Better T&A for engineers

Access & Identity Management Handbook 2009 Access Control & Identity Management

Bearing Man Group turned to Dengard Systems to upgrade its surveillance and time and attendance systems.

With its doors first opening in 1974, the Bearing Man Group (BMG) is said to be Africa’s largest specialist distributor of engineering components. With a combined force of over 100 outlets in southern Africa, BMG is strategically positioned to service all sectors of industry including agriculture, mining, petrochemical, sugar, paper and general engineering, as well as the automotive and domestic sectors.

The company strives to be a part of the productivity and operations of each customer’s business. It accomplishes this by providing technical solutions that optimise productivity.

The immediate availability of a comprehensive range of quality branded products sets the company apart in a highly competitive industry.

Since 1974 the company’s workforce has expanded tenfold, so a decent security and time and attendance solution was critical to keep day to day operations running smoothly. Thus the company looked to Dengard Systems to implement newer, more reliable access control and CCTV systems.

BMG decided to go for this upgrade a few months ago, as part of a complete overhaul of its main warehouse. Apart from upgrading the current CCTV system, the group was looking for a better way of controlling time and attendance and thus shifted its focus towards biometrics.

“Our previous time and attendance solution worked well when we employed a smaller workforce, however, with the growing number of employees, numerous problems such as buddy-clock-in occurred,” a company spokesperson said. Furthermore, the company faced endless security problems. The previous time and attendance system was also very outdated and was completely unserviceable.

The overall reward the company was looking for when the solution was operational was that of an effective access control system. Furthermore, it wanted detailed, accurate time and attendance reports to curtail unauthorised overtime and unauthorised access to the factory.

When BMG approached Dengard Systems with our needs it proposed we install a series a Sagem biometric fingerprint readers all connected to an Impronet backbone. However, before things could get underway, BMG’s executive committee had to be convinced that the proposed solution was the best way to go and would deal with all the shortcomings of the previous access control solution.

BMG’s Anton Kritzinger specified the needs and the entire project was then left up to Dengard Systems. The project was not put up for tender, nor were additional companies called in to work on the installation.

After the installation was complete, BMG’s time and attendance records were accurate and up-to-date, security improved and overall the employees are now experiencing a much healthier working environment.

For more information contact Denis Guard, Dengard Systems, +27 (0)83 228 2881.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
Protecting citizens’ identities: a shared responsibility
Access Control & Identity Management
A blind spot in identity authentication today is still physical identity documents. Identity cards, passports, and driver’s licences, biometric or not, are broken, forged, or misused, fueling global trafficking networks and undermining public trust in institutions.

Read more...
The challenges of cybersecurity in access control
Access Control & Identity Management
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Luxury residential access
Access Control & Identity Management Residential Estate (Industry)
Clifftown Shore is an exclusive collection of 51 luxury 1, 2 and 3-bedroom seafront apartments and penthouses set within a protected conservation park area, served by CAME’s XiP system and door entry system.

Read more...
From identity to insight
neaMetrics Access Control & Identity Management
Identity outlives technology. When it is trusted, it becomes a foundation for insight and scale. When it is not, every system built on it inherits the risk. Identity quality matters, at both human and system levels, and getting it right is what allows security to endure.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
Holding all the cards
neaMetrics Suprema SMART Security Solutions Technews Publishing Access Control & Identity Management
After so many years of offering alternatives to card technology for access control, one could be forgiven for assuming we are all using biometrics or mobile credentials for all our physical and digital access requirements.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.