classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2018


Secure mining with integrated solutions
October 2017, Mining (Industry), Integrated Solutions

Securing a mine is a vast undertaking requiring one to use almost every security technology and process if you are to get it right. Mining security starts at the perimeter, with long boundaries measuring kilometres, potentially situated in remote areas far from any power lines. And despite the best precautions mine management can take, mines today are targets of well organised syndicates with criminal and political backing.

From there, one moves further into the mine’s property and you need to secure access and egress points, multiple buildings, plants and offices, as well as large industrial operations. And of course, there are dangerous goods that need protecting, such as explosives and other deadly chemicals. Only then can you think about what happens in terms of security under the ground.

Gino de Oliviera, Kedacom representative at Forbatt SA, offers a few insights into what technology can be used to assist in securing mines from the many challenges they face.

• It is vitally important to cover the perimeter of the mine. The perimeter covers a large area and mines therefore need long distance cameras with auto-tracking and analytics to cover these points of entry effectively. Ideally, we should be able to see details such as car number plates and human faces from far away.

• In South Africa we also have a lot of illegal miners on mining sites, better known as ‘Aliens’ or ‘Zama Zamas’. These miners work in close proximity to the existing operations and make it dangerous for people living in the area as well as permanent and contract staff on the mines. And that doesn’t even begin to consider the dangers they put themselves in when ignoring safety standards.

• The next phase would be HD cameras over smelters, high-powered machinery, and for a general overview of the working areas. This is for health and safety reasons as well as security – and often the health and safety operations benefit more from these cameras. In extreme situations, explosion-proof cameras are also available to take care of securing special areas (such as locations where dangerous goods are stored.

• Human recognition cameras at entrances and exits will monitor who is coming in and who is leaving. Most mines have security and check points, so there is enough time to capture a face clearly. Kedacom has developed its Falcon system that includes human comparison functions to recognise people and prevent suspects or people who have been blacklisted from entering the mine’s premises.

• I would also suggest placing cameras in common areas to watch the movement of staff and to catch any internal theft that may occur. Kedacom’s cameras are all equipped with intelligent algorithms that are helpful in securing important areas and watching the movement of people.

• When it comes to security underground, things get more challenging as these are extremely harsh areas with very low light. Kedacom’s new generation body-worn cameras may be a solution for supervisors, and there are also explosion-proof cameras from the company, as mentioned above.

The benefit mines can achieve from deploying systems such as those mentioned above is that they will obtain security peace of mind, while also gaining insight and assistance into many of the health and safety issues mines contend with.

Risk, health and safety, and security are enormous issues on South African mines. Kedacom has a range of technologies that can be combined in a turnkey solution that provides the

necessary solutions, from the foundational hardware through to Kedacom’s intelligent software.


Credit(s)

Tel: +27 11 469 3598
Fax: +27 11 469 3932
Email: sales@forbatt.co
www: www.forbatt.co
Articles: More information about Forbatt SA

  Share via Twitter   Share via LinkedIn      

Further reading:

  • Trust but continually verify
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Hi-Tech Security Solutions looks at access and identity management and asks some industry players what ‘zero trust’ and ‘least privilege’ access means.
  • Physical/logical convergence
    November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Integrated Solutions, IT infrastructure
    The convergence between physical and logical (or cyber) security will be a game-changer because it will change the way we do everything, from planning to design and all the way to installation and maintenance.
  • Physical and logical convergence is a fact
    November 2018, This Week's Editor's Pick, Integrated Solutions, IT infrastructure
    Convergence, the next buzzword? A dated buzzword? Is convergence ­merely ­integration on steroids? What is convergence?
  • Taking augmented identity to the world
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    Hi-Tech Security Solutions spoke to Gary Jones, VP Global Channel and Marketing biometric access and time solutions) at IDEMIA (formerly Morpho) about his career with the company and its new vision of Augmented Identity.
  • BIMS set to change identity ­management
    November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Local biometrics integrator, Ideco Biometric Security Solutions, has announced that its Biometric Identity Management System (BIMS) has been launched to market.
  • Tracking biometrics into a brave new digital world
    November 2018, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    The industry is increasingly transitioning from unimodal to more integrated multimodal biometric solutions for more accurate identity verification and faster real-time results.
  • Key components of access control
    November 2018, Paxton Access, Access Control & Identity Management, Integrated Solutions
    Dan Drayton speaks to Hi-Tech Security Solutions about what the key components in modern access control systems are.
  • IP is no stranger to access control
    November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Just as the surveillance market made the move to IP-based communications, the access control market is also moving to IP (or some say it already has).
  • Applying the SaaS model to access control
    November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions
    The software-as-a-service model has proven transformative to many organisations, and even entire industries. The benefits it can offer are undeniable, but in the security sector which is risk-averse by necessity, we wanted to hear the views of some local experts in access control as a service (ACaaS) to find out what some of the pros and cons are.
  • Cloud-based access control
    November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions
    Running your access control through a cloud service has made people nervous in the past, but today’s solutions are hard to beat.
  • Controlling access in the cloud
    November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions
    In the access control arena, hosted or managed services have been around for a few years, and the adoption of cloud-based access control only continues to grow as companies become more and more open to the idea of relying on it to perform such a vital function within their business.
  • They sure don’t make them like they used to
    November 2018, Technews Publishing, Access Control & Identity Management, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
    The latest offerings in the market with respect to doorbells and intercoms, and what functionality they offer.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.