Biometrics 2017 Handbook
Biometrics 2017 Handbook
Editor’s Note........................................................................................................................................... 4
Security versus convenient access ........................................................................................16 Protecting against criminal use of stolen biometric data .......................................36
The growing security demands of business versus the need for Biometric technology is not invulnerable, but with the correct
identity and access management controls. planning it is an effective authentication mechanism.
The biometric decision .................................................................................................................22 The future of access control credentials ............................................................................42
Biometric technology has come a long way to being a reliable, Mobile technology is set to play an even greater role in security,
yet often misunderstood identification and authentication including access and identity management.
mechanism in business today.
The reliability of mobile credentials ......................................................................................44
Biometrics advance is relentless .............................................................................................26 Using mobile devices and cloud services to control visitor entry
The global market for biometrics will climb to over $40 billion in 2021. and exit is fast becoming the norm.
Electronic locks
IP access control
Turnstiles
Key management Access control solutions need to embrace open platforms .................................93
Astute users want a cohesive and non-proprietary access control system.
Ergonomic design delivers practical benefits ................................................................84
Ergonomics was fundamental to Morse Watchmans’ key Digital IAM
control and management design.
Eight best practices for identity and access management ....................................94
Visitor management Eight key identity and access management practices that will help
you improve your identity management system to ensure
Managing visitors and contractors ........................................................................................85 better security, efficiency and compliance
Visitor and contractor management has become more
important than ever, and it is also much simpler. Perimeter
Product news
authentication at the moment is for people the handbook. By the time you receive the transmitted in any form or by any means, electronic,
mechanical, photocopying, recording or otherwise,
to report that biometrics are no longer magazine it will also all be online. We without the prior written permission of Technews
a good option for security because your will also be sending out a few email Publishing (Pty) Ltd,
Reg No. 2005/034598/07
fingerprints, voice or face can be stolen newsletters with a few articles in the new
and you can’t change them like you can a year. And although the handbook is a Disclaimer
password or PIN. We asked some biometrics once-per-year affair, we welcome your While every effort has been made to ensure the accuracy of
the information contained
players to deal with this issue in one of the feedback which always assists in improving herein, the publisher and its agents cannot be held
articles, but it’s fair to say that the leading the next year’s Access & Identity Management responsible for any errors contained, or any loss incurred
as a result. Articles published do not necessarily reflect the
brands are ahead of the game in terms Handbook. Please feel free to send your views of the publishers. The editor reserves the right to alter
of liveness detection and other means of comments to [email protected]. or cut copy. Articles submitted are deemed to have been
cleared for publication.
proving a biometric belongs to a real live Andrew Advertisements, inserts and company contact details are
printed as provided by the advertiser. Technews Publishing
(Pty) Ltd cannot be held responsible for the accuracy or
veracity of supplied material.
LETTERS TO THE EDITOR
Letters to the Editor should be addressed to Andrew Seldon at [email protected].
Sending material to this publication will be considered automatic permission to use in full
or in part in our Letters column. Be sure to include your name, e-mail address, city and
postal code. We reserve the right to edit all letters.
According to IHS, the total installed base of access control readers, panels,
credentials and electronic locks is expected to reach 2.3 billion by 2016, up from
1.8 billion in 2012.
The access control market is growing, not control, for example, access to cabinets and the search to eliminate these isolated identities
only the cool stuff like biometrics and mobile safe areas, what about integrated physical and is a hot topic which more vendors and solu-
credentials, but also the traditional cards and logical access to PCs, printers or cloud services tion providers are trying to address. It is easy
fobs business. Yet, as many companies as there controlled from the IT directory? Do companies to see the value, why would I not want to use
are that still use cards and fobs, the technology consider these options at all? the same biometric data used for HR vetting
for access control has evolved and offers more Walter Rautenbach, MD of neaMetrics, local for the company’s access control and logical
options than ever for controlling access to vari- Suprema distributor, explains that, in an ideal access to data. At the present moment, the
ous places, systems and devices. world, we would have a one-to-one relation- number of solutions offering linking access
In one way, this makes the industry more ship between a person and identity data. One control and logical data alone is widespread,
complex for those who have to make sense enrolment used everywhere from building but the uptake is limited. However, we will see
of all the noise and ensure their access solu- access, time attendance, logical access, devices substantial growth in this area, even over just
tions do what is required in their companies. and cloud services. the next year.”
Yet it also opens the door to more integrated “This is nothing new with Single Sign-On One of the reasons he gives that develop-
systems that allow one to more effectively (SSO) talked about and implemented for many ment in this arena is not as fast as we would
manage access and other security or building years to address the problem of managing think or like, might be that it is easier to do this
management functions from a central point. multiple passwords and where using the same in a closed system. However, when implement-
Hi-Tech Security Solutions asked some one everywhere is a significant risk. With this, ing solutions across vendors or providers, a
leaders in the field to make sense of the access flowing into biometric identities, clients want matter of trust arises with everyone wanting
control market in a world that is bigger and the convenience of utilising their single iden- to be the controller of the identity or not
smaller than ever, more complex and simpler tity across all aspects of life.” trusting identities created in competitors’
than ever, with a wider variety of choices and Unfortunately, one of the significant systems. In addition, implementing multiple
price points than ever. identity flaws in today’s age is that most of us levels of access and attaching user authority
In the world of access control systems, have many biometric identity profiles, with to a centrally managed identity introduces a
people and companies install solutions for the most of them managed on separate platforms, level of trusted integration that needs careful
long haul. They do not want to have to replace he continues. “The biometrics I use to access consideration.
or upgrade everything every three or even five my phone, work access control, workstation or This may also be changing soon since,
years. So what do people look for when con- even employment vetting, are in most cases all while trust remains an issue, several providers
sidering their electronic access control options different and introduce a problem that differ- are now offering centralised Identity Vaults or
today? Are we still focused on letting people ent biometric identities are presented by one Trusted Identities, which are becoming more
in or out of the door; or are people looking at person. popular. “I suppose in our particular environ-
more integrated use of access technology to “In a society aiming for non-repudiation, ment, with PoPI being a hot topic, it is easier
Airports are microcosms of the world, enclosed in a small, potentially volatile space.
For over half a century now, Checkpoint Charlie A human mixing pot complex web of local, national and interna-
has captured our imagination as the ultimate Not only in scale, but also in opportunity of tional laws, as well as surveillance for conflict-
border crossing. Shrouded in the mysteries of great architecture and commerce for example, ing reasons – on behalf of companies, gov-
cold war espionage stories, when the Berlin the airport is a true twenty-first century icon. ernments and individuals. It connects many
wall finally came down, it had 14 checkpoints But alongside are the vulnerabilities of post- social spheres and has to provide incarceration
that went by the names of the neighbour- cold-war politics and terrorism. In a world that amidst an illusion of infinite freedom. As politi-
hoods they were located in. But earlier, they fluctuates between borderless globalisation cal scientists state, thus the airport is both –
simply bore signage in the aviator alphabet – and claustrophobic xenophobia, the airport the definition of an immense problem as well
Alpha, Bravo, Charlie … and of this somehow has to be many things for its different users, all as a statement of its grand solution.
this makeshift name of the Friedrichstrasse at the same time.
crossing persisted, and even after being It brings together at a single location both, Who and what are you
reduced to a mere tourist attraction, it remains the ideas and the reality of security, territory By the end of this decade, seven billion people
a poignant reminder of one of the sad aspects and population. It also brings together a are expected to pass through airports travel-
of nation-state politics – that of dividing ling nationally and internationally, consisting
people from people. of about half a billion passport holders. There is
At the beginning of the twenty-first already the pressure for the élite to be treated
century, this drama has shifted to the airport, with queue-less instant service. Archaic instru-
and thus, if you deal in security policy, strategy ments such as visas cause additional bottle-
or technology, it becomes a microcosm to be necks on an already overstretched service
examined in great detail. No doubt, 9/11 or infrastructure.
rather its immediate aftermath has been the Many of the sixty-five million internation-
single most important reason for this focus. ally displaced persons also arrive at interna-
However, the definitive ideas around tional airports, some of them seeking asylum
it came together, with more clarity than and in the most complex legal situations, in
anywhere else perhaps, in the book titled conditions of statelessness. There are women
Politics at the Airport, edited by Mark B. Salter. and children requiring immediate humanitar-
Published in 2008, it is a slim volume, with just ian attention.
eight papers by different authors and comes in Amidst all this, are individuals attempting
at under two hundred pages. Professor Salter to travel on one of the over 60 million stolen or
teaches political science at the University of lost travel documents, individuals suspected of
Ottawa. Not surprisingly, the most influential commercial crime, smuggling and drugs, and
bodies that govern air travel are headquar- those with a criminal background and intent.
tered at nearby Montreal – the International Finally, there are the dreaded terrorists, detect-
Civil Aviation Organisation (ICAO), Inter- ing and stopping whom could prevent untold
national Air Travel Association (IATA) and loss and tragedy. These could arrive disguised
the Airports Council International (ACI). across the entire spectrum – from the élite to
Much has happened since its publication, the asylum seeker. There is no way to tell what
but the principles of border crossing and persona they will don next.
security, essentially remain the same. Sanjay Dharwadker Continued on page 14
Continued from page 12 standards and authentication. Similarly, despite government and the commercial, domestic and
The freedom of restriction constant advancements, both in the technology international and the inside and the outside.
Apart from ICAO, IATA and the ACI a number and practice, biometrics as valves that control However, experts reckon that despite tech-
of other regional and national bodies formu- global flows of humanity, could be restricted only niques being available, they have not been
late guiding principles for all this. In the US, it to international border crossing. put together in the most effective way – for
is the Federal Aviation Administration (FAA), Imponderables invariably turn up, such as the identification, classification and managing
the Transportation Security Administration what happens to your data across borders. For of individuals and groups sorted by a level of
(TSA) as well as the Department of Homeland example, the moment it reaches the United dangerousness, so to say.
Security (DHS). States, is it subject to the USA-PATRIOT Act?
Involving almost the entire community of Few of us remember that this ten-letter abbre- Behaviour and identity
nations, the governance environment is a com- viation stands for: Uniting and Strengthening observation
bination of international treaties, national laws, America by Providing Appropriate Tools Three specific areas have immediate potential.
local by-laws as well as management practices. Required to Intercept and Obstruct Terrorism, Biographic search is one of them that helps
The ICAO itself goes back to the Chicago as signed by President George W. Bush on investigators look beyond singular physical
Convention of 1944 (ratified in 1947) as well as October 26, 2001. This has subsequently been identification characteristics. The biometric
its various annexures and amendments. extended and amended in 2011 and 2015 silos also need to be turned upside down and
In a broad sense, airports have the objec- under the Obama administration, and is now provided with connecting passageways. Thus
tive to maximise national security. However, known, quite ironically, as the Freedom Act. names, locations, faces and other specifics can
prevalent business models also require them be looked at more holistically and intuitively
to maximise commerce. This leads to the com- A Difference Machine like a human mind does.
plex layouts and the alternating of wide-open For the airport then, the notion put forward Lastly, there is the hypothesis that identity
spaces with narrow passages and barriers. underlying its laws, regulations, procedures and itself is not the final frontier of security. It is the
Overall, it has been a question of optimising technologies, is to facilitate global mobility and knowing that there is intent. One of the impor-
space, speed and security. at the same time, if required, fortress countries tant ways that an airport functions are segre-
For the security aspect, initially it was and continents. Smart borders has been a gating the streams among the frequent-flying
considered a question of minimising the time euphemism for the increasing use of biometrics ‘kinetic élite’ (as termed by Rem Koolhaas),
to process. Today, the focus is on the outcome. (face and fingerprints mainly) in this context. the more general classes, the refugees and
Also in recent years, there has been a need Peter Adey is one of the contributors in vagabond immigrants (some needing deporta-
to re-evaluate the security objective function Mark Salter’s book and his paper – Mobilities tion) and finally those that need a closer look
itself, because the dependence of returns on and Modulations: The Airport as a Difference for security reasons. It is not only being able to
investment in this field is difficult to quantify. Machine – is a powerful one and immediately foil their passage at arrival or departure, but
In general, security is said to depend on caught the imagination, not only of those also keep the airport itself out of reach from
ID documents, identification and detection wanting to tame the unwieldy airport beast, but being a target.
devices, CCTV and data such as no-fly lists. also of businesses looking to maximise profits Thus there is the current debate between
Viewed individually, each have well-under- within. In sociological terms, he described this behaviour-based and identity-based tech-
stood shortcomings, however together, do continuous and unending process of segrega- niques. Objections abound, and these too
provide a system that seems to hold. Added to tion being based on securitising identity and need to be addressed, especially those in the
this in recent years have been strategies of risk identification, with political asylum at one end realm of privacy, protection, due process, dis-
management, more comprehensive post-event to credit card theft at the other. At an airport, crimination, international law and conventions.
assessment, and somewhat controversially, this synchronises well with the twin ideas of Already businesses, airlines and govern-
using databases as an instrument of selection, maximising security and commerce. In addition, ments are imposing visible and invisible
separation and exclusion. both have established paradigms of profiling, levies that support all means of security at the
In principle, these violate privacy and though with different objectives. However, the airport. With the annual traffic projected to
personal data protection laws. However, many underlying commonality of securitised identity touch seven billion passengers via thirty-five
agencies espouse temporary profiles bringing provides a significant intersection. million flights in one hundred and ninety-one
together data for the eyes of experts, while Already, the mobile phone and the use of countries, the nine thousand odd airports
maintaining the essential separation in the biometrics to authenticate payments provides where they originate and land, assume more
machine form, as a bare minimum, looking at even greater common ground, between the importance than ever before.
today’s threats. authority of one and the power of the other, in its Not one of them is known as Checkpoint
Ideally, passports serve well for external move- capacity to organise the identification of individu- Delta, but I thought to use the name to remind
ment. However, the use of ID cards for internal als. Newer ID schemes have already breached us of what changes and what remains the
movement opens up many issues of acceptability, the conventional distinction between the same.
The growing security demands of business versus the need for identity
and access management controls.
