Integrated anything

September 2018 Editor's Choice, Integrated Solutions, Security Services & Risk Management

When it comes to management platforms, the security industry has no lack of products to choose from. There are systems designed for single products and the larger ones designed to integrate multiple products and solution categories into a single interface. Then there’s Babylon, or officially, XMP-Babylon.

In development for over three decades by German company Autec, Babylon is designed to manage access control systems and more. However, its utility goes beyond management. Alvin Flaum, director of Veracitech, a Babylon OEM partner in southern Africa describes it as an automation platform that allows for the management of numerous and diverse business processes across diverse industries.

Autec appoints companies like Veracitech as OEM partners because the system is a complex platform that allows you to do almost anything, and Veracitech through some 28 years’ experience as OEM partners for Babylon systems, has capitalised on this with a number of in-house developed products that run on the platform aimed to serve its clients’ various requirements.

At a basic level, Babylon offers a fully configurable high-performance access automation system, which is fast, secure and flexible. It can be integrated with multiple access technologies and different types of identification, such as badges, card readers and biometrics. The data collected is stored in a secure environment and its encrypted in transit. For distributed operations, the master database continually updates all branches wherever they are to ensure all sites are using the current dataset. The system adds to this by offering time recording and accounting according to a modular-based model offering custom solutions for any application purpose.

You can also make use of a configurable security and facility management system that offers a graphical dashboard for easy management. CCTV systems and IP cameras, key management systems, phone and radio systems can be integrated into the system along with fire alarms, parking systems, intrusion detection and the usual security offerings. Depending on how the system is set up and what custom plug-ins are used, customers can have integrated video analytics, guard patrol management, X-ray scanning of objects or people, and other functionality running on the system.

Building management modules are also available for larger projects that can include functions such as energy, lighting and ventilation management, and you can even manage manufacturing systems from the Babylon interface. But that is only the start.

OEM benefits

Flaum says Babylon is used globally and is a standard at many African reserve banks and on many mines (as well as other large organisations) because of the system’s versatility and the ease with which Veracitech’s engineers can develop plug-ins for almost any purpose. This is not a plug-and-play system, however, it requires skilled engineers to implement successfully, but has a reputation for extreme reliability once installed. Veracitech also offers certified operator, administrator and service technician training on the Babylon platform.

Veracitech partners with a host of security suppliers, from Avigilon through to Traka, Idemia, Qognify, Dallmeier, Axis and others. All these systems are integrated into Babylon, and in some cases Veracitech has written its own integration to better meet customer demands. Some of the solutions Veracitech has developed and deployed as plug-ins for active client applications include the following:

• Babylon Avigilon: VMS Integration with Veracitech Soft Matrix feature, including fully integrated alarm and event video management and the ability to utilise multiple Babylon workstation monitors for video matrix switching.

• Babylon Key Management: High level database integration with Traka (ASSA Abloy).

• Babylon Enrolment: Morpho (Idemia) biometric enrolment and template management allowing for cardless fingerprint-only transactions on Babylon / Idemia (Morpho) equipped systems.

• Babylon Certifications: Access control incorporating health and safety as well as other statutory accreditations and training prerequisites. Integrating with HR databases and more, the system can control access to certain areas based on whether the person requesting access meets corporate requirements. For example, if a miner has been for a scheduled medical check-up or has been certified in a specific skill. Before allowing anyone to start a truck on a mine, the system may first check to ensure the individual’s licence is up to date and that he underwent a breathalyser test that morning.

• Babylon Rules IBO: Integrating with maintenance and scheduling databases and more, the system can control temporary access to certain areas or machines.

• Babylon Toolstore: Technicians can be issued with tools or any assets at the start of a workday or when required, with each asset allocated to them according to their access credentials. The same person can be prevented from leaving the workplace if they have not checked their tools back in, or if they are allowed to take certain equipment home, it will be checked out to them until it is returned.

• Babylon Baggage X-Ray Search: In areas where people are regularly subjected to baggage X-Ray scans, Veracitech has integrated the system to include video images and RFID tags for bags people may carry, irrefutably linking people to their belongings – just in case someone tries to sneak out something in their bag only to claim it isn’t theirs when caught.

• Babylon VLPR Access Control: Veracitech can also manage access in Babylon via licence plate recognition (LPR) using on-camera LPR systems. The client can manage vehicle entrance and exits in real-time. The camera is treated as a virtual access control reader on the Babylon system.

• Babylon Alarm Receiver Base Integration: This enables the monitoring and handling of alarm signals from alarm monitoring systems from companies such as RDC, FSK, and MAMI.

• Hardware developments: Veracitech has also developed client specific hardware components for Babylon.

There are numerous other applications Veracitech has developed on the platform. All told, Veracitech offers the design, installation, configuration and custom development and integration of multiple security and operational systems into the Babylon platform, which will allow clients to more efficiently manage their operations, even distributed operations, reliably from a central source.

Veracitech currently has a client list that includes companies like Anglo Platinum, De Beers, Petra Diamonds, Namdeb, Debmarine, Gemfields, South32, DTI, Transnet and others, including clients in Namibia, Botswana and Mozambique.

For more information, contact Veracitech, alvin@veracitech.co.za, www.veracitech.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
From the editor's desk: The beginning of the end
Technews Publishing News & Events
            As we come to the final issue of SMART Security Solutions, we can look back on a tough year: long decision-making cycles, squeezed budgets and the expectation of miracles on a shoestring. SMART Security ...

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
AI and automation are rewriting the cloud security playbook
Technews Publishing AI & Data Analytics
Old-school security relied on rules-based systems that flagged only what was already known. AI flips the script: it analyses massive volumes of data in real-time, spotting anomalies that humans or static rules would miss.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Toxic combinations
Editor's Choice
According to Panaseer’s latest research, 70% of major breaches are caused by toxic combinations: overlapping risks that compound and amplify each other, forming a critical vulnerability to be exploited.

Read more...
Cybersecurity operations done right
LanDynamix SMART Security Solutions Technews Publishing Information Security
For smaller companies, the costs associated with acquiring the necessary skills and tools can be very high. So, how can these organisations establish and maintain their security profile amid constant attacks and evolving technology?

Read more...
Syndicates exploit insider vulnerabilities in SA
Information Security Security Services & Risk Management
Today’s cyber criminals do not just exploit vulnerabilities in your systems; they exploit your people, turning trusted team members into unwitting accomplices or deliberate collaborators in their schemes.

Read more...
Is your entrance security secure?
SMART Security Solutions Centurion Systems Technews Publishing News & Events Access Control & Identity Management Smart Home Automation
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.