Selecting the right entrance

Access & Identity Management Handbook 2015 Access Control & Identity Management

There are a host of products and solutions on the market when looking for a secure entrance system for your business premises. Some of them are made locally while others are imported. The question every buyer needs to consider when looking for a solution is which of these options would best suit their business.

You can choose between differing levels of security, more manual systems or those incorporating more technology. There’s also the choice of systems that look pleasant and inviting, or those that make it clear that people are going through a security checkpoint. Above all, you need to choose a solution that matches your security needs.

Hi-Tech Security Solutions asked three experts in entrance systems to elaborate on this topic of what systems are available and how to select the best one for your business. Our interviewees were:

• Craig Sacks from Turnstar,

• Charl Mijnhardt from Centurion Systems, and

• Francois Breedt from ASSA ABLOY.

Hi-Tech Security Solutions: How do companies decide on which entrance systems to use for their business premises? What factors need to be considered?

Charl Mijnhardt: Companies tend to choose holistic solutions for their security systems; in other words, solutions that incorporate and address different aspects of access control to provide a comprehensive, one-size-fits-all infrastructure while taking into account the company’s unique security needs. In terms of the factors that need to be considered, the following points are always important:

• Power failure autonomy (battery backup).

• Memory capacity (in other words, the number of remote buttons, fingerprints, PIN codes etc., that the system is capable of storing).

• After-sales and technical support.

• User-friendliness and ease of maintenance.

• Features of the individual products.

• Diagnostic feedback.

Craig Sacks: We look at the physical side of securing a particular entrance. From this point of view, the decision making process or steps are as follows:

• Where is the entrance which requires protection? Is it on the perimeter of the property or inside a building (such as an office reception)?

• Is the entrance being monitored by active security who will notice if a criminal is trying to circumvent the physical security measures?

• How many people will be using the particular entrance at any given time? This information is critical to assessing the flow rate through the access control point. Traffic jams are to be avoided as it is unproductive time and frustrates people.

• How will wheelchairs and special deliveries be accommodated? Special security gates may be required for these special access needs.

• What type of electronic access system will be used in conjunction with the physical security barrier – fingerprint, card reader? How will the access control reader be incorporated into the turnstile, speedgate or booth?

• Lastly, the general aesthetic and level of corrosion resistance must be selected by the customer. The product can be manufactured in mild steel and powder coated (colour decided by the customer) or it can be supplied in either stainless steel or hot dip galvanised steel which offer high levels of corrosion resistance.

Francois Breedt: There are many factors to take into consideration when deciding on an entrance system for premises: functionality, cost etc. It really comes down to horses for courses, what the end user wants to get out the system when all is said and done. Some of the deciding factors would be:

• Is it purely an access control system or should it be able to integrate into a time and attend­ance system as well?

• Should it be an online 'live system' or is offline standalone adequate?

• Can the system accommodate various identification devices i.e. biometric devices, card readers or a combination of devices?

• Scalability of the system for seamless expansion in future if necessary?

• Carbon footprint: maglocks versus electronic locks (maglocks require a constant electrical supply to function and are by default, not energy efficient). Battery powered readers versus traditional identification devices. The trend is towards energy efficiency.

• Initial cost of the system is always a massive factor and cost of ownership needs to be considered as well

Hi-Tech Security Solutions: What are the various security systems/solutions/technologies available for entrance systems?

Charl Mijnhardt: In very broad terms, the main access control systems are:

• RF-based systems (remote controls).

• GSM-based systems (access control via mobile phone).

• Keypad access control.

• Proximity access control (tag/card readers).

• Biometric systems (fingerprint readers).

Craig Sacks: There are a number of different types of turnstiles, security booths and speedgates which can be installed. The product chosen depends on the desired security level and the assessed risk of each area. For instance, a turnstile at a boundary wall which is not monitored by security can pose a significant risk.

Turnstiles are available in full height, half height and waist height versions, depending on the desired security level. Security booths (man-trap cubicles) are ideal for banking and high security applications where both security and aesthetics are a priority. Speedgates are most often used in office premises and provide a prestige high-speed access control solution.

Francois Breedt: From a control backbone perspective there are two groups:

• The 485 communication bus system where a certain number of doors are managed by a door controller that communicates back to a system controller that then gets managed with software on a server.

• Latest trends follow IT design principles where the reader is a pure IP device that connects back to the server via the network, thus eliminating the additional building blocks required in a traditional system.

From an end-device perspective there are only a few identification options in principle:

• Biometric identification i.e. fingerprint, voice, retina scan, hand scanners, etc.

• Access credential i.e. access cards, NFC, SEOS (credential on smart device) etc.

• PIN.

Hi-Tech Security Solutions: Does there always have to be a compromise in terms of ­solutions that are secure and those that fit in with the ‘look-and-feel’ of the premises?

Charl Mijnhardt: Not at all. When it comes to security technology, the lines that separate form from function have always been very sharply defined, and product designers have historically sacrificed aesthetics in favour of feature riches, the rationale being that homeowners would suffer visually unappealing equipment as long as it kept them safe.

