Aycliffe Secure Centre selects CEM

October 2013 Surveillance, Access Control & Identity Management, Healthcare (Industry)

CEM Systems, part of Tyco Security Products, announced that Aycliffe Secure Centre, provider of comprehensive secure care facilities for young people, has chosen CEM’s AC2000 SE (Standard Edition) Security Management System (SMS) and biometric technologies to help protect and secure its premises. ADT, Europe’s leading supplier of electronic and fire solutions, successfully installed and managed the full end-to-end deployment of the solutions.

The crux of Aycliffe’s business is based on its ability to provide a safe and secure environment for its young residents who are between the ages of 11 and 17. It offers high quality, secure accommodation, as well as education and assessment prior to the reintegration of adolescent individuals back into the community.

ADT worked closely with CEM and Aycliffe to ensure the best solution was installed to match Aycliffe’s specific business requirements. CEM AC2000 SE was chosen because it is a powerful and fully integrated security management system, ideal for securing large facilities such as Aycliffe, offering powerful access control, alarm processing, photo badging and integration to third-party systems.

In addition to the core CEM AC2000 SMS, ADT deployed the CEM AC2000 AED (Alarm Event Display) application to run on the management platform. This provides a graphical and textual representation of the status of all alarms and events across the entire system. AC2000 AED responds to all alarm situations in real time providing a dynamic on-screen interface to external CCTV systems. At Aycliffe, AED is used in conjunction with the CEM AC2000 video interface for Synectics, providing the ability to associate access control alarms with Synectics digital video footage.

Coupled with this overarching CEM software, ADT worked with Aycliffe to heighten authentication at specific points in the facility. Given Aycliffe’s focus on providing the utmost security for its residents, ADT deployed CEM’s S610f biometric fingerprint readers in heavily restricted areas. The CEM S610f is a fully integrated biometric and access control reader that is used to control access to restricted areas, which is managed and monitored by security staff using the AC2000 SE. This streamlines operations in the event of suspicious activity to mitigate risk to residents.

Other hardware which ADT has deployed and integrated within the central AC2000 SMS is CEM’s DCM (Door Control Modules) to help ensure both the privacy and safety of those in the secure care facility, controlling and allowing for frosted glass to become clear once authorised personnel enter certain areas. This gives young people privacy when in their rooms, but also provides the necessary visibility to staff at the swipe of a card ensuring security is a priority at all times.

“Using a multi-door interlocking system created by CEM, Aycliffe has increased security by pre-programming, managing and authenticating access to specific areas, ensuring certain doors are locked before others can be opened,” said Philip Verner, regional director of sales, CEM Systems. He continued “this ensures only those with the specific card privileges can move throughout the building at ease, ensuring all infringements are flagged to the operations team and any issues are handled effectively.”

“ADT fully managed the end-to-end installation of this project, and we rolled out the CEM AC2000 SE to reduce costs, as well as deliver on the demanding needs of the facility,” said Tracy Burtwell, national accounts director, ADT. “By working with the customer closely and installing a reliable solution, the facility can look after individuals in a secure environment to help protect their welfare and avoid potentially volatile situations.”

For more information contact Tyco Security Products, +27 (0)82 566 5274,  emallett@tycoint.com www.tycosecurityproducts.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Edge AI-powered night vision
Surveillance Products & Solutions
By eliminating the need for supplemental lighting, the VIVOTEK Chroma24 low-light full-colour AI camera series provides quiet, unobtrusive protection, while also reducing power consumption and minimising impact on people, ecosystems, and the environment.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
CAA-compliant ground drone outsourcing
Surveillance IoT & Automation
South African mines, estates, utility companies, independent power producers, ports, municipalities and others can now own and operate a CAA-compliant drone dock ground station in just six to eight weeks.

Read more...
AI-powered classification across large areas
Axis Communications SA Surveillance Products & Solutions AI & Data Analytics
Axis Communications announced the upcoming launch of two innovative radars. Each device delivers a 180° or 270° horizontal field of detection, with accurate AI-powered classification across large areas, 24/7, in all weather and lighting conditions.

Read more...
Unified, AI-powered security platform
Suprema neaMetrics Access Control & Identity Management Surveillance Products & Solutions
Suprema recently announced the launch of BioStar X, its advanced unified security platform. BioStar X unifies biometric access control and video surveillance into a single, scalable platform.

Read more...
Axis signs CISA Secure by Design pledge
Axis Communications SA News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.