Safety for students

Access & Identity Management Handbook 2005 Access Control & Identity Management

Project scope

Ensuring the safety and security of 65 000 people occupying 110 buildings under the auspices of the University of the Witwatersrand.

The history

Wits University needed to upgrade the access control at its campuses and the institutions that fall under it - including the Wits Business School, Medical School and the medical students at the Chris Hani Baragwanath Hospital. Originally the university had an entirely open campus as it was a public area, but because of crime in the area that had to change.

The goal and benefits

The security and access control measures put in place were intended to create a more secure environment for learners and staff without being too restrictive or intrusive and to only let authorised people into the specific areas they are allowed to enter.

The cards that grant access are not used just for that. In the case of a student it is linked to various facilities within the grounds and/or buildings of the university. The outermost security measures include pedestrian turnstiles and booms for motor vehicles - this card opens both of these. Once inside the perimeter fencing, the card allows access to the buildings via turnstiles monitored by CCTV. Once inside the buildings, the cards allow access to more secure and restricted parts of the buildings, cardholders are identified and allowed access to predetermined areas. The cards also serve as debit cards against which food can be bought, photocopies made as well as laser printing. The cards are also used for the Wits' Meal Booking system for catered residence students among others.

Obstacles en route to a final solution

The main hiccup in the system comes when students finish an academic year and are required to re-register on the system at the start of a new year. They cannot all be deleted from the system at the end of the year as they would then not be able to gain access the following year in order to register again, so there is an overlapping period until after registration.

The result

Vehicle theft from the campus parking lots dropped from around 17 a month prior to the seal-off down to less than 17 a year since access has been controlled.

Within the confines of the campus, students are in a safer environment and equipment in the various departments is more secure due to the turnstiles at entry points into each room containing valuable equipment. Many facilities are now available to students 24 hours a day.

Fact file

Key service providers, products and solutions:

Diebold South Africa, Christa Kensley, 011 348 2941.

Blick South Africa, Mike Lotter, 011 844 3200.

Turnstar, Mark Eardley, 011 786 1633.

Boomgate, Andre Rossouw, 011 769 1677.

University of the Witwatersrand, Giles Watermeyer, 011 717 1870.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Impro announces Primo update
News & Events Access Control & Identity Management Integrated Solutions
Impro Technologies recently held a launch event in which it introduced a series of new products, from new readers through to its updated Primo access management software.

Read more...
If you cannot prove identity, you cannot claim security
Access Control & Identity Management Information Security
Cybersecurity planning for 2026 is a structural change in how attacks are executed and how trust is exploited, demanding that companies stop layering tools on top of infrastructure and instead prioritise intelligence and identity.

Read more...
Paxton set to launch game-changing new system
Paxton Access Control & Identity Management News & Events
Access control is evolving fast. Installers and end users are looking for systems that are simple to install, easy to manage remotely, and flexible enough to scale. In response, Paxton is exploring how emerging technologies can reshape access control.

Read more...
NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...
Cloud security in visitor management and access control
SA Technologies Access Control & Identity Management Infrastructure Residential Estate (Industry) Commercial (Industry)
Cloud has become the default platform for modern security operations, from visitor management portals and remote access control to incident logging, reporting, analytics, and integrations. But “in the cloud” does not mean “someone else is securing it for us”.

Read more...
Centurion raises the bar at HomeSec Expo
Centurion Systems News & Events Access Control & Identity Management Residential Estate (Industry) Smart Home Automation Commercial (Industry)
Centurion Systems unveiled its latest product lines at HomeSec Expo 2026, introducing SMART+, a simpler way for installers and end users to manage their Centurion installations - as well as a few new products.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
Protecting citizens’ identities: a shared responsibility
Access Control & Identity Management
A blind spot in identity authentication today is still physical identity documents. Identity cards, passports, and driver’s licences, biometric or not, are broken, forged, or misused, fueling global trafficking networks and undermining public trust in institutions.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.