside the specifi ed<br />

time zone. In addition, vouchers f<strong>or</strong> specifi c meals,<br />

such as breakfast, would not be available outside a<br />

specifi ed ‘breakfast time’ range,” said Kellerman.<br />

The system has SQL <strong>or</strong> Access d<strong>at</strong>abase capabilities<br />

and can exp<strong>or</strong>t inf<strong>or</strong>m<strong>at</strong>ion to other T&A packages,<br />

which in turn will exp<strong>or</strong>t to all the proprietary<br />

payroll systems. Clocking terminals can be added<br />

internally and the system is based on either individual<br />

w<strong>or</strong>kst<strong>at</strong>ions <strong>or</strong> is server-based across WAN <strong>or</strong> LAN.<br />

“There is no limit to the number of users who<br />

can be added to the system and there is no extra<br />

charge f<strong>or</strong> adding extra users, making it quite<br />

unique in industry,” said Kellerman.<br />

“Once the terminal has scanned your fi ngerprint it m<strong>at</strong>ches it to<br />

re<strong>co</strong>rds in the d<strong>at</strong>abase. You can add further security elements to the<br />

system by having a 1:1 which would mean a check against your fi ngerprint<br />

plus a check against either a PIN <strong>co</strong>de <strong>or</strong> a user card. This then in<br />

essence be<strong>co</strong>mes an individual security system which allows it to check<br />

only th<strong>at</strong> one particular person without having to access a large d<strong>at</strong>abase,”<br />

said Kellerman. The anti-passback fe<strong>at</strong>ure means th<strong>at</strong> if someone<br />

has entered the building without clocking in, they will not be allowed to<br />

clock out <strong>at</strong> a valid terminal.<br />

Based on feedback from previous users of Access Manager, the<br />

software is designed around ease of use and enhanced management<br />

with extended rep<strong>or</strong>ting capabilities. “The basic rep<strong>or</strong>ting facility is per<br />

user, per department, per terminal, per access group and per d<strong>at</strong>e range.<br />

Re<strong>co</strong>rds are st<strong>or</strong>ed on both the terminal and the software with inf<strong>or</strong>m<strong>at</strong>ion<br />

of the user and their clocking hist<strong>or</strong>y,” Kellerman explained.<br />

110 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

Access <strong>co</strong>ntrol<br />

fi ngerprint management<br />

software<br />

allows users to<br />

maximise the<br />

functionality of<br />

their access <strong>co</strong>ntrol<br />

hardware.<br />

Superi<strong>or</strong> access management<br />

Unis has evolved into a superi<strong>or</strong> management tool with a number of<br />

specialised fe<strong>at</strong>ures including a blacklist manager. “This fe<strong>at</strong>ure is ideal<br />

f<strong>or</strong> use in scenarios where multiple <strong>co</strong>ntract<strong>or</strong>s access site on a daily<br />

basis. If someone is dismissed by a <strong>co</strong>ntract<strong>or</strong> they will be blacklisted on<br />

the system so if they try to register with a new <strong>co</strong>ntract<strong>or</strong> (employer) the<br />

system will autom<strong>at</strong>ically alert management as to their blacklisted st<strong>at</strong>us<br />

and disallow their entry on to site,” said Kellerman.<br />

Various access groups and areas can be <strong>co</strong>nfi gured in Unis:<br />

• Access times f<strong>or</strong> particular, predetermined zones (06:00 to 22:00 f<strong>or</strong><br />

example).<br />

• Access times f<strong>or</strong> access zones f<strong>or</strong> specifi c days (administr<strong>at</strong>ion and reception<br />

areas only on weekdays f<strong>or</strong> administr<strong>at</strong>ion and<br />

management staff , f<strong>or</strong> example).<br />

• Access areas, f<strong>or</strong> example, ‘front do<strong>or</strong> f<strong>or</strong> administr<strong>at</strong>ion’;<br />

<strong>or</strong> ‘fact<strong>or</strong>y entrance f<strong>or</strong> administr<strong>at</strong>ion and fact<strong>or</strong>y<br />

w<strong>or</strong>kers’ with specifi c links to the time periods<br />

each group can have access to these areas.<br />

• Visit<strong>or</strong> management module f<strong>or</strong> alloc<strong>at</strong>ed access<br />

periods and areas.<br />

“Site map monit<strong>or</strong>ing shows the global layout of the<br />

site and terminal position in rel<strong>at</strong>ion to entrance and exit<br />

points and will indic<strong>at</strong>e if a do<strong>or</strong> is opened <strong>or</strong> a terminal<br />

is dis<strong>co</strong>nnected,” said Kellerman.<br />

“You can manage I/O inf<strong>or</strong>m<strong>at</strong>ion, f<strong>or</strong> example when<br />

an access do<strong>or</strong> remains open f<strong>or</strong> a predetermined time,<br />

a pop-up will appear on the user’s PC screen to inf<strong>or</strong>m<br />

them of their action. The software can broadcast messages when people clock<br />

in, f<strong>or</strong> example, ‘rep<strong>or</strong>t to the manager’s offi ce’. An e-mail can also be sent to<br />

alert management when specifi c people clock in,” explained Kellerman.<br />

In <strong>or</strong>der to minimise netw<strong>or</strong>k traffi c and provide a real-time upd<strong>at</strong>e<br />

of transactions, the devices will push their transactions to the server as<br />

they occur. While templ<strong>at</strong>es are being sent to the Virdi biometric readers,<br />

users can <strong>co</strong>ntinue to transact.<br />

The software is also designed with safety and security in mind. “You<br />

can enable panic <strong>co</strong>ntrol in the software such th<strong>at</strong> if a panic button is<br />

pressed <strong>at</strong> a terminal, it will send an e-mail alert plus audibly emit a<br />

siren. This is ideal f<strong>or</strong> fi re warnings and can also be linked to a fi re/smoke<br />

monit<strong>or</strong>ing system f<strong>or</strong> autom<strong>at</strong>ic alerts,” said Kellerman.<br />

F<strong>or</strong> m<strong>or</strong>e inf<strong>or</strong>m<strong>at</strong>ion <strong>co</strong>ntact Trac-Tech, 0861 100 199,<br />

info@trac-tech.<strong>co</strong>.<strong>za</strong>, www.trac-tech.<strong>co</strong>.<strong>za</strong> .


