Security, right from the start

Access & Identity Management Handbook 2006 Access Control & Identity Management

IT companies have a greater need for security than most, so when a Cape Town-based company specialising in e-commerce and Internet solutions for a global client base, decided to build a new three-storey­building in the Century City Precinct, it was an ideal opportunity to review and upgrade its security.

The old building was monitored by outdated systems that had been accumulated over a period of time, and the company needed an integrated solution utilising modern technology to fulfil all its security requirements.

One of the company's major goals was to provide a safer, more secure environment for the more than 700 staff members working in the building. The communication centre operates around the clock so it also had to consider the needs of staff members working shifts.

The project

The new solution was planned long in advance of implementation as the proposed new structure was still to be built. The company put together a substantial project team to develop the methodologies and business processes required to ensure that all the company's requirements had been thoroughly analysed.

Jeff Greeff, sales executive at Blick SA explains: "We were in constant contact with the company at this stage, making recommendations about the technology that was available and which systems we felt would best meet its requirements. The company was well prepared by the time it appointed a consultancy firm for the tender specifications to be drawn up and finalised."

Blick provided a turnkey solution, featuring biometric and conventional access control (AC), CCTV monitoring and recording, public address and voice evacuation, fire detection, and parking control systems. The systems and hardware were all integrated via an ImproX AC system, utilising a graphic user interface (GUI).

The GUI was then used to populate the site map for any alarms that were generated from the fire doors, the fire detection system or AC points.

The CCTV system was then used to monitor these alarms. In the event of a fire alarm being generated, the PA/voice evacuation system would automatically begin the fire alarm alert routine.

Sagem biometric fingerprint readers were used to provide enhanced levels of AC for high-risk areas such as the server room.

Smith adds: "We also greatly improved pedestrian traffic flow through the strategic control of key entry and exits points throughout the building.

"The networking capabilities of the ImproX system were also a factor in the choice of the system. It was important to the company that managers could have security information available at their fingertips."

The control room, which housed three 40" LCD monitors and four 32" LCD monitors which are recorded by four Sanyo 16 channel 200FPS DVRs with built-in multiplexers, was another area where increased security was provided. This has allowed for the compartmentalisation of different departments so that they can protect their intellectual property rights to the various Internet-based solutions that they design for clients.

The company did put the project out to tender, but in the end decided to stick with Blick, with whom it had an excellent relationship, built up over a number of years.

"Being a part of the specifying process helped, in that Blick had already surmounted all the obstacles in terms of equipment required. Our proposal already met the company’s requirements," comments Greeff.

The company, following standard policy, awarded the oversight contract to BFBA Consultants, who implement the final scope of work, bill of quantities and all legal contractual requirements.

There was some frustration due to delays in the building process, but these were overcome in time. Blick's long-term relationship with their many suppliers was very useful in assisting the company to overcome the challenges.

Design, specification and implementation were handled as separate phases in the development of the project. "The project was very capably controlled by one of our project managers. Goals were set and achieved, when and where we could, without allowing the construction delays to get in our way. Weekly and often daily meetings where held with all relevant parties who influenced our forecast timelines," explains Greeff.

"The post-implementation snag-list could perhaps have been sorted out sooner if we had we been more involved in assisting the client with training to overcome their lack of familiarity with operational procedures."

The implementation of this R1,2 million project was successfully completed to the client's satisfaction.

The success of the implementation was largely due, in Greef's opinion, to "well thought-out and properly-practised business processes and the commitment of a thorough project management team."

Blick is currently working on a future expansion programme for the company.

Greef concludes: "The company achieved the successful integration of all systems involved. The project was complex and required many hours of careful planning but the effort paid off and they got the solution they wanted."

Fact file

Blick SA, Jeff Greeff, +27 (0) 21 511 3322, jeffg@blick.co.za

Ideco, biometrics, Gary Jones, +27 (0) 11 745 5600, ggj@ideco.co.za

Impro, access control, Barry East, +27 (0) 31 700 1087, barrye@impro.net

Elvey, CCTV, Steve Smethurst, +27 (0) 21 448 6390

Pentagon Distribution, control room, Anton Hochleutner, +27 (0) 21 555 0258

Ziton, fire panel and peripherals, Terence Ewers, +27 (0) 021 506 6000

Wild and Marr, voice evacuation, Raymond Ricks, +27 (0) 21 762 8615



Credit(s)





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Paxton set to launch game-changing new system
Paxton Access Control & Identity Management News & Events
Access control is evolving fast. Installers and end users are looking for systems that are simple to install, easy to manage remotely, and flexible enough to scale. In response, Paxton is exploring how emerging technologies can reshape access control.

Read more...
NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...
Cloud security in visitor management and access control
SA Technologies Access Control & Identity Management Infrastructure Residential Estate (Industry) Commercial (Industry)
Cloud has become the default platform for modern security operations, from visitor management portals and remote access control to incident logging, reporting, analytics, and integrations. But “in the cloud” does not mean “someone else is securing it for us”.

Read more...
Centurion raises the bar at HomeSec Expo
Centurion Systems News & Events Access Control & Identity Management Residential Estate (Industry) Smart Home Automation Commercial (Industry)
Centurion Systems unveiled its latest product lines at HomeSec Expo 2026, introducing SMART+, a simpler way for installers and end users to manage their Centurion installations - as well as a few new products.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
Protecting citizens’ identities: a shared responsibility
Access Control & Identity Management
A blind spot in identity authentication today is still physical identity documents. Identity cards, passports, and driver’s licences, biometric or not, are broken, forged, or misused, fueling global trafficking networks and undermining public trust in institutions.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.