Security convergence for people, places and data

June 2010 Integrated Solutions

South Africa’s universities are ever more technology driven and interest in converged security technologies is currently at a high, with a number of tenders recently released. Small wonder when the increasing convergence of technologies is delivering benefits like consolidated functionality, enhanced efficiencies and better controls.

Says Neil Cameron of Johnson Controls South Africa: “Many universities today have high-end IT backbones with high bandwidth capabilities. These need to be leveraged to drive core processes, which include not only the business of teaching and testing knowledge, but running the many varied facilities on campus – from canteens to labs, lecture halls, gymnasiums and dormitories – and ensuring the security of students and assets.”

The technologies to enable this have advanced significantly. Instead of specialised standalone systems all being managed individually, multifunctional solutions are now being integrated on open platforms, interacting intelligently to deliver far greater value.

The security challenges universities deal with are very different from those of corporates, however. Explains Cameron: “In corporate buildings, the turnover of staff and visitors is slow; in universities, however, there are upwards of 100 000 students physically entering the university’s premises or interacting with its data systems every year. This includes new students as well as those whose status has changed. and it is the status of every individual that determines what facilities and data they can access.”

This makes the central student database and registration system pivotal components of a comprehensive security system.

Security begins at registration

Says Cameron: “At universities large numbers of people will typically register in a very short time – say three or four days per faculty – every year.”

It is a process that includes registration per class, payment, issuing of study materials and, importantly, issuing of student cards. These are important as they will enable access to and use of specified areas on campus and at residential facilities.

At Rhodes University, where Johnson Controls has recently implemented an integrated security solution, 7500 students register in three days. Only three workstations are used to manage this process, which includes the issuing of a student registration card within 20 seconds of the payment and registration process being completed.

And if student data changes or configured thresholds fail to be met – say a student does not pay fees by a certain time or is dismissed from campus as a result of unruly behaviour – updates to these cards can be done in less than a minute. This ensures university rules and policies can be enforced, protecting students and making sure facilities can be secured against unauthorised access.

More than just physical security

However, thanks to technology advances, access cards and systems today have a number of additional features that can be leveraged by universities, providing added convenience in terms of facility use and security.

Explains Cameron: “The smartcards issued to students can be used for a lot more than just access. It can be used for payment for services on campus, and if agreements are struck with retailers [movie theatres are a good example] for granting discounts or payment.”

This means students do not have to carry cash around on campus, lowering their security risk. It also means the funds provided to students in residence can be better allocated by parents. Says Cameron: “Monies meant for books and food on campus can thus not be spent on entertainment – a control parents will love and students not familiar with budgeting may find useful.”

In addition, biometric information can be loaded on the cards, assisting universities to verify that correspondence students writing exams in remote locations are who they say they are. “A card reader at these venues will compare actual and stored fingerprints, a proof of identity that limits fraud.”

Criminal behaviour

The sad truth is that criminal behaviour is everywhere. Rape, violence, abuse, theft and vandalism are all present on South Africa’s university campuses. Parents entrust universities to look after their children. Many of them are outside the family home for the first time, are not street smart and can be irresponsible. This makes the use of CCTV cameras – and the monitoring of students around the campus – important to protect the vulnerable.

The majority of universities have a security centre where feeds from strategically placed CCTV cameras are monitored. This includes identified danger zones like remote areas of the campus, parking lots, service corridors, areas outside entertainment venues, dormitories, labs where expensive and potentially dangerous materials and equipment are stored, common areas and perimeters.

The days of relying solely on a security guard in front of a bank of monitors to notice the occurrence or development of potentially dangerous situations is long past, however.

Intelligent algorithms in CCTV monitoring software assist to identify anomalies such as when fixed assets are moved, when unusual activity takes place (people move in the wrong direction at the wrong time – eg, at entrances and exits), or when specific areas are accessed after hours.

