Securing the Treasury

May 2015 Integrated Solutions

The National Treasury is responsible for managing South Africa’s national government finances. This highly sensitive national keypoint not only hosts a large number of employees, but also receives a fairly high volume of visitors on a daily basis. Access control is critical to the security of the facility, but was subjected to the normal problems associated with traditional access cards – buddy clocking, sharing of cards and the lack of anti-passback.

Management of assets was inadequate and high-risk data areas were being placed under threat by the existing system. ADI Global Distribution was approached by the National Treasury to design an access control and asset tracking system that would ensure that the theft of company and personal belongings would be eliminated and that access to sensitive areas was secured.

ADI required a subcontractor to provide a systems integration service based on unlocking the National Treasury’s requirements, as well as selecting and applying the correct solutions. ADI wrote the specifications for the project and EOH SBT (Security and Building Technology) was selected to undertake the 12-month implementation of the upgrade.

The departments most invested in the project were IT, human resources and security. The IT department were primarily concerned with logical access to rights and privileges as well as potential access to and theft of sensitive data. The HR department required full integration into the Treasury’s payroll system and the security department needed to ensure that this national keypoint was fully secured. The facilities department needed to gain control over asset tracking and matching.

The plan of action was to integrate the access control into the IT department’s Access Directory as well as into HR’s SAP and Oracle systems. The security department stipulated that anti-passback, video on alarm and customised events were to form part of their solution, while the facilities team needed to be able to identify Treasury and employee assets, track their movement in the building and match them to their owner at each of the checkpoints.

Asset tracking for mobile devices

This latter issue has escalated since mobile technology, such as smart devices and laptops, has become so popular with employees. The new system was required to immediately pick up a signal from the RFID chip placed on mobile assets, when passing through any of the entry or exit points within the building.

Prior to the selection of a total security solution, EOH and ADI conducted shootouts between various products, in the presence of both the IT and security managers. By using ADI’s global Honeywell solution footprint, the team was able to address all of the issues raised by the National Treasury.

A major challenge faced by the ADI and EOH team was the change in key personnel in the throes of the project implementation. This necessitated educating the new Treasury team on the advantages and goals of the system. “While hardware and software play a critical role in the success of any project, in this instance process and change management were equally important to acceptance of the solution,” says EOH SBT sales manager, Wayne Schneeberger.

A basket of Honeywell products was complemented by Visonic Elpas asset tracking solutions, a variety of Axis CCTV cameras and RFID chips. All solutions were applied according to EOH’s stringent ISO 9001 charter and the project was coordinated by EOH SBT project manager, Neil Scholtz, with progress checks made on a weekly basis. An SLA, outlining a planned maintenance programme, was implemented to ensure that the client was cognisant of the project progress at all stages. Feedback received from the National Treasury underlines the success of the project and the complete achievement of the primary and secondary goals outlined in the original project specification.

Schneeberger emphasises that clients should ensure that the technology solution they select matches their requirements. In addition, the system should be embedded into their business processes to ensure acceptance and sustainability.

For more information contact EOH, +27 (0)11 607 8346, [email protected], www.eoh.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The benefits of offsite control rooms
Astrosec Surveillance Integrated Solutions
As the security landscape grows more intricate, control rooms – the crucial hub of security operations – need to adapt. With escalating costs, mounting threats, and a heightened demand for immediate responses, many organisations are reassessing the operations of their control rooms.

Read more...
edgE:Tower video analytics integrated with SEON
Surveillance Integrated Solutions AI & Data Analytics
Sentronics has announced a new integration between its edgE:Tower advanced AI-driven video analytics solution and SEON, a Central Monitoring Software (CMS) platform. This integration enhances real-time situational awareness and automated threat detection for control rooms.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
The power of knowing your client
Ideco Biometrics Access Control & Identity Management Integrated Solutions
One of the most effective ways to combat the threat of fraud, identity theft, and financial crime threats is through a robust Know Your Client (KYC) process, which safeguards both businesses and clients.

Read more...
Managing identities for 20 years
Ideco Biometrics Technews Publishing SMART Security Solutions Access Control & Identity Management Integrated Solutions IoT & Automation
Many companies are now more aware of the risks associated with unauthorised access to locations and sensitive data and are investing in advanced identity authentication technologies to mitigate these threats.

Read more...
Cost-effective and reliable remote connectivity
Agriculture (Industry) Integrated Solutions Infrastructure
Companies that operate in hard-to-connect areas now have access to reliable connectivity due to a collaboration between MTN South Africa, Vox and Tarana technology.

Read more...
Advanced Perimeter Intrusion Detection Systems
XtraVision OPTEX Technews Publishing Modular Communications Perimeter Security, Alarms & Intruder Detection Integrated Solutions Products & Solutions
Making full use of fibre installations around the perimeter by adding Perimeter Intrusion Detection Systems means you can easily add another layer of security to existing surveillance and fencing systems.

Read more...
A critical component of perimeter security
Nemtek Electric Fencing Products Gallagher Technews Publishing Stafix Editor's Choice Perimeter Security, Alarms & Intruder Detection Integrated Solutions
Electric fences are standard in South Africa, but today, they also need to be able to integrate with other technologies and become part of a broader perimeter security solution.

Read more...
Using advanced surveillance technology as a smart city enabler
Duxbury Networking Integrated Solutions Surveillance
Smart cities are increasingly becoming a focus area for African governments and companies. However, the transition to these environments does not come without challenges, especially when it comes to security and resource management.

Read more...