Like it or not, in the application economy every wearables. In order to protect the business
enterprise is now in the software business and and grant the appropriate level of access,
the challenges ahead are daunting. Budget organisations must authenticate each user
constraints continue to be a common obstacle, and each endpoint.
but they are closely followed by security As digital interactions increase in volume
concerns. and complexity, identity and access secur-
Many have found that protecting the iden- ity have become more critical for both the
tity of users and safeguarding sensitive data is organisation and end user. However, security
easier said than done when contending with: measures should not be achieved at the cost
• Exploding user and application populations. of convenience. Today, intuitive and easy-to-
The sheer volume of applications, their rate use functionality drive applications are ripe for
of change and the diversity of end users has adoption. If a customer has to jump through
never been greater. To enable and protect awkward authentication hurdles, they will not
the business, enterprises must efficiently hesitate to look elsewhere. And if an employee,
manage: partner or contractor must juggle multiple
a) the identities of this growing user base, logins to gain access to essential services,
and frustration will quickly grow while productivity
b) their access to the appropriate plummets.
applications. In this culture, where security is paramount Biography: Michael Horn
• The externalisation of IT. In order to meet and the user experience is king, the ultimate Michael Horn is the CA Southern Africa
the break-neck pace of application demand goal is to provide users with easy and secure security business unit manager. Over the
while keeping costs low, businesses have access to the applications they require – past three decades Michael has accumu-
turned to cloud-based deployment models. whether on premise or in the cloud – based on lated extensive specialist skills based
Moreover, enterprises are increasingly their identity, role and associated entitlements. on real-world exposure to: architecting;
embracing partner-delivered services implementing – including the operational
and third-party applications to enhance Appropriate security levels management – of a variety of information
their line-up of digital experiences. This So, how do we ensure appropriate security security technologies. Michael is a Certified
diversity in application environments has levels within this complex and rapidly evolving Information Systems Security Professional
erased the once well-defined boundaries application economy? (CISSP) and the author of several publica-
of an enterprise, introducing new security The answer lies in a centralised identity tions. Michael has experience in a wide
considerations. and access management (IAM) service. This range of identity and access management
• Varied endpoints. Applications are every- approach ensures all identity-related func- technologies including advanced authen-
where – as are the employees, partners and tions, such as authentication – and ultimately tication, identity consolidation, unified
customers accessing them. And, these users authorisation – are consistently managed by access management and privileged access
are leveraging a dizzying array of devices, the enterprise and executed reliably across management.
from PCs and tablets to smartphones and Continued on page 18
access control provides a first line of defence, architecture offered by smartcards vastly participate by collaborating with the integra-
but a multi-layered approach is required for decreases the likelihood of unauthorised tion of the two systems.
truly proactive security. As such, there is a users gaining access to sensitive data. Today’s With the use of embedded identity analyt-
compelling argument to implement smart- credential management solutions help ics, administrators will be able to drill down
cards for logical access. manage heterogeneous environments that into potential ‘road blocks’ existing in logical
In fact, businesses are beginning to realise combine all of the normal access manage- and physical identity lifecycle management
the benefits in cost savings, ease of use and ment models such as passwords, software processes, allowing the identification of areas
increased security by ‘marrying’ physical and certificates and hard physical tokens, allow- of process inefficiency and to ensure meeting
logical access control onto a single platform. ing migration by department or groups from business service level agreements.
Instead of adding technological and man- one model to the next and so on. One thing is certain, everything revolves
agement complexities by having separate Ease of use is another compelling argu- around positive identification that can be
access control systems for physical facilities ment for marrying physical and logical access audited and potentially used in court for
and electronic data, it makes more sense to onto a single platform. Users will not have to prosecution. Perhaps most importantly,
combine the two solutions and gain higher carry multiple credentials, nor will they need though, such an integrated system brings
assurance, cost savings, efficiency and ease to remember multiple passwords or PINs to down the barriers that have stalled the
of use. access applications and data. Instead, they convergence of physical and logical access
The marriage of physical and logical will have one smart card that can be used for control systems for so long.
access into a single solution builds an infra- everything. IT departments and facilities manage-
structure of increased trust. Deploying smart ment staff can finally work together to
cards to employees, partners and other key Collaborate and integrate become more efficient and eliminate security
individuals is a proactive enterprise approach Many companies consider integrating gaps in the process, once an IT and user-
to higher assurance. Except for informa- physical and logical security to be a technical friendly building security system has been
tion that requires little or no protection, effort. Logical and physical security organ- acquired.
user names and passwords will one day be isational structures are typically described
considered an unacceptable access control as two silos, each reporting up through For more information contact
mechanism, as they are easily forgotten or different management structures. While Michael Horn, CA Southern Africa,
compromised. this is not ideal, the organisational chasm +27 (0)11 417 8765,
The multi-factor authentication and PKI can be bridged by having physical security [email protected].
Biometric technology has come a long way to being a reliable, yet often
misunderstood identification and authentication mechanism in business today.
The topic of biometrics is nothing new in the no matter how similar two people’s faces are, Faulds, who published an article on finger-
pages of the Access & Identity Management the facial recognition system must be able to prints in 1880. However, fingerprints have been
Handbook. As has become the norm, this issue reliably tell them apart. in use for far longer, as a fingerprint on a clay
will examine how and where biometrics are While all of the trait mentioned above will seal confirms – dated somewhere between
being used in the broader access field. In this be able to identify an individual in the right cir- 1000 BC and 2000 BC. Fingerprints, however,
article, however, we look at the various biomet- cumstances, the research into these other traits are a biometric format that requires overt
ric options available and their acceptance. We stands at different levels of technical advance- acceptance from the user, who is expected to
will also touch briefly on what is required from ment. This means that the convenience and place their finger/s on a reader for a second or
a biometric system to make it a reliable and ease of obtaining and comparing data are very more. This excludes latent fingerprint gather-
accurate access and authentication mechanism different – just take DNA, which was really ing, for example at crime scenes.
for today’s end-user. only first used in 1986 as an example of a long, Facial recognition goes back as far as
For those readers wanting more than the drawn-out process as opposed to fingerprints. 1964, or perhaps to the beginning of the 20th
brief overview below, there are two resources When choosing a biometric for use in one’s century when 35 mm still cameras started
(among many) offering insights and more own environment, you therefore need to find appearing. Facial biometrics is perhaps the
information on the topic. The first is a paper by something that fits your requirements in terms most popular form as it doesn’t require
Jain, et al, 20161 ; the second is a presentation, of ease of use and reliability (and speed). Jain anything from the user, they don’t touch
also by Jain2 which is far more concise and et al, (2016) notes that the utility of a biometric anything and recognition and authentica-
easier to read, covering the same data. trait for a specific environment “depends on tion is not affected by your mood or facial
the degree to which the following properties expression (supposedly, real life is sometimes
What biometric? are satisfied: (i) uniqueness or distinctiveness, somewhat different). Facial is also popular
Fingerprints are by far the most widespread (ii) permanence, (iii) universality, (iv) collect- among governments as these readings can be
biometric trait used globally, primarily due to ability, (v) performance, (vi) user acceptance, taken covertly – such as in a crowd – allow-
the long history of research and the ease and (vii) invulnerability, and (viii) integration.” ing for broader identification programmes, as
convenience with which fingerprints can be Meeting these requirements, the most well as less privacy. Fortunately, the quality of
captured and compared. Today, however, other popular biometrics in use today are fingerprint, these ‘readings’ is still a work in progress, but
forms of biometrics are gaining ground and facial and iris recognition. There are other traits the technology will improve dramatically over
being used in various situations. Some of these that are being used successfully, such as vein the next few years.
include face, iris, palm or finger vein, signature, and/or general hand geometry systems, but Iris recognition got a start in 1936 when
voice and even deoxyribonucleic acid (DNA). the three mentioned are the primary ones Frank Burch raised the idea of using these pat-
One of the keys to biometric use is that the used by over one billion people around the terns for identification, but the first patent was
trait chosen must offer a high probability of world. only granted in 1985 (Jain, 2013.) While iris bio-
identifying an individual, even when the bio- metrics could be a covert operation, technol-
metric is read in different conditions (poor or Historic foundations ogy does not yet allow for ‘on-the-fly’ readings,
bright light, dry or wet conditions, and so on). As noted, fingerprints have the longest history although this technology is used effectively in
Similarly, it must have a very low probability of of research and use. The science of fingerprint the UAE, at airports for example.
identifying the wrong individual. For example, recognition can be traced back to Henry Continued on page 24
Continued from page 22 is presented to a reader) and attacks on the to create multiple unique templates of the
template database. same biometric, and
Quality is key “Spoof detection is a critical requirement, • Discriminability, in that the template
In all types of biometrics, the quality of the especially in unsupervised applications (e.g., should not degrade the reader’s accuracy in
data is critical in the ultimate accuracy of the authentication on a smartphone) where the recognition.
system, both for capturing the biometric as presence of a user is not being monitored”
well as comparison. For this reason, it is wise (Jain, 2013). To prevent spoofing, the biometric Advancing market
to choose your biometric trait carefully – there product chosen must have the ability for ‘live- It’s clear that biometric technology has come
may be problems when using fingerprints for ness detection’, in other words, proving that a long way over the past years and is being
identity and authentication for manual labour- the biometric presented is attached to a living used in a variety of situations all over the world,
ers like miners, as their fingerprints can be person and not a plastic mould, for example. from time and attendance functions through to
worn down due to their jobs. There are many ways of doing this, but they national identification databases. The research
Similarly, it is equally, if not more important rely on measuring some physiological aspect and development into this technology is also
to choose your products carefully. In today’s of the person, behavioural patterns, or a chal- ongoing, and will allow for further rollouts and
globalised world, there is always someone lenge-response mechanism. In most cases the usage in more environments over time, as well
with a cheaper option that promises to do liveness checks are handled automatically so as as the introduction of new biometric traits as
everything a more expensive product will. not to waste time or inconvenience legitimate well as improvements in existing ones.
But will these cheaper readers capture the users, but when dealing with sensitive access, Arguably, the most effort is being focused
data accurately enough and ensure accurate challenge-response may be required to ensure on DNA as the unbeatable biometric trait, and
comparisons? people are who they are supposed to be (such we have seen advances in the time it takes to
The benefits and speed of biometrics as asking for a random finger to be scanned analyse DNA. This branch of biometrics has
quickly turn into a disaster when, for example, each time the person authenticates). a long way to go before it is as fast and con-
using a cheaper solution results in finger- When it comes to protecting the biometric venient as fingerprints, for example, and even
prints having to be scanned multiple times templates stored in databases, smaller applica- longer before it is as cost-effective as fingerprint
before they are recognised, or they may not tions may find it worthwhile to decentralise biometrics. Then of course, the other traits are
be recognised at all even though they were their storage to smartcards the users carry. also advancing, such as touchless fingerprint
initially captured. The worst scenario is if one In other situations, a central server may be recognition and more. And let’s not forget how
person’s biometrics is mistaken for another required, in which case the biometric will be biometrics has even found a place on your
individual’s, negating the purpose of using stored as a key, or in a numeric format accord- smartphone, allowing the user to unlock their
biometrics in the first place. ing to an algorithm which is (hopefully) secure. device or authorise payments with a fingerprint
While even a cheap reader will work in Jain et al, (2016) recommends three require- or by pointing the camera at your face.
ideal conditions, the day-to-day conditions ments for storing a biometric template: To sum up, the choice of biometrics is
of a working environment are seldom ideal. • Non-invertability, to prevent the conversion therefore a reasonable one when consider-
This is where better design and build delivers of a template back into a biometric feature ing identification and authentication needs
the goods as the companies which have put such as a fingerprint, in business, but it’s a case of buyer beware.
money into R&D focus on addressing those • Non-linkability, meaning it should be possible Opting for the cheapest offering on the market
‘non-ideal’ conditions – which will include may indeed meet your T&A requirements in
fraudulent activity like fingerprint spoofing, a normal, small-office environment, but don’t
or standing too far away from an iris reader or expect exceptional or trouble-free perfor-
keeping your eyes half closed. mance. Doing your homework will enable the
Other issues which affect quality and buyer to make better decisions based on what
the ability to identify individuals include the they require and what is available. Biometric
ageing process. We all know our bodies change systems aren’t cheap, but it is a competitive
as we get older and this includes various bio- market and advancing technology works in the
metrics, including fingerprints and our faces. end user’s favour.
Many algorithms have been developed to cater
1
for ageing and these will improve over time to Jain, A. K., Nandakumar, K. & Ross, A., 2016. 50 years
deal with the changes we all go through. of biometric research: Accomplishments, challenges, and
The environment is also a factor in iden- opportunities. Available at: http://www.cse.msu.edu/
tification, as noted, requiring significant rgroups/biometrics/Publications/GeneralBiometrics/
investments in research to allow for imperfect JainNandakumarRoss_50Years_PRL2016.pdf (short
scanning conditions. URL: http://securitysa.com/*cm823a).
2
Jain, A., 2013. 50 Years of Biometric Research:
Faking it Almost Solved, The Unsolved, and The Unexplored.
A final thought when it comes to selecting Talk delivered at The International Conference.
biometrics is the abilities of criminals to fool on Biometrics, Madrid, Spain, 2013. Presentation
the readers using a fake fingerprint or some available at: http://biometrics.cse.msu.edu/
kind of mask. Jain notes that there are two pri- Presentations/AnilJain_50YearsBiometricsResea
mary vulnerabilities when it comes to fooling rch_SolvedUnsolvedUnexplored_ICB13.pdf (short
biometrics: spoofing (where a fake biometric URL: http://securitysa.com/*cm823b).
The global market for biometrics will climb to over $40 billion in 2021.
According to Radiant Insights, the financial Hi-Tech Security Solutions: There are stories Reliable, good quality biometric solu-
value of the global biometrics market will doing the rounds that criminals have ways tions have been in existence for many years,
reach $44.2 billion by 2021, primarily from four of skimming your fingerprints at ATMs. Then but their cost has not justified the cause.
segments law enforcement, border control there are the never-ending stories about Complaints of poor quality and reliability arise
(which includes government identity systems), the poor quality and reliability of biometric more often than not as a result of cost winning
workplace access, and consumer identity. authentication systems? How would you the battle over quality, to the detriment of the
Governments are a key driver in the respond to this? technology as a whole.
rollout of biometrics with enormous projects Hendrik Combrinck: Through many years The past decade has seen a general
underway in, among others, China and India. of research and working with the banking improvement in biometric technology, pro-
Another driver is expected to be the financial sector extensively, we have concluded that cessing speed and accuracy, with the driv-
market which is finding more reliable ways of biometrics by itself will never be the silver ing force being fierce competition between
identifying people and combating fraud, both bullet everyone was looking for in identifica- vendors and modalities in search of a positive
internally and externally. tion and authentication. Biometrics will always authentication technology that delivers the
It wasn’t too many years ago when South form part of the full solution where it will most business value (cost versus effective-
Africa was a primary driver in the biomet- be used as one of the criteria in multifactor ness). Credit must be given to those that
rics market. The uptake of biometrics in the authentication. So the ATM user will still need spend extensive time to ‘flaw’ systems because
country was driven by the private sector, with to enter a PIN, account number or just insert without that vendors would have no reason to
government catching on before too long. the card, but with that a fingerprint, face, retina innovate and improve.