Real-time, Web-based time and<br />

<strong>at</strong>tendance solution<br />

Web Register is a Web-based time and <strong>at</strong>tendance (T&A) solution hosted on a<br />

client’s server.<br />

Instant <strong>co</strong>nnectivity, real-time d<strong>at</strong>a and minimal fuss are the demands of<br />

modern-day businesses. Web Register is a Web-based time and <strong>at</strong>tendance<br />

(T&A) solution hosted on a client’s server, which <strong>co</strong>mmunic<strong>at</strong>es<br />

with SQL d<strong>at</strong>abases and allows many users to <strong>co</strong>nnect to the system via<br />

a Web browser, without the need f<strong>or</strong> additional software.<br />

Developed 10 years ago, the system is fi nding gre<strong>at</strong> acceptance in a<br />

w<strong>or</strong>ld driven by the move to m<strong>or</strong>e Web-based applic<strong>at</strong>ions and it allows<br />

<strong>co</strong>mpanies to access a shared resource environment quickly and painlessly.<br />

The system allows f<strong>or</strong> multiple administr<strong>at</strong><strong>or</strong>s and up to 100 users.<br />

Specifi c industries th<strong>at</strong> benefi t from this package are mining; travel and<br />

tourism; hospitality; and R&D, where the system monit<strong>or</strong>s total project<br />

hours in terms of research hours per person.<br />

Web Register has all the benefi ts and fe<strong>at</strong>ures th<strong>at</strong> other T&A packages<br />

off er but the diff erenti<strong>at</strong><strong>or</strong> is apparent in its design and usage.<br />

One of these characteristics is th<strong>at</strong> a user can email rep<strong>or</strong>ts to relevant<br />

parties straight from the Web page. “One can also exp<strong>or</strong>t rep<strong>or</strong>ts directly<br />

to Excel and certain rep<strong>or</strong>ts can be exp<strong>or</strong>ted to PDF, all with the <strong>co</strong>nfi -<br />

dence th<strong>at</strong> the traditionally associ<strong>at</strong>ed issues with loss of f<strong>or</strong>m<strong>at</strong>ting on<br />

imp<strong>or</strong>t<strong>at</strong>ion have been removed,” said Trac-Tech’s Buddy Solomons.<br />

There are no annual licences associ<strong>at</strong>ed with Web Register and there<br />

is no restriction on the number of employees who can be added to the<br />

system. In addition, because of its user-friendly n<strong>at</strong>ure, Web Register<br />

n<strong>or</strong>mally does not require on-site supp<strong>or</strong>t after its fi rst year in oper<strong>at</strong>ion.<br />

Rep<strong>or</strong>t fl exibility<br />

Web Register uses Trac-Tech’s Unis as the underlying product to g<strong>at</strong>her<br />

authentic<strong>at</strong>ed details. The integr<strong>at</strong>ion between the two products is<br />

seamless and Web Register is able to autom<strong>at</strong>ically detect any T&A users.<br />

Standard fe<strong>at</strong>ures include an HR rep<strong>or</strong>ter and full time and <strong>at</strong>tendance<br />

inf<strong>or</strong>m<strong>at</strong>ion. “A new fe<strong>at</strong>ure is cross fi ltering which allows one<br />

to fl exibly select the relevant department <strong>or</strong> occup<strong>at</strong>ional group and<br />

produce targeted rep<strong>or</strong>ts,” said Solomons.<br />

“Administr<strong>at</strong><strong>or</strong>s can cre<strong>at</strong>e a number of users and permissions f<strong>or</strong><br />

each user, f<strong>or</strong> example, ‘Access timesheets’ <strong>or</strong> ‘Only allow access to specifi<br />

c <strong>co</strong>lumns within the timesheet’,” Solomons added.<br />

Web Register provides a multitude of rep<strong>or</strong>ts f<strong>or</strong> defi ned exceptions<br />

and fi nal hours. Rep<strong>or</strong>ts are interactive f<strong>or</strong> the main users and when the<br />

timesheet is upd<strong>at</strong>ed it will autom<strong>at</strong>ically upd<strong>at</strong>e the relevant rep<strong>or</strong>t.<br />

The system will indic<strong>at</strong>e which person’s re<strong>co</strong>rds have been accessed and<br />

edited, which can be reviewed in any other rel<strong>at</strong>ed rep<strong>or</strong>t.<br />

The audit trail allows management to see if supervis<strong>or</strong>s are editing<br />

timesheets. “Each time they access and edit it is re<strong>co</strong>rded against their<br />

user profi le. Passw<strong>or</strong>d protection of users, however, is specifi c to each<br />

user and even administr<strong>at</strong><strong>or</strong>s cannot view this passw<strong>or</strong>d,” said Solomons.<br />

Full integr<strong>at</strong>ion<br />

Web Register inf<strong>or</strong>m<strong>at</strong>ion can be exp<strong>or</strong>ted to 95% of all payroll systems<br />

in South Africa and is a seni<strong>or</strong> partner of Softline VIP Payroll and many<br />

other payroll systems such as Pastel and Payslip . “Trac-Tech has developed<br />

the Autom<strong>at</strong>ic Leave Integr<strong>at</strong>ion module specifi cally f<strong>or</strong> use in the<br />

Softline VIP Payroll system,” said Solomons.<br />

A separ<strong>at</strong>e module – Employee Integr<strong>at</strong>ion – will allow payroll<br />

administr<strong>at</strong><strong>or</strong> to add <strong>or</strong> termin<strong>at</strong>e an employee from the system from<br />

VIP. This will autom<strong>at</strong>ically upd<strong>at</strong>e the employee’s details on the templ<strong>at</strong>e<br />

management software (Unis) and then upd<strong>at</strong>e Web Register.<br />

Solomons said th<strong>at</strong> Trac-Tech has had rep<strong>or</strong>ts of some users accessing<br />

specifi c elements such as clocking in and clocking out of employees<br />

via their iPhones and Blackberries even though Trac-Tech has not currently<br />

developed a smart phone applic<strong>at</strong>ion. “This underlines the inherent<br />

sophistic<strong>at</strong>ion of the programming of the system and aff <strong>or</strong>ds us with<br />

a further challenge going f<strong>or</strong>ward as we refi ne its use on smart phones.”<br />

F<strong>or</strong> m<strong>or</strong>e inf<strong>or</strong>m<strong>at</strong>ion <strong>co</strong>ntact Trac-Tech, 0861 100 199,<br />

info@trac-tech.<strong>co</strong>.<strong>za</strong>, www.trac-tech.<strong>co</strong>.<strong>za</strong>.<br />

www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 111


PRODUCT UPDATE<br />

A new approach to people management<br />

Industrial, petrochemical, manufacturing and mining oper<strong>at</strong>ions globally<br />

are facing increasing pressure to strictly apply and <strong>co</strong>mply with a myriad<br />

of policies with regards to health and safety and monit<strong>or</strong>ing of individuals,<br />

as well as service providers’ <strong>co</strong>mpliance, time and exposure on-site.<br />

Zero harm initi<strong>at</strong>ives and standardis<strong>at</strong>ion of <strong>co</strong>mpany policy across<br />

all oper<strong>at</strong>ions are key internal drivers while increasing st<strong>at</strong>ut<strong>or</strong>y requirements<br />

are placing a larger focus and onus on <strong>or</strong>ganis<strong>at</strong>ions to ac<strong>co</strong>unt<br />

to external legisl<strong>at</strong><strong>or</strong>s and industry regul<strong>at</strong><strong>or</strong>s.<br />

This has resulted in an increased direct <strong>co</strong>st of <strong>co</strong>mpliance as additional<br />

resources and systems are put in place. In many cases the impact<br />

of indirect <strong>co</strong>sts resulting from additional fees charged by <strong>co</strong>ntract<strong>or</strong>s<br />

and vend<strong>or</strong>s to meet enhanced <strong>co</strong>mpliance requirements is signifi cant.<br />

