Centralising Telkom’s national security access system

Access & Identity Management Handbook 2014 Access Control & Identity Management

National telecommunications provider, Telkom, has centralised its access control system nationally. Telkom’s presence comprises a national footprint of buildings with telecommunication equipment, technical and administrative personnel. The company’s security policy restricts access to certain areas for staff, contractors and visitors. The levels of access further restrict staff who execute functions internally and externally, that is, core side and client side.

A primary obstacle is the management of keys for remote locations and governance regarding the access to the sites. Although a key register is used to manage the site keys, delays in acquiring the keys posed an operational challenge, since multiple staff required keys simultaneously. A combination of physical and logical media was proposed to validate access.

Sam Moodley, manager, Telkom Asset & Revenue Protection Services (TARPS)
Sam Moodley, manager, Telkom Asset & Revenue Protection Services (TARPS)

An internally devised conceptual design was presented to management in early 2000. This design, that incorporates a national surveillance centre, was approved as the national security programme. At that time, there were six regional centres that managed the security operations for Telkom, monitoring all the intruder detection systems. The access control systems were standalone site devices and were locally managed. No national standard and no centralised database existed at the time, making investigations of security breaches labour intensive and time consuming.

The project for the new national security programme began with the drafting of an enterprise secur-ity policy that incorporated the networked surveillance system. An access card policy was also drafted to align all elements of the access control system to ensure seamless integration of the various modules. As a singular unit, the system would enrol a person, print a security access badge and provision access to any one of the sites that was incorporated onto the new enterprise system.

Various logical levels of access were provisioned for, such as management, security surveillance and maintenance staff. Furthermore, multiple physical access layers were also created, such as national, regional, sub-regional, site and door areas. A user also has the opportunity to have a combination of access permissions to these areas, together with timed duration. This methodology also provided other levels of access control, such as vehicle or parking management through a single access card.

Among others, milestones such as naming conventions, door permissions, grouping of access permissions, specific user access requirements, network provisioning and management formed the critical path for this project. The enterprise architecture, fragmented into the various regions, sub-regions and sites needed to be concise and provide for future growth. The architecture incorporated existing buildings that would also transform where churn needed to be accommodated.

A solution of this magnitude is primarily dependent on a team that is fully conversant with IT and communication networks with the ability to adapt to an ever-evolving landscape such as cloud-based servers and virtual environments. Although Telkom has not extended the programme to all its sites as yet, the organisation is tracking the changes within business to accommodate new needs from this system.

Forward compatibility is an integral part due to the changes and updates on the operating systems. A development environment is available to perform testing of all updates to the software so that the system is not compromised.

During events such as the FIFA World Cup 2010, remote management of the telecommunications rooms at all the stadiums was made possible by extending the current solution to these sites. Provision of access and surveillance of these rooms were centrally managed with great success.

The benefits derived from this programme extend to all users within Telkom. Workforce management enables supervisors to manage multiple staff working on a 24-hour shift basis and the management of staff at remote locations. Immediate provision or denial of access, together with situational analysis of the various sites, is provided. Instantaneous reports at any of the national sites are now available and centralised management and surveillance of the remote sites is provided. In all, this has been a highly successful project and has achieved all the goalposts and benchmarks originally assigned to it.

For more information contact Sam Moodley, +27 (0)12 311 3189, moodleys@telkom.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Luxury residential access
Access Control & Identity Management Residential Estate (Industry)
Clifftown Shore is an exclusive collection of 51 luxury 1, 2 and 3-bedroom seafront apartments and penthouses set within a protected conservation park area, served by CAME’s XiP system and door entry system.

Read more...
From identity to insight
neaMetrics Access Control & Identity Management
Identity outlives technology. When it is trusted, it becomes a foundation for insight and scale. When it is not, every system built on it inherits the risk. Identity quality matters, at both human and system levels, and getting it right is what allows security to endure.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
Holding all the cards
neaMetrics Suprema SMART Security Solutions Technews Publishing Access Control & Identity Management
After so many years of offering alternatives to card technology for access control, one could be forgiven for assuming we are all using biometrics or mobile credentials for all our physical and digital access requirements.

Read more...
Inside the RealScan SG10
neaMetrics Access Control & Identity Management Products & Solutions
The SG10 was optimised for speed at every stage, from capture to processing. The result is faster fingerprint acquisition and near-instant response for operators.

Read more...
Unified, AI-powered security platform
Suprema neaMetrics Access Control & Identity Management Surveillance Products & Solutions
Suprema recently announced the launch of BioStar X, its advanced unified security platform. BioStar X unifies biometric access control and video surveillance into a single, scalable platform.

Read more...
Directory of access and identity management suppliers 2025
Access Control & Identity Management
The Directory of Access and Identity Management Suppliers 2026 includes the details of companies that provide products, advice and services to the access control and identity management market.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.