Campus security

June 2011 Integrated Solutions, Education (Industry)

From murder, rape and robbery to alcohol and drug abuse, campuses are vulnerable to the same crimes as the world at large.

In South Africa, wracked by crime throughout its length and breadth, its safest campuses attribute their success to cutting-edge technology in conjunction with trained personnel.

“Without effective systems in place, our universities, colleges, technikons and the like would undoubtedly have descended into disorganised, crime-ridden chaos,” avers Zane Greeff, technical director for Elvey Security Technologies. “However, those that keep up with developments in the electronic security field are able to exploit a number of different avenues in their quest to minimise, if not eradicate, trespassing, violence, theft, arson, hate crimes, assault and vandalism.”

Ideally suited to this challenging job, he says, is a comprehensive security management system that can be easily and cost-effectively integrated with existing infrastructures such as video, intercoms, intrusion, fire and perimeter detection, and in so doing, deliver powerful end results. The days are long gone for inflexible, one-size-fits-all solutions. In today’s security-conscious world, universities want customised systems capable of addressing their unique challenges. The AC2000 SE, for example, has been successfully installed at large facilities around the world including oil refineries, mines, ports, corporate premises and universities. Understanding that each site has its own unique challenges, the manufacturer CEM works continuously to ensure that its product is able to meet the most exacting of security needs.

Registration

Traditionally chaotic, student registration has become far less onerous on staff as a result of innovations such as the visual imaging pass production system (VIPPS), which produces permanent and temporary identification badges for faculty staff, students and visitors. According to Greeff, the VIPPS workstation is linked with the AC2000. Not only does it record and store the details of card holders but it also allows for the speedy retrieval of staff and student records as well as the assignation of access levels and time zones, thereby freeing up administration staff for other activities.

The growing trend to smartcard usage is very evident in the world of degrees and diplomas, which invariably requires complex security situations within relatively limited budgets. Smartcards have enormous benefits since they can be used for multiple applications; it is a ‘one card’ identity solution for both access control and university management.

Each student and staff member is issued with a card that contains not only registration data but also their course and other information. As a result, they can use their cards in an administrative as well as access capacity. Smartcards allow them entry to libraries as well as access to resources such as cashless vending, photocopying and car parking control, simplifying their lives and simultaneously optimising institutional resources.

Inherent to the system is the card reader, which boasts an LCD display screen as well as an onboard database. In the unlikely event of a server communications failure, says Greeff, the reader will continue to operate and store transactions offline, thus ensuring zero system down time, and – importantly – not locking card holders inside or outside the premises.

Another feature of the AC2000 is its Access Levels application, which allows security personnel to link cardholders to access groups. Within medical school, for example, resident doctors could be assigned to a higher access group than first year medical students. This means the doctors would have access to certain areas such as the pharmacy, which would be off-limits to their junior counterparts. It could even be used to block access for truant or problem students.

The alarm event display module (AED) provides security personnel with a complete graphical and textual representation of the current status of the entire system. For example, says Greeff, if a reader has been tampered with, the AED will relay this to security staff in the form of real-time graphical, audio and text-based alarms. This instant notification allows them to respond to alarm or system error situations immediately. In addition, it provides a dynamic, on-screen interface to external CCTV systems and facilities for CCTV switching and remote door broadcasting.

For more information contact Elvey Security Technologies, +27 (0)11 401 6700, [email protected], www.elvey.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Digitising security solutions with AI and smart integration
Regal Security Distributors SA Technews Publishing Integrated Solutions
The Regal Projects Team’s decades of experience and commitment to integration have brought the digital security guard to life as a trusted force for safer, smarter living.

Read more...
Smart cities and the role of video security
Surveillance Integrated Solutions
As cities around the world continue to embrace smart technology, including IoT that not only connects to people, but also the surrounding activity, the integration of advanced video security systems is crucial to ensure safety and efficiency in environments.

Read more...
Surveillance to unjam the traffic
Integrated Solutions Transport (Industry)
Traffic is a challenge that affects urban areas across Africa. The city of Johannesburg, South Africa’s most populous city, experiences severe traffic resulting from a confluence of issues, including power outages, faulty traffic lights, and infrastructure theft.

Read more...
The future of the surveillance channel
Duxbury Networking Technews Publishing Elvey Security Technologies SMART Security Solutions Surveillance
The video surveillance market has evolved from camera-based specifications to integrated solutions that solve customers’ problems. Moreover, the growth of AI and cloud has changed the channel even more, with more to come.

Read more...
The benefits of offsite control rooms
Astrosec Surveillance Integrated Solutions
As the security landscape grows more intricate, control rooms – the crucial hub of security operations – need to adapt. With escalating costs, mounting threats, and a heightened demand for immediate responses, many organisations are reassessing the operations of their control rooms.

Read more...
edgE:Tower video analytics integrated with SEON
Surveillance Integrated Solutions AI & Data Analytics
Sentronics has announced a new integration between its edgE:Tower advanced AI-driven video analytics solution and SEON, a Central Monitoring Software (CMS) platform. This integration enhances real-time situational awareness and automated threat detection for control rooms.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
The power of knowing your client
Ideco Biometrics Access Control & Identity Management Integrated Solutions
One of the most effective ways to combat the threat of fraud, identity theft, and financial crime threats is through a robust Know Your Client (KYC) process, which safeguards both businesses and clients.

Read more...
Smarter ways to secure your space
Elvey Security Technologies Access Control & Identity Management Products & Solutions
Ensuring the safety of people and assets has become more crucial than ever, and access control systems provide essential tools to regulate and monitor who can enter specific areas or access sensitive resources.

Read more...