This tension between enf<strong>or</strong>cement of best practice safety policies and<br />

increased pressure to oper<strong>at</strong>e in a <strong>co</strong>mpetitive and <strong>co</strong>st eff ective manner is<br />

a perfect environment f<strong>or</strong> <strong>co</strong>mpanies to re-assess their approach to <strong>co</strong>mpliance<br />

enf<strong>or</strong>cement and reduce the risks associ<strong>at</strong>ed with non-<strong>co</strong>mpliance.<br />

Moving beyond security<br />

<strong>co</strong>mpliance<br />

With the focus on governance, risk,<br />

and <strong>co</strong>mpliance (GRC), all aspects<br />

of an <strong>or</strong>ganis<strong>at</strong>ion are directly <strong>or</strong><br />

indirectly impacted by any heightened<br />

security policies and procedures.<br />

These new business requirements<br />

demand th<strong>at</strong> non-security<br />

functions (HR / IT / fi nance / facility<br />

/ wellness and even production,<br />

logistics, etc.) be<strong>co</strong>me directly<br />

ac<strong>co</strong>untable f<strong>or</strong> identity management<br />

and policy enf<strong>or</strong>cement on<br />

site. Ownership of source d<strong>at</strong>a<br />

Figure 1.<br />

input, f<strong>or</strong> example:<br />

• Physical security systems th<strong>at</strong> are<br />

seamlessly provisioned from HR system d<strong>at</strong>a.<br />

• Logical security to w<strong>or</strong>k areas th<strong>at</strong> are driven by a w<strong>or</strong>kfl ow approval<br />

process has eff ectively transferred ac<strong>co</strong>untability from the security<br />

function to whoever is ac<strong>co</strong>untable f<strong>or</strong> the relevant business process<br />

and mand<strong>at</strong>ed f<strong>or</strong> the <strong>co</strong>rrect capture of the source d<strong>at</strong>a.<br />

Streamlined business processes and deployment of technology can be<br />

used as an enabler to streamline the administr<strong>at</strong>ion of policy, but the real<br />

value and challenge exists in the cre<strong>at</strong>ion of a holistic view of all people and<br />

rel<strong>at</strong>ed assets interacting on your sites. Traditional security functions and use<br />

of manned guard services in <strong>co</strong>njunction with electronic security solutions<br />

still plays a vital part in an integr<strong>at</strong>ed people management solution (IPMS)<br />

but, with all business processes around security being streamlined and<br />

manual processes autom<strong>at</strong>ed, these resources can be focused and vigilant as<br />

all mundane, labour intensive functions are autom<strong>at</strong>ed.<br />

Towards enhanced <strong>co</strong>mpliance<br />

A sustainable <strong>co</strong>mpliance solution is 90% to do with proper up-front<br />

blueprinting, systems integr<strong>at</strong>ion and process optimis<strong>at</strong>ion and 10% about<br />

implementing a PAC Solution / new technology. Knowledge is the key. This<br />

doesn’t necessarily mean be<strong>co</strong>ming a subject m<strong>at</strong>ter expert on integr<strong>at</strong>ed<br />

security solutions, but of vital imp<strong>or</strong>tance is to understand the business<br />

requirements and unique needs of the various individual stakeholders in<br />

112 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

your <strong>or</strong>ganis<strong>at</strong>ion and be able to transl<strong>at</strong>e th<strong>at</strong> into meaningful output<br />

during a facilit<strong>at</strong>ed Blueprinting process.<br />

Key to success is to partner with a <strong>co</strong>mpany / systems integr<strong>at</strong><strong>or</strong> th<strong>at</strong><br />

adds value to your business processes and facilit<strong>at</strong>es delivery of the process<br />

using technology as an enabler. This is far m<strong>or</strong>e preferable to a <strong>co</strong>mpany<br />

promulg<strong>at</strong>ing technology (fe<strong>at</strong>ures and benefi ts) to solve people rel<strong>at</strong>ed<br />

process issues. The focus should be on <strong>co</strong>nsider<strong>at</strong>ion of all aspects and<br />

eff ected stakeholders with regards to <strong>co</strong>mpliance and a full understanding<br />

of the technical and functional requirements th<strong>at</strong> any technology selection<br />

(whether modernising existing <strong>or</strong> replacing with new) will need to fulfi l.<br />

Dynamic impact of various inputs<br />

InnoVIZION’s iPfuzion Framew<strong>or</strong>k (Figure 1) highlights the impact of<br />

various systems and people types on an integr<strong>at</strong>ed access <strong>co</strong>ntrol<br />

framew<strong>or</strong>k. A framew<strong>or</strong>k approach enables <strong>or</strong>ganis<strong>at</strong>ions to eff ectively<br />

manage <strong>co</strong>mpliance by elimin<strong>at</strong>ing silos of d<strong>at</strong>a and utilising people<br />

inf<strong>or</strong>m<strong>at</strong>ion to integr<strong>at</strong>e and<br />

streamline business processes<br />

whilst providing a single view<br />

of multiple people types.<br />

Integr<strong>at</strong>ion and technology<br />

are key enablers f<strong>or</strong> change<br />

towards autom<strong>at</strong>ion, whilst<br />

business process optimis<strong>at</strong>ion<br />

(BPO) is the key value<br />

driver f<strong>or</strong> businesses looking<br />

towards integr<strong>at</strong>ed solutions<br />

th<strong>at</strong> enhance productivity and<br />

autom<strong>at</strong>e manual and regul<strong>at</strong><strong>or</strong>y<br />

processes.<br />

innoVIZION’s People Fuzion<br />

proprietary software solution<br />

is a single pl<strong>at</strong>f<strong>or</strong>m, process<br />

driven, Web framew<strong>or</strong>k th<strong>at</strong><br />

seamlessly integr<strong>at</strong>es to your business systems:<br />

• seamlessly manage d<strong>at</strong>a and integr<strong>at</strong>es multiple systems;<br />

• makes use of your physical access <strong>co</strong>ntrol (PAC) system to enable your<br />

<strong>or</strong>ganis<strong>at</strong>ion to eff ectively manage people processes;<br />

• provides a single holistic view of multiple people types (visit<strong>or</strong>s /<br />

<strong>co</strong>ntract<strong>or</strong>s / vend<strong>or</strong>s / employees, students, parents, etc.) and asset<br />

types (vehicles / laptops / PPE / valuable Items / issued equipment etc.)<br />

within an <strong>or</strong>ganis<strong>at</strong>ion.<br />

Key fe<strong>at</strong>ures<br />

• Increased return on investment / benefi t realis<strong>at</strong>ion – leverage on all<br />

your existing and future technology investments.<br />

• Single <strong>co</strong>mmon user interface / front-end f<strong>or</strong> all interactions irrespective<br />

of technology utilised.<br />

• Single integr<strong>at</strong>ion point – to business management systems and all<br />

other systems linked to access <strong>co</strong>ntrol / time and <strong>at</strong>tendance / digital<br />

surveillance / building management systems, etc.<br />

• Applied intelligence – policies and legisl<strong>at</strong>ion autom<strong>at</strong>ically enf<strong>or</strong>ced<br />

from multiple d<strong>at</strong>a sources (Medicals / Training / Inductions /<br />

Licences, etc.).<br />

• Simplifi es management of people and assets – provides a single view<br />

of all people types and assets <strong>or</strong> equipment linked to them.


