On the Beach Front

On the Beach Front

Good security improves relationship with club members

Bel-Air Bay Club, an exclusive club that includes a beachfront facility, sought an accurate, effective identity management solution that would replace its previous system. In 2015, FST Biometrics was installed at the beach facility and successfully integrated with the existing membership management system, offering fast and accurate entry for the members of the iconic Pacific Palisades club.

Bel-Air Bay Club chose FST Biometrics’ In Motion Identification (IMID) technology to integrate with its membership management system, Jonas Club, to swiftly and accurately identify club members, and serve as a sign-in for specific club areas.

Bel-Air Bay Club staff gives the system rave reviews and its ability to improve their relationships with club members. Bel-Air Bay Club members are satisfied with the user experience and proud of the cutting-edge technology in their club.

Bel-Air Bay Club is a private shoreline club in California, directly accessible from the beach. The club needed a system to accurately and quickly identify members entering the club, without restricting their freedom of movement. The club also wanted a solution that could identify members conveniently, without the need to carry ID, a keycard or fob, and that would accurately identify members with very few identification errors.

In order to provide better service to members, help the club operate more efficiently, and reduce frustration among staff, FST Biometrics was selected to implement its highly accurate identity management solution.

Bel-Air Bay Club implemented FST’s solution at the members’ only beach desk entrance, integrating it with Jonas Club Software, the existing membership management database. As members enter the club, IMID Access instantaneously identifies members, allowing beach desk staff to view profiles, and greet each individual by name.

The IMID Access system was successfully installed in two days and handles all daily entrances at the beach desk quickly and accurately. The Bel-Air Bay Club’s 2000 members were happy to enroll in the system, with each registration into IMID Access taking an average of 10-15 seconds.

Staff are able to use the information in FST’s system to have more tailored interactions with club members. This not only builds trust between the club and its members, but also allows members to feel that they have “come home” as soon as they enter the club. This is especially important for members who are less frequent visitors, as staff are able to provide the same high level of service and attention to each valued member.

Bel-Air Bay Club staff also use FST for its critical reporting functions, including monitoring specific club areas, such as the sought-after beach cabanas. FST’s system serves as a sign-in for cabana use, since the cabanas run on a “use-it-or-lose-it basis.” FST’s reports give management a better understanding of club usage.

Members are happy with the new ‘futuristic’ system as well, with some even showing off the cutting-edge technology to their guests as a point of pride in the club. Club staff have noted that the touch-free functionality of FST creates a more hygienic environment as well, particularly during flu season.

“FST Biometrics’ system works very well, and our members immediately felt the difference” said Bill Howard, general manager of Bel-Air Bay Club. “We feel confident in the system, which has proven to be fast, accurate and seamless. Most importantly, FST helps us improve the level of service we provide to our membership, allowing us to truly get to know each and every member by face and name.”

This article originally appeared in the May 2017 issue of Security Today.

About the Author

Arie Melamed is the CMO of FST Biometrics.

Featured

  • Evolving Cybersecurity Strategies: Uniting Human Risk Management and Security Awareness Training

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

  • Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

    CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks. Read Now

  • Built for Today, Ready for Tomorrow

    Selecting the right VMS is critical for any organization that depends on video surveillance to ensure safety, security and operational efficiency. While many organizations focus on immediate needs such as budget and deployment size, let us review some of the long-term considerations that can significantly impact a VMS's utility and flexibility. Read Now

  • Paving the Way to Smart Buildings

    In today's rapidly evolving security landscape, the convergence of on-prem, edge and cloud technologies are critical. The physical security landscape is undergoing a profound transformation, driven by the rapid digitalization of buildings and the evolving needs of modern organizations. As the buildings sector pivots towards smart, AI and data-driven operations, the integration of both edge and cloud technology has become crucial. Read Now

  • The Cybersecurity Time Bomb

    If you work in physical security, you have probably seen it: a camera, access control system, or intrusion detection device installed years ago, humming along without a single update. It is a common scenario that security professionals have come to accept as "normal." But here is the reality: this mindset is actively putting organizations at risk. Read Now

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.