Today, using biometrics is common for millions or iris will be compared to the system. The bio- Users also play a vital role by demanding
of South Africans at work, collecting pensions metric systems the banking sector is looking technology that works and which overcomes
or getting a new passport. And that ignores for now are meant to strengthen their existing the flaws that receive attention. International
the growth of smartphones and other devices identification systems and not to replace them. benchmarking of vendors and modalities
that have biometrics embedded. Walter Rautenbach: There is no such thing across large databases, previously not avail-
From a business perspective, both private as perfect technology, and whilst flaws exist, able, also assist users in making educated
and public, biometrics plays and will play a and with financial gain as a motivator, there decisions on viability and selection. Certain
significant role in various applications, from will always be enthusiasts willing to exploit implementations might justify placing a finger
access control to time and attendance track- these weaknesses. three times for it to work or having a high false
ing, through to workforce management As Albert Einstein said, “We cannot solve acceptance rate. The rest has a wealth of infor-
and financial authorisations. Hi-Tech Security problems by using the same kind of thinking we mation and research readily available to ensure
Solutions asked the leading biometric suppliers used when we created them”. The same applies they make the right decisions.
in the region to tell us more about the market, to biometrics. One must consider the prog- The thought of a having one’s identity
as well as about reports claiming it is easy to ress security has made to ensure true identity stolen is also a driver of technology improve-
fool biometric readers. through biometrics over the current flaws in ment. Liveness detection was a good start,
We received input from people from three identifying a person based on something they kerbing at least the motivation of someone to
respondents: have (card, phone) or something they know steal your finger. Protecting the data generated
• Hendrik Combrinck from ZKTeco. (account number, PIN, passwords). There will still at the time of interaction to completion of the
• Walter Rautenbach from neaMetrics, local be many advancements in skimming of data, transaction, with the purpose of interjecting
Suprema distributor. be it biometrics or not, and hence the need for the same later to execute another transaction
• Deon van Rensburg from ViRDI Distribution. continuous enhancements in technology. is another challenge. It is, however, a general
A password you
can’t forget
By Andrew Seldon.
Voice biometrics doesn’t receive the same Vodacom and Absa. At the 2016 Voice in itself has no value to a hacker. The solution
level of publicity that other forms of biometric Biometrics Forum, hosted in Johannesburg by also has sophisticated elements included, which
technology do, but it is a fast growing form of Nuance and its South African partner, OneVault, would identify a recording of a voice if anyone
identity authentication that is being used with Investec, Discovery and Vodacom were on stage wants to try to crook the system with a digital
great success globally. Opus Research has done to speak about how voice biometrics have recording of someone’s voice.
a significant amount of work on the uptake positively influenced their businesses.
and use of voice biometrics and its latest To find out more about voice biometrics Where is it best used?
report, completed in July 2016, shows impres- and its reliability and usage, Hi-Tech Security Dickson says voice biometrics is an extremely
sive growth in the number of voices enrolled. Solutions spoke to Vanda Dickson from valuable business solution for organisations
According to Opus, there are now more OneVault. We asked her to explain how it works that have a large customer base that contact
than 137 million enrolments globally, clearly and where it is best used. them regularly and/or are required to go
demonstrating the growth of voice as an through an authentication processes in order
authentication technology. The company notes A verbal fingerprint to fulfil an interaction.
that voice is a “ubiquitous, highly personalised Dickson explains that a person’s voice is unique, “Voice biometrics can be utilised to auto-
authentication factor with the capability to much like their fingerprint, face or iris. “The size mate transactions and service fulfilments that
combine command and control with identifica- and shape of one’s vocal tract, mouth and teeth previously were not automatable due to the
tion and access management”. are only a few of the physical characteristics need for the caller to be authenticated by, for
As we know from other forms of biometric that contribute to making our voices unique. example, a contact centre agent. It can be used
measurements, there is no failsafe and 100% However, unlike the other biometrics, voice in various scenarios, whether it is resetting a
guaranteed form of biometrics, but the market biometrics also measures behavioural charac- password, confirming proof of life, enabling
leaders say voice is more effective than PINs, teristics, such as accent and speaking rhythm.” login via your voice into web portals, authenti-
passwords, tokens or other authentication There are over one hundred voice charac- cating in a queue to reduce the time it takes to
methods when it comes to authenticating iden- teristics that can be measured to determine authenticate when you do speak to an agent,
tities and providing access to customer service who you are based on your voice. To identify a and so on.
systems to the right people. What’s more, it is person, voice biometrics technologies capture Globally and in South Africa, passive voice
simple to use and doesn’t require users to do a person’s voice, typically through the micro- biometrics has a strong use case where an
anything other than speak into a microphone or phone of a phone, and use software algorithms organisation speaks to clients regularly, but by
over the phone to be authenticated. to compare the captured voice characteristics to virtue of their business, is required to properly
Global voice biometrics company, Nuance, the characteristics of a previously created voice- verify and authenticate the individual they
has a claimed 117 million voiceprints world- print. If the two match, then the voice biometric are speaking to. Voice biometrics avoids the
wide and over 3 billion verifications among software will confirm that the person speaking laborious and frustrating processes currently
companies using its voice biometric solutions. is the same as the person registered against the used for verification, allowing companies to
In South Africa, there are numerous voice voiceprint. eliminate them almost entirely.
biometric implementations, making SA one of While many other authentication challenges, Moreover, where small groups of individu-
the countries with the largest concentration of such as usernames, passwords, etc. can be com- als need to be associated to a profile, Dickson
voice biometric implementations. promised, she says that with voice biometrics says voice biometrics can also enable this with
Some South African voice biometrics this is very difficult as a voiceprint is a hashed an enhanced level of reporting. These sce-
users include Discovery, Investec, TransUnion, string of numbers and characters. A voiceprint narios tend to be prevalent within the financial
services arena where fraud plays a big role and specific – and often mundane – transactions,
yet, using voice authentication to delight your but are sensitive enough to require authentica-
customer with an easy and convenient process tion are ripe for voice biometrics.
is equally important. “With active voice biometric authentica-
OneVault has been involved in implement- tion, where the consumer needs to enrol their
ing voice biometrics in the following industry voice against a unique identifier such as an
sectors in South Africa: identity number and companies are updat-
• Financial services. ing a range of business processes to facilitate
• Telecommunications. automation, there are many types of transac-
• Credit bureau. tions that can be done entirely through the
• ICT. IVR using the consumer’s voice to validate and
• Healthcare. process,” notes Dickson. She provides the fol-
lowing examples:
Quality of the call • Password reset.
While it will surprise nobody that voice calls • PIN/PUK resets.
in South Africa can sometimes be abysmal in • Automated login onto secure portals/web-
terms of quality, these same issues that make it sites (e.g. banking where you don’t need to
hard to hear a caller on the other end of a call remember a username and password).
can interfere with voice biometric systems’ abil- • Proof of life.
ity to accurately verify an individual’s identity. • Balance enquiries.
Dickson says that in a passive voice biomet- • Tax statements.
ric solution, if the agent battles to hear and • Approval of banking transactions.
understand what the caller is saying, it stands • SIM swaps.
to reason that the voice biometric technology • Logistics e.g. confirmed delivery to right party. “From a consumer perspective: passive
may take longer to verify the voiceprint against “While there are obviously alternatives to voice biometrics is convenient and enables a
the one on file, thus the time to verify may take the above such as OTPs or temporary pass- much improved customer experience largely
longer. If, for example, there is too much inter- words being sent to users’ email or mobile through the reduction in customer frustra-
ference, the contact centre agent can always phones, there is very little robust authentica- tion. From a company perspective, it offers the
revert to knowledge-based security questions tion of the actual identity of the individual,” above as well as improved efficiency, security
to ensure the person is who they claim to be. Dickson adds. “Rather, an action is processed and employee satisfaction.”
In the case of active voice biometric based on a correct process being followed or Active voice biometric authentication
solutions, if the individual’s verification is not traditional knowledge-based security ques- which is passphrase dependent is another
accepted, depending on the company and the tions being answered. With crime syndicates story, as it tends to have difficult challenges.
processes that have been set up, the caller may invariably knowing the answer to security Dickson says the use case has to be appropri-
be prompted to move to a quieter place, speak questions, one needs to question the strength ate and the consumer has to understand the
louder, speak more softly, etc., and can be of the process being followed.” benefits. “Thus, communication and education
asked to repeat the passphrase. to and of the consumer is a critical aspect.”
“Bear in mind that there are many aspects User response? She adds there will always be the sceptics
to take into account when the verification pro- As with all biometric solutions, the user will be around voice biometrics, as is the case with
cess is configured for a customer. When a caller the ultimate judge of the solution. Despite the any solution. “Voice biometrics is one solution,
is unable to fulfil an action via a voice biomet- improvements in fingerprint readers, for example, however, that can assist in enabling so many
ric solution, the fallback may be the option to some still complain that they have to touch interactions with significantly higher levels of
speak to an agent, but, ideally, the failed verifi- something others have touched. For iris recogni- secure and robust authentication that it is not
cation should be flagged when speaking to an tion, there are questions about long-term impact a solution that can be dismissed.
agent to ensure the individual is authenticated to the eye. The users, whether they have a good “With identity theft being a bigger issue
as who they are claiming to be. argument or not, decide on the success of a bio- for everyone, it is a solution that should be
metric based on what their perspective is. embraced as a complementary authentication
More than authentication When it comes to voice biometrics, methodology that will assist consumers and
It stands to reason that if one’s voice can be user response differs between use case companies alike in addressing risk and fraud in
used to verify your identity for transactional and between the voice biometric solution new and innovative ways.”
purposes, the technology must also be able deployed. Dickson says that with passive voice With the levels of fraud increasing expo-
to handle other functions which currently biometric authentication, where the customer nentially and the fact that more businesses are
require talking to a call centre agent. Dickson really doesn’t have to do anything, but the introducing digital channels into their interac-
says those tasks that previously required a system actually improves the customer experi- tions with their customers, voice biometrics
consumer to speak to someone in order to do ence, the response has only been positive. is an excellent choice to enhance the value of
these strategies while improving the security
OneVault is a focused voice biometric authentication company. It delivers active, passive and of your client and staff interactions.
managed fraud voice biometric solutions through a number of partners such as Dimension
Data, Bytes, Atio and Pivotal Data. OneVault has a range of commercial models to suit clients’ For more information contact Vanda Dickson,
requirements, ranging from cloud, on-premise and managed services. OneVault, +27 (0)82 884 7786,
[email protected]
The very idea of a computer being able to recognise people in a similar way to
which we as humans instinctively recognise individuals, is mind boggling.
Napoleon Hill said: “Whatever the mind can Andrè Immelman, CEO of eyeThenticate these can be intercepted and compromised.
conceive and believe, it can achieve.” This Technology Labs says that in the KYC (know Upping the ante, it has become custom-
little gem has no doubt contributed to the your customer/client) realm, the question is ary to rely on who the person is through a
development of many allegedly inconceivable whether you know if the person to whom you biological, physiological or psychological trait
achievements. Often, things we read about are speaking is actually the person who they that defines them. Typically, fingerprints were
are relegated to the realm of science fiction, say they are. Trusting their word is simply not used as a means of identification, but this has
simply too incredible to be true. Using soft- enough, so people have tended to rely on the led to what is commonly known as ‘CSI Effect/
ware to emulate the functions of the brain in credentials that they expect the person to Syndrome’ which is any of several ways in
the recognition of faces is a case in point. present in the form of their passport, ID book which the exaggerated portrayal of forensic
The very idea of a computer being able to or access token. These elements, he says, are science on crime television shows such as CSI
recognise people in a similar way to which we not really trustworthy in reality. Traditionally, (Crime Scene Investigation) influences public
as humans instinctively recognise individuals, people have also relied on passwords and pin perception. In this scenario, the fingerprint is
is mind boggling. codes for authentication, but unfortunately deemed proof positive of who the person is.
This is, however, erroneous since finger-
prints can be duplicated and in recent
cases it was found that fingerprints are
not actually unique. Two of these cases
are Brandon Mayfield, who in 2004 was
wrongly linked to the Madrid train bomb-
ings by FBI fingerprint experts in the
United States; and Shirley McKie, a Scottish
police officer, who was wrongly accused
of having been at a murder scene in 1997
after a print supposedly matching hers
was found near the body. (Source: http://
www.telegraph.co.uk/science/2016/03/14/
why-your-fingerprints-may-not-be-unique/)
Immelman says that fingerprints are therefore
not as foolproof as we have assumed in the past.
He adds that to measure fingerprints properly,
one needs to employ sophisticated and expen-
sive technology to obtain a reasonable degree
of accuracy. Based on the matching of a specific
number of dots extracted from the fingerprint,
the success rate, especially on latent fingerprints,
is minimal. The same is true of points of compari-
son on a face. These methods of identification
are, in his opinion, highly unreliable.
Mobile technologies have made biometrics a household word and are now changing
the face of access control.
Mobile biometrics received an enormous boost technologies to transmit access information to phone so it is actually a natural progression
into the mainstream consciousness when a reader. Of course, in the case of authenticat- that a device carried by everyone would evolve
Apple released its first iPhone with a finger- ing your identity to the device in order to gain into more than just a phone – it’s a camera,
print reader. This was not the first smartphone access, biometrics plays a role and is expected video recorder, computer, and now it’s a
with fingerprint recognition, but it was the to play an even more important role in future credential carrier for you to gain entry into a
first to hit the market with a popular following. and spread to a number of different industries restricted area.
Samsung and others joined in the trend and and applications. “Even in South Africa, where we have
today there are endless smartphones allow- However, since we are focused on access significant poverty issues, most people have
ing you to skip entering passwords or PINs in control and making sure the right people are a cellphone. It’s accessible, adopted and,
favour of simply scanning your finger. able to go where they need to go and are through our new technologies, secure. A win-
These changes filtered throughout the allowed to go, we approached two companies win for everyone.”
world very quickly and made fingerprint playing a significant role in the local access SALTO’s Wouter du Toit agrees, noting that
recognition a common and accepted method control market, specifically when it comes the ability to bring your business and security
of authentication. Even in countries like South to mobile access, and asked them about the onto a mobile platform has been a growing
Africa, where fingerprint biometrics had seen market. Our first question asked why mobile trend and technology is allowing us to provide
remarkable growth in business and govern- devices are being used for access control when better solutions for people on the move. “Being
ment, fingerprint authentication became we already have more than enough ‘stuff’, from able to see what is happening at your office
common and accepted by everyone. fobs to biometrics controlling entrances and without you being there is just one of the ways
Technavio’s 2016 report on the mobile bio- exits. mobile technology is improving the security
metrics market, expects the global market to element for SME users.”