• Contract<strong>or</strong> management<br />

including:<br />

° Dashboards (with<br />

trends and live<br />

drill-down of<br />

<strong>at</strong>tendance).<br />

° Attendance<br />

re<strong>co</strong>rding.<br />

° Departmental scheduling<br />

and loc<strong>at</strong>ion<br />

<strong>co</strong>sting f<strong>or</strong> <strong>co</strong>ntract<strong>or</strong>s.<br />

° Costing of all <strong>co</strong>ntract<strong>or</strong><br />

hours to <strong>co</strong>rrect departments<br />

/ <strong>co</strong>st centres.<br />

° Detailed Time / Activity hours rep<strong>or</strong>ts.<br />

° Head<strong>co</strong>unt Management Widget (displays live<br />

d<strong>at</strong>a on managers’ desktops with regards to<br />

<strong>at</strong>tendance of Students, Staff and Contract<strong>or</strong>s).<br />

• Web rep<strong>or</strong>ting th<strong>at</strong> gives you <strong>co</strong>ntrol over all<br />

the people movement in your <strong>or</strong>ganis<strong>at</strong>ion.<br />

• Real-time messaging – is a smart messaging<br />

service th<strong>at</strong> monit<strong>or</strong>s multiple access <strong>co</strong>ntrol<br />

transactions / events in real-time from any<br />

access <strong>co</strong>ntrol system <strong>or</strong> directly from access<br />

<strong>co</strong>ntrol hardware.<br />

• Reception management.<br />

• Allows detailed real-time <strong>co</strong>ntrol over people<br />

activities, access valid<strong>at</strong>ion, movement and any<br />

processes th<strong>at</strong> people interact with.<br />

• Facilit<strong>at</strong>es phased implement<strong>at</strong>ions <strong>or</strong> roll-outs<br />

of new technology.<br />

• Scalable – future technology inclusion.<br />

The need of the industrial, petrochemical,<br />

manufacturing and mining industry f<strong>or</strong> security<br />

technology to positively impact<br />

on their oper<strong>at</strong>ions and reduce<br />

risk is unquestionable.<br />

The unique challenges<br />

presented in these<br />

environments from harsh<br />

environments to legisl<strong>at</strong>ive<br />

<strong>co</strong>mpliance require<br />

<strong>co</strong>mprehensive <strong>co</strong>mpliance,<br />

security and safety<br />

solutions.<br />

Integr<strong>at</strong>ion of identity<br />

and security management<br />

to deliver on <strong>co</strong>mpliance enf<strong>or</strong>cement<br />

is inevitable. This, together with rising<br />

<strong>co</strong>mpliance enf<strong>or</strong>cement requirements cre<strong>at</strong>e<br />

an opp<strong>or</strong>tunity f<strong>or</strong> enterprises to gain a <strong>co</strong>mpetitive<br />

advantage and streamline oper<strong>at</strong>ions<br />

through the implement<strong>at</strong>ion of a <strong>co</strong>mpliance<br />

enf<strong>or</strong>cement framew<strong>or</strong>k.<br />

Companies th<strong>at</strong> re<strong>co</strong>gnise this reality soon<br />

and address current gaps in business processes<br />

and dispar<strong>at</strong>e silos of inf<strong>or</strong>m<strong>at</strong>ion can utilise<br />

existing / new physical access <strong>co</strong>ntrol solutions<br />

to signifi cantly improve <strong>co</strong>mpliance and<br />

increase safety in oper<strong>at</strong>ions. Removal of any<br />

human intervention (and often subsequent dangerous<br />

practices) in the applic<strong>at</strong>ion of policies<br />

and rules regarding HSE can have a signifi cant<br />

eff ect on zero harm initi<strong>at</strong>ives.<br />

F<strong>or</strong> m<strong>or</strong>e inf<strong>or</strong>m<strong>at</strong>ion <strong>co</strong>ntact Innovizion,<br />

0861 849 466, info@innovizion.<strong>co</strong>.<strong>za</strong>,<br />

www.innovizion.<strong>co</strong>.<strong>za</strong><br />

www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 113


PRODUCT UPDATE<br />

The ProxNet 647-50<br />

fi ngerprint reader<br />

Unf<strong>or</strong>tun<strong>at</strong>ely it’s not just criminals on the outside who thre<strong>at</strong>en the<br />

security and prosperity of businesses – the deceitful within can also<br />

have a devast<strong>at</strong>ing eff ect on profi ts.<br />

So says Valerie Bingham, product manager f<strong>or</strong> Elvey Security<br />

Technologies, which supplies a range of access <strong>co</strong>ntrol products.<br />

Among these is the fi ngerprint reader and specifi cally the ProxNet<br />

647-50 from GSC Systems, which is being used with <strong>co</strong>nsiderable<br />

success to prevent unauth<strong>or</strong>ised access to premises, to stop buddy<br />

clocking and to safeguard valuables.<br />

Since fi ngerprint identifi c<strong>at</strong>ion began its transition to autom<strong>at</strong>ion<br />

in the l<strong>at</strong>e 1960s, governments, mines, petrochemical plants (SASOL),<br />

refi neries, priv<strong>at</strong>e manufacturing <strong>co</strong>ncerns and educ<strong>at</strong>ional facilities,<br />

have increasingly embraced the technology to ensure the protection<br />

of their people and assets.<br />

Not only is it used to keep trespassers off the premises, it is also key<br />

to <strong>co</strong>ntrolling the movement of staff members within the buildings,<br />

says Bingham. “An access <strong>co</strong>ntrol system allows security managers to<br />

restrict <strong>or</strong> grant admittance to specifi ed areas such as those <strong>co</strong>ntaining<br />

classifi ed inf<strong>or</strong>m<strong>at</strong>ion, dangerous equipment <strong>or</strong> valuables. In the event<br />

of a breach <strong>or</strong> incident, security managers can pull full rep<strong>or</strong>ts on<br />

everyone who has entered <strong>or</strong> left the protected site and in so doing,<br />

take the appropri<strong>at</strong>e <strong>co</strong>rrective action.”<br />

With this in mind, she readily re<strong>co</strong>mmends GSC System’s ProxNet<br />

647-50 fi ngerprint reader. The 647-50, which requires a separ<strong>at</strong>e <strong>co</strong>nnection<br />

f<strong>or</strong> the templ<strong>at</strong>e management with the link being either the<br />

RS-232 <strong>or</strong> the RS-485, runs on a Windows (2000 /XP /Vista /Windows7)<br />

oper<strong>at</strong>ing system, though not necessarily on the <strong>co</strong>mputer th<strong>at</strong> runs<br />

the ProxNet system.<br />

One of its <strong>at</strong>tributes is th<strong>at</strong> it allows templ<strong>at</strong>es cre<strong>at</strong>ed and used<br />

on one unit to be transferred in their entirety <strong>or</strong> selectively uploaded<br />

to other units on the netw<strong>or</strong>k, thereby making it possible to grant<br />

restricted access to specifi ed personnel. The number of users th<strong>at</strong> can<br />

be st<strong>or</strong>ed depends on the number of templ<strong>at</strong>es enrolled per user.<br />

