Nuclear access

May 2012 Access Control & Identity Management

Secure access to a nuclear power plant.

A heavily regulated nuclear power plant in California asked Unlimited Technology, Inc. (UTI), a Software House integrator, to install an access control system. This solution would help protect dangerous materials used to generate power at their facility, without interruption of the system’s operation.

Physical security for power plants in the USA is extremely important to comply with government regulatory commissions and to ensure the safety of the local communities where the facilities reside. In the nuclear power industry, the systems that control perimeter and internal security must maintain constant control of their assets.

A large utility company in California was searching for a reliable access control solution to manage and control physical access to various parts of their facilities while meeting the most stringent regulations and requirements set forth by the government and local communities. Many of the requirements for physical security systems are specific to NERC CIP (North American Electric Reliability Corporation Critical Infrastructure Protection) compliance. The system of choice would need to be fast, secure and ensure zero downtime. Failure to maintain constant control of security assets results in heavy fines and could potentially cost them their licence to operate the facility.

Solving the challenges

Some of the challenges that the nuclear power plant was facing included:

* The need to meet the government’s demanding requirements and regulations for safety and security.

* The need to select and implement a reliable access control system for their facility.

* The need to have zero downtime to prevent the company from incurring high penalties or potentially losing licensure.

Unlimited Technologies selected Marathon’s everRun MX integrated with the Software House CCURE 9000 access control system to deliver a reliable solution with around-the-clock support. UTI was familiar with the CCURE 9000 system and reviewed its capabilities and distributed architecture with the customer.

The solution offered ease of use and the reliability that they were looking for, assuring them that the fully integrated system they delivered was capable of not merely meeting, but exceeding the most stringent security requirements and regulations.

“Following some disappointments in performance of some other high-availability systems, we came across Marathon Technologies’ everRun MX product,” stated Jason Troester, manager of information systems for UTI. “We brought it into our test lab, installed Software House’s CCURE 9000 on it, and proceeded to put it through rigorous testing. We are very happy to say that it surpassed our expectations in every test. Now Marathon, equipped with CCURE 9000, is the first solution that we consider when our clients enquire about a high availability access control solution.”

The system is now fully deployed and the customer has been extremely satisfied with the installation and operation. The system has met the requirements and exceeded the expectations of the facility staff.

For more information contact Tyco Security Products, +27 (0)82 566 5274, [email protected], www.tycoacvs.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...
T&A in South Africa’s retail sector
ERS Biometrics Access Control & Identity Management
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Paxton opens second experience centre
Paxton News & Events Access Control & Identity Management
Security technology manufacturer, Paxton, has opened a new experience centre in Cape Town on 12 February in partnership with its exclusive distributors, Reditron and Regal Security.

Read more...
DoorBell with built-in AI
Ajax Systems Access Control & Identity Management Products & Solutions Smart Home Automation
Ajax Systems has announced the release of Ajax DoorBell, which features built-in AI, an IR sensor, and app control, seamlessly integrating into the Ajax ecosystem to ensure efficiency and security confidence.

Read more...
Physical security evolving beyond security teams
ATG Digital Access Control & Identity Management
The landscape of physical security is undergoing a major shift. Traditionally, selecting access control and visitor management solutions fell squarely on the shoulders of security professionals, but today includes legal, IT, technical operations and more.

Read more...
A passwordless future?
Access Control & Identity Management
The digital landscape is evolving rapidly, and with it comes the urgent need for more secure authentication methods. Passwords, once the cornerstone of online security, are now easy targets for cybercriminals.

Read more...