“grow steadily at a CAGR of over 103% during Why mobile access? Another way, he says, is combining cloud-
the forecast period” to 2020. Vikki Vink from local manufacturer Impro based solutions with your mobile device. For
Today mobile biometrics is not simply a Technologies says customers are looking for example, a retail operator who owns a number
way you can log into your smartphone. First increased convenience, without the tradition- of retail chains can now link all these sites
off, the type of biometrics available on one’s ally associated increased risk. easily into a central cloud-based solution and
phone includes fingerprint, facial, voice and “In the past, convenience had to be bal- use his mobile device to access any location
potentially iris recognition. Secondly, the anced against the level of risk or security – or easily invite new users to gain access to the
functions it is used for include authenticating tighter security meant greater inconvenience. property. They are also able to cancel access
yourself, mobile payments and, more pertinent Today however, technology is moving at a on the go without having to be in front of the
to this publication, access control. rapid pace and the use of mobile phones for server and get real-time notifications on doors
Access control via a mobile device does not your access control system are a reality, with- left open, forced open and other events.
necessarily use biometrics (except in the case out compromising security. That’s what makes Yet another way mobile phones are
of voice biometrics as we explain in another the use of mobile so compelling.” changing in the hospitality environment is by
article in this publication), but makes use She also notes that the highest technology sending your room check-in directly to your
of near-field communications or Bluetooth adoption in the world has been the mobile Continued on page 40
integrate the newer mobile access technolo- mobile and traditional access methods, as well features including, online key management,
gies with older systems since it is unlikely that as an API (application programming interface). instant extended stay, instant room change,
a company will simply decide to replace their Du Toit says the company tries to simplify the personalised promotions. Furthermore, not
entire access control setup with a mobile solu- integration process through the API, but ulti- waiting in long queues gives front desk opera-
tion – although smaller companies may be in a mately it is dependent on the client’s integra- tors time to personalise and welcome guests
position to do this. tion skills. properly, increasing the experience when you
Vink explains that one of the reasons He adds, “Our platform is easy to use and check-in.
Impro’s Access Portal system has been so suc- quick to understand and is really no different “We also offer mobile solutions for our
cessful is the ability to quickly integrate new from an operators point of view when adding cloud-based platform where you can have
technologies into the solution. “Through our or deleting standard credentials or cards on full control over your site(s) from your mobile
modular design, and the inbuilt flexibility of the system.” device anywhere in the world, this includes
the platform, we are able to seamlessly bring in Expanding on the Impro Access Portal solu- cancelling access, who enters your property, is
new products and features.” tion, Vink explains, “Our Access Portal system any door left open or forced open, opening a
Since Impro was purchased by ASSA ABLOY, comprises a variety of solutions, tailored door locally or remotely, multi-site access and
this flexibility has been extended and the for different customers depending on their more.
company can now offer customers credentials specific needs. We have mobile readers that Our standard SALTO platform also includes
securely on their mobile phones. This will are handheld biometric devices for remote BLE (Bluetooth Low Energy) and NFC (Near
require mobile enabled readers on doors (from offsite verification of employees; mobile phone Field Communication). BLE is used as a creden-
a hardware perspective), while the user down- credentials where your phone becomes your tial on the phone and you can use both card
loads a free app and receives the authorised tag, as well as the ability to control your site and phone for access control with bi-direc-
credentials remotely onto their device. “When through a mobile HTML5-enabled device. tional communication. NFC in mobile phones
you want to enter the building, you simply “The options are vast and enable us to is used to update the card with the latest
‘twist’ your phone in front of the reader – no offer each customer a tailor-made solution, credentials for people not frequently visiting
touch necessary – and access is granted.” with off the shelf products, to address their the office and needing to visit remote locations
All these features are able to integrate into specific pain points, goals and needs – both where no networked access control solution is
the company’s Access Portal software suite, for today, but more importantly, for tomorrow deployed.
enabling customers to get a full solution from and beyond.”
Impro Technologies. From SALTO’s perspective, Du Toit says, For more information:
SALTO offers a similar solution, delivering a “SALTO offers mobile solutions for the hos- Impro Technologies: www.impro.net
complete access control suite that comprises pitality industry. Clients benefit from various SALTO Systems: www.saltosystems.com
needed to provide maximised effect for these can also be implemented as an applet which
applications. executes in a SIM chip or Secure Elements for
Impro, well known for its access con- greater levels of protection. A cautionary note
trol technologies, believes that SEOS is the here, says East, is that the latter will introduce
optimum ecosystem for its products. Going dependencies on the underlying hardware and
forward, the company will systematically the mobile network operator.
introduce SEOS as a standard across its entire The encryption on cards is high end but due
access control based range. Adoption of this to the tangible benefits of the technology, there
platform means that mobile devices can now have already been a number of deployments
be used by registered users to gain access into into a various solutions in South Africa. “As soon
premises and to guarantee that the storage as you realise how quickly your credential can
and management of this information is secure be used across multiple media, you realise that
and centrally managed. you as an individual have control over these
platforms using encryption technology. SEOS
International standards helps to ensure that these credentials remain
The SEOS protocol was derived from the best in encrypted until they are needed,” says East.
class standards defined by the National Institute Impro’s Vikki Vink adds that in simplistic
of Standards (NIST) and during the provisioning terms, the greatest benefit of an application- Barry East, Impro.
of digital keys to the selected mobile device, based encryption method such as SEOS is the means that it will be much easier in the future
it establishes a mutually authenticated chan- enhanced security it offers and the ability to to protect against issues that we haven’t yet
nel between the provisioning service and the upgrade or update is radically quicker and experienced. With the increased demand for
mobile device to ensure the safe delivery of the easier than the traditional chip-based method. convenience, this future proofing and the
key material. Similarly, when the credential is “If a card is hacked, the hacker now has ability to quickly react to a possible problem,
being used, a mutually authenticated channel is access to the cards using that chip. In order is crucial. With added convenience, risk often
established between the mobile device and the to stop the hack, you have to recall each unit increases but by using SEOS technology, this
relying party application. and make a hardware change by changing the risk is minimised,” Vink says.
Identity credentials are encrypted while chip. With an application-based encryption
in storage on the mobile device. In addition method, should there be a problem, you only For more information contact Impro
to encryption keys based on the underly- need to push an update to rectify the issue. Technologies, +27 (0)31 717 0700,
ing mobile operating system, the SEOS vault This is where the future proofing is so critical. It [email protected], www.impro.net.
Increased security
Estates quite often require more of the visitor’s details than what is cap-
tured in the pre-authorisation process and enforce that all pre-authorised
visitors and their vehicle details be scanned when arriving at the estate’s
entrance. While the pre-authorised visitor’s destination is predefined by the
system, based on who their host is, guards at the entrances using portable
devices scan and decrypt the visitor’s driver’s licence or ID and vehicle’s
registration disc and on completion update the access control system’s
database with all the accurately captured information.
An audit trail is available which allows estate management to view
who requested a PAC, which method was used to obtain the PAC, when
it was requested and if and when it was successfully created. This also
provides for data mining to establish trends, especially where estates
have a number of venues or host various events, such as wine tasting,
conferences and golf tournaments as well as for levy applications.
The four- or five-digit PAC is randomly generated by the PT-GUEST
system and allows for a single entry and exit through the perimeter
entrances. PACs are valid for a customisable period but expire 24 hours
from first use at the entry point and visitors exceeding this time alloca-
tion will have to visit the administration office to request a manual exit.
PT-GUEST does however also cater for long-term visitors that can be
pre-authorised and have multiple accesses to the estate or business
park over an extended period of time.
Powell says that in instances where sites have perimeter and inter-
nal access points, the PAC will be allocated to allow single entry and
exit access to the main gate but multiple access to the access control
points en route to the destination. It will deny access into any other
area within the estate not allocated to the visitor. This prevents visitors
from driving haphazardly around estates, thereby adding a further
security element to the access control process.
For more information contact Powell Tronics, +27 (0)861 787 2537,
[email protected], www.p-tron.com.
Wireless access solutions abound, but most installed solutions still rely on cables.
Wireless access control systems have been avail- integration capabilities and ease of use can be primary challenges with cloud-based manage-
able for some time, but the uptake has been a significant benefit.” ment (especially in EMEA) is cross-border data
limited. The slow uptake could be ascribed to a So what would persuade the rest of the privacy laws, not the actual integrity of the
number of factors, including the fact that access wired addicts to move to a wired system? It’s cloud system.”
control systems generally have a longer lifespan easy to promote the benefits of not having to With these facts in mind, Hi-Tech Security
than other electronic security equipment. While install cabling throughout your building and Solutions asked some vendors for their insights.
some people may use a three to five year period so on, but the fact is your wireless systems will Our questions were answered by:
for the lifespan of their surveillance cameras require either a power cable or batteries, each • Wouter Du Toit from Salto.
(although some analogue systems have been with their own challenges. The IFSEC report • Riaan Pretorius from ASSA ABLOY.
going for longer than that), access control sys- states that integration capabilities would • Jose A. Gonzalez from Avigilon.
tems break the five-year period with ease. be a primary driver for the move to wireless. • Ingo Mutinelli from Elvey Security
In a 2016 research report by IFSEC Global However, almost equally as important are: Technologies.
and sponsored by ASSA ABLOY (available at • Quicker, easier, less disruptive, cheaper
http://www.ifsecglobal.com/download-the- maintenance. The benefits of wireless
wireless-access-control-market-in-2016/), only • Easier integration with existing access control While it may be old hat to some, it’s worthwhile
5% of the companies that employed electronic systems. to start recapping the benefits of wireless access
access control solutions had a fully wireless • Easy, quick, minimally disruptive installation. control as opposed to its wired counterparts.
system in place; 24% had hybrid wired and wire- • Battery life in excess of two years. Elvey’s Mutinelli explains that wireless offers the
less systems, while 57% had traditional wired When one talks about wireless security installer the benefit of a less complicated instal-
systems using cards and fobs for entry control. implementations of any kind, the focus today lation, “especially in those hard to reach areas
Other reasons for the slow uptake of wire- often leads to the question of security as well where trunking or trenching just isn’t possible.
less may include the different skills required for as mention of cloud or hosted access control. The end-user in this instance receives a more
wireless access, and perhaps the price differ- Security is, naturally, of prime importance complete solution which otherwise would have
ence between wired and wireless systems, today, but with all the talk of data breaches created many more problems such as remodel-
which was initially quite steep. In addition, the and exposure, it may be taken somewhat out ling and rebuilding … if access control was
IFSEC research quotes Blake Kozak, principal of context when it comes to wireless. critical for that location.”
analyst for IHS as noting, “Adoption of wireless There is no doubt that there is a significant He adds that a wireless solution should
systems has been slow in emerging countries security and privacy concern for any security offer a hybrid variation with wired systems.
for reasons including cost of labour, education installation, but wireless is not more or less “The power of hybrid means that wireless
and cost of equipment.” insecure than wired. Someone who wants to becomes complementary as pure wireless
A benefit of wireless access the report hack your system will do so if you do not take does have range limitations.”
highlights is the ease of integration with other precautions, and this applies to any electronic Du Toit expands on this, agreeing that wire-
security and building management systems system, wireless or wired – locally hosted or less access control solutions allow for quicker
– including HVAC (heating, air conditioning hosted in the cloud. installation, but adds that they also provide
and ventilation), surveillance, lighting etc. In the IFSEC report, 51% of the respondents more options for installation. This reduces the
Most of the respondents noted the integration believed wireless is as secure as wired access cost of labour and time on-site drastically.
process was fairly easy, with Kozak adding, control, while only 46% thought cloud-based Pretorius says the ease of wireless access is
“Wireless locks are often specially designed access is secure. Kozak notes: “Overall, properly like using Wi-Fi to connect your laptop to the
for integration with other systems, with only a installed cloud-based management systems Internet, as opposed to a network cable. It just
few suppliers of electronic locks offering their by vetted integrators will meet the security makes everything easier. The benefits extend
own standalone ecosystems. As a result, the requirements of most end users. One of the Continued on page 48
transactions (blacklisted users, battery status cylinders, electronic handles, controllers that As noted at the start of this article, despite
and the state of the door) to the server and can work online and offline with our data-on- the advances made in wireless access control
back. The wireless solution is encrypted with card principle. This is backed up by our latest systems, the majority of the users in the real
AES 128-bit encryption for high security.” web-based software for ease of installation and world still use wired solutions. In addition to
maintenance. All our solutions are scalable and this, many don’t even use electronic access or
Which product? can work completely offline or online with live locking solutions at all. IHS’s Kozak notes that
Should a company decide it is going to opt for notifications and event streaming.” mechanical solutions are not going away any
a wireless access control solution, the ques- Salto’s solution is integrated to many third- time soon: “Although electronic locking sys-
tion arises as to which brand and product to party conventional access control manufactur- tems will continue to see strong growth, IHS
select. There are, of course, many options on ers through its SHIP and Sallis protocols. “With does not expect the mechanical locks market
the market, some from well-known brands like Sallis, we become part of the integrators access to decline. Globally, mechanical cylinders are
the companies mentioned in this article, and control bus via POE or RS-485 through our projected to grow by about 4.6% in 2016.”
others from less well-known brands that are wireless online hardware, where SHIP gives our The current situation is expected to remain
entering the wireless access market with new integrated partners full access to our wireless for the near future. What we are likely to see is
ideas and solutions. online and data-on-card solutions.” more companies making use of wireless access
When making a decision, Mutinelli advises In addition, Du Toit says Salto also offers solutions where it makes sense financially,
that you get what you pay for and one should a cloud-based solution, SaltoKS, Keys as a as well as in smaller projects to gauge the
always look for a product that has a certain Service, using the same wireless online hard- effectiveness of these products. The immedi-
pedigree. “Arguably, the most respected access ware in a slightly different configuration. This ate future, it seems, is hybrid and developers of
product in the local market is Impro. Designed allows the hardware to connect through the management platforms and access products
and manufactured in South Africa to meet Internet or a 3G connection to a secure cloud would do well to adopt a standards-based
our requirements, the product is awesome. platform. “All these solutions are backed up approach to ensure they are able to easily
The addition of wireless really does take it to by mobile access credentials and applications integrate with various solutions.
the next level of convenience, features and where you can use your phone as your key or
security.” as an update point. For more information:
Du Toit says Salto has a wide range of In addition, ASSA ABLOY offers its Aperio • Salto: www.saltosystems.com
products to cater for virtually any door and wireless locking solution. Avigilon sells • ASSA ABLOY: www.assaabloy.com
locking mechanism without using cabling on Allegion’s Schlage AD400 series wireless lock • Avigilon: www.avigilon.com
the door. “Our product lines include electronic solutions and also Aperio. • Elvey Security Technologies: www.elvey.co.za
MiRO Morpho
Distributor: MiRO
Device/solution: Wiegand
Interface
Manufacturer/brand
name: Axxess-E
Biometric technology:
Fingerprint reader
Product description: Distributor/supplier: Ideco Biometric Security Solutions, Gallagher
Axxess-E’s wireless access control solution is easy to deploy, cost- Security, EOH, Impro Technologies.
effective and highly scalable. The solution also includes a Wireless Device/solution: MorphoSmart Optical 300 Series
Wiegand Interface (the only one of its kind, to our knowledge) which Manufacturer/brand name: Safran Morpho/ MorphoAccess
converts Wiegand into RF and RF back to Wiegand, eliminating the Biometric technology: Fingerprint
use of wires while saving you time and money on installations. Product description: The MSO300 Series is a family of high-end USB
Typical applications: Perfect for high-security access control requir- optical sensors. It is based on Morpho’s 25-year experience in the field of
ing fingerprint recognition. electro-optics and forensic quality fingerprint processing algorithms.
