Integrated anything

September 2018 Editor's Choice, Integrated Solutions, Security Services & Risk Management

When it comes to management platforms, the security industry has no lack of products to choose from. There are systems designed for single products and the larger ones designed to integrate multiple products and solution categories into a single interface. Then there’s Babylon, or officially, XMP-Babylon.

In development for over three decades by German company Autec, Babylon is designed to manage access control systems and more. However, its utility goes beyond management. Alvin Flaum, director of Veracitech, a Babylon OEM partner in southern Africa describes it as an automation platform that allows for the management of numerous and diverse business processes across diverse industries.

Autec appoints companies like Veracitech as OEM partners because the system is a complex platform that allows you to do almost anything, and Veracitech through some 28 years’ experience as OEM partners for Babylon systems, has capitalised on this with a number of in-house developed products that run on the platform aimed to serve its clients’ various requirements.

At a basic level, Babylon offers a fully configurable high-performance access automation system, which is fast, secure and flexible. It can be integrated with multiple access technologies and different types of identification, such as badges, card readers and biometrics. The data collected is stored in a secure environment and its encrypted in transit. For distributed operations, the master database continually updates all branches wherever they are to ensure all sites are using the current dataset. The system adds to this by offering time recording and accounting according to a modular-based model offering custom solutions for any application purpose.

You can also make use of a configurable security and facility management system that offers a graphical dashboard for easy management. CCTV systems and IP cameras, key management systems, phone and radio systems can be integrated into the system along with fire alarms, parking systems, intrusion detection and the usual security offerings. Depending on how the system is set up and what custom plug-ins are used, customers can have integrated video analytics, guard patrol management, X-ray scanning of objects or people, and other functionality running on the system.

Building management modules are also available for larger projects that can include functions such as energy, lighting and ventilation management, and you can even manage manufacturing systems from the Babylon interface. But that is only the start.

OEM benefits

Flaum says Babylon is used globally and is a standard at many African reserve banks and on many mines (as well as other large organisations) because of the system’s versatility and the ease with which Veracitech’s engineers can develop plug-ins for almost any purpose. This is not a plug-and-play system, however, it requires skilled engineers to implement successfully, but has a reputation for extreme reliability once installed. Veracitech also offers certified operator, administrator and service technician training on the Babylon platform.

Veracitech partners with a host of security suppliers, from Avigilon through to Traka, Idemia, Qognify, Dallmeier, Axis and others. All these systems are integrated into Babylon, and in some cases Veracitech has written its own integration to better meet customer demands. Some of the solutions Veracitech has developed and deployed as plug-ins for active client applications include the following:

• Babylon Avigilon: VMS Integration with Veracitech Soft Matrix feature, including fully integrated alarm and event video management and the ability to utilise multiple Babylon workstation monitors for video matrix switching.

• Babylon Key Management: High level database integration with Traka (ASSA Abloy).

• Babylon Enrolment: Morpho (Idemia) biometric enrolment and template management allowing for cardless fingerprint-only transactions on Babylon / Idemia (Morpho) equipped systems.

• Babylon Certifications: Access control incorporating health and safety as well as other statutory accreditations and training prerequisites. Integrating with HR databases and more, the system can control access to certain areas based on whether the person requesting access meets corporate requirements. For example, if a miner has been for a scheduled medical check-up or has been certified in a specific skill. Before allowing anyone to start a truck on a mine, the system may first check to ensure the individual’s licence is up to date and that he underwent a breathalyser test that morning.

• Babylon Rules IBO: Integrating with maintenance and scheduling databases and more, the system can control temporary access to certain areas or machines.

• Babylon Toolstore: Technicians can be issued with tools or any assets at the start of a workday or when required, with each asset allocated to them according to their access credentials. The same person can be prevented from leaving the workplace if they have not checked their tools back in, or if they are allowed to take certain equipment home, it will be checked out to them until it is returned.

• Babylon Baggage X-Ray Search: In areas where people are regularly subjected to baggage X-Ray scans, Veracitech has integrated the system to include video images and RFID tags for bags people may carry, irrefutably linking people to their belongings – just in case someone tries to sneak out something in their bag only to claim it isn’t theirs when caught.

• Babylon VLPR Access Control: Veracitech can also manage access in Babylon via licence plate recognition (LPR) using on-camera LPR systems. The client can manage vehicle entrance and exits in real-time. The camera is treated as a virtual access control reader on the Babylon system.

• Babylon Alarm Receiver Base Integration: This enables the monitoring and handling of alarm signals from alarm monitoring systems from companies such as RDC, FSK, and MAMI.

• Hardware developments: Veracitech has also developed client specific hardware components for Babylon.

There are numerous other applications Veracitech has developed on the platform. All told, Veracitech offers the design, installation, configuration and custom development and integration of multiple security and operational systems into the Babylon platform, which will allow clients to more efficiently manage their operations, even distributed operations, reliably from a central source.

Veracitech currently has a client list that includes companies like Anglo Platinum, De Beers, Petra Diamonds, Namdeb, Debmarine, Gemfields, South32, DTI, Transnet and others, including clients in Namibia, Botswana and Mozambique.

For more information, contact Veracitech, alvin@veracitech.co.za, www.veracitech.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

SMARTpod talks about HomeSec Expo 2026
SMART Security Solutions Technews Publishing News & Events Residential Estate (Industry) Videos
SMARTpod, the podcast from SMART Security Solutions, finds out more about the upcoming HomeSec Expo happening at Gallagher Estate on 4 & 5 March 2026.

Read more...
“This Is Theft!” SASA slams Mafoko Security
News & Events Security Services & Risk Management Associations
The Security Association of South Africa (SASA) has issued a stark warning that the long-running Mafoko Security Patrols scandal is no longer an isolated case of employer misconduct, but evidence of a systemic failure in South Africa’s regulatory and governance structures.

Read more...
Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...
Security ready to move out of the basement
AI & Data Analytics Security Services & Risk Management
Panaseer believes that in 2026, a board member at a major corporation will lose their job amid rising breaches and legal scrutiny, as organisations recognise that cyber risk is a business risk that CISOs cannot shoulder alone.

Read more...
Cyber remains top business risk, but AI fastest riser at #2
News & Events Security Services & Risk Management
The Allianz Risk Barometer 2026 ranks cybersecurity, especially ransomware attacks, as the #1 risk, while AI is the biggest riser and jumps from #10 to #2, highlighting the emerging risks for companies in almost all industry sectors.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.