Integrate visitor management and access control

April 2014 Access Control & Identity Management

Gary Chalmers, CEO of iPulse.
Gary Chalmers, CEO of iPulse.

One of the crucial aspects of commercial security is visitor management. Hi-Tech Security Solutions approached Gary Chalmers, CEO of iPulse, to find out who’s doing what and how visitor management has evolved from the tattered old visitor’s book that Superman filled in many times each day.

We asked how technology is changing this field, how it should change it, and what the potential impact of PoPI will be in traditional visitor management.

Hi-Tech Security Solutions: First, a broad question: how is visitor management changing and how has it changed over the years as security has become more important?

Gary Chalmers: It is my contention that visitors are currently the biggest security breach in most buildings in South Africa. While access control for tenants has advanced in leaps and bounds, including advanced biometric solutions, RFID tags, electronic turnstiles and CCTV camera systems, most of this is overridden every day as security guards and receptionists hold open a gate, boom or turnstile for visitors to walk through.

At best, most visitors fill in a desk-based register or complete a slip in a security guard’s book, yet no one really checks this information, despite the fact that these visitors are the biggest unknown on any site.

In the past year, changes have begun creeping in, with scanners reading drivers licences and vehicle registrations becoming available, and with a realisation that knowing who these visitors are is a key requirement for security. Systems like the iPulse VisitorIQ, which integrates directly into national databases such as BIOVault, allows for visitors to be identified, then verified within a few seconds, and to use their biometrics to control access to a site within a given set of time and access rules.

With the PoPI Act passing into law during December 2013, all of this is about to become a legal requirement and this will also see massive change being forced into this space by legislation.

Hi-Tech Security Solutions: How will the broader adoption of technology in the security market impact visitor management? Will we see the old visitor book replaced and visitor management being integrated into other corporate security processes?

Gary Chalmers: As mentioned above, PoPI makes the old visitor book not only defunct, but actually illegal. Technology will have to jump in to fill the gaps left by the current systems and I suspect that the next 18 months will see a flurry of activity as the first prosecutions for non-compliance start to filter through.

Hi-Tech Security Solutions: How should visitor management be handled today? What are the best practices and/or technologies that should be used for effective visitor management? Can you give examples of how visitor management could/should be done?

Gary Chalmers: Visitor management should be an integral part of your existing access control, making sure that one system is used to manage both employees and visitors/contractors. Implementing controls such as limited access periods, expiring tokens and auto-reactivation are key concepts that will be part of most new systems that want to be compliant with the act, and meet the growing needs for a properly integrated security solution.

Hi-Tech Security Solutions: Finally, given the cost of technology and integration and the required skills, is it not realistic that most companies will stick to a visitor book of some sort simply to avoid the cost implications of other solutions? And is this such a bad thing when dealing with people who are not regularly coming into your office/campus?

Gary Chalmers: Even assuming POPI does not make this impossible, in South Africa at least, I believe that this is extremely short sighted. Having limited information about the people who are visiting your site leaves you completely vulnerable, and most of the issues that are going to occur and which are not internally driven will come from people who have actually been on your site. Inaccurate, false and sometimes no data are the best you can hope for from the existing system, while a properly integrated visitor solution will give you all the tracking and security of your existing access control system.

For more information contact iPulse, 0860 IPULSE, [email protected], www.ipulse.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

New State of Physical Access Control Report from HID
HID Global Editor's Choice Access Control & Identity Management News & Events
HID released the 2024 State of Physical Access Control Report, identifying five key trends shaping access control's future and painting a picture of an industry that has been undergoing considerable transformation.

Read more...
Smart intercoms are transforming access control
Access Control & Identity Management Products & Solutions
Smart intercoms have emerged as a pivotal tool in modern access control. They provide a seamless and secure way to manage entry points without the need for traditional security guards to validate visitors before granting them access.

Read more...
Easy, secure access for student apartments
Paxton Access Control & Identity Management Surveillance
Enhancing Security and Convenience at Beau Vie II Student Accommodation, a student apartment block located at Banghoek Road, Stellenbosch, with Paxton's access control and video management solution

Read more...
Invixium acquires Triax Technologies
News & Events Access Control & Identity Management
Invixium has announced it has acquired Triax Technologies to expand its biometric solutions with AI-based RTLS (Real-Time Location Systems) offering for improved safety and productivity at industrial sites and critical infrastructure.

Read more...
ControliD's iDFace receives ICASA certification
Impro Technologies News & Events Access Control & Identity Management
The introduction of Control iD's iDFace facial biometric reader, backed by mandatory ICASA certification, underscores the commitment to quality, compliance, and innovation.

Read more...
The future of workplace access
HID Global Access Control & Identity Management
Mobile credentials are considerably more secure than physical access control, because they eliminate the need for physical cards or badges, support multiple security protocols, and add layers of protection on top of basic card encryption.

Read more...
Integrated, mobile access control
SA Technologies Entry Pro Technews Publishing Access Control & Identity Management
SMART Security Solutions spoke to SA Technologies to learn more about what is happening in the estate access world and what the company offers the residential estate market.

Read more...
Bespoke access for prime office space
Paxton Access Control & Identity Management Residential Estate (Industry)
Nicol Corner is home to a six-star fitness club, prime office space, and an award-winning rooftop restaurant. It is also the first building in South Africa to have its glass façade fully incorporate fritted glazing, saving 35% on energy consumption.

Read more...
Next-generation facial recognition access control system
Enkulu Technologies Products & Solutions Access Control & Identity Management Residential Estate (Industry)
With a modern and innovative design, iDFace is the ideal device for monitoring and controlling people entering and exiting a building using facial recognition technology, including liveness detection, for enhanced security.

Read more...
Long-distance vehicle identification
STid Security Products & Solutions Access Control & Identity Management Residential Estate (Industry)
The STid SPECTRE reader can identify vehicles up to 14 metres away, across four traffic lanes, ensuring secure access to an estate without disrupting the traffic flow.

Read more...