But times have changed and today users demand security products that blend in seamlessly, or in the best case scenario, enhance the overall aesthetic of their premises.

Craig Sacks: A key component of physical security solutions is the balance between safety, comfort and security. Firstly, the product itself must be reliable and it must be safe. Turnstiles, security booths and speedgates all have moving parts, some of which are motorised, and the expectation is that a pedestrian would stand a virtually 0% chance of getting hurt while walking through the threshold. In terms of comfort, physical security products are often designed in order to minimise the amount of entrance space, thereby decreasing the possibility of tailgating. Security itself is another challenge and supplying a robust and strong solution which operates correctly and which can withstand abuse from vandals and disgruntled employees is important.

Francois Breedt: 90% of an access control system should not be visible after installation. Cable reticulation, controllers etc. are usually installed out of sight and only the readers are visible to the user. And from that perspective, users are spoiled for choice.

Hi-Tech Security Solutions: What warranties do you supply with your products? Do you work through a channel or do the installations yourself? Are your systems manufactured locally or overseas? How do you ensure the quality of your products?

Charl Mijnhardt: There is a warranty of 24 months on most of our products. We work through a dedicated channel of distributors and installers.

The vast majority of our products are manufactured locally. The company invests considerably in its research and development programme with a team of qualified engineers, using the latest computer-aided design tools to constantly research new and innovative products to add to the range. They also focus on upgrading existing models and developing tools and jigs for the manufacturing facility.

Centurion is accredited with the world-class quality assurance system ISO9001:2008 to ensure its products are manufactured to the highest level of quality. Added to this, using custom-built computer-aided equipment and there is a 100% test to specification.

Craig Sacks: All Turnstar’s products are manufactured in our 7700 m² factory in Johannesburg. Turnstar currently employs 115 people and installations are carried out by Turnstar throughout South Africa. A series of internal quality controls ensure a perfect product is dispatched every time.

Turnstiles are supplied with a five-year guarantee, speedgates with a three-year guarantee.

Francois Breedt: ASSA ABLOY has a two-year warranty on products. The wireless Aperio range is available through our OEM partners and electronic locks and other door peripherals are available from various distributors.

Hi-Tech Security Solutions: What systems does your company specialise in?

Charl Mijnhardt: We specialise in access automation and our product range runs the full gamut, including:

• Swing gate motors

• Sliding gate motors

• Traffic barriers

• Remote controls and receivers

• Proximity access control

• GSM devices

• Garage door motors

• Roller-shutter operators

• Intercom systems

Francois Breedt: ASSA ABLOY specialises in door hardware: electro-mechanical locks, strike locks, maglocks, card readers, biometric locks and also our flagship wireless battery powered Aperio range of locks. Aperio is an affordable wireless lock that is easy to install, easy to maintain with a low cost of ownership, easy to expand on and integrated with all the big name access control OEMs.

For more information contact:

Centurion Systems, +27 (0)11 699 2400, [email protected], www.centsys.co.za

Turnstar Systems, +27 (0)11 786 1633, [email protected], www.turnstar.co.za

ASSA ABLOY, +27 (0)11 761 5019, [email protected], www.assaabloy.co.za



Credit(s)






Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Enhancing overall access control
Turnstar Systems Mining (Industry)
Turnstar’s Titan turnstile offers high security physical access control, which can be integrated with advanced technologies to prevent unauthorised entry to mining facilities.

Read more...
Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Read more...
Access Selection Guide 2024
Access Control & Identity Management
The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.

Read more...
Biometrics Selection Guide 2024
Access Control & Identity Management
The Biometrics Selection Guide 2024 incorporates a number of hardware and software biometric identification systems aimed at the access and identity management market of today.

Read more...
Smart intercoms for Sky House Projects
Nology Access Control & Identity Management Residential Estate (Industry)
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app.

Read more...
Authentic identity
HID Global Access Control & Identity Management
As the world has become global and digital, traditional means for confirming authentic identity, and understanding what is real and what is fake have become impractical.

Read more...
Research labs secured with STid Mobile ID
Access Control & Identity Management
When NTT opened its research centre in Silicon Valley, it was looking for a high-security expert capable of protecting the company’s sensitive data. STid readers and mobile ID solutions formed part of the solution.

Read more...
Is voice biometrics in banking secure enough?
Access Control & Identity Management AI & Data Analytics
As incidents of banking fraud grow exponentially and become increasingly sophisticated, it is time to question whether voice banking is a safe option for consumers.

Read more...
Unlocking efficiency and convenience
OPTEX Access Control & Identity Management Transport (Industry)
The OVS-02GT vehicle detection sensor is the newest member of Optex’s vehicle sensor range, also known as ‘virtual loop’, and offers reliable motion detection of cars, trucks, vans, and other motorised vehicles using microwave technology.

Read more...
Protecting our most vulnerable
NEC XON Access Control & Identity Management Products & Solutions
In a nation grappling with the distressing rise in child kidnappings, the need for innovative solutions to protect our infants has never been more critical. South Africa finds itself in the throes of a child abduction pandemic.

Read more...