Integration support: Fully integrated with the Suprema range of Typical applications: Enrolment.
readers; compatibility with Morpho Sigma readers by early 2017. Integration support: System integration.
Contact details: MiRO Sales, [email protected], 086 123 6476 Contact details: Craig Dubois, [email protected],
www.miro.co.za +27 (0)11 286 5800, www.safran-identity-security.com.
Morpho Morpho
Distributor/supplier: Ideco
Distributor/supplier: Ideco
Biometric Security Solutions,
Biometric Security Solutions,
Gallagher Security, EOH, Impro
Gallagher Security, EOH, Impro
Technologies..
Technologies.
Device/solution: MorphoWave
Device/solution: Morpho 3-D
Manufacturer/brand name:
Face Reader
Safran Morpho/ MorphoAccess
Manufacturer/brand name:
Biometric technology:
Safran Morpho/ MorphoAccess
Fingerprint
Biometric technology: Face
Product description:
Product description: These
MorphoWave is the world’s
3D facial recognition terminals
first biometric access solution
are ideal for environments that
to capture and match four
require gloves or where hygiene
fingerprints with a single hand
is a concern. 3D geometry of the
movement. It implements a pat-
face is calculated with over 40 000
ented, truly contactless tech-
points for enrolment and identi-
nology that not only acquires
fication, providing a high-speed,
extremely accurate fingerprint
hands-free access solution.
data but also overcomes the
Typical applications: Access
challenges wet/dry fingers and
control, enrolment, identification,
latent prints pose to conven-
time and attendance.
tional scanning systems.
Integration support: System integration.
Typical applications: Access
Contact details: Craig Dubois,
control, time and attendance, contactless.
[email protected],
Integration support: System integration.
+27 (0)11 286 5800,
Contact details: Craig Dubois, [email protected],
www.safran-identity-security.com.
+27 (0)11 286 5800, www.safran-identity-security.com.
Morpho Morpho
Distributor/supplier: Ideco Biometric Security Solutions, Gallagher Distributor/supplier: Ideco Biometric Security Solutions, Gallagher
Security, EOH, Impro Technologies. Security, EOH, Impro Technologies.
Device/solution: MorphoAccess Sigma Device/solution: Outdoor MorphoAccess 520D
Manufacturer/brand name: Safran Morpho/ MorphoAccess Manufacturer/brand name: Safran Morpho/ MorphoAccess
Biometric technology: Fingerprint Biometric technology: Fingerprint
Product description: The MA Sigma is a newly launched multiple Product description: The OMA520D is an outdoor version of the MA
recognition (NFC chip reader, PIN and BioPIN codes, contactless card 500+ series. It shares all characteristics of the MA520D (multifactor
reader) touchscreen device. It has a modern glossy black design with verification with Mifare or Desfire cards) and is IP65 rated. Its ruggedised
features designed for market needs and requirements, and brings casing makes it vandal resistant, and it can be used in rough environ-
enhanced security and accuracy (FBI PIV IQS certified optical sensor). ments like mines, oil refineries, etc.
Typical applications: Access control, time and attendance Typical applications: Access control, time and attendance.
Integration support: System integration. Integration support: System integration.
Contact details: Craig Dubois, [email protected], Contact details: Craig Dubois, [email protected],
+27 (0)11 286 5800, www.safran-identity-security.com. +27 (0)11 286 5800, www.safran-identity-security.com.
Morpho Morpho
Morpho Morpho
Distributor:
Regal Distributors SA
Device/solution:
LK179 / MA300
Manufacturer/brand name:
ZKTeco
Biometric technology:
Fingerprint
Distributor: Powell Tronics Product description: The
Device/solution: ATOM MA300 is a metal unit offer-
Manufacturer/brand name: ATOM by Powell Tronics ing a robust, vandal resistant
Biometric technology: Biometric and RFID solution to the African market.
Product description: Capitalising on the innovations of Safran Morpho The IP65 rated unit is perfect
and Impro biometric identification technologies, ATOM time and atten- for outdoor installations. This
dance and biometric management solutions are designed to comple- unit not only offers the latest
ment the efficiency of biometrics with the added benefits of web-based algorithm but one can use
employee time management. ATOM caters for mobile enrolment and the RFID function as well. The
clocking solutions for remote sites. sensor cover provides additional protection from the elements
Typical applications: Time and attendance. and direct sunlight.
Integration support: Morpho Biometrics, Impro Access Control, Payroll Typical applications: Access control.
interfaces. Integration support: Std SDK, ZKAccess 3.5
Contact details: Mike Austen, [email protected], Contact details: Andrew Levell-Smith, [email protected]
086 17872537, www.p-tron.com +27 (0)11 553 3300, www.regalsecurity.co.za
Suprema Suprema
Distributor/supplier: neaMetrics, ADI, Elvey and various resellers Distributor/supplier: neaMetrics, ADI, Elvey and various resellers
Device/solution: BioMini Series Device/solution: SupreMOBILE
Manufacturer/ brand name: Suprema Manufacturer/brand name: Suprema
Biometric technology: Fingerprint Biometric technology: Fingerprint
Product description: Suprema’s range of 500 dpi optical fingerprint Product description: Compact, portable suitcase for Suprema biomet-
sensors with scratch-free surface, high-speed USB 2.0 interface and ric terminals, IP67 sealed for dust, dirt and rain. SupreMOBILE boasts 10
award winning algorithm. BioMini Plus 2, Slim and Combo feature live hours up-time and an optional extended battery and car charger. Real-
finger detection and FBI PIV/FIPS201 certification. Slim and Plus 2 offer time synchronisation is possible using a Wi-Fi bridge or 3G/GPRS/Edge
Mobile IDFAP certification and Combo has contact and contactless modem. Suitable for most mobile environments, the case can be fitted
smart card readers. with BioStation, BioLite Net, BioEntry W or BioEntry Plus.
Typical applications: Civil and criminal identification, fingerprint Typical applications: Mobile time and attendance, random and
enrolment, biometric identity systems, application user security, time emergency roll call, on-demand identification (exams, random visitors),
and attendance. indoor and outdoor environments.
Integration support: Developer API, SDK for Windows and Linux, SDK Integration support: Developer API (device), software development
for Android (Slim), software development integration support, integration support, technical and sales training, architectural system
customised solution development. design consulting.
Contact details: Suprema Team, [email protected], Contact details: Suprema Team, [email protected],
+27 (0)11 784 3952, www.suprema.co.za. +27 (0)11 784 3952, www.suprema.co.za.
Suprema Suprema
Distributor/supplier:
neaMetrics, ADI, Elvey and
various resellers
Device/solution: FaceStation
Manufacturer/brand name:
Suprema
Biometric technology:
Facial
Distributor/supplier: Product description: Using
neaMetrics Suprema’s proprietary algo-
Device/solution: RealScan Series rithms and state-of-the-art
Manufacturer/ brand name: Suprema hardware, this face recogni-
Biometric technology: Fingerprint tion terminal provides near
Product description: FBI certified and AFIS compliant live scanners with real-time template matching
options for single or 10 print flats, rolls, 4 finger slaps and palm. 500 dpi (1:1000 <1 sec, 10 000 [1:1]).
greyscale images, high-quality image capturing with halo effect and It features live face detection, wide 4,3” touchscreen, dual-CPU,
ghost image elimination, wet or dry fingers, automated image quality Mifare/Desfire RFID support, videophone interface and
check and WSQ image compression. Robust and ideal for static and embedded web server. Maximum users: 10 000 (1:1), 1000 (1:N).
mobile operations. Typical applications: Access control, time and attendance,
Typical applications: National ID, immigration and border control, building management systems, CCTV and VMS integration,
criminal applications (police), civil identification, high-speed fingerprint home, office and production automation
capturing. Integration support: Developer API, software development
Integration support: Developer API, software development integration integration support, open platform Wiegand, RS-485,
support, customised solution development, integrated with major civil integrated door control, integrated with major access
and criminal solution providers. control manufacturers.
Contact details: Suprema Team, [email protected], Contact details: Suprema Team, [email protected],
+27 (0)11 784 3952, www.suprema.co.za. +27 (0)11 784 3952, www.suprema.co.za.
Suprema Suprema
Distributor/supplier: Distributor/supplier:
neaMetrics, ADI, Elvey neaMetrics, ADI, Elvey and
and various resellers various resellers
Device/solution: Device/solution:
BioStation 2 BioEntry Series
Manufacturer/brand Manufacturer/brand name:
name: Suprema Suprema
Biometric technology: Biometric technology:
Fingerprint Fingerprint
Product description: Product description:
The latest Suprema Comprises BioEntry Plus and
technology in a beauti- BioEntry W fingerprint/card
ful exterior with massive IP access readers, with the
memory. A maximum latter offering a IK08 vandal-
of 500 000 users (1:1) or 20 000 users (1:N) are supported, with 3 resistant housing with IP65
million logs. Features interactive colour UI, instant matching and rating and optional Power-
authentication (20 000/sec), IP65 for in/outdoors, built-in Wi-Fi, over-Ethernet. The series is
PoE and rapid data transfer (5000/min). Interfaces include TCP/IP, compatible with BioStar 1 and 2 access control management software
RS-485, RS-232, USB and Wiegand. and BioStar SDK. Card options include Mifare/Desfire, HID Prox and
Typical applications: Access control, building management iCLASS SE. Maximum number of users is 5000 (1:1 or 1:N).
systems, CCTV and VMS integration, home, office and production Typical applications: Access control, building management systems,
automation, high-end security. CCTV and VMS integration, home, office and production automation.
Integration support: Developer API, software development inte- Integration support: Developer API, software development
gration support, open platform Wiegand, RS-485 (OSDP), integrated integration support, open platform Wiegand, RS-485 (OSDP), integrated
door control, integrated with major access control manufacturers. door control, integrated with major access control manufacturers.
Contact details: Suprema Team, [email protected], Contact details: Suprema Team, [email protected],
+27 (0)11 784 3952, www.suprema.co.za. +27 (0)11 784 3952, www.suprema.co.za.
Suprema Suprema
Distributor/supplier:
Distributor/supplier:
neaMetrics, ADI, Elvey
neaMetrics, ADI, Elvey
and various resellers
and various resellers
Device/solution:
Device/solution: BioEntry W2
BioLite Net
Manufacturer/ brand name:
Manufacturer/brand
Suprema
name: Suprema
Biometric technology:
Biometric technology:
Fingerprint
Fingerprint
Product description: Rugged IP
Product description:
access reader with fast matching
IP fingerprint terminal
speed (1:150 000/second). IK08
with IP65 rated hous-
vandal-resistant housing with IP67
ing, perfect for outdoor
rating for dust and water protection.
or indoor installations.
Features live finger detection, dual frequency
BioStar 1 and 2 com-
multi-smartcard reader, versatile interfaces
patible, BioLite Net supports full time and attendance and access control
and PoE for easy installation.
functionality for up to 5000 users. It features illuminated keypad, LCD
Max users: 500 000 (1:1); 100 000 (1:N).
backlight and LED indicator, integrated RFID and offers secure door con-
Typical applications: Access control, building management
trol and I/O expansion. Card options include EM and Mifare/Desfire.
systems, CCTV and VMS integration, home, office and
Typical applications: Access control, time and attendance, building
production automation.
management systems, CCTV and VMS integration, home, office and
Integration support: Developer API, software development
production automation
integration support, open platform Wiegand, RS-485 (OSDP),
Integration support: Developer API, software development integra-
integrated door control, integrated with all major access
tion support, open platform Wiegand, RS-485 (OSDP), integrated door
control manufacturers.
control, integrated with major access control manufacturers.
Contact details: Suprema Team, [email protected],
Contact details: Suprema Team, [email protected],
+27 (0)11 784 3952, www.suprema.co.za.
+27 (0)11 784 3952, www.suprema.co.za.
Suprema ZKTeco
Distributor/supplier:
neaMetrics, ADI, Elvey and
various resellers
Device/solution:
BioStation A2
Manufacturer/ brand name:
Suprema
Biometric technology:
Fingerprint
Product description:
Premium access control and
time and attendance terminal
with live finger detection. It
features fingerprint, RFID and PIN with built-in wide-angle camera
with face detection, video phone interface and touchscreen LCD with
Device/solution: ProCapture-T
Android based UI. Max users: 500 000 (1:1) 100 000 (1:N) and 5 million
Manufacturer/brand name: ZKTeco
text logs. Interfaces: TCP/IP, Wi-Fi, PoE, RS-485 and Wiegand. Extensive
Biometric technology: Fingerprint
RF card options supported.
Product description: The ProCapture-T is an access control terminal
Typical applications: Access control, time and attendance, building
applying the most advanced Silk ID fingerprint sensor. Its outstanding
management systems, CCTV and VMS integration, home, office and
performance provides a high identification rate for dry, wet and rough
production automation.
fingers, and it is capable of detecting a living finger for a higher
Integration support: Developer API, software development integra-
security level.
tion support, open platform Wiegand, RS-485 (OSDP), integrated
Typical applications: Access control
door control, integrated with all major access control manufacturers.