Hands-on <strong>at</strong>tendance<br />

Biometric terminals like the new HandPunch GT400 from Uniclox will<br />

prevent fraud from buddy clocking. While fi ngerprint terminals are<br />

popular in <strong>co</strong>mmercial applic<strong>at</strong>ions, many industrial <strong>co</strong>mpanies fi nd<br />

th<strong>at</strong> hand geometry is faster and m<strong>or</strong>e <strong>co</strong>nsistent because it is unaffected<br />

by dirt, paint, oil <strong>or</strong> damage to the fi ngertips.<br />

“Instead of punching manual <strong>or</strong> electronic timecards, employees<br />

simply enter their number and place their hand on the pl<strong>at</strong>en of<br />

the HandPunch terminal. It autom<strong>at</strong>ically takes a three-dimensional<br />

reading of the size and shape of the hand and verifi es the user’s<br />

identity in less than one se<strong>co</strong>nd,” explains Peter Noppe, MD of Uniclox<br />

Technologies.<br />

Customers can set up programmable function keys with specifi c<br />

software to cre<strong>at</strong>e valid<strong>at</strong>ion tables, multi-level promptings <strong>or</strong> menus<br />

th<strong>at</strong> meet specifi c requirements. There is also a built-in relay f<strong>or</strong> ringing<br />

a bell <strong>or</strong> locking a do<strong>or</strong> on certain hardware models.<br />

Uniclox Vision is a time and <strong>at</strong>tendance system th<strong>at</strong> improves<br />

employee time tracking, scheduling and rep<strong>or</strong>ting. Vision provides<br />

advanced fe<strong>at</strong>ures f<strong>or</strong> managing labour d<strong>at</strong>a with pay rules, scheduling,<br />

tracking <strong>at</strong>tendance and disciplinary events, and maintains basic<br />

HR re<strong>co</strong>rds. It achieves this while meeting the scalability, reliability and<br />

114 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

Next gener<strong>at</strong>ion time<br />

and <strong>at</strong>tendance<br />

Brand New Technologies (BNTech) has introduced Avalon Biometrics<br />

ID2GO product, a biometric time and <strong>at</strong>tendance solution f<strong>or</strong> fi xed and<br />

mobile use.<br />

“ID2GO is a software solution th<strong>at</strong> can be installed on a fi xed<br />

machine <strong>or</strong> on a mobile Android device, eff ectively turning the Android<br />

phone <strong>or</strong> tablet into a mobile identity verifi c<strong>at</strong>ion terminal. It is easy to<br />

use, install and integr<strong>at</strong>e,” explains Dave Crawshay-Hall, CTO f<strong>or</strong> BNTech.<br />

“The product is suitable f<strong>or</strong> environments where personnel are loc<strong>at</strong>ed<br />

remotely but still need to be logged into the systems f<strong>or</strong> time and <strong>at</strong>tendance<br />

purposes. In fact, we have already had enquiries from game farms<br />

where guards loc<strong>at</strong>ed <strong>at</strong> peripheral g<strong>at</strong>es need to be ac<strong>co</strong>unted f<strong>or</strong>.”<br />

In essence, the ID2GO Attendance solution is a <strong>co</strong>mplete persons<br />

register with an integr<strong>at</strong>ed AFIS, capable of st<strong>or</strong>ing and identifying an<br />

unlimited number of persons, but <strong>co</strong>mbined with a biometrics white<br />

list of enrolled persons. ID2GO off ers photo and fi ngerprint capture<br />

and verifi c<strong>at</strong>ion, unlimited number of users and many other fe<strong>at</strong>ures<br />

th<strong>at</strong> make it the ‘next gener<strong>at</strong>ion’ T&A solution. It is able to perf<strong>or</strong>m<br />

rapid positive identifi c<strong>at</strong>ion of individuals, ensuring only auth<strong>or</strong>ised<br />

access to premises, netw<strong>or</strong>ks and install<strong>at</strong>ions. The logging of each<br />

identifi c<strong>at</strong>ion also provides a transparent audit trail mitig<strong>at</strong>ing fraud<br />

and unauth<strong>or</strong>ised access.<br />

Other key fe<strong>at</strong>ures include:<br />

• Rapid AFIS identifi c<strong>at</strong>ion<br />

• Attendance check<br />

• Duplic<strong>at</strong>e check<br />

• Biometric enrolment<br />

• Unique ID number f<strong>or</strong> each re<strong>co</strong>rd cre<strong>at</strong>ed<br />

• Structured person register<br />

• ANSI/MIST fi le exp<strong>or</strong>t<br />

• Audit log<br />

F<strong>or</strong> m<strong>or</strong>e inf<strong>or</strong>m<strong>at</strong>ion <strong>co</strong>ntact Brand New Technologies,<br />

+27 (0)11 450 3088, dave@bntech.<strong>co</strong>.<strong>za</strong>.<br />

security requirements of even<br />

the largest <strong>or</strong>ganis<strong>at</strong>ions.<br />

Designed and developed in n<br />

South Africa to suit local <strong>co</strong>ndi-<br />

tions and labour legisl<strong>at</strong>ion,<br />

Vision is suitable f<strong>or</strong> all types of f<br />

<strong>or</strong>ganis<strong>at</strong>ions, from mid-sized<br />

businesses right up to large<br />

industrial <strong>co</strong>mpanies with<br />

<strong>co</strong>mplex shifts and schedules.<br />

Vision can be integr<strong>at</strong>ed<br />

with popular payroll<br />

packages and Uniclox is a<br />

Certifi ed Business Partner<br />

with Softline, which sells VIP<br />

and Pastel payroll and ac<strong>co</strong>unt-<br />

ing Software.<br />

F<strong>or</strong> m<strong>or</strong>e inf<strong>or</strong>m<strong>at</strong>ion <strong>co</strong>ntact Uniclox Technologies,<br />

+27 (0)11 439 2000, info@uniclox.<strong>co</strong>.<strong>za</strong>, www.uniclox.<strong>co</strong>.<strong>za</strong>.


IP to the do<strong>or</strong><br />

The T24 IP Video Do<strong>or</strong> St<strong>at</strong>ion is a video do<strong>or</strong> inter<strong>co</strong>m, with a recently<br />

released RFID access module (keypad), the Security Do<strong>or</strong> Opener and<br />

the two-wire netw<strong>or</strong>k module (Mx2wire info module). The new IP telephony<br />

standard enables the user to establish a direct <strong>co</strong>nnection from<br />

the Do<strong>or</strong> St<strong>at</strong>ion to any VoIP phone <strong>or</strong> any <strong>co</strong>mputer <strong>or</strong> smartphone<br />

running VoIP software. This means th<strong>at</strong> with appropri<strong>at</strong>e netw<strong>or</strong>k<br />

infrastructure, the user can establish a video <strong>co</strong>nnection, remotely<br />

open do<strong>or</strong>s <strong>or</strong> view st<strong>or</strong>ed video messages and review re<strong>co</strong>rdings<br />

from anywhere in the w<strong>or</strong>ld.<br />

Mobotix`hemispheric camera technology enables the user to<br />

view the entire area in front of the building in the video. This means<br />

th<strong>at</strong> the image section can always be focused on any area of interest,<br />

regardless of the distance between the Do<strong>or</strong> St<strong>at</strong>ion and the do<strong>or</strong><br />

itself. The image is tilted and zoomed electronically without any<br />

mechanical movement, meaning th<strong>at</strong> there is no wear and tear to<br />

the camera and no maintenance is required. In addition, the system<br />

allows users to return to the re<strong>co</strong>rding <strong>at</strong> a l<strong>at</strong>er time and view<br />

all areas of the video, all the way down to the fl o<strong>or</strong> in front of the<br />

camera – even if the video <strong>at</strong> the time of the actual re<strong>co</strong>rding was<br />

focused on the visit<strong>or</strong>’s face.<br />

The Do<strong>or</strong> St<strong>at</strong>ion can be accessed from anywhere in the w<strong>or</strong>ld,<br />

as the IP telephone <strong>co</strong>nnection is established autom<strong>at</strong>ically via the<br />

netw<strong>or</strong>k. This means th<strong>at</strong> central <strong>co</strong>ntrol units and <strong>co</strong>mputers are not<br />

required f<strong>or</strong> oper<strong>at</strong>ion. The Do<strong>or</strong> St<strong>at</strong>ion <strong>co</strong>nsumes very little power<br />

