Tuesday, July 22, 2014

who is in the campus

!!!! Who is in Your Campus !!!
The main feature of any visitor management system is to screen the unwanted individuals. An internal watchlist to can be used to alert the security officers of malicious individuals, disgruntled employee or any other individual who are not wanted inside the school facility. External databases can be accessed directly from the Visitor Management System to screen the individual against registered sex offenders.

True Fact
As per 2013 Survey
Visitor management: More and more university, hospital and school protection professionals are realizing that paper guest logs are no longer acceptable ways of keeping track of visitors. More than two in five campuses (43%) say that lack of a visitor management system is one of their top five access control challenges. The issues with sign-in sheets are many, including illegible handwriting, lack of confidentiality and the potential for counterfeit visitor badges. Consider adopting a software solution to help you better manage campus guests as well as decrease your institution’s exposure to liability.

As per 2010 Survey
In 2009–10, about 74 percent of public schools recorded one or more violent incidents, 16 percent recorded one or more serious violent incidents, and 44 percent recorded one or more thefts.

Enhance Security
The schools use Access Control Systems for their staff. The same access control system can be leveraged for visitor and contractor management to grant temporary access. In this way the school can showcase more security and professionalism. Some of the large campuses in the country are using Visitor Identity Management systems to track visitors and contractors entering the premises.
This enhanced visitor management system allows us to analyze the visitor trends and patterns. In case of any unwanted visitor the system allows to quick flag the information to the Security Personnel and School Administrators. In the worse situation, during a fire emergency in the campus, it will be impossible to determine who is still in the campus since it is the human factor to enter the inconsistent check-in and check-out times.
In addition to basic visitor management facilities like information capturing, badging and reposting some of the visitor management systems has self service capabilities that allows the staff and employees to preregister their  visitors.

Shortcomings of Traditional Method
1.     You can capture the photo of the visitor
2.     It is difficult to read the handwriting of people
3.     The names of the employees will be much visible in the log which will make it easy for the intruder to just enter the name of the employee from the list above.
4.     During the time of emergency it is difficult to track the number of visitors who are inside the premises.
Uses of Visitor Management System
1.     Integration of Visitor Management systems with the existing access control systems
2.     Custom Badge Design allows you to have one or many of these, name of the person being visited, type of the visitor, expiry date and time of the visit and photo.
3.     The self service allows preregistration of the visitor and scheduling the visit.
4.     In case of a security alert, the information is flagged to the concerned Security Personnel and the Administrators.
5.     The visitor destination such as floor, building, department can be addressed and appropriate privileges can be assigned
6.     In case multiple school campus allows integration with the central database
Not recommended
A visitor Kiosk is not the recommended solution in the campus. Let us consider a situation that a visitor enters the campus with the stolen ID proof and enters the same details in the kiosk to avoid getting tracked as a match on the watchlist. Instead of reducing in the school environment, you are actually adding risks. It is always a best to have face to face contact with the visitor before granting access to the premises,

Data Analysis
The data analysis allows to analyses the visitor trends like
1.     Visitors who stayed overtime
2.     Type of ID proofs presented by the last 100 visitors
3.     Areas within the campus with more visitor footprint – need to explore and improve security.
4.     Total Badged Visitor hours
5.     Repeated Visitor in the past 4 weeks

6.     Visitor Denied Access 

Monday, July 14, 2014

Applying Real Time and Predictive Analysis to Visitor Identity and Access Management

Through the use of real-time and predictive analytics, that data can become a powerful resource. The use of Real-time and predictive analytics enables organizations to turn their data stores into knowledge and insight with swiftness and exactness as required time on time, and I think this cannot be achieved by any human. This insight could enable a different action to be taken – potentially improving an outcome, saving money or even saving lives, yes really I mean it.

Let us imagine a situation in a hospital with the Identity and access Management Application installed, of the last 100 visitors to the hospital with this age group, department, affiliated clinics, 31% visited the Neurology Department, 45% visited Intensive care unit and 30% visited Cardiology department and 5% other diagnosis. The one month visit rate was 30% between the age group 20-30 years and 35% between the age group 40 -50 years and the peak visit timings was 7.00 AM to 8:00AM  and 3:00 PM to 4:00 PM. Now the Security Administrator of the hospital can explore data across the departments, time and age or any other parameters. Now decision can be made for an individual department using population based content.

Emerging real-time analytics have the potential to provide this kind of significant value. The idea is to enable depth of insight across a broad distributed set of data — at a minimum, across a hospital and its many departments and affiliated clinics, but even better across its multiple hospitals, where traditionally an observable pattern can be hidden by the number of visitors, repeated visitors.

Predictive analytics work in a similar way, but with a focus on analyzing data and providing probabilities of various outcomes in the future. In the scenario above, imagine Predictive analytics system provides the additional information, like the predictive return of the visitors due to the patient admitted for a longer term.  A same visitor with the 48 hour return rate on initial visit. Based on this type ok knowledge, the security officers can predict the Visitor flow to each department and relatively plan the workforce in each department.


So both real-time and predictive analytics take the power of data beyond mere storage, categorization and traditional periodic reporting. Key insights like the proverb needle in a haystack; just increasing the amount of data storage is as good as adding more and more hay, but real-time and predictive analytics serve as a powerful magnet to accelerate the search for the needle

Wednesday, April 3, 2013

My new site a Ux designer coming up shortly

I will post the link once the website is ready,  please give me your feedback.

Wednesday, February 15, 2012

When wrtiting a title.......


A title must be simple but informative and easy to understand. A title presents the message of topic or chapter in just a few words.

  • Length of the title
Keep your titles simple, short and clear. Avoid long ones.

  • Avoid Abbreviations
Avoid abbreviations by writing out the full word.

  • Do not use –of genitives
Right: Prime minister’s daughter
Wrong:  Daughter of the Prime minister

Right: Usage hours
Wrong: Hours of usage

  • Parentheses
Avoid parentheses in a title

  • Do not use comma
Do not use comma in a title unless the title is a list of items.