Bits 'n Bytes

Access & Identity Management Handbook 2004 News & Events

Welcome to this, the first Access Control Handbook.

An idea brought to us at Hi-Tech Security Solutions by industry specialists in access control, this Handbook is designed not so much to highlight access control products specifically, but to educate end-users and security professionals about the principles which underpin successful security solutions. We sincerely hope that you find it of value.

As you might appreciate, it is never easy to get end-users to discuss their security systems and solutions, but I have always maintained that one can do so without compromising security, simply by highlighting the principles of success. What to do, what not to do. And why? In this Handbook we have attempted to do just that, with a focus on case studies and best practices, trends and white papers. A special word of thanks to the contributors to this Access Control Handbook. Without their help we would never have got out of the starting blocks. You know who you are. Thank you.

Access out of control?

Do South African business and security professionals need education in access control? We all do. Whilst the principles of success might not change, the technology and integration trends are ensuring we are all in need of continued learning. A case in point, is that as I write this, there is a Saturday newspaper headline trumpeting the breach of security at Johannesburg International Airport by its reporters in the aftermath of a recently botched heist at the airport.

The journalist 'tested' access control measures at Johannesburg International Airport, and according to police, the journalist, in gaining access to certain restricted areas, committed a criminal offence.

Superintendent Eugene Opperman is quoted as saying that, "The Johannesburg International Airport ... is governed by the National Key Points Act. Members of the public, including journalists, who wilfully and illegally access certain areas without clear authority commit a criminal offence. If found guilty, such a person could be sentenced to a heavy fine or even imprisonment."

Surely the question should rather be 'how on earth did this journalist gain illegal access to a National Key Point'!

After all, that is what access control is all about. Restricting unauthorised people from entering areas out of their jurisdiction. It seems to me that the authorities should rather be taking a much closer look at the security technology, processes and people staffing security at these National Key Points, than threatening the layman with arrest. Any high-risk environment (such as an airport) should constantly evaluate itself for security breaches. These regular checks, much like a quality management system, will allow professionals to actively see how easily their systems can be breached, and where. One has to question whether such audits are taking place as regularly and systematically as they should be.

Have we covered it all?

Have we covered everything we would like to in this Access Control Handbook. No, not at all. We have barely scraped the surface. But there are gems of value in the case studies, opinion pieces, and white papers we have published, and I would encourage you to look beyond the pages of this Handbook. Securitysa.com will archive Standards, Legal Guides, Case Studies and White Papers related to the Access Control Handbook, which will bring you the depth that this 80-page publication cannot.

And if you feel we have missed something, or even missed it all, let me know. We will take your kudos and brickbats to heart.

Sincerely

Darren Smith





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Unlock the future of security operations in Bloemfontein
DeepAlert News & Events Surveillance
Security professionals and business leaders are invited to revolutionise their offsite monitoring operations at the DeepAlert Product Road Show, taking place on 16 – 17 September 2025, at the Schoemanspark Golf Club, Bloemfontein.

Read more...
Hytera supports communication upgrade for Joburg
News & Events Infrastructure Government and Parastatal (Industry)
By equipping Johannesburg’s metro police and emergency services with multimode radios which integrate TETRA and LTE networks, Hytera is bridging coverage gaps and improving response times across the city.

Read more...
Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
ProtecLink 2025: Ithegi Electronics supports a safer, smarter security ecosystem
News & Events
If you are a security buyer, operations lead, or technology partner, do not miss ProtecLink 2025, to be held in Polokwane on 16 September 2025, at the Polokwane Royal Hotel.

Read more...
Secutel maintains ISO certifications
News & Events Fire & Safety
Secutel Technologies has successfully recertified all four of its ISO standards, a reflection of its continued commitment to excellence, client trust, and operational integrity.

Read more...
SABRIC appoints Andre Wentzel as interim CEO
News & Events Financial (Industry) Associations
The South African Banking Risk Information Centre (SABRIC) has announced the appointment of Andre Wentzel as interim chief executive officer, effective immediately.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Paxton cuts emissions by over a third
Paxton News & Events
Paxton has announced a significant reduction in its carbon footprint, cutting emissions by 961 tonnes of CO2e in its 2023 second reporting year.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...
Securex gears up for Cape Town
News & Events
Four industry expos debut in Cape Town from 21–23 October, providing access to Africa’s tech hub and a rapidly expanding local market, through a platform covering security, OSH, facilities management, and fire safety solutions in one venue.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.