Tshimologong and ACSA partner for security challenge

February 2018 News & Events, Access Control & Identity Management

The Airports Company of South Africa (ACSA) and Wits University’s Tshimologong Digital Innovation Precinct have partnered to launch a security access management hackathon. Aimed at streamlining the company’s security access, The ACSA Access Management Challenge hopes to find a unique and impactful security solution utilising a Single-Sign-On (SSO) approach.

Itumeleng Dhlamini, community manager, Tshimologong Digital Innovation Precinct, says that the hub welcomes the collaborative project with ACSA and is excited to work with a host of budding IT gurus to find an appropriate access management solution: “ACSA is a world-class airports management organisation running a wide range of systems within each of its operations. The issue of managing access to these systems is a major challenge and resulted in ACSA approaching Tshimologong to not only find a solution, but to use the challenge as a means to identify and build new generation IT skills.”

Kutlwano Mtyeku, ACSA Group manager: brand marketing and communications, says that the issue of user identification is critical within ACSA: “We are no different to any other large organisation that uses a multitude of systems and has hundreds of users. It is imperative to link user identity, either to meet security protocols or to match the system to the user profile. It would prove challenging to utilise a system that requires a user ID and password, which is why ACSA wants to consider various SSO options.”

The initial hackathon briefing session takes place on 23 January 2018 at Tshimologong Digital Innovation Precinct in Braamfontein. The process will work as follows:

• Briefing session: Interested participants are invited to attend the briefing session at Wits University’s Tshimologong Digital Innovation Precinct in Braamfontein, Johannesburg. Each person will be given additional information by the ACSA and Tshimologong teams.

• Submit an entry: Once participants have attended the briefing session and are clear about the challenge and the expectations, they will be required to complete an entry form and upload a two-minute video clip describing their idea.

• Boot camp and hackathon session: The top 50 entrants will be invited to participate in a three-day boot camp and hackathon. They will be guided through the process of developing a conceptual prototype and a business model canvas. At the end of the hackathon, each entrant will present a 10-minute pitch to a panel of expert judges. The 10 top ideas will be selected.

• Pre-incubation: The top 10 entrants will be given a six-week membership to the Tshimologong Precinct pre-incubation programme. They will each be assigned a mentor and given access to a range of facilities, expert advisors and resources. They will use this time to develop a working prototype and will refine their business model canvas.

• Demo day: Each of the top 10 entrants will demonstrate their prototype and pitch their idea to a panel of judges. Three winners will be selected.

• Incubation: All three winners will receive an additional seven-month membership to the Tshimologong Precinct incubation programme.

To enter or find out more about the ACSA Challenge, visit http://www.tshimologong.joburg/acsa/





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

From the editor's desk: It’s all about data
Technews Publishing News & Events
      Welcome to the SMART Access and Identity Handbook 2026. We have slightly changed the handbook this year, specifically the selection guides, but there is still a lot of industry information inside, and ...

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
Reshaping South Africa’s built environment
Securex South Africa Facilities & Building Management News & Events Commercial (Industry)
FM teams are responsible for the overall operational environment of a building, while security teams focus on protection, control, and incident response. Increasingly, both rely on the same data streams, infrastructure, and digital tools.

Read more...
Banking’s AI reckoning
Financial (Industry) News & Events AI & Data Analytics
From agentic commerce disputes to quantum-powered risk modelling, SAS experts offer a ‘banker’s dozen,’ 13 industry-defining predictions that will separate institutions that master intelligent banking from those still struggling with the basics.

Read more...
Axis signs CISA Secure by Design pledge
Axis Communications SA News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.

Read more...
Five key technology trends for the security sector in 2026
Axis Communications SA News & Events Surveillance
Axis Communications examines trends it considers important for 2026, as technology and customer requirements continue to evolve, but the basic security needs of end users remain constant.

Read more...
2026 Industry Trends Report calls out security’s next opportunity
Integrated Solutions Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Gallagher Security has released its 2026 Security Industry Trends Report, drawing on insights from end users, channel partners, consultants, and technology stakeholders; highlighting a growing opportunity for security to play a more strategic, value-driven role across organisations worldwide.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.