Access to mixed-use development

Access & Identity Management Handbook 2013 Access Control & Identity Management, Residential Estate (Industry)

40 on Oak is an upmarket apartment block within the Melrose Arch mixed use development in Johannesburg. The five-storey building has 54 units ranging from one to four bedrooms, and five penthouses on the top floor.

The developers decided that any access control systems installed in 40 on Oak would need to be able to integrate with the systems already running at Melrose Arch. In addition, the systems needed to conform to the planned future expansion and upgrading of the precinct-wide access control and building management system (BMS) requirements.

The UTM Group was approached in November 2011 to assess, determine and design an access control system that would achieve all the client stipulations in terms of both future proofing and backwards compatibility. At the same time, due to the nature of the final development, aesthetics played a large role.

Kelly McLintock, group managing director of the UTM Group, said of the existing access control system at Melrose Arch: “A total of over 450 doors are controlled across all areas of the Melrose Arch precinct. Our challenge was to provide a solution that would integrate with all existing bespoke systems, and which will also be compatible with any future expansion of the precinct. We also looked to streamline the administration process and offer improved monitoring and control.”

Cost and quality were weighed up against the pressing security requirements at 40 on Oak. “As the security integrator and solution provider for the project, our first plan of action entailed consolidating and mapping the existing system to determine areas requiring attention. It was important to then design and implement a system for both 40 on Oak and the rest of the Melrose Arch precinct that will provide the end user with a state-of-the-art and user-friendly solution,” McLintock explained.

“The solution comprised three main components: an access control system, Stentofon IP intecom system and Bosch BVMS CCTV system. The selection allows us to integrate with the site-wide system, with a view to future proofing. The systems will control access to the general areas of the building via all external entrances, as well as individualised access for the lifts.”

The biggest challenge faced by UTM was the software and firmware incompatibility between the systems that are currently in place, and the new system proposed for 40 on Oak. “In order to provide a truly integrated solution, it was necessary to institute upgrades across the board which would not only benefit the 40 on Oak residents, but also all the users across the precinct. The entire project is being tackled in a phased approach over the next three years and UTM is currently on deadline for completion of the 40 on Oak section of the project in early 2013,” McLintock added.

The access control system at 40 on Oak comprises the control of 74 access controlled doors and over 100 monitored doors, using a combination of readers. Each user is enrolled for a specific zone, for example ‘4th floor’, with the ability to customise each user for multi-zone access levels. This not only applies to 40 on Oak but, once again, to the entire precinct. Readers at the lifts ensure that when a user tags in the lift, they will only be able to access their designated floor.

The building, which has received accolades for its green compliance, will possibly in the long term utilise the access control system to control power usage. “When a tenant leaves their unit, the system could switch all non-essential powered items off to eliminate unnecessary power consumption. When the tenant swipes his card to enter his unit, full power would be restored to his unit,” explained McLintock.

Visitors to the building will be required to interact with tenants via the Stentofon IP system. This system interfaces with a building-wide PABX system. Each unit is equipped with a SIP phone that doubles as a VoIP telephone and an intercom handset.

“UTM’s input from the design stage ensured that all conduit and electrical requirements were in place prior to first fix commencement. This meant that there were no surprises or unforeseen problems as the installation progressed,” said McLintock.

The feedback received from the client has been extremely encouraging. “We have been told that the installation and service exceeds their initial expectations and based on the success of the project to date, the customer has extended the scope of the project and contract period,” McLintock concluded.

Once the project is completed, UTM will provide all onsite support, maintenance and servicing requirements.

For more information contact UTM Group, 0860 22 22 66, kelly@utmgroup.co.za, www.utmgroup.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Read more...
Access Selection Guide 2024
Access Control & Identity Management
The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.

Read more...
Biometrics Selection Guide 2024
Access Control & Identity Management
The Biometrics Selection Guide 2024 incorporates a number of hardware and software biometric identification systems aimed at the access and identity management market of today.

Read more...
Smart intercoms for Sky House Projects
Nology Access Control & Identity Management Residential Estate (Industry)
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app.

Read more...
Authentic identity
HID Global Access Control & Identity Management
As the world has become global and digital, traditional means for confirming authentic identity, and understanding what is real and what is fake have become impractical.

Read more...
Research labs secured with STid Mobile ID
Access Control & Identity Management
When NTT opened its research centre in Silicon Valley, it was looking for a high-security expert capable of protecting the company’s sensitive data. STid readers and mobile ID solutions formed part of the solution.

Read more...
Is voice biometrics in banking secure enough?
Access Control & Identity Management AI & Data Analytics
As incidents of banking fraud grow exponentially and become increasingly sophisticated, it is time to question whether voice banking is a safe option for consumers.

Read more...
Unlocking efficiency and convenience
OPTEX Access Control & Identity Management Transport (Industry)
The OVS-02GT vehicle detection sensor is the newest member of Optex’s vehicle sensor range, also known as ‘virtual loop’, and offers reliable motion detection of cars, trucks, vans, and other motorised vehicles using microwave technology.

Read more...
Protecting our most vulnerable
NEC XON Access Control & Identity Management Products & Solutions
In a nation grappling with the distressing rise in child kidnappings, the need for innovative solutions to protect our infants has never been more critical. South Africa finds itself in the throes of a child abduction pandemic.

Read more...
Understanding the power of digital identity
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
The way we perceive business flourishing is undergoing a paradigm shift, as digital identity and consumer consent redefine the dynamics of transactions, says Shanaaz Trethewey.

Read more...