classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2017


Golf club’s vehicle access
November 2017, Access Control & Identity Management, Products

Designed by Jack Nicklaus and rated in the top 20 golf courses in Gauteng, Houghton Golf Club has a history as a championship facility, having hosted no fewer than eight SA Open events, the first of which took place in 1951. The course was also selected as the chosen venue for the prestigious Alfred Dunhill Championship.

The parkland layout is dotted with ponds, dams, well-established trees and flowering shrubs and is situated adjacent to the greenbelt of The Wilds. The Executive Suite and two recently renovated function rooms play host to gatherings from an intimate meeting for up to six people all the way up to catering for up to 50 delegates. The facilities are regularly used for conferences, golf clinics and private celebratory events.

The influx of vehicular traffic at this prestigious establishment means that the security of employees, members and guests is often at risk. Turnstar provided a solution that would secure the entrance to the estate.

The solution, says Craig Sacks, MD of Turnstar, was the deployment of two 4-metre Talon automatic spike vehicle barriers. These high-security road spike barriers are particularly suited to applications that require high-volume access control. The installation at the Houghton Golf Club is of a recessed design and the double-sided spikes on the Talon offer protection for traffic in any direction.

“We find that most people find the presence of the Talon road spike barrier to be rather intimidating. The driver’s biggest concern is obviously irreparable damage to their vehicle’s tyres. However, the Talon barrier comes complete with a combined logic and loop detector as well as an electronic interlock, which safely lowers spikes first and then raises the barrier arm for safe passage of the vehicle.

“In addition, a visual cue is supplied with the traffic light. When it is safe to proceed through the barrier, the green light will be activated. Similarly, when it is unsafe to drive through the barrier, the red light will be activated. Therefore, as long as the driver does not try to drive through the spike barrier and boom before the spikes have been lowered, there is zero risk to the vehicle’s tyres,” says Sacks.

For more information contact Turnstar Systems, +27 (0)11 786 1633, craig@turnstar.co.za, www.turnstar.co.za


Credit(s)
Supplied By: Turnstar Systems
Tel: +27 11 786 1633
Fax: +27 11 440 5839
Email: info@turnstar.co.za
www: www.turnstar.co.za
  Share via Twitter   Share via LinkedIn      

Further reading:

  • Awareness and trust in context
    November 2017, CA Southern Africa, Access Control & Identity Management, Security Services & Risk Management
    Markus Krauss, senior director, Digital Identity and Security, CA Technologies, spoke to Hi-Tech Security Solutions about making identity work for people and things.
  • People on the move
    November 2017, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Sanjay Dharwadker looks at some of the changes that have been enacted to better manage Europe’s borders.
  • Access and identity: looking ahead
    November 2017, neaMetrics, ZKTeco, Powell Tronics, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    Access and identity is more important than ever with more options than ever for companies looking for solutions that go beyond mere entry and exit.
  • A question of trust and ­accountability
    November 2017, Technews Publishing, Access Control & Identity Management, Integrated Solutions
    Access and identity management is about trust, how you assign it, how much you allow and how you manage it.
  • Trusting your privilege
    November 2017, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    Privileged access management is the starting point for effective enterprise identity and access management, whichever device you're logging in from.
  • Involve users in design
    November 2017, Elvey, Access Control & Identity Management
    One of the biggest obstacles to the successful operation of an access control system is the end user not being involved in the design of the solution.
  • Integrating surveillance and access
    November 2017, Cathexis Technologies, Gallagher, Milestone Systems, Paxton Access, Access Control & Identity Management, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
    Integrating access control and surveillance is a good idea, but those who take on this task have their work cut out for them.
  • The access edge
    November 2017, Johnson Controls, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions, Security Services & Risk Management
    With the common denominator of IP networks as their backbone, building automation, security and, in particular, access control systems are increasingly providing opportunities to both security integrators and building managers.
  • Home run for integrated security
    November 2017, Milestone Systems, Integrated Solutions, CCTV, Surveillance & Remote Monitoring, Access Control & Identity Management, IT infrastructure
    Axis Communications, Extreme, Lenel and Milestone team up to secure 2017 Little League Baseball Series.
  • Facing the future
    November 2017, neaMetrics, Virdi Distribution SA, This Week's Editor's Pick, Access Control & Identity Management, IT infrastructure
    Facial biometrics is coming into its own today, but is it a 100% reliable means of identity verification and authentication?
  • The growth of biometrics
    November 2017, ZKTeco, Access Control & Identity Management
    Biometric verification is the future, we live in a time where a person can be uniquely identified by evaluating one or more distinguishing biological traits.
  • Access on the edge
    November 2017, Suprema, Access Control & Identity Management, Integrated Solutions
    CoreStation handles half a million users with a fingerprint matching speed of up to 400 000 match/second and simultaneous matching speeds of up to 8 devices in 1 second.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.