Integration support: Works exclusively with ZKBioSecurity
Contact details: Suprema Team, [email protected],
Contact details: Johannes Tlhabi, [email protected]
+27 (0)11 784 3952, www.suprema.co.za.
+27 (0)12 259 1047, www.zkteco.co.za
ZKTeco ZKTeco
Device/solution: FR1500-WP
Manufacturer/brand name: ZKTeco
Device/solution: inPulse+ Biometric technology: Fingerprint
Manufacturer/brand name: ZKTeco Product description: The FR1500-WP is a slave fingerprint reader with
Biometric technology: Fingerprint and vein RS-485 communication interface that is compatible with the inBio Pro
Product description: The inPulse+ is a multi-biometric reader capable access controllers. With its IP65 rated rugged structure, the FR1200
of capturing and processing finger vein and fingerprint biometric data offers extra durability in all weather conditions including outdoor
at the same time. Ergonomic, intuitive and highly secured, inPulse+ environments.
ushers in a new era for ZKTeco in enhancing security with biometrics. Typical applications: Access control
Typical applications: Access control Integration support: Exclusively compatible with selected
Integration support: Works exclusively with ZKBioSecurity ZKTeco products
Contact details: Johannes Tlhabi, [email protected] Contact details: Johannes Tlhabi, [email protected]
+27 (0)12 259 1047, www.zkteco.co.za +27 (0)12 259 1047, www.zkteco.co.za
Device/solution: HID Mobile Ready Multiclass SE Reader Device/solution: Uno & Quattro
Manufacturer/brand name: HID Global Manufacturer/brand name: AccessLine
Distributor: Controlsoft Distributor: Elvey Security Technologies
Supplier: Controlsoft Product description: The 1-door Uno (with 1 x NO/NC relay output)
Product description: With the multiclass SE reader from HID, your and 4-door Quattro (4 x NO/NC relay outputs) controllers each feature
cellphones can provide secure access on any system that supports two 7-segment displays for easy programming via four pushbuttons
Wiegand. Mobile credentials are securely provisioned for supported and LED display. Supporting up to 99 tag holders, a range of readers
smartphones, allowing behind-the-scenes enrolment. This technology is available, with RFID and Pin or RFID only. A software interface and
independent reader supports ‘tap n go’ tagging as well as a ‘twist n go’ download cable are available for event logging (up to 99 event history)
read range of up to 5 metres. and backup.
Application: Access control, multiple card technologies, long range Application: Access control, small commercial and residential applica-
applications. tions, eliminates the need for multiple remote controls or tags, no need
Integration support: Identity Access, Wiegand interface for a PC or software.
Contacts: Marilize Munro, [email protected] Contact details: Elvey Security Technologies, [email protected],
+27 (0)11 792 2778, www.controlsoft.com +27 (0)11 401 6700, www.elvey.co.za
GeoVision SA IDS
Softcon Suprema
Device/solution: X-Station
Manufacturer/brand name:
Suprema
Distributor/supplier:
neaMetrics, ADI, Elvey and
various resellers
Product description: IP card/
pin-based terminal featuring
3,5” touchscreen LCD and
intuitive GUI for full-feature
access control and time and
attendance. Face detection
to record up to 5000 face
logs for extra security and
attendance records. Built-in
camera detects and captures
images of each entry to
Device/solution: CR391 card reader controller detect unauthorised access
Manufacturer/brand name: Softcon and payroll fraud. Card options include EM and Mifare/Desfire.
Product description: This card reader controller is 32-bit microprocessor- Application: Access control, building management systems,
based, designed to execute control of one or two doors, barriers, turn- CCTV and VMS integration, home, office and production automation.
stiles etc. Control of these doors could be via card readers (MAG, prox, Integration support: Developer API, software development
touch, barcode or Wiegand) PIN-pads or push buttons. The controller can integration support, open platform Wiegand, RS-485 (OSDP),
be used as a standalone unit or in an online PC based LAN system. integrated door control, integrated with major access control
Application: Access control manufacturers.
Contacts: Theo Olivier, [email protected], +27 (0)83 390 6693, Contact details: Suprema Team, [email protected],
www.softconserv.com +27 (0)11 784 3952, www.suprema.co.za
Suprema Suprema
Device/solution: Device/solution:
BioStar 2 X-pass Series
Manufacturer/brand Manufacturer/brand
name: Suprema name: Suprema
Distributor/ Distributor/supplier:
supplier: neaMetrics, neaMetrics, ADI, Elvey
ADI, Elvey and various and various resellers
resellers Product description:
Product description: High-level security,
Cloud- and web- smart IP card-based
based open access control.
security platform for Ultra-compact
access control and design with
time and attendance. Power-over-Ethernet,
Easily integrate with third- party systems, IP65 rated for indoor and outdoor installation. S2 extras include
build new applications and functions into BioStar 2 using built-in adaptive heater for operation between -35°C to 65°C.
Web API, Device SDK and Web inlays. Features Cloud implementation Multi-smart card reading, including NFC. Fits into switch box
and updates, auto user synchronisation, automatic device mounting. Expanded capacity – up to 50 000 user badges and
discovery, anti-passback, fire alarm and BioStar Mobile for Android 100 000 event logs.
and iOS. Application: Access control, building management systems, CCTV
Application: Access control, time and attendance, office and and VMS integration, home, office and production automation,
business security. smart IP door/boom controller.
Integration support: RESTful Web API, Device SDK, Integration support: Developer API, software development integration
customised Web inlays, software development and integration support, open platform Wiegand, RS-485 (OSDP), integrated door control,
support. integrated with all major access control manufacturers.
Contact details: Suprema Team, [email protected], Contact details: Suprema Team, [email protected],
+27 (0)11 784 3952, www.suprema.co.za +27 (0)11 784 3952, www.suprema.co.za
ZKTeco ZKTeco
ZKTeco ZKTeco
Device/solution: ZK-D3180S Device/solution:
Walk Through Metal Detector TS1000 Tripod
Manufacturer/brand name: Turnstile
ZKTeco Manufacturer/
Product description: The brand name:
ZK-D3180S walk through ZKTeco
metal detector has 18 mutually Distributor: ZKTeco
overlapping detection zones Product
whose sensitivity can be description:
individually adjusted. With The TS1000 is a
an easy, modular assembly semi-automatic,
design, the metal detector bidirectional,
can be operational within vertical tripod
10 minutes from unpacking. turnstile. These
The unit comes with a 5,7” stainless steel,
display that automatically compact models
displays the user count and alarm offer high operating
count. reliability in a small casework, ideal for sites where space is an
Application: Access control, issue. In case of emergency, the horizontal arm will drop. The
security inspection TS1011 and TS1022 models feature built-in ZKTeco controllers and
Contacts: Johannes Tlhabi, readers.
[email protected], Application: Access control
+27 (0)12 2591047, Contacts: Johannes Tlhabi, [email protected],
www.zkteco.co.za +27 (0)12 259 1047, www.zkteco.co.za
ZKTeco ZKTeco
Device/solution: LH4000
Mifare Hotel Lock
Manufacturer/brand name:
ZKTeco
Product description:
The LH4000 Hotel Lock is
manufactured specifically for
small to medium hotel door
installations. It works with
13,56 MHz Mifare cards that
are programmed for a certain
room for a certain period.
The door locks are set up via
programming cards from
the ZKBioLock Hotel Lock
Device/solution: ZKBioLock Hotel Lock System software.
Manufacturer/brand name: ZKTeco Application: Access control
Product description: The ZKBiolock Hotel Lock System is specially Contacts: Johannes Tlhabi,
designed to meet the needs of small to medium hotels, motels [email protected],
and bed-and-breakfasts. The system offers maximum security, +27 (0)12 259 1047,
individual style and low operation costs. This Hotel Lock System covers www.zkteco.co.za
comprehensive access control features in a user friendly interface.
Application: Access control
Contacts: Johannes Tlhabi, [email protected], +27 (0)12 259 1047,
www.zkteco.co.za
ZKTeco ZKTeco
Device/solution: LH5000 Device/solution: SKW-V
Mifare Hotel Lock Manufacturer/brand
Manufacturer/brand name: ZKTeco
name: ZKTeco Product description:
Product description: The SKW-V is an outdoor, IP65
LH5000 Mifare Hotel Lock rated, vandal-resistant
is a lock especially metallic RFID reader with
designed for the small to a backlit keypad. It has a
medium size hotel door built-in 12 V relay contact
lock installation. The which can be connected
LH5000 comes with an directly to a 3rd party
American standard electric lock. SMK-V also has
mortise with 5 latches. The a built-in Wiegand-Out port
lock gets programmed via which can be connected to
programming cards from almost any access
the ZKBiolock Hotel Lock control panel, including the
System. ZKTeco range of controllers.
Application: Access control Application: Access control
Contacts: Johannes Tlhabi, Contacts: Johannes Tlhabi,
[email protected], [email protected],
+27 (0)12 259 1047, +27 (0)12 259 1047,
www.zkteco.co.za www.zkteco.co.za
that uses the capabilities of RFID read/write Du Toit, however, says battery power is not a securely. No information is stored in the cloud
technology.” real concern. Salto allows for up to 40 000 open- that could compromise the security of the
In the Salto Virtual Network (SVN), all access ings on a single device and the battery status lock. The company runs its own Salto private
data is stored on and distributed by its operating is written back to the system for maintenance cloud for Salto KS. “We’re talking about a 100%
smartcard. When presenting a smartcard to reporting and support. When the unit gets to the owned cloud as a result of Salto’s acquired
an SVN standalone door, not only does this last 1 000 openings it will visually warn each user knowledge and expertise.”
control access rights to that door, but thanks that enters as well as the system administrator. If A supporter of cloud technology, Du Toit says
to two-way communication, the door also all warnings are ignored, there are also PPDs and advances in cloud technologies allow function-
writes data like blacklist information or battery portable battery packs that will power the unit alities that were previously impossible to be
status back to the smartcard. “The smartcard from the front to allow for battery replacement. implemented, including multi-site location and
then transmits this information back to the “Some clients do opt for a mechanical key connected services, as well as CCTV integration
server via online wall readers that are able to override,” says Du Toit, “but this adds more cost with a cloud-based surveillance solution.
update and receive information from the cards to the system and then you have the problem The ranges of both Salto’s and ASSA
anytime and anywhere in the building. When of managing the keys.” ABLOY’s electronic locks are suited for a variety
the lock is wireless online, we can also receive of industries and uses. The companies have a
the data through the wireless network.” Cloud control great deal of experience in the access industry
Another concern, already mentioned in this As cloud or hosted access control grows in the and have therefore designed these systems
publication is that of battery power. One does market, it would make sense for organisations with a view to integration with other systems
not want any hold-ups because the battery on to manage their electronic locks via a cloud- which are able to drive the locks according to
an electronic device has failed and you have to based access management system, or larger the processes developed and approved by the
wait for someone to arrive and open the door security management system. Erasmus says this organisation.
or change the batteries. isn’t a problem because his company’s locks can
Erasmus notes that ASSA ABLOY locks have the work with almost any access control system. For more information:
cylinder-override function, which allows for the Salto’s electronic locks are also cloud ASSA ABLOY: www.assaabloy.com
door to be opened manually if the batteries do fail. driven, but Du Toit says they use the cloud Salto Systems: www.saltosystems.com
IP delivers many benefits to the access market, but it’s a case of slow
and steady wins the race.
Unlike the surveillance market, the access con- recent acquisition of Impro shows this is the building or security system will be judged on
trol sector of the security industry is not known beginning, not the end, of consolidation in our the solution it offers for the price: How much
for constant innovation – not that it has been market as the global players look to acquire bang for your buck from a single source.”
resting on its laurels. Perhaps this is because new technology or buy market share.”
the concept of controlling access to a building Brian Wynberger, national technical manager Benefits of IP
or campus has always been a fairly standard at Reditron, adds, “the move to IP can be If users are to migrate to IP, they first need to
process. Over the past couple of years, how- attributed to a few reasons: the utilising of understand the benefits they can obtain and
ever, the industry has followed the surveillance existing cabling infrastructure makes sense why the move is worth the effort. Too many
market in making the move to IP-based access economically, eases installation and enable easier companies have been taken in by the promises
control, but without the fanfare we hear from integration of security systems.” of new technology, only to find they fail to
the CCTV world. Taking a somewhat more philosophical deliver when it counts, or that simplicity or
The move to IP could be seen as a natural approach, John Loudon, brand manager for other benefits expected are not realised.
evolution, or perhaps the requirement to more access control and fire at PinnSec, notes that IP technology enables the integration of an
easily integrate access with other security as well all access control systems (ACS) have always existing security system, which might consist
as building management systems. The integra- incorporated an element of IP in them, even if it of CCTV, access control and intruder alarm into
tion of access control and video surveillance is a just a basic server/client environment. “Most of a single user interface platform, says Drayton.
popular example of this. With everything running the popular ACS in Africa provide IP connectivity “However, the proprietary cabling and protocols
on the same network, management becomes between all their components and promote this for legacy systems makes this almost impossible or
simpler and the skills required for maintenance IP option as the preferred configuration. I do not at the least hugely complex and expensive. Today,
and repairs are also consolidated. And, of course, think any one company dominates the move to there are many integration options for installers to
the ability to host your access solution in the cloud IP, but I enjoy the perceived competitiveness IP use. For example, all Paxton integrations are
is also simpler. Of course, this is not completely has brought the ACS industry.” available free of charge, while most of the market
dependent on simply adopting IP as your base He is of the opinion that the move to IP is still charges, further delaying their adoption.”
infrastructure, but it helps. being driven by current entrenched players that Echoing these sentiments, Wynberger says
In a ‘pure’ IP access controlled solution, the can offer the best of both worlds (IP and other- having your security system of CCTV, access control,
idea is that more functionality is also to be found wise). Newcomer solutions seem to offer IP only fire and intruder operating in an integrated
in the reader/controller, once again expanding and the African market may still have some trust solution is undeniably useful, and “this is what IP
the scope of the access control system beyond issues regarding redundancy when it comes to technology has enabled”. For example, he says
simply allowing someone through a door or relying on an exclusively IP solution. “People like Reditron can now supply customers with a fully
not. While it is fairly clear today that IP is the and trust what they know and IP networks in integrated Avigilon, Paxton, and ViRDI system
future of access control, Hi-Tech Security Solutions Africa contend with a set of issues not commonly working as a single seamless solution.
asked a number of people active in the industry experienced in First World environments. I would As access control does not consume
locally for their take on how the African market is imagine this could be an issue for newcomers with bandwidth like a CCTV implementation does,
moving (or not) to IP. Are we about to see a mass an IP only system.” it is simpler to implement access control on
migration or a more conservative approach? However, he does add that Africa is starting the same network as the e-mail, Internet and
to trust IP reliability, understand the ease of business systems. Loudon says this also means
Consolidation or not implementation and although IP equipment is the user’s IT department can take ownership,
Dan Drayton, Paxton’s country manager for slightly more expensive, it is a lot less costly on provide first line support and have total control.