Integration of multiple systems also assists. “By tying together access control systems, visual control systems such as CCTV cameras, perimeter intrusion solutions and building management systems (which controls and monitors, among others, energy management systems such as lights and air conditioning, and fire detection systems) a clearer picture of potentially dangerous situations can be formed, so enabling security or other personnel to make better informed, faster decisions,” says Cameron.

Intelligent systems will send alerts to all responsible personnel, be they security officers or lecturers, when these situations occur via SMS, e-mail or other means. Furthermore, to assist in the identification of risk, the feed from the CCTV cameras can be accessed via PDAs (personal digital assistants) or the Internet from remote locations by these people.”

Technology is today present in almost everything we do. It is inevitable that it will all eventually converge, enhancing efficiency and convenience. Security – of facilities, people and data – is similarly converging, making a comprehensive security policy and strategy vital for places of work, entertainment and learning.”

For more information contact Johnson Controls, +27 (0)11 921 7141,,

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Future trends for electronic safety and security in mining
Fang Fences & Guards Mining (Industry) Integrated Solutions AI & Data Analytics
The mining industry is ever evolving, driven by technological advancements and the growing need for enhanced safety and security measures, with significant innovation seen in turnkey electronic security for mining operations.

Unlocking enhanced security for mining
Mining (Industry) Integrated Solutions
In the dynamic landscape of African mining, security remains of paramount concern as threats evolve and challenges persist, and mining companies seek innovative solutions to safeguard their operations, assets, and personnel.

A constant armed struggle
Technews Publishing XtraVision Editor's Choice Integrated Solutions Mining (Industry) IoT & Automation
SMART Security Solutions asked a few people involved in servicing mines to join us for a virtual round table and give us their insights into mine security today. A podcast of the discussion will be released shortly-stay tuned.

Access and identity in 2024
Technews Publishing Gallagher HID Global IDEMIA Ideco Biometrics Enkulu Technologies neaMetrics Editor's Choice Access Control & Identity Management Integrated Solutions
SMART Security Solutions hosted a round table discussion with various players in the access and identity market, to find out what they experienced in the last year, as well as their expectations for 2024.

Advanced security solution for high-risk areas
Secutel Technologies Surveillance Integrated Solutions
The need for a sophisticated intrusion detection system is paramount when faced with persistent security challenges, particularly in isolated battery rooms or high-risk areas prone to vandalism, cable theft, and battery theft.

Vumacam and NAVIC enhance SafeCity initiative
Integrated Solutions Security Services & Risk Management
Vumacam and NAVIC, two of South Africa's most respected surveillance technology and vehicle intelligence providers, are proud to announce an alliance that will greatly expand the coverage and impact of the SafeCity initiative across the country.

Gallagher Security’s achieves SOC2 Type 2 recertification
Gallagher News & Events Integrated Solutions Infrastructure
Gallagher has achieved System and Organization Controls (SOC2 Type 2) recertification after a fresh audit of the cloud-hosted services of its integrated security solution, Command Centre. The recertification was achieved on 21 December 2023.

Integrated transportation security
Guardian Eye AI & Data Analytics Integrated Solutions Logistics (Industry)
HG Travel installs an AI-powered camera system integrated across 115 vehicles throughout a fleet comprising 160 vehicles of different sizes, along with predictive and self-monitoring tools to track tyre condition, fuel consumption and theft, and overall vehicle maintenance.

Embracing next-generation surveillance for safer cities
Surveillance Integrated Solutions AI & Data Analytics
With the South African government highlighting the importance of building smart cities by integrating advanced technologies to make them more resilient and liveable, the role of next-generation network video and surveillance technologies cannot be ignored.

Gallagher Security releases Command Centre v9
Gallagher News & Events Access Control & Identity Management Integrated Solutions
Richer features, greater integrations, with the release of Gallagher Security’s Command Centre v9 security site management software designed to integrate seamlessly with various systems and hardware.