Luxurious security

July 2012 Security Services & Risk Management

When you walk into the Sandton Square branch of International Vaults (IV), you could be excused for thinking you have just entered a luxurious, although very secure hotel.

IV offers clients a series of safety deposit boxes (the kind we often see on TV) for rent. Ranging from R200 per month up to R600 per month depending on the size of the box, clients are able to store valuables and documents in the secure vault. Each box is secure and private, its contents known only to the client.

Access to IV is made from the Sandton Square mall via an inconspicuous entrance most people would miss. The company also has a private parking area for its clients that lead directly into the vault area.

Access is strictly controlled by both technology and operators, ensuring that only authorised clients gain access to the vault area. Access to the individual boxes is controlled by a master key, held by the company, and an individual, unique key for each box, which the client holds. Jadoonandan says the company does not keep a copy of the client’s key, so if it is lost the only way to access your box is to drill the lock open, a long process.

Access control

Access to the vault area starts with a biometric fingerprint scan linked to a surveillance camera. The client is then also manually verified by an operator located behind strengthened glass via an identity document – which is visually compared to the surveillance image.

Then the client enters the secure area via a mantrap. A guard allows one person at a time into the mantrap. Once inside, another biometric scan is done and a surveillance camera takes another image of the individual’s face to allow the operators to once again confirm his/her identity compared to an image on file.

From the point clients enter the company, they are under constant CCTV surveillance. A secure control room is located on the premises where a guard monitors all the feeds. As can be expected, the vault is contracted to armed guarding companies to handle unexpected events.

The surveillance system extends into the vault itself, except for the private viewing booths where the client can add or remove items from their boxes. There are, naturally, other security measures in place to ensure the security and privacy of the clients as well as their belongings.

Jadoonandan says the vault concept has proved popular in KwaZulu-Natal as well as in Gauteng by clients who choose to keep their valuables and important documents in a 24x7 secure vault instead of carrying the risk of keeping them at home.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Surveillance & AI roundtable
DeepAlert Lytehouse Refraime SMART Security Solutions Technews Publishing Editor's Choice Surveillance Integrated Solutions AI & Data Analytics
SMART Security Solutions held an online roundtable with a few surveillance experts to explore the intersection of surveillance and AI, gaining insights into the market and how control rooms are evolving.

Read more...
SMARTpod talks about HomeSec Expo 2026
SMART Security Solutions Technews Publishing News & Events Residential Estate (Industry) Videos
SMARTpod, the podcast from SMART Security Solutions, finds out more about the upcoming HomeSec Expo happening at Gallagher Estate on 4 & 5 March 2026.

Read more...
“This Is Theft!” SASA slams Mafoko Security
News & Events Security Services & Risk Management Associations
The Security Association of South Africa (SASA) has issued a stark warning that the long-running Mafoko Security Patrols scandal is no longer an isolated case of employer misconduct, but evidence of a systemic failure in South Africa’s regulatory and governance structures.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...
Security ready to move out of the basement
AI & Data Analytics Security Services & Risk Management
Panaseer believes that in 2026, a board member at a major corporation will lose their job amid rising breaches and legal scrutiny, as organisations recognise that cyber risk is a business risk that CISOs cannot shoulder alone.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.