Groote Schuur Hospital ­upgrades to ­biometrics

April 2014 Access Control & Identity Management

Groote Schuur Hospital is a teaching hospital located in Cape Town. Founded before the Second World War, the hospital gained an international status in 1967 when the first human heart transplant took place, conducted by Dr Christiaan Barnard.

In 2013, the hospital took another step into the future, when it upgraded its RFID access cards and tags to include fingerprint biometric access to certain areas. The Granding biometric devices were supplied by Castle Access Control Systems and installed by Keep Electronics.

Keep’s Bryan Fitchat says the hospital realised it needed to improve the access security to certain areas within the hospital. Areas such as the pharmacy, stock rooms and services areas, among others required better control of who was able to come and go. It’s easy to lend someone a tag or card and allow them access to sensitive areas, hence biometrics provided the answer.

Michael Pass runs the maintenance and access division of Groote Schuur. He says biometrics was the answer as nobody can lend or steal a fingerprint. This would provide the hospital with a clear indication of who accessed sensitive areas and when, with the assurance that unauthorised people could not get in.

Pass says Groote Schuur would have liked to install biometrics throughout the hospital, but did not have the budget to upgrade the entire access control system in one phase. It therefore went out to tender for phase one of the project to secure specific sensitive areas.

Warwick Forde, director at Castle Access Control Systems, says the project was not simply about swapping old readers for biometric devices. Other areas of the hospital still used card and tag access so the biometric readers would have to be able to read biometrics and cards, and even have an option to ask for a password in highly secure areas.

Forde says before the Granding biometric readers were installed, Castle had to work with the technical team in China to adapt the readers to read different generations of HID access cards and communicate these to the existing Softcon system. The hospital has installed a number of HID card readers over the years and have a variety of access cards in use. The biometric readers had to be capable of reading each version of the cards as well as the new fingerprints.

Once the 150 readers were customised to Groote Schuur’s requirements, Fitchat adds that it took only three weeks to install the devices and get the hospital running on the new system. Groote Schuur’s maintenance department does its own support, which is easy with the reliable Granding access products.

Further biometric units will be installed in phases in the future as budget becomes available.

For more information contact Castle Access Control Systems, +27 (0)21 702 1102 or +27 (0)11 312 8528, www.castlecontrols.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...
T&A in South Africa’s retail sector
ERS Biometrics Access Control & Identity Management
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Paxton opens second experience centre
Paxton News & Events Access Control & Identity Management
Security technology manufacturer, Paxton, has opened a new experience centre in Cape Town on 12 February in partnership with its exclusive distributors, Reditron and Regal Security.

Read more...
DoorBell with built-in AI
Ajax Systems Access Control & Identity Management Products & Solutions Smart Home Automation
Ajax Systems has announced the release of Ajax DoorBell, which features built-in AI, an IR sensor, and app control, seamlessly integrating into the Ajax ecosystem to ensure efficiency and security confidence.

Read more...
Physical security evolving beyond security teams
ATG Digital Access Control & Identity Management
The landscape of physical security is undergoing a major shift. Traditionally, selecting access control and visitor management solutions fell squarely on the shoulders of security professionals, but today includes legal, IT, technical operations and more.

Read more...
A passwordless future?
Access Control & Identity Management
The digital landscape is evolving rapidly, and with it comes the urgent need for more secure authentication methods. Passwords, once the cornerstone of online security, are now easy targets for cybercriminals.

Read more...