Touchless access and temperature screening

Issue 1 2021 Access Control & Identity Management

Invixium has announced that Eastern Platinum Limited (Eastplats) has deployed the IXM TITAN with its Enhancement Kit at the Crocodile River Mine. This deployment comes in response to a growing global need for touchless access control and temperature screening due to COVID-19.

The local deployment of IXM TITAN was handled by South African integration specialist, Bluewhale Digital. Bluewhale Digital has 35 years’ experience in the South African mining sector, and after assessing a number of products, chose IXM TITAN for its superior specifications, build quality and ability to handle the unique challenges posed at the mine.

Mining operations like Crocodile River Mine require extremely rugged security equipment. Invixium’s IXM TITAN is crafted with an all-aluminium body and a Corning Gorilla Glass LCD screen to withstand the harshest environmental conditions, from exposure to dust and sand to high impacts caused by nearby mine blasts. With an existing HRMS installed, Eastplats required full feature integration with its time-and-attendance access control hardware.

Shift schedules and breathalyser results need to be checked to enter the mine, and TITAN’s time-tracking data can be used to calculate payrolls. Further, Eastplats’s COVID-19 response demands that temperature screening and mask detection be added to its access control protocol for thousands of employees and visitors at every shift, adding complexity to an already intricate integration.

IXM TITAN with the Enhancement Kit was selected not only for its ruggedness and integration capabilities, but also for its high throughput. With the Enhancement Kit installed, the complete solution can authenticate and temperature-screen twelve to fifteen users per minute without requiring any person to touch a screen. Thousands of employees, and the overall business, risk monumental financial losses from delays in entry, thus speed is a top factor in biometric hardware selection.

“Our concern was for the safety and wellbeing of the Eastplats employees as well as addressing the large amount of time spent on collation and reporting for regulatory requirements,” said Matthew Simpson, director at Bluewhale Digital. “In the midst of a global pandemic, we needed a way to safely and reliably move 500 people through turnstiles during shift change. We needed to do it with no physical contact, and in line with South Africa’s lockdown regulations.”

Using the IXM TITAN, Bluewhale Digital was able to integrate employee identification and touchless core body temperature scanning, with Eastplats’ existing time-and-attendance system and its multi-layered security infrastructure. This, along with an automated system for restricting access until a COVID-19 declaration statement was signed by all those entering the mine, ensured Eastplats received a fully integrated solution that reduced paperwork and reporting time, and prioritised the health and safety of all mine employees.

Following a successful proof-of-concept trial with four IXM TITANs with Enhancement Kit units, Eastplats plans to add additional Invixium solutions at more entry points to Crocodile River Mine. Due to the ease of installation and integration with its existing system, Eastplats is highly satisfied with the increase in productivity and peace of mind provided by the Invixium solution.

“There has been a revolution when it comes to face recognition in the rugged industry of mining, as fingerprints have obvious issues with the time it takes to wash hands before touching a delicate sensor. Add that to the risk of COVID-19 lingering on surfaces, and face recognition becomes the obvious answer for access control,” said Hannelie Hanson, general manager at Eastplats. “Invixium’s products are quick and accurate, even in our mine, and the Enhancement Kit’s temperature screening reduces the number of steps it takes for a person to get to work safely and with ease. IXM TITAN’s integration with Crocodile River Mine’s current human resource management system and security software ensures managers have all the necessary documents and reports to manage staff and visitors in one location.”




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Paxton set to launch game-changing new system
Paxton Access Control & Identity Management News & Events
Access control is evolving fast. Installers and end users are looking for systems that are simple to install, easy to manage remotely, and flexible enough to scale. In response, Paxton is exploring how emerging technologies can reshape access control.

Read more...
NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...
Cloud security in visitor management and access control
SA Technologies Access Control & Identity Management Infrastructure Residential Estate (Industry) Commercial (Industry)
Cloud has become the default platform for modern security operations, from visitor management portals and remote access control to incident logging, reporting, analytics, and integrations. But “in the cloud” does not mean “someone else is securing it for us”.

Read more...
Centurion raises the bar at HomeSec Expo
Centurion Systems News & Events Access Control & Identity Management Residential Estate (Industry) Smart Home Automation Commercial (Industry)
Centurion Systems unveiled its latest product lines at HomeSec Expo 2026, introducing SMART+, a simpler way for installers and end users to manage their Centurion installations - as well as a few new products.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
Protecting citizens’ identities: a shared responsibility
Access Control & Identity Management
A blind spot in identity authentication today is still physical identity documents. Identity cards, passports, and driver’s licences, biometric or not, are broken, forged, or misused, fueling global trafficking networks and undermining public trust in institutions.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.