South Africa believes the launch of global the labour and implementation side. Loudon “Sometimes the challenge is getting these
companies such as Paxton into the South does not expect IP to be a big integration IT departments to accept responsibility and
African market in recent years has helped drive driver; however, expecting integration and ownership for yet another business process.
the change to IP, making some of the domestic multi-faceted solutions will eventually dominate In my opinion, it is a major benefit for an
brands move quickly to bring their own IP the environment because that is what customers installer/integrator to pass the database and
solutions to market. Moreover, he says, “the demand. “We believe in the very long term a Continued on page 80
Tyco Security Products is taking a proactive role in securing its range of physical
security products by developing its Cyber Protection Programme.
As if the job of specifying, installing and move has started and there is no stopping it. as possible when they do arise. To date Barkley
maintaining physical security products is not The traditional physical security approach says Software House access control solutions,
hard enough, recent news reports have shown to cyber security is to ignore it as the whole American Dynamics video management systems
that many of these devices – mainly cameras cyber issue is seen as an IT problem and left to and Illustra IP cameras are all on board, with
and DVRs at the moment – are being used in the people who manage servers and data further products from the group in the pipeline.
botnets. These are networks of devices, which centres. As everything in the access world
can be anything from computers to cameras moves to IP and being connected, this is no Six-step programme
(or any electronic devices) that have not been longer an acceptable approach. The Cyber Security Programme has been
properly secured and as a result are infected Of course, security of any sort is never divided into six parts. This is to ensure that the
with malware. one person or department’s responsibility programme covers all the aspects of security,
This malware normally sits on the device (although many try to make it so). It takes not simply covering certain components of
and doesn’t cause any trouble until the owner, collaboration across the board, from manu- the solution while ignoring others.
or those renting the botnet from the owner, facturers to installers and end users to make
decide to target a company or person. Then, security work. 1. Secure product development practices
all the devices work together to carry out Tyco Security Products is taking a proactive Tyco trains its developers and engineers to
their attack plans. A recent example can be role in securing its range of physical security code and test their products securely
seen at www.krebsonsecurity.com/2016/09/ products by developing its Cyber Protection throughout the development cycle. It has
krebsonsecurity-hit-with-record-ddos. Programme. Jeffrey Barkely, product manager also launched a Cyber Protection Team, an
While access and identity devices are not at Tyco Security Products, spoke to Hi-Tech independent branch of the development team
known to be involved in already identified Security Solutions and explained that the with the authority and responsibility to manage
botnets in any number, it stands to reason multifaceted programme is focused on the development process and final product
that network connected devices, especially delivering a holistic approach to cyber security release. This team is tasked with monitoring
Internet-connected devices, form part of the awareness, covering all the bases from the compliance according to the company’s ‘secure
global Internet of Things (IoT) network. As manufacturer to the end-user. development best practices’.
such, they can be used for cyber attacks The idea is to reduce the risk of cyber crime
either on the company using them, or on happening to end users by minimising the 2. Inclusive protection of components and
third parties. Access control has been a slow potential for the introduction of vulnerabilities systems
learner when it comes to moving to IP, but the into products as well as resolving issues as fast This step is to ensure that all components
of a solution are tested and verified before on the products to verify their security status As noted above, security requires
reaching the customer. Some of the steps in and compliance. buy-in from all parties and the Cyber
the process include end-to-end encryption, Security Programme from Tyco covers all
encrypted database communications, system 5. Rapid response to vulnerabilities the bases, from the product manufacturers
auditing, alerting and management, and denial Since vulnerabilities are being discovered through to the end users. As many integrators
of service attack protection. every day – or so it seems – the Cyber Security will testify, the end users are probably the
team is continually on the lookout for new most important link in this chain as they are
3. Configuration guidelines for compliance threats. The team consists of engineers from often the ones who opt for the cheapest
Taking the process beyond the development product security, development, quality and solution that is almost guaranteed to be
stage, the team also provides integrators and tech support. They evaluate each threat insecure – although no company would say
installers with documentation to assist them and decide if it can be dealt with in the next that publically. Hopefully, the training and
in installing systems securely, and to comply upgrade process or if they need to send out a advocacy Tyco is involved with will be echoed
with various standards and regulations. For hotfix as soon as possible. throughout the physical security industry
example, Tyco uses the Risk Management Barkley notes that recently the team was and both users and integrators will come
Framework from NIST 800-53 – ‘Security able to develop, test and release patches for to understand the importance of effective
and Privacy Controls for Federal Information critical vulnerabilities such as Heartbleed (en. security, even if it’s only in the interest of
Systems and Organizations’ – to help users wikipedia.org/wiki/Heartbleed) and Shellshock self-preservation.
configure access control and video systems (en.wikipedia.org/wiki/Shellshock_(software_ For more on the programme, please see
that require a high level of compliance. bug)) in just two weeks. http://www.tycosecurityproducts.com/pdf/
cyber_protection/Cyber_Protection_Program_
4. Ongoing rigorous testing 6. Advocate and educate eBook_REVE.pdf (short URL: s ecuritysa.
The Cyber Protection team continues The sixth step of the programme is the educa- com/*tyco1).
testing products against known and new tion of partners and customers regarding the
vulnerabilities to ensure properly installed necessity of securing their infrastructure. This For more information contact
solutions remain as secure as possible. This includes training and development certifi- Tyco Security Products,
testing also applies to software updates and cations, and the team also travels globally +27 (0)82 566 5274,
new configurations. Moreover, third parties are advocating for the rigorous protection of all [email protected],
also employed to conduct independent tests security systems. www.tycosecurityproducts.com.
Continued from page 90 ensure that the systems are secure and up-to- vendors claim to provide ‘enterprise identity
date, and in many cases, surpass the level of management’, but if you take a closer look,
Stability testing that on-premise solutions undergo. they oftentimes only connect to on-premise
Contrary to popular belief, cloud-based solu- directory systems and not with on-premise
tions do not necessarily offer less stability than Cost applications. Take a close look at what vendors
an equivalent system deployed on-premise. SaaS solutions have shifted the cost and claim they do when it comes to application
By design, many enterprises do have a single consumption model for enterprise applications. access and understand what it really means.
point of failure in parts of their IT infrastructure. The models have shifted from the on-premise After all, the ability to access only external SaaS
In fact, organisations can rarely justify fully licence associated with an upfront capital applications provides only half of the equation
redundant infrastructure for 100% of their expense and annual maintenance costs. This when it comes to business impact.
applications and are faced with selecting just has shifted to a subscription-based approach,
a few key systems. In comparison to a cloud- which usually can be classified as operational Fit with existing processes
based solution, it runs on commercial-grade expenses. Given this, it’s important to When it comes to IAM systems, especially
cloud infrastructure, which is more robust than understand how your organisation treats IDaaS solutions, this is an ideal time to engage
an organisation’s standard infrastructure. This, in capital expenses vs. operational expenses. In with the line-of-business (LOB). Take this as an
turn, provides a higher level of uptime. some scenarios, it’s easier to secure funding opportunity to analyse and improve your
and execute for operating expenses, which current business and technical processes.
Security would help make the case for IDaaS. During time of change, it is always a good
Now that your data is stored in the cloud, a Then, it is important to understand the total chance to re-evaluate current processes and
common fear is the loss of control, given it cost of ownership behind on-premise vs. SaaS determine whether changes are required. The
sits outside your organisation’s traditional solutions. At first glance, the sticker prices will key in choosing an IDaaS vendor in this process
boundaries. Again, contrary to popular belief, naturally vary, but also think about hidden costs is to find one that is flexible and can adapt to
on-premise deployments are not automatically associated with implementation, customisation, your current (or proposed) processes.
more secure than cloud-based deployments. time-to-deployment and maintenance. If There is no quick answer when it comes to
The notion of a traditional security perimeter has your organisation requires complex use cases, understanding whether IDaaS is right for your
been shattered, and in place of that, organisa- oftentimes custom coding is far more involved organisation. The best thing you can do for your
tions are responding to the demands of business and costly than a simpler configuration-based organisation is ask the right questions, assess
agility and have opened up internal applications deployment. Most organisations find that your organisation’s business and technical goals,
to partners, customers, and suppliers. cloud-based solutions are easier to deploy and and of course, apply it all in the context of
By doing so, they have of course also faster to derive immediate value from, which your business. With the right level of thought,
opened up their vulnerability to an evolving translates to a lower cost of ownership. planning, and reflection, IT can successfully
generation of hackers. IDaaS solutions are leverage cloud-based IAM across the organisation
deployed with a very limited set of entry Interoperability with on-premise applications for maximum impact.
points, which reduces the potential in an As valuable as it is to access external SaaS To download the full white paper, go to
attack. IDaaS vendors also typically go through applications, it is just as critical to access http://www.emc.com/collateral/white-paper/
rigorous and ongoing penetration tests to on-premise applications as well. Many IDaaS h13026-making-case-idaas-wp.pdf
Eight key identity and access management practices that will help you improve your
identity management system to ensure better security, efficiency and compliance.
Identity and access management (IAM) isn’t identity management system to ensure better 2. Define identities
something you do once and then forget about. security, efficiency and compliance. The next best practice is to implement a single,
It’s an ongoing process, a critical part of your integrated system that provides end-to-end
infrastructure that demands continuous man- Eight best practices management of employee identities and that retires
agement. Even if you have a fully implemented 1. Define your workforce orphaned or unneeded identities at the appropriate
directory, it’s never too late to take advantage Your organisation’s workforce is managed by time. This is where IT responsibility formally begins
of best practices to help continuously manage your personnel or human resources depart- in the identity management lifecycle. Typically, you’ll
this crucial part of your environment. ment. They also have to manage information identify the following:
A key insight about identity and access about people who are not employees, such • A primary directory service (often Active
management is beginning to emerge in our as contractors and consultants. Most of these Directory).
industry: contrary to common practice, IT people require access to company resources. • A messaging system (such as Exchange Server or
should not be heavily involved in identity The first best practice is to use your HR Lotus Notes).
management. Too often, IT is placed in the role systems as much as possible as an authorita- • A primary Enterprise Resource Planning (ERP)
of “gatekeeper” simply because only IT has the tive source of data for your identity and access system (such as SAP).
tools needed to manage identity. But with the management system. This will help you avoid Once identified, these crucial systems are
right identity management tools in place, IT repetitive work, errors, inconsistencies and integrated into the overall identity management
maintains the tools and infrastructure, and the other problems as the IAM system grows. architecture. Why focus on these three kinds of
business controls the actual identities. Ideally, you’ll provide some kind of managed systems? Primarily because they deliver a “quick win,”
Here are eight key practices, gathered front-end, such as a web-based interface that providing identity integration across the most-visible
from years of experience and informed by this can be used to verify the quality of the imported and most-used resources that users interact with on
key insight, that will help you improve your data, revise data as needed and so on. a daily basis. More systems can be integrated later.
4. Implement workflow
Although technology is always about embrac-
ing change, unmanaged change causes prob-
lems. Implementing a ‘request and approval’
workflow provides an efficient way to manage
and document change. A self-service user
interface (often web-based) enables users to
“Use your HR systems Define compliance rules step by step,
and assign each step to a responsible
request permission to resources they need. as much as possible as an job role. Integrate rule checking in your
Data owners and custodians can respond to
these requests, helping the business ensure
authoritative source of identity management system and work-
flow operations to help automate reme-
appropriate access, while removing IT from data for your identity and diation of incorrect actions; this will help
the decision-making role in permissions
management.
access management improve consistency and security as well as
compliance.
You might begin by defining different system.”
kinds of permission sets, each with its own 7. Check and recheck
workflows. This enables different kinds of These provisioning tasks typically involve In a well-designed identity management
data and tasks to be treated appropriately, connections to numerous systems, includ- system, permissions are typically assigned to
depending upon their sensitivity. Take the ing email, ERP and databases. Prioritise job roles rather than to individuals, but organ-
time to define who can control that list of these systems so that the most important isations are still likely to simply assign permis-
services, who is responsible for managing and visible ones can be automated first, and sions as needed and never review them again.
workflow designs, and so on. For example, clearly define and document the flow of data This practice invites security risks.
financial data might require more extensive between these systems and your identity Permissions require periodic recertification –
approvals when changing permissions than management toolset. Focus first on automat- you need to review who has access to what
company-wide information (such as details ing the basic add/change/ delete tasks for and determine whether or not they should
about the next company picnic), which might user accounts, and then integrate additional still have those permissions.
be changed with relatively little workflow tasks such as unlocking accounts. Define job roles within your organisation
required. that can recertify permissions, such as system
6. Become compliant owners, managers, information security
5. Automate provisioning Many companies are now affected by one officers and so forth. Recertification can be
You need to manage new users, users who or more industry or governmental regula- defined in a workflow in which data owners
leave the organisation, and users who move tions, and your identity management system and custodians review a current permission
or are promoted or demoted within the can play a central, beneficial role in helping set and verify the accuracy (or inaccuracy) of
organisation. Provisioning, de-provisioning you to become and remain compliant. You’ll that set. The idea is to regularly make sure
and re-provisioning are often time-consum- need to focus on clearly defining and docu- that the roles and people who have permis-
ing manual tasks, and automating them can menting the job roles that have control over sions to resources should continue to have
not only reduce overhead but also reduce your data, as well as the job roles that should those permissions.
errors and improve consistency. have access to auditing information. Continued on page 96
Dell One Identity Manager provides comprehensive yet simplified identity and access management, which enables organisations to follow the
eight best practices for IAM outlined in this brief.
