Watching the diamonds

CCTV Handbook 2013 Integrated Solutions, Access Control & Identity Management

Martin van der Westhuizen, business development manager Fire, Security and Integrated Systems, Johannesburg, ADT Security, has been integrally involved with the implementation of security solutions for a diamond mine in Botswana. He provides the following information on the project.

What were the client’s needs?

The project scope was to supply a fully-integrated security solution for a diamond mine in Botswana. The system needed to provide full biometric access control into the mining area, to and from the security areas and within the high-risk diamond recovery building. Focused surveillance was needed on all mining areas included in perimeter, mining and materials handling, crushing and flotation, recovery and process areas, short house and diamond export areas. Two monitoring control rooms were required, one for security and one for process control.

What solutions did ADT Security put in place?

We applied the Tyco C-Cure 9000 access control system with full IP Edge door controllers. The video system installed is the Tyco American Dynamics Video Edge Network video recorders with the Illustra 400 Series IP dome and bullet cameras as well as VideoEdge IP Speed dome PTZ cameras. The IP intercom system delivered was the Aiphone IP intercom system. The biometric system used was the Morpho Access fingerprint biometrics.

What technology was used?

All systems implemented were full IP systems with power over Ethernet connections. The security system was the latest in digital security with virtual matrices and content analytics. On the access side, smart card technology with Morpho Access fingerprint biometrics and full IP PoE door controllers were used.

What were the customer benefits?

Using a full IP system, the customer received easy and fast implementation and ease of use. We were able to utilise the fibre ring network around the mine and plant to connect all systems to the servers and control rooms. Minimal cable runs were required as all devices connected back to network switches with a single cable for data and power. The customer is also guaranteed of a future-proof solution fully upgradable should they require growth or changes.

What was unique about this particular solution?

CCTV and access control was used to manage high risk areas without the hindrance of physical barriers. Access to work areas was granted per area and per duration and loaded into the system. Staff can now proceed to working areas through virtual barriers to the approved and disarmed areas. Should the staff member deviate from this, the CCTV system will register the intrusion and immediate action can be taken. This is a very innovative use of the integrated power of the security system to support operations without interfering with it.

Further to this, the CCTV system is installed for security as well as process and production. Cameras were placed at all critical process areas to monitor the process flow. There are also cameras mounted inside the vacuum chambers of the cyclone sorting units to monitor a process that is normally impossible to see. This use of technology for both security and process is fairly unique.

What was the time-frame in which you implemented the solution?

The project ran over a seven-month period (starting in February 2012 and ending in Sept 2012) and coincided with the civil construction of the mine and plant.

What would you say are the success factors of this case?

Close cooperation of ADT, the security provider, DRA, the engineering contractor, and the mine staff ensured the system was designed and implemented to be efficiently applied and supported all disciplines on the mine.

Any other comments you want included?

Although the fire system was delivered by another vendor, ADT was able to integrate it into the security system for monitoring and secure mustering of staff during a fire.

For more information contact ADT, 0860 100 911, mpaynter.za@adt.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
Gallagher releases Command Centre v9.40
Gallagher Products & Solutions Integrated Solutions
Gallagher Security has released Command Centre v9.40, introducing new capabilities for the Controller 7000 product range and supporting optional licencing expansion to up to 24 doors per controller, more than doubling the previous limit of 10.

Read more...
2026 Industry Trends Report calls out security’s next opportunity
Integrated Solutions Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Gallagher Security has released its 2026 Security Industry Trends Report, drawing on insights from end users, channel partners, consultants, and technology stakeholders; highlighting a growing opportunity for security to play a more strategic, value-driven role across organisations worldwide.

Read more...
Smarter access, stronger defence
Secutel Technologies Security Services & Risk Management Access Control & Identity Management Retail (Industry)
The holiday season brings excitement, increased foot traffic and, unfortunately, a spike in criminal activity targeting retail environments. Taking a proactive approach to security is essential in ensuring staff and assets remain safe.

Read more...
Is your entrance security secure?
SMART Security Solutions Centurion Systems Technews Publishing News & Events Access Control & Identity Management Smart Home Automation
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security.

Read more...
Continuum launches centralised access and identity management
Editor's Choice Access Control & Identity Management Integrated Solutions Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.