Century City automates access control

1 March 2017 Access Control & Identity Management, Perimeter Security, Alarms & Intruder Detection, Integrated Solutions

Century City Property Owners Association (CCPOA), the body responsible for the day-to-day running of Century City, a 250 ha mixed-use development in Cape Town, has reinforced its access control and security with the deployment of new technology from South African software solution providers Solution House and At The Gate.

The CCPOA was one of the first organisations in the country to deploy the comprehensive incident management platform, Incident Desk, developed and distributed in South Africa by Solution House.

The system has recently been expanded with the introduction of a simplified access control and visitor management solution from Gauteng-based At The Gate, which uses a handheld device and custom-developed Android app to monitor the flow of all vehicles in and out of entry points to buildings, estates, precincts and almost any other gated thoroughfares.

At The Gate gives site managers instant access to information on a vehicle and driver once the licence plate, licence disc or driver’s card has been scanned. Using a comprehensive licence plate database developed by the CCPOA, any suspicious or flagged vehicle or driver immediately raises an Incident Desk alert, which is automatically sent to CCPOA management and patrol staff.

“We’ve been building a database of suspicious vehicle information from a number of different sources, including SAPS, over the past few years, and through Incident Desk have centralised the access to this data so we can quickly raise an alert if one of our staff encounters a flagged vehicle,” says Marinus Boshoff, safety and security manager, CCPOA.

“With the introduction of At The Gate, we can now push that data to the access devices at booms and other entry points, and automatically get alerts in our control centre about suspicious vehicles as soon as a vehicle is scanned,” he says. “This gives us the time we need to proactively mobilise our staff to the incident, whereas before we would possibly have received the information about a suspicious vehicle too late to act on it.”

Boshoff says that because Incident Desk is closely linked to a detailed map of the precinct, not only can suspicious vehicles be pinpointed, but over time, Incident Desk helps generate hotspot maps that give CCPOA management valuable data on the types, locations and times of incidents.

“Because we know when and where certain incidents occur – be it a criminally-linked vehicle or any other security-related incident captured by Incident Desk, we can start to analyse trends and even predict the likely occurrence of future incidents,” he adds. “This has knock-on benefits in terms of how we allocate our staff and resources to proactively manage incidents across the precinct.”

At The Gate director Barry Resnik, says that At The Gate is configured to push the name and ID number of the expected driver in each vehicle, as well as the image of the driver on the front of the driver’s licence.

“This is a failsafe way to ensure the driver of the vehicle being scanned is correctly identified, and should he or she not be the person whose information was captured, an incident alarm will immediately be triggered,” he says.

“Where this level of access control is particularly useful is in more serious criminally-linked cases, where the information in the database indicates, for example, a certain grouping of driver and passengers in a certain model and colour of car, which can quickly be corroborated by security staff who alert the proper authorities. Since alerts are raised in real time, CCPOA has enough time to take the necessary steps before the vehicle leaves the precinct.”

Tiaan Janse van Rensburg, Solution House.
Tiaan Janse van Rensburg, Solution House.

“Much like At The Gate, which was developed to replace physical access control books, we developed Incident Desk as a replacement for physical site management books,” says Solution House director Tiaan Janse van Rensburg. “Over time, it’s evolved into much more than a centralised management platform, adding functionality such as real-time incident reporting via the mobile app, and giving users an almost infinite number of ways to configure the software to their specific sites.

“Customers like CCPOA use Incident Desk to not only track and respond to serious crime-related incidents, but also structural faults, like potholes or broken lights, fallen trees, and damaged fences, to name a few. It can also be used to generate reports for managers and staff, to monitor and control schedules, or track just about any conceivable management and maintenance function.”

Boshoff says the combination of Incident Desk and At The Gate gives CCPOA unprecedented control over vehicle access inside and around Century City, and the value of the combined system is worth much more than the sum of its parts. “We’ve taken a custom-built and highly configurable platform in Incident Desk and coupled it with another South African innovation with At The Gate, and the result is one of the most detailed and accurate vehicle identification systems that I’ve had the privilege of working with.”

For more information contact Solution House, +27 (0)82 565 8081, tiaan@solutionhouse.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Future trends for electronic safety and security in mining
Fang Fences & Guards Mining (Industry) Integrated Solutions AI & Data Analytics
The mining industry is ever evolving, driven by technological advancements and the growing need for enhanced safety and security measures, with significant innovation seen in turnkey electronic security for mining operations.

Read more...
Unlocking enhanced security for mining
Mining (Industry) Integrated Solutions
In the dynamic landscape of African mining, security remains of paramount concern as threats evolve and challenges persist, and mining companies seek innovative solutions to safeguard their operations, assets, and personnel.

Read more...
A constant armed struggle
Technews Publishing XtraVision Editor's Choice Integrated Solutions Mining (Industry) IoT & Automation
SMART Security Solutions asked a few people involved in servicing mines to join us for a virtual round table and give us their insights into mine security today. A podcast of the discussion will be released shortly-stay tuned.

Read more...
Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Read more...
Access Selection Guide 2024
Access Control & Identity Management
The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.

Read more...
Biometrics Selection Guide 2024
Access Control & Identity Management
The Biometrics Selection Guide 2024 incorporates a number of hardware and software biometric identification systems aimed at the access and identity management market of today.

Read more...
Smart intercoms for Sky House Projects
Nology Access Control & Identity Management Residential Estate (Industry)
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app.

Read more...
Authentic identity
HID Global Access Control & Identity Management
As the world has become global and digital, traditional means for confirming authentic identity, and understanding what is real and what is fake have become impractical.

Read more...
Research labs secured with STid Mobile ID
Access Control & Identity Management
When NTT opened its research centre in Silicon Valley, it was looking for a high-security expert capable of protecting the company’s sensitive data. STid readers and mobile ID solutions formed part of the solution.

Read more...
Is voice biometrics in banking secure enough?
Access Control & Identity Management AI & Data Analytics
As incidents of banking fraud grow exponentially and become increasingly sophisticated, it is time to question whether voice banking is a safe option for consumers.

Read more...