Piping hot cash

August 2012 Security Services & Risk Management

GPT, a Bidvest company, has developed a new system to protect and recycle cash. While pneumatic tube systems, and specifically the Sumetzberger system, are nothing new in the market, a new application of the system promises to be the nemesis of cash in transit heists and armed robberies in stores.

Imagine a world where you don’t have to keep a big float in the store because cash can reach you 10 minutes after a request through a tube system? The system was originally developed for hospitals to transport medicines, but is now being used in a variety of applications. The Sumetzberger system, distributed and implemented by GPT, is a computer driven engine that can be programmed to deliver to or from a specific point.

The system was first implemented by Europcar to move keys, but the market soon realised the anti-crime advantages. Cash can now be transported via a tube directly to a drop safe, minimising the risk of theft.

Ryno Joubert, a business consultant for GPT, says that the Sumetzberger system fits in perfectly with the GPT business strategy. Sumetzberger is about process optimisation. Having exclusive sub-Saharan distribution rights extends the GPT strategy to all valuables and not just cash. GPT can now provide customers with a turnkey solution. The tube system fits in with a variety of products, including note counters, coin sorters, counterfeit detectors and drop safes. In retail centres, cash can be transported straight from tills to cash centres, enabling cashiers to keep tills almost empty and request cash within minutes.

Additional savings

An added value is the saving on insurance due to much lower cash levels in store. In taking CIT away from shopping centres, the need for firearms and resultant risk to consumers is removed, whereas under the current system there can be up to 380 weapons at a shopping centre on any given day to protect cash in transit.

Cash is now managed through a closed loop recycling solution, in other words the cash stays in the shopping centre and is recycled between groups of stores. Even when maintenance is required on the system, the cash is not retrievable. Another advantage is huge cost savings, especially on cash-in-transit and insurance costs while dramatically improving client service. When change or a product such as a cellphone is required, the cashier does not have to leave his or her workstation to retrieve the objects. It arrives immediately via the tube and can be handed over to the client. It is no longer necessary to send a client from pillar to post. The customer can have one point of contact.

The system can be used by anybody that has a need to move cash or anything else small enough to fit into the cylinder, such as medicines, cellphones or jewellery. The system is robust making mistakes and incorrect deliveries a thing of the past. It is made up of a motor, a control panel, a computer with software and diverters.

Each station gets an IP address and each diverter has an optical sensor. The carrier moves at 6 m per second. If a cylinder does not reach the next diverter within the stipulated time, the system reverts and pulls everything back to the original station. Even cutting the pipe to get to the money will not work due to the fact that the system works on pressure, releasing the pressure will cause the system to stop.

Reporting included

Software includes a reporting system providing feedback on the amount of transactions from each station, times per transaction, problems in system and peak times. It can also include a scheduler, avoiding peak times where each retailer can only draw or send at a specific time. The ‘secure receive function’ provides a facility where each receiver is given an ID card programmed with a code. The only way to release the carrier is with the ID card.

In addition, each carrier has a radio frequency identification (RFID) tag programmed to deliver to a specific station. The carrier therefore automatically sees which station it is intended for. In such, carriers are dedicated to work stations and cannot be used by other stations.

The pneumatic tube system was originally developed in Austria in 1921. The Sumetzberger system was developed in 1961 and today it is one of the technology leaders in the world and is represented in more than 40 countries. There are 3500 systems implemented globally. The system has been endorsed by Business Against Crime, Standard Bank and the SBVs (cash centres). To date, the system has had a 100% success rate. When a fault occurs, it will automatically send an e-mail to a technologist who will respond, before the client is aware of a problem.

Wanda van Vuuren, sales and marketing director of GPT, says that this is a much needed anti-crime solution for South Africa. “It will even assist the banks in not having to draw as much cash from the Reserve Bank.”

For more information contact Global Payment Technologies (GPT), +27 (0)11 997 6600, www.gpt.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The security debt hidden in residential estates
Security Services & Risk Management Integrated Solutions Residential Estate (Industry)
Many residential estates undermine their own security not through a lack of technology, but through hidden weaknesses in gate design, fragmented systems, recurring software dependence, weak operational ownership, and insufficient estate management input.

Read more...
Verification is reshaping South Africa’s labour market
Security Services & Risk Management Asset Management Commercial (Industry)
Hiring faster, trusting less: in a labour market defined by both constraint and potential, the ability to hire with confidence may well become one of the most important competitive advantages.

Read more...
Africa’s opportunity to shape the future of human-centred AI
AI & Data Analytics Security Services & Risk Management
Across the Global South, countries are not yet locked into decades of legacy AI systems, energy-intensive infrastructure, or governance frameworks designed for a different technological era. That creates something rare in technology development: a cleaner slate.

Read more...
AURA appoints Taryn Winer as global head of people
News & Events Security Services & Risk Management
Following its €13,5 million Series B funding round last year and accelerating international expansion, particularly across the United States, AURA has appointed Taryn Winer as global head of people.

Read more...
95% do not have full trust in cybersecurity vendors
Information Security Security Services & Risk Management
Trust in cybersecurity vendors is fragile, difficult to measure, and increasingly shaping risk posture at both operational and board levels. Lack of verifiable transparency undermines cybersecurity decision-making, according to Sophos-backed research.

Read more...
Enhancing control room operations
iFacts Security Services & Risk Management Surveillance
As South Africa faces complex and more advanced security challenges, the demand for advanced surveillance solutions, including CCTV and security control rooms, continues to surge, but what about the people in front of the screens?

Read more...
Understanding the Shared Responsibility Model
Infrastructure Security Services & Risk Management
While the cloud can certainly be a growth enabler in many ways, it can also introduce new security risks. Companies want to have a clear understanding of where their security duties end and where their cloud service provider’s begin.

Read more...
“This Is Theft!” SASA slams Mafoko Security
News & Events Security Services & Risk Management Associations
The Security Association of South Africa (SASA) has issued a stark warning that the long-running Mafoko Security Patrols scandal is no longer an isolated case of employer misconduct, but evidence of a systemic failure in South Africa’s regulatory and governance structures.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.