Cell C's comprehensive integrated approach

Access & Identity Management Handbook 2004 Integrated Solutions

The history

Cell C is SA's third cellular network provider. After being awarded the third licence by ICASA in February 2001, when it employed only about 30 people, and launched in November 2001. In September 2004 the employee strength stood at 2500 and will grow to 5000 when it completes its rollout by 2008.

Until August 2001 the company was based in temporary offices while sourcing and construction of major office parks was carried out. At this time there were no specifications in place to ensure standardisation and commonality of access control, CCTV, fire or HVAC systems for physical security nationwide and no definitive policies or procedures in place to manage them.

Andrew Melville was recruited as head of Corporate Security on 20 August 2001 and immediately started to research the local electronic access and security systems available. "I worked closely with Kifah Laham, the head of Cell C Infrastructure Planning and had my recommendations endorsed for standardised equipment after an exhausting period of research and comparison," says Melville.

Cell C security doctrine is based on the premise that electronic security systems must be complemented by a sufficiently robust number of on-site, armed, security officers. To this end all Cell C premises are extremely well secured and all offices have the following major components in place to manage risk:

Access control: All buildings are zoned and staff allocated to zones. Staff and visitors alike are not free to wander around any area at any time.

CCTV at all entrances and exits to ensure primary capture. Secondary capture in open-plan office spaces. Specific capture at high value locations such as computer rooms.

Fire detection is provided by fully addressable ZP3 fire detection panels and various smoke heat or particle detectors on three levels, above suspended ceilings, in office spaces and below suspended floors are installed.

Inert halon gas flooding systems are used in all high value switches and document stores, again all components Ziton.

Perimeter security is provided by flood and glare lighting where local regulations permit, as well as CCTV and electric fencing.

Guard forces are armed and also supported by armed response. Cell C security doctrine dictates that armed guarding will not be carried out by one single service provider. To this end, eight guarding companies are used nationwide.

Was anything forecast to happen that needed to be prepared for, ie, was the change proposed, imposed or strategically planned?

All security infrastructure, policy and procedures have been strategically planned and have gone through a full business process and control procedure of approval and acceptance. The Cell C Corporate Security Manual is available to all employees via the company intranet and also C mail, the internal electronic magazine.

The solution

The access control system is based on Keymaster Pro Version 3.5 and it is truly integrated nationwide. All Cell C sites have a local onsite server at each office park, but the management is done from a central SQL server based at Esher Place. These remote servers are linked via WAN and synchronisation is done at night. There is a fulltime access control clerk who is responsible for keeping the databases updated and an access control database supervisor who coordinates all of the requests for protocol changes nationwide.

Support for the software is under a service level agreement from Grintek, the suppliers of the software. Cell C hardware is based on the following:

Sentinel proximity card readers.

Door controllers and system controllers.

Various locks are used but standardised for various applications. These are:

Inter office doors, strike locks.

Fire doors clawlocks and electromagentic locks.

VIP offices shear locks.

At the four small regional offices, all the security infrastructures are fully integrated through the Honeywell CCTV DVR unit which has the capacity to integrate many functions. The following systems have been integrated and alarm faults are generated to key staff and the company's national armed response provider.

CCTV.

Burglar alarming.

Fire.

Access.

In addition, our regional offices are remotely CCTV patrolled at night via WAN from the main Cell C Security Operations Room at Esher Place.

The goal

Cell C Corporate Security Department is currently the driver in a major project to provide time and attendance reports to individual departments nationwide by utilising the transactions recorded via the access system, these stand currently at 36 000 per day on average.

The chosen solution must also be integrated into Oracle HR and Oracle Finance. This project is currently at the Business Requirement Stage and is due to be signed off for implementation in September or October 2004. A trial site is already identified as our national call centre in Midrand.

The benefits

The exact figure is highly confidential but Cell C loss to asset ratio of fixed and movable assets is less than 5% of insured value for year 2003. The last year for which full figures are available from our risk manager.

Melville is expecting similar figures for 2004 to be similar. He subscribes these losses, which are the true reflection of the success of Cell C investment in modern integrated security systems, as the yardstick of the company's risk management policies and strategy.