GarantiBank Romania
In 2009, GarantiBank was authorised access
to the Romanian market by the National Bank
of Romania, becoming operational by the
end of May 2010. GarantiBank is a universal
bank offering a large range of products and
services to all business segments. In Romania,
GarantiBank benefits from the support of
its established international and Turkish
operation. Security installers began with the implementa- recorders now provide video surveillance.
tion of a full-blown solution. While in the past each site was managed
Pre-existing situation independently, GarantiBank Romania’s central
Like most banks, GarantiBank pays special UTC solution security operations is now equipped with UTC
attention to the safety and security of its GarantiBank’s Romanian sites have been Fire & Security’s Alliance security manage-
assets, but more importantly, that of its equipped with UTC Fire & Security’s ATS Master ment tool. This software tool allows security
employees and clients. In order to build control panels, covering intrusion detection personnel to monitor, operate and maintain
a robust and reliable security solution, and access control. Over 150 ATS panels have all aspects of the UTC Fire & Security, security
GarantiBank started looking for a solution that been installed, connecting approximately 1400 solution. This solution allows GarantiBank
would offer access control, intrusion and fire intrusion detectors and 600 badge readers. Romania to optimise its security operations,
detection and video surveillance. Looking at In addition to this, a fire detection system has while increasing safety and privacy.
the different options in the market, UTC Fire been installed, supported by over 1500 heat
& Security was selected as its manufacturer of and smoke detectors. For more information, contact UTC Fire & Security,
choice throughout Romania. After evaluating To complete the system, more than 100 +27 (0)11 579 7300, [email protected],
the current lay-out of the sites, local UTC Fire & of UTC Fire & Security’s TruVision digital video www.tcfssecurityproducts.eu
Passage to luxury
Besam door system facilitates passage of luxury vehicles through showroom.
The seamless operation of Besam bi-parting and the mechanism was completed with a evacuation, for safety and ease of use the door
sliding door system from Assa Abloy Entrance Technical Data Besam Frame BreakOut unit. sensors can be toggled to an option of the
Systems allows for the easy passage of vehicles According to Aiton, these units can open the user’s choice. For example: OPEN, the door
in and out of a luxury vehicle show room in full length to enable vehicles to be moved in stays permanently open, or AUTO, for normal
Fourways, Johannesburg. and out of the showroom with ease. two‑way operation, other settings include,
Managing director of ASSA ABLOY Entrance Ultimately, the doors keep adverse weather AUTO PARTIAL (door can be opened partially
Systems South Africa, André Aiton, explains conditions such as heat, cold and wind (even with the inner and outer activation units), ONE
that the new doors required for the vehicle insects) outside, while maintaining a constant WAY (passage from one way only), OFF (door
showroom had to be specially designed to comfortable indoor climate. By preventing the cannot be opened from either side and RESET
withstand continuous use at a high degree of air conditioning from escaping, this environ- (door will return to the closed position and
safety to avoid injury to customers and staff as mentally friendly solution reduces energy function as normal).
well as damage to vehicles. Alongside con- consumption, saving electricity costs for the ASSA ABLOY Entrance Systems partnered
venience, the doors also needed to be visually vehicle dealership. with Edelweiss glass and aluminium to com-
appealing to customers. A further requirement Additional benefits include a 12-month plete the installation to meet the customer’s
from the customer was that the door system warranty (beginning at time of delivery), deadline.
be reliable to ensure a maximum lifetime. regular service inspections by a trained quali-
The order included Besam bi-parting doors fied individual and a one-year maintenance For more information contact ASSA ABLOY
complete with side screens and break-out, contract (with an option to extend). Entrance Systems SA, +27 (0)11 761 5000,
beam mounted solutions. A total of three bi- All sliding door operators are linked to [email protected],
parting break-out unit operators were installed the fire alarm systems for safety and easy www.assaabloy.co.za
VixNet introduces a new access control solution for electricity meters and
distribution enclosures, substation entrance doors and more.
To most people, access control means some- communications networks in Gauteng and the All these events are logged on the server to
thing you attach to a door or a gate. There are, greater Cape Town region, based on direct- keep an accurate record of who was involved
however, other areas where access control is sequence spread spectrum (DSSS) technol- on which jobs at what locations. The reader
beneficial. ogy. The DSSS system provides bidirectional itself will also keep a list of past access events
Take a utility box at the side of a road, communications and does away with the need in memory, replacing the oldest events with
whether it is used for electricity or telecom- to manage SIM cards. More importantly, it is the latest.
munications is irrelevant. What is relevant is designed to be jamming resistant and triangu- Not only does SACU permit access to these
that access to these boxes is fairly simple to lation techniques provide positioning that is enclosures, it is also able to send a warning
allow for easy and fast access by technicians. accurate to within 4 metres. if a door has been left open. SACU includes
However, this is also why it is so easy for crimi- To control access to enclosures with SACU, other monitoring functions, such as built-in
nals to sabotage Telkom communications or companies can attach electronic access con- temperature monitoring and shock detection.
hook up illegal electricity cables. To implement trolled locks to the doors they wish to protect. Accurate positioning through triangulation
access controls in these situations has been The locks are linked to a central command via VixNet’s towers, and an audible alarm is
difficult in the past because there could be any server over VixNet’s network where a central also on the reader. In case of a power failure, a
number of technicians sent to work on a box, command station controls who has access battery, charger and monitor is also included
and if an access card or PIN was compromised, and at what times. Technicians working in the to ensure authorised people have access in any
anyone would be allowed to gain access. area permanently could be given 24x7 access, circumstances.
VixNet is a technology company with a long or individuals could be assigned to specific SACU takes traditional access control and
history of developing communications solu- jobs, with only the appointed technician being gives it a new, remote controlled role for use in
tions for the security industry. The company granted access for a specified time. cabinets and enclosures that are of necessity
recently came up with a new access solution When the individual arrives at the enclosure, located in open, public areas, but still need
that takes its communications expertise and they present their access card to the reader. The to be protected from unauthorised access.
combines it with access control. SACU is a system then communicates to the central sta- Utilities can now protect their electronics more
solution from VixNet that targets these public tion where the server will decide if that person easily while keeping exact records of who was
enclosures, including electricity meters and is allowed access at that particular time. If he/ where and what they were doing.
distribution enclosures, substation entrance she is, then the door is unlocked; if not, the
doors, mini-sub access doors, street lighting door stays locked. Should the enclosure have a For more information, contact VixNet,
control panels and so forth. rear door, permission to open this is granted if +27 (0)11 100 1969, [email protected],
SACU makes use of VixNet’s RF appropriate once the person has badged in. www.vixnet.co.za
XTime has evolved into a control, time and attendance and visitor
management solution.
When G4S Secure Solutions first developed its new features they want, and our software devel- as that portion can be generic across various
XTime workforce management solution about 15 opment strategy is to always be open to new suppliers. The system is very flexible and can be
years ago for a couple of large mining clients, it ideas for improvement and added functionality,” configured and segmented in various ways to
could not have imagined what the system would he states. Some of the extra features that have accommodate a wide variety of physical limita-
eventually grow to become. Through continual been added in this way over the years include tions, such as network speed, down-time and
in-house development, XTime has evolved into a the likes of health and safety, fatigue manage- lack of infrastructure.
fully fledged access control, time and attendance ment and canteen management, among others. “Another strong point is our generic interface
and visitor management solution capable of Since no two organisations’ requirements are platform which forms the foundation of most
interfacing with all the major enterprise report- the same, the system is modular to allow each of our payroll and ERP system interfaces. XTime
ing systems (ERS) and payroll platforms. client to fine tune it for their particular needs. It is caters for a vast range of identification and verifi-
According to G4S software development licensed as a core module, with optional activa- cation mediums, i.e., RFID, active tags, biometrics
manager, Johan van Heerde, XTime has thus far tion of additional modules such as for mining (finger, facial, vein) etc. The system has been tried
enjoyed the best adoption by clients operating or equipment. Typically hosted on the client’s in tested in many sectors and environments,
in mining, heavy industry and government/para- own server as per IT policy and in line with PoPI including mining, oil and gas, and manufactur-
statals, with a footprint covering roughly 60% (protection of personal information), G4S is also ing, to name just a few,” van Heerde says.
of the large mining and industrial sites in South able to host the system and database on its own Van Heerde says G4S’ strategy is to continue
Africa. However, he points out that it offers ben- servers. to expand XTime’s penetration into markets
efits to any organisation with a large workforce Further flexibility is demonstrated by XTime’s beyond those in which it already has a strong
that is typically paid according to time worked, or extensive integration between many hardware foothold. He believes its already powerful
not worked, in order to keep track and manage vendors’ platforms and the G4S system control- capabilities, combined with the company’s
overtime, short time and so on. “We are currently ler, allowing it to be used in existing installations. commitment to listen to what the market wants
exploring how features that have already been For new projects, G4S has partnered with local and enhance it accordingly, will see the XTime
developed for XTime can benefit clients in other manufacturers in order to offer its own hardware solution grow from strength to strength in the
industries such as construction, hotel and leisure, solution. years to come.
and others,” he states. “The system controller itself includes a subset
Van Heerde believes that XTime offers of the database onboard to ensure full valida- For more information, contact G4S,
significant advantages over competing solutions. tion on- or off-line,” explains van Heerde. “The +27 (0)10 001 4500,
“By taking the time to speak with our clients face strength of the controller lies within our firmware [email protected],
to face, we are in a perfect position to learn what and not so much the actual controller hardware, www.g4s.co.za
4C Technology designs, installs and services access The Boomgate Advertising Barrier is designed to place
control and identity management systems. We advertisements 830 mm (h) up to 4.2 m (l) underneath the boom arm and offers
integrate ‘best-of-breed’ technology that best fits additional advertising on the cabinet which has a light box. This patented design is
your requirements and budget and offer turnkey projects with a detailed scope- the first in South Africa. It can interface with any parking management system.
of-work and project plan to optimise delivery and client satisfaction.
Contact: Andre Rossouw or Sharon Findlay
Contact: Paul Frewen Tel: +27 (0)82 410 4921 or +27 (0)82 448 1488
Tel: +27 (0)11 608 0596 [email protected] or [email protected]
[email protected] 18 Minerva Avenue, Leaglen, Roodepoort
14 High Street, Modderfontein www.boomgatesystems.co.za
www.4c-technology.com Branches: Cape Town
Disclaimer: The information in this publication is furnished for the exclusive use of subscribers and is based on the most reliable data available to Technews
Publishing. However, the information was obtained from sources which Technews Publishing does not control and, although every effort has been made to
verify it, the data is volatile. In furnishing this information, Technews Publishing in no way assumes any part of the users’ or suppliers’ risks, does not guarantee
its completeness, timeliness or accuracy and shall not be liable for any loss or injury whatever resulting from the use of or reliance on the information, or from
negligence.
CEM Systems
Manufacturer
GeoVision SA
CEM Systems, part of Tyco Distributor/supplier
Security Products, is a leading provider of access control and fully
integrated security management systems. With a reputation for GeoVision’s award winning sur-
designing industry firsts, CEM continuously develops innovative veillance products provide total
software and hardware to incorporate the very latest in technology. security for POS, LPR and CMS systems. With its advantages in video
surveillance techniques it is forging ahead to new fields of IP surveil-
Contact: Ernest Mallet lance, analytics, network video storage, access control and intelligent
Tel: +44 2890 456 767 security services.
[email protected]
195 Airport Road West, Belfast, BT3 9ED, United Kingdom Contact: Jacques Taylor
www.cemsys.com Tel: +27 (0)12 664 0411
Distributors/resellers: Pentagon Distribution, Mustek Security [email protected]
Technologies, Protego Worldwide Unit 10, Central Office Park, 257 Jean Avenue, Centurion, Gauteng
Branches: Johannesburg www.geovisionsa.co.za
Branches: Pretoria
neaMetrics Regal
Manufacturer Distributors SA
Distributor/supplier Distributor/supplier
neaMetrics develops customised, integrated A comprehensive range of biometric devices; RFID and keypad read-
software solutions for biometric ID (finger- ers available as standalone or combined technology readers, PAC
print, face, iris), identification (AFIS), card software and hardware such as maglocks, and an extensive range of
personalisation (Smartcard, RFID, ID cards). request to exit buttons for any application from entry level to com-
Exclusive distributor of Suprema and other mercial access control installations.
identity products, providing specialised
turnkey ID solutions. Contact: Andrew Levell-Smith
Tel: +27 (0)11 553 3300
Contact: Walter Rautenbach [email protected]
Tel: +27 (0)11 784 3952 9 Electron Street, Linbro Business Park, Marlboro Drive, Sandton,
[email protected] Johannesburg
108 11th Street, Parkmore, Sandton www.regalsecurity.co.za
www.neametrics.com Branches: Johannesburg, Pretoria, Vanderbijlpark, Nelspruit, Witbank,
Branches: Johannesburg Polokwane, Cape Town, Bellville, East London, Port Elizabeth, Durban,
Pinetown, Bloemfontein.
Paxton Access
Manufacturer Ringmaster Security
Installer/System integrator
A global brand of networked access control and Distributor/supplier
door entry systems, providing simple and reliable
security, ideal for small to medium sized applica- Ringmaster Security provides commercial and
tions. Paxton products move beyond access control to offer energy industrial proximity and biometric access control
saving, building control and CCTV, fire, intruder alarm and biometric sytems which include vehicle barriers, turnstiles, mantraps, sliding
system integration. doors and many more. We offer the finest quality products to ensure
your access control needs are met.
Contact: Werner Geldenhuys
Tel: +27 (0)72 758 6485 Contact: Vincent Botha
[email protected] Tel: +27 (0)11 476 3381
Paxton House, Home Farm Road, Brighton, East Sussex, BN1 9HU, United [email protected]
Kingdom 12 Molope Road, Randpark Ridge
www.paxtonaccess.co.za www.ringmastersecurity.com
Distributors/resellers: Reditron, Pinnacle Security, Regal Security. Branches: Johannesburg
Powell Tronics
Distributor/supplier RR Electronic
Security Solutions
Impro, Safran Morpho, Golmar Installer/System integrator
and its own brand of P-tron Distributor/supplier
software solutions and door
furniture, provide the market Electronic solutions is a company
with top of the range local and equipped with a highly qualified and
global product offerings, unri- experienced team with over a decade of
valled expertise and support experience, the company was established
and unparalleled integrated solutions. with the intention to satisfy our customers
requirements.
Contact: John Powell
Tel: 086 1787 2537 Contact: Rivash Raghubir
[email protected] Tel: +27 (0)11 021 1071
Unit 19-4, The Waverley Complex, Wyecroft Road, Observatory, Western [email protected]
Cape Unit 12, Cycad Block, Cnr 9th Avenue and Rugby Road,
www.p-tron.com Weltevreden Park
Branches: Cape Town (Head Office), Durban, Johannesburg, Port www.rress.co.za
Elizabeth. Branches: Cape Town, Polokwane, Northern Cape
Vixnet Africa
Softcon Manufacturer
Manufacturer Value-added Reseller