(around fi ve w<strong>at</strong>t-hours), which is provided directly via the Ethernet<br />

cable. The autom<strong>at</strong>ic install<strong>at</strong>ion enables the user to set up the system<br />

quickly and easily without the need f<strong>or</strong> extensive netw<strong>or</strong>k knowledge.<br />

All d<strong>at</strong>a transmissions to and between the modules are encrypted and<br />

the access rights are st<strong>or</strong>ed and checked from a secure loc<strong>at</strong>ion indo<strong>or</strong>s.<br />

Even in the case of a <strong>co</strong>mplete power failure, the RFID access module – in<br />

<strong>co</strong>nnection with the rechargeable b<strong>at</strong>tery of the Security Do<strong>or</strong> Opener<br />

– ensures up to 60 hours of keyless access. As standard, the individual<br />

modules of the Do<strong>or</strong> St<strong>at</strong>ion are equipped with electromagnetic anti-theft<br />

protection to secure them against unauth<strong>or</strong>ised removal.<br />

The RFID access module enables keyless access using a card transponder<br />

<strong>or</strong> by entering a PIN number. Access requests are encrypted<br />

and transferred to the Security Do<strong>or</strong> Opener via a two-wire cable and<br />

once the access request is cleared, the do<strong>or</strong> opens. M<strong>or</strong>eover, visit<strong>or</strong>s<br />

can leave their own messages <strong>or</strong> view video messages th<strong>at</strong> were left<br />

f<strong>or</strong> them.<br />

The Security Do<strong>or</strong> Opener <strong>co</strong>ntains all PIN numbers, transponder<br />

d<strong>at</strong>a and access times f<strong>or</strong> opening the do<strong>or</strong>. Since this module is<br />

installed indo<strong>or</strong>s and no relevant access d<strong>at</strong>a is st<strong>or</strong>ed outdo<strong>or</strong>s, the<br />

Do<strong>or</strong> St<strong>at</strong>ion is secure against theft and manipul<strong>at</strong>ion. In addition,<br />

the module functions as a do<strong>or</strong>bell and the user can select from a<br />

wide range of diff erent ring tones. It is not necessary to <strong>co</strong>nnect an<br />

extra power source to oper<strong>at</strong>e the electrical do<strong>or</strong> opening and closing<br />

mechanism, because the Security Do<strong>or</strong> Opener gener<strong>at</strong>es the<br />

required voltage with its integr<strong>at</strong>ed rechargeable b<strong>at</strong>tery.<br />

The two-wire netw<strong>or</strong>k module, an illumin<strong>at</strong>ed do<strong>or</strong> sign th<strong>at</strong> can<br />

replace the simple info module of the Do<strong>or</strong> St<strong>at</strong>ion, supplies power to<br />

the module and establishes the netw<strong>or</strong>k <strong>co</strong>nnection via two standard<br />

bell wires. This way, the st<strong>at</strong>ion can be integr<strong>at</strong>ed in any older building,<br />

either as an on-wall <strong>or</strong> in-wall version.<br />

F<strong>or</strong> m<strong>or</strong>e inf<strong>or</strong>m<strong>at</strong>ion <strong>co</strong>ntact IAC, +27 (0)12 657 3600,<br />

raine@ia<strong>co</strong>ntrol.<strong>co</strong>.<strong>za</strong>, www.ia<strong>co</strong>nline.<strong>co</strong>.<strong>za</strong>.<br />

www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013 115


THE BACK PAGE<br />

Is th<strong>at</strong> you, darling?<br />

Polonius.<br />

You haven’t made a sound, you are in total darkness, and yet your ethereal<br />

presence is <strong>co</strong>nfronted by the most f<strong>or</strong>midable challenge-response system<br />

known to mankind.<br />

I have often wondered wh<strong>at</strong> the fuss is about identity and identifi c<strong>at</strong>ion.<br />

When you were a boy, no m<strong>at</strong>ter in wh<strong>at</strong> ‘av<strong>at</strong>ar’ you returned home,<br />

your mom not only re<strong>co</strong>gnised you instantly, but carried the paradigm<br />

of face re<strong>co</strong>gnition to m<strong>or</strong>e exalted heights. She even knew with the<br />

most un-Heisenberg-like certainty, whether you had taken a shy <strong>at</strong> the<br />

window-pane down the lane and not missed, hissed <strong>at</strong> your teacher and<br />

got a note in your diary, <strong>or</strong> someone else was about to dis<strong>co</strong>ver wh<strong>at</strong>ever<br />

happened to their c<strong>at</strong> in the neighbourhood.<br />

They should actually get moms to write the software f<strong>or</strong> identity<br />

management. F<strong>or</strong> example, if they <strong>co</strong>uld extend their expertise to <strong>co</strong>mpany<br />

employees, the most perplexing <strong>co</strong>rp<strong>or</strong><strong>at</strong>e problems of the day<br />

would probably disappear. With the face re<strong>co</strong>gnition would <strong>co</strong>me the<br />

additional routines to know if the boss was in a surly mood, <strong>or</strong> your sales<br />

person has already thought up the most wonderful st<strong>or</strong>y about why<br />

the sales didn’t happen, <strong>or</strong> the cashier has decided th<strong>at</strong> s/he has had<br />

enough of w<strong>or</strong>king class penury and will put a hand in the till this m<strong>or</strong>ning,<br />

then be off to the Durban July to bet it all on Raspberry Princess.<br />

After the killing has been made, the <strong>or</strong>iginal sum would be returned, of<br />

<strong>co</strong>urse. Whichever way, moms <strong>co</strong>uld help <strong>co</strong>mpanies save millions.<br />

A camera <strong>co</strong>uld even be installed in the meeting room and a little<br />

old-fashioned tweet <strong>co</strong>uld go off every time one of the trusted <strong>co</strong>mpany<br />

boys told a little lie, so wh<strong>at</strong> if it was meant to save their indef<strong>at</strong>igable<br />

<strong>co</strong>rp<strong>or</strong><strong>at</strong>e skins, <strong>or</strong> even improve their chances f<strong>or</strong> th<strong>at</strong> richly deserved<br />

fabulous promotion. Oh, this one would be easy f<strong>or</strong> the moms, especially<br />

if they had to <strong>co</strong>de them in languages with names like Visual C++.<br />