Obstacles en route to a final solution

There has been some staff resistance to the introduction of transaction control technology access doors. This was caused by staff piggybacking previous to the doors being fitted and to overcome this resistance required a change of corporate culture.

There was also concern that overweight or disabled staff would not be able to use the doors and also the doors would hamper the movement of large or bulky items. These concerns were soothed as staff became more familiar with the doors and they saw they could be manually overridden by the security officers to allow for this type of passage.

Tenders, specs and implementation

Cell C security doctrine was to source and have accepted standardised security infrastructure from major suppliers, and then to fulfil the requirements of the Cell C tendering process which takes full account of all equity requirements allowing suitably experienced and qualified installers to go ahead and tender.

This approach has allowed maximium participation from local as well as national installers and has greatly assisted companies that have formed and registered from the previously disadvantaged sectors of the community to tender.

Project managers were appointed to oversee the installation process. There were distinct phases to each project roll out. These were:

Initial design by head of corporate security of access and CCTV systems.

Initial design of fire and HVAC by suitably qualified consultants.

Detailed specifications by suitably qualified consultants.

Tendering process handled by the project management company and Cell C Procurements & Contracts.

Installation by the tender winner.

Snagging.

Acceptance.

Fact file

Key service providers, products and solutions.

CCTV and HVAC: Ultrak Honeywell, Mike Emery, 011 574 2500.

Fire detection systems: Ziton, 021 462 4020.

Access control: Grintek, Piet Pistorius, 012 421 6200.

Access doors to high value areas: Transaction Control Technology, Malcolm Thomas, 011 888 1210.

Cell C, Andrew Melville, 011 324 4425, [email protected]



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
edgE:Tower video analytics integrated with SEON
Surveillance Integrated Solutions AI & Data Analytics
Sentronics has announced a new integration between its edgE:Tower advanced AI-driven video analytics solution and SEON, a Central Monitoring Software (CMS) platform. This integration enhances real-time situational awareness and automated threat detection for control rooms.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
The power of knowing your client
Ideco Biometrics Access Control & Identity Management Integrated Solutions
One of the most effective ways to combat the threat of fraud, identity theft, and financial crime threats is through a robust Know Your Client (KYC) process, which safeguards both businesses and clients.

Read more...
Managing identities for 20 years
Ideco Biometrics Technews Publishing SMART Security Solutions Access Control & Identity Management Integrated Solutions IoT & Automation
Many companies are now more aware of the risks associated with unauthorised access to locations and sensitive data and are investing in advanced identity authentication technologies to mitigate these threats.

Read more...
Cost-effective and reliable remote connectivity
Agriculture (Industry) Integrated Solutions Infrastructure
Companies that operate in hard-to-connect areas now have access to reliable connectivity due to a collaboration between MTN South Africa, Vox and Tarana technology.

Read more...
Advanced Perimeter Intrusion Detection Systems
XtraVision OPTEX Technews Publishing Modular Communications Perimeter Security, Alarms & Intruder Detection Integrated Solutions Products & Solutions
Making full use of fibre installations around the perimeter by adding Perimeter Intrusion Detection Systems means you can easily add another layer of security to existing surveillance and fencing systems.

Read more...
A critical component of perimeter security
Nemtek Electric Fencing Products Gallagher Technews Publishing Stafix Editor's Choice Perimeter Security, Alarms & Intruder Detection Integrated Solutions
Electric fences are standard in South Africa, but today, they also need to be able to integrate with other technologies and become part of a broader perimeter security solution.

Read more...
Using advanced surveillance technology as a smart city enabler
Duxbury Networking Integrated Solutions Surveillance
Smart cities are increasingly becoming a focus area for African governments and companies. However, the transition to these environments does not come without challenges, especially when it comes to security and resource management.

Read more...
SMART Estate Security returns to KZN
Nemtek Electric Fencing Products Technews Publishing Axis Communications SA OneSpace Technologies Editor's Choice News & Events Integrated Solutions IoT & Automation
The second SMART Estate Security Conference of 2024 was held in May in KwaZulu-Natal at the Mount Edgecombe Estate Conference Centre, which is located on the Estate’s pristine golf course.

Read more...