Securing a power plant in Oman

1 October 2014 Access Control & Identity Management

CEM Systems, part of the Security Products business unit of Tyco, has announced that the AC2000 security management system has been installed in the Sur Independent Power Plant, Oman. The system was installed by CEM Approved Reseller Majees Technical Services.

The gas- and oil-fired Sur Independent Power Plant (IPP) will be the largest power plant in Oman, representing approximately 30% of Oman’s installed power capacity when it is complete in 2014. The $1.6bn project owned by Phoenix Power Company SAOC will provide much needed power to meet the growing demand for electricity by employing state-of-the-art technology and introducing high efficiency conversion technology.

CEM’s AC2000 is a powerful and reliable access control and security management system used to protect sites where security is of paramount importance. AC2000 provides the Sur Independent Power Plant with a suite of essential client and browser-based applications including central alarm monitoring, integrated command and control, sophisticated ID badging, visitor management, time and attendance and much more.

“Having worked with CEM Systems previously on a number of projects in Oman, we knew the AC2000 system would be the perfect solution for the Sur Independent Power Plant,” said Sekhar Subramonian, GM, Majees Technical Services. He continued, “With software applications such as Time and Attendance, AC2000 offers the power plant more than access control, it offers a way of increasing business efficiency and cost savings.”

“CEM works closely with customers to provide a solution which meets their specific needs,” said Philip Verner, regional sales director, EMEA, CEM Systems. “The AC2000 Time and Attendance module provides a user friendly interface which allows the company to monitor and report on employee IN and OUT swipes each day, ensuring staff have completed their daily/weekly contracted hours. Existing cards and readers can be used for both access control and time and attendance, providing significant project cost savings.”

The sDCM300 low cost, two-door intelligent serial controller was also installed throughout the power plant. The sDCM300 interfaces third-party read heads with the CEM AC2000 access control system. Using a powerful 32 bit processor, the sDCM300 gives full off-line validation and decision making at the point of entry, even when host communication is not available.

Built with the flexibility to grow, the AC2000 system has provided the Sur Independent Power Plant with virtually unlimited expansion capabilities.

For more information contact Tyco Security Products, +27 (0)82 566 5274, [email protected], www.tycosecurityproducts.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Gallagher Security releases OneLink
Gallagher Animal Management Products & Solutions Access Control & Identity Management
Gallagher Security has announced OneLink, a cloud-based solution that makes it faster, easier and more cost-effective to deploy security anywhere in the world, transforming how security can be delivered to remote sites and distributed infrastructure.

Read more...
IQ Panels now supported by PowerManage
Johnson Controls - (Tyco Security Products) Products & Solutions
IQ Panels, now supported by PowerManage, simplify installation and data management. The PowerManage interactive platform allows for localised data storage, so customer information is not stored in the cloud or exposed to a third party.

Read more...
Suprema unveils BioStar Air
Suprema neaMetrics News & Events Access Control & Identity Management Infrastructure
Suprema launches BioStar Air, the first cloud-based access control platform designed to natively support biometric authentication and feature true zero-on-premise architecture. BioStar Air simplifies deployment and scales effortlessly to secure SMBs, multi-branch companies, and mixed-use buildings.

Read more...
Continuous AML risk monitoring
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
AU10TIX, launched continuous risk monitoring as part of its advanced anti-money laundering (AML) solution, empowering businesses to detect behavioural anomalies and emerging threats as they arise.

Read more...
The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...
T&A in South Africa’s retail sector
ERS Biometrics Access Control & Identity Management
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...