And, we are not talking voice re<strong>co</strong>gnition yet.<br />

Tele<strong>co</strong>mmunic<strong>at</strong>ion equipment is usually designed f<strong>or</strong> 8 k MHz. They<br />

say judges and the f<strong>or</strong>ensic experts can be sure of culprits if voices are<br />

re<strong>co</strong>rded <strong>at</strong> 16 k. However, moms already use 64 k. Imagine your bank’s<br />

call centre. Along with your request, “can I know my bank balance, please?”<br />

116 Access & Identity Management Handbook 2013 www.securitysa.<strong>co</strong>m<br />

Mummy’s voice re<strong>co</strong>gnition system would already know if now, a check<br />

would be made out to your favourite church charity, <strong>or</strong> spent on some<br />

dire household necessities, <strong>or</strong> f<strong>or</strong> a weekend with the mistress. If such<br />

things <strong>co</strong>uld be known in advance, especially by a spouse, (though they<br />

know it, actually, but don’t tell) the w<strong>or</strong>ld would indeed be a better place.<br />

Terr<strong>or</strong>ists wouldn’t stand a chance, if only moms ‘manned’ the airp<strong>or</strong>t<br />

security g<strong>at</strong>es and the CCTV cameras <strong>at</strong> public places. Imagine the <strong>co</strong>nvers<strong>at</strong>ion<br />

in the backroom – one mom to another – when they dis<strong>co</strong>ver<br />

the guy carrying the bombs on his body. “Oh my Jake would never have<br />

his eyeballs so close, even if the <strong>co</strong>nstip<strong>at</strong>ion was severe.” Imagine this<br />

<strong>co</strong>uld save the w<strong>or</strong>ld one day.<br />

They would even do better <strong>at</strong> the scene of crime than present-day<br />

f<strong>or</strong>ensic experts. From the expressions on the face of the <strong>co</strong>rpse, they<br />

would know if it was a jealous partner, a greedy and imp<strong>at</strong>ient family<br />

member, the butler <strong>or</strong> a <strong>co</strong>mplete stranger.<br />

Large multi-million dollar fi ngerprint bureaux and even identity kits<br />

th<strong>at</strong> f<strong>or</strong>ensic artists use to re-<strong>co</strong>nstruct the face of criminals from eyewitness<br />

ac<strong>co</strong>unts would be<strong>co</strong>me obsolete. They would be able to tell who’s<br />

not ‘dunit’ simply by looking <strong>at</strong> a scene of crime and telling the teacher<br />

– my Jake would never do such a thing.<br />

But then, moms are m<strong>or</strong>e than a m<strong>at</strong>ch f<strong>or</strong> the spouse, something<br />

you dis<strong>co</strong>ver on your fi rst l<strong>at</strong>e night out with the boys after moving in<br />

together. You don’t even drive all the way up to the garage. You turn<br />

the key in the lock without a click and tip-toe up the stairs. You haven’t<br />

made a sound, you are in total darkness, and yet your ethereal presence<br />

is <strong>co</strong>nfronted by the most f<strong>or</strong>midable challenge-response system known<br />

to mankind, the deceptively simple query, “Is th<strong>at</strong> you, darling?”<br />

Polonius, when not appearing in Shakespeare’s Hamlet, is a Hi-Tech<br />

Security Solutions’ writer who prefers th<strong>at</strong> his wife doesn’t know about it.


* denotes advertiser<br />

QUICKFIND<br />

Company Telephone E-mail Website Page<br />

Accsys 0861 ACCSYS pr@jhb.accsys.<strong>co</strong>.<strong>za</strong> www.accsys.<strong>co</strong>.<strong>za</strong> 93*<br />

ADI Global Distribution 0860 22 55 23 adelaide.tayl<strong>or</strong>@adiglobal.<strong>co</strong>m www.adiglobal.<strong>co</strong>m/<strong>za</strong> 31*<br />

Becker Mining South Africa +27 (0)11 617 6300 info@<strong>za</strong>.becker-mining.<strong>co</strong>m www.<strong>za</strong>.becker-mining.<strong>co</strong>m 64*<br />

Bosch Security Systems +27 (0)11 651 9838 christine.smit@<strong>za</strong>.bosch.<strong>co</strong>m www.boschsecurity.<strong>co</strong>.<strong>za</strong> 12,13<br />

Brand New Technologies +27 (0)11 450 3088 dave@bntech.<strong>co</strong>.<strong>za</strong> www.bntech.<strong>co</strong>.<strong>za</strong> 95*,114<br />

Business Connexion +27 (0)11 266 5287 mark.stoop@bcx.<strong>co</strong>.<strong>za</strong> www.bcx.<strong>co</strong>.<strong>za</strong> 29*,89<br />

CA Southern Africa +27 (0)11 417 8645 joanne.cawrse@caafrica.<strong>co</strong>.<strong>za</strong> www.caafrica.<strong>co</strong>.<strong>za</strong> 38<br />

Card Control Systems +27 (0)11 907 3192 info@card<strong>co</strong>n.<strong>co</strong>.<strong>za</strong> www.card<strong>co</strong>ntrolsystems.<strong>co</strong>.<strong>za</strong> 113*<br />

CEM Systems +44 28 9045 6767 cem.info@ty<strong>co</strong>int.<strong>co</strong>m www.cemsys.<strong>co</strong>m 7*<br />

Clearline +27 (0)11 848 1100 info@clearline.<strong>co</strong>.<strong>za</strong> www.clearline.<strong>co</strong>.<strong>za</strong> 17*<br />

Comb Communic<strong>at</strong>ions +27 (0)11 089 <strong>5800</strong> sales@<strong>co</strong>mb-<strong>co</strong>mmunic<strong>at</strong>ions.<strong>co</strong>m www.<strong>co</strong>mb-<strong>co</strong>mmunic<strong>at</strong>ions.<strong>co</strong>m 25*<br />

Controlsoft Security +27 (0)11 792 2778 africasales@<strong>co</strong>ntrolsoftsecurity.<strong>co</strong>m www.<strong>co</strong>ntrolsoftsecurity.<strong>co</strong>m 26*<br />

EasyRoster +27 (0)12 809 4270 info@easyroster.net www.easyroster.net 80,82*,83<br />

Elvey Security Technologies +27 (0)11 401 6700 tasha.smith@elvey.<strong>co</strong>.<strong>za</strong> www.elvey.<strong>co</strong>.<strong>za</strong> 44*,87*<br />

EOH Intelligent Infrastructure 0861 500 500 sales.ii@eoh.<strong>co</strong>.<strong>za</strong> www.eohii.<strong>co</strong>.<strong>za</strong> 76,79*<br />

Flow Systems Manufacturers +27 (0)11 762 2453 info@fl owsystems.<strong>co</strong>.<strong>za</strong> www.fl owsystems.<strong>co</strong>.<strong>za</strong> 97*<br />

Gallagher +27 (0)11 974 4740 lyn.dupreez@gallagher.<strong>co</strong> www.gallagher.<strong>co</strong> 94<br />

GSC Systems +27 (0)21 712 5130 erich@gsc.<strong>co</strong>.<strong>za</strong> www.gscsystems.<strong>co</strong>m 37*<br />

HAB Intern<strong>at</strong>ional Fire & Security +27 (0)11 314 7066 security@hab.<strong>co</strong>.<strong>za</strong> www.hab.<strong>co</strong>.<strong>za</strong> 115*<br />

HID Global +44 1440 714 840 brabasse@hidglobal.<strong>co</strong>m www.hidglobal.<strong>co</strong>m 41*<br />

HID Global +27 (0)82 449 9398 rtruter@hidglobal.<strong>co</strong>m www.hidglobal.<strong>co</strong>m 42,43,108<br />

IAC +27 (0)12 657 3600 raine@ia<strong>co</strong>ntrol.<strong>co</strong>.<strong>za</strong> www.ia<strong>co</strong>nline.<strong>co</strong>.<strong>za</strong> 115<br />

Ide<strong>co</strong> Biometric Security Solutions 0861 043 326 <strong>co</strong>ntact@ide<strong>co</strong>.<strong>co</strong>.<strong>za</strong> www.ide<strong>co</strong>.<strong>co</strong>.<strong>za</strong> 1*,19*,21*,<br />

Impro Technologies 08600 46776 www.impro.net OBC*<br />

F<strong>or</strong> m<strong>or</strong>e inf<strong>or</strong>m<strong>at</strong>ion on these and other suppliers please see www.hsbd.<strong>co</strong>.<strong>za</strong><br />

www.securitysa.<strong>co</strong>m Access & Identity Management Handbook 2013<br />

26*,29*,31*<br />

innoVIZION 0861 849 466 sales@innovizion.<strong>co</strong>.<strong>za</strong> www.innovizion.<strong>co</strong>.<strong>za</strong> IFC*,112,113<br />

IP Security Solutions +27 (0)11 553 3300 info@ipsecuritysolutions.<strong>co</strong>.<strong>za</strong> www.ipsecuritysolutions.<strong>co</strong>.<strong>za</strong> 85*<br />

Jas<strong>co</strong> Security Solutions +27 (0)11 894 7127 sales@multivid.<strong>co</strong>.<strong>za</strong> www.jas<strong>co</strong>.<strong>co</strong>.<strong>za</strong> 81*,84<br />

M<strong>or</strong>pho SA +27 (0)11 286 <strong>5800</strong> ni<strong>co</strong>las.garcia@m<strong>or</strong>pho.<strong>co</strong>m www.m<strong>or</strong>pho.<strong>co</strong>m 20<br />

Mustek Security Technologies +27 (0)11 237 1364 sergiop@mustek.<strong>co</strong>.<strong>za</strong> www.mustek.<strong>co</strong>.<strong>za</strong> 6<br />

N<strong>at</strong>ech Universal Technology +27 (0)10 591 5073 sales@n<strong>at</strong>ech.<strong>co</strong>.<strong>za</strong> www.n<strong>at</strong>ech.<strong>co</strong>.<strong>za</strong> 39*<br />

neaMetrics 0861 632 638 info@neametrics.<strong>co</strong>m www.neametrics.<strong>co</strong>m 34,45*,80,<br />

NetIQ +27 (0)11 322 8300 marianne.vanderpluym@netiq.<strong>co</strong>m www.netiq.<strong>co</strong>m 35*<br />

Novell SA +27 (0)11 322 8342 cgrobler@novell.<strong>co</strong>m www.novell.<strong>co</strong>m 28,30,32<br />

Powell Tronics +27 (0)11 234 6990 marketing@powelltronics.<strong>co</strong>.<strong>za</strong> www.p-tron.<strong>co</strong>m 33*<br />

Reditron +27 (0)87 802 2288 sales@reditron.<strong>co</strong>.<strong>za</strong> www.reditron.<strong>co</strong>.<strong>za</strong> 21*<br />

Regal Distribut<strong>or</strong>s +27 (0)11 553 3300 mel.labuschagne@regalsecurity.<strong>co</strong>.<strong>za</strong> www.regalsecurity.<strong>co</strong>.<strong>za</strong> 88<br />

Safl ec Systems +27 (0)11 477 4760 info@safsys.<strong>co</strong>.<strong>za</strong> www.safsys.<strong>co</strong>m 23*<br />

Secequip +27 (0)11 624 2815 vaughn.tempelhoff @secequip.<strong>co</strong>.<strong>za</strong> 19*<br />

Security & Communic<strong>at</strong>ion Warehouse +27 (0)12 653 1005 marketing@securitywarehouse.<strong>co</strong>.<strong>za</strong> www.securitywarehouse.<strong>co</strong>.<strong>za</strong> 26*<br />

Soft<strong>co</strong>n +27 (0)12 348 7301 sales@soft<strong>co</strong>nserv.<strong>co</strong>m www.soft<strong>co</strong>nserv.<strong>co</strong>m 15*<br />

Suprema +27 (0)11 781 9964 enquiry@suprema.<strong>co</strong>.<strong>za</strong> www.suprema.<strong>co</strong>.<strong>za</strong> 34,45*,80,<br />

Technews Publishing +27 (0)11 543 <strong>5800</strong> <strong>vivienne@</strong><strong>technews</strong>.<strong>co</strong>.<strong>za</strong> www.<strong>technews</strong>.<strong>co</strong>.<strong>za</strong> 27*<br />

Trac-Tech 0861 100 199 info@trac-tech.<strong>co</strong>.<strong>za</strong> www.trac-tech.<strong>co</strong>.<strong>za</strong> 98,99,<br />

83*,85<br />

83*,85<br />

110,111<br />

Turnstar Systems +27 (0)11 786 1633 info@turnstar.<strong>co</strong>.<strong>za</strong> www.turnstar.<strong>co</strong>.<strong>za</strong> 13*,101,106<br />

Ty<strong>co</strong> Security Products +27 (0)82 566 5274 emallett@ty<strong>co</strong>int.<strong>co</strong>m www.ty<strong>co</strong>securityproducts.<strong>co</strong>m 5*,36,90,109<br />

Uniclox Technologies +27 (0)11 439 2000 info@uniclox.<strong>co</strong>.<strong>za</strong> www.uniclox.<strong>co</strong>m 9*,114<br />

UTC Fire & Security +27 (0)11 579 7300 gretchen.geldenhuys@fs.utc.<strong>co</strong>m www.utcfi reandsecurity.<strong>co</strong>m 95<br />

UTM Group 0860 22 22 66 info@utmgroup.<strong>co</strong>.<strong>za</strong> www.utmgroup.<strong>co</strong>.<strong>za</strong> 11*,96<br />

Virdi Distribution SA 0861 184 734 chris@virditech.<strong>co</strong>.<strong>za</strong> www.virditech.<strong>co</strong>.<strong>za</strong> 40,66*<br />

Xpanda +27 (0)31 791 0061 xpanda2@argent.<strong>co</strong>.<strong>za</strong> www.xpanda.<strong>co</strong>.<strong>za</strong> 100<br />

ZKSoftware +27 (0)12 259 1047 info@zkte<strong>co</strong>.<strong>co</strong>.<strong>za</strong> www.zkte<strong>co</strong>.<strong>co</strong>.<strong>za</strong> 65*<br />

IBC

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!