Cell C's comprehensive integrated approach

Access & Identity Management Handbook 2004 Integrated Solutions

The history

Cell C is SA's third cellular network provider. After being awarded the third licence by ICASA in February 2001, when it employed only about 30 people, and launched in November 2001. In September 2004 the employee strength stood at 2500 and will grow to 5000 when it completes its rollout by 2008.

Until August 2001 the company was based in temporary offices while sourcing and construction of major office parks was carried out. At this time there were no specifications in place to ensure standardisation and commonality of access control, CCTV, fire or HVAC systems for physical security nationwide and no definitive policies or procedures in place to manage them.

Andrew Melville was recruited as head of Corporate Security on 20 August 2001 and immediately started to research the local electronic access and security systems available. "I worked closely with Kifah Laham, the head of Cell C Infrastructure Planning and had my recommendations endorsed for standardised equipment after an exhausting period of research and comparison," says Melville.

Cell C security doctrine is based on the premise that electronic security systems must be complemented by a sufficiently robust number of on-site, armed, security officers. To this end all Cell C premises are extremely well secured and all offices have the following major components in place to manage risk:

Access control: All buildings are zoned and staff allocated to zones. Staff and visitors alike are not free to wander around any area at any time.

CCTV at all entrances and exits to ensure primary capture. Secondary capture in open-plan office spaces. Specific capture at high value locations such as computer rooms.

Fire detection is provided by fully addressable ZP3 fire detection panels and various smoke heat or particle detectors on three levels, above suspended ceilings, in office spaces and below suspended floors are installed.

Inert halon gas flooding systems are used in all high value switches and document stores, again all components Ziton.

Perimeter security is provided by flood and glare lighting where local regulations permit, as well as CCTV and electric fencing.

Guard forces are armed and also supported by armed response. Cell C security doctrine dictates that armed guarding will not be carried out by one single service provider. To this end, eight guarding companies are used nationwide.

Was anything forecast to happen that needed to be prepared for, ie, was the change proposed, imposed or strategically planned?

All security infrastructure, policy and procedures have been strategically planned and have gone through a full business process and control procedure of approval and acceptance. The Cell C Corporate Security Manual is available to all employees via the company intranet and also C mail, the internal electronic magazine.

The solution

The access control system is based on Keymaster Pro Version 3.5 and it is truly integrated nationwide. All Cell C sites have a local onsite server at each office park, but the management is done from a central SQL server based at Esher Place. These remote servers are linked via WAN and synchronisation is done at night. There is a fulltime access control clerk who is responsible for keeping the databases updated and an access control database supervisor who coordinates all of the requests for protocol changes nationwide.

Support for the software is under a service level agreement from Grintek, the suppliers of the software. Cell C hardware is based on the following:

Sentinel proximity card readers.

Door controllers and system controllers.

Various locks are used but standardised for various applications. These are:

Inter office doors, strike locks.

Fire doors clawlocks and electromagentic locks.

VIP offices shear locks.

At the four small regional offices, all the security infrastructures are fully integrated through the Honeywell CCTV DVR unit which has the capacity to integrate many functions. The following systems have been integrated and alarm faults are generated to key staff and the company's national armed response provider.

CCTV.

Burglar alarming.

Fire.

Access.

In addition, our regional offices are remotely CCTV patrolled at night via WAN from the main Cell C Security Operations Room at Esher Place.

The goal

Cell C Corporate Security Department is currently the driver in a major project to provide time and attendance reports to individual departments nationwide by utilising the transactions recorded via the access system, these stand currently at 36 000 per day on average.

The chosen solution must also be integrated into Oracle HR and Oracle Finance. This project is currently at the Business Requirement Stage and is due to be signed off for implementation in September or October 2004. A trial site is already identified as our national call centre in Midrand.

The benefits

The exact figure is highly confidential but Cell C loss to asset ratio of fixed and movable assets is less than 5% of insured value for year 2003. The last year for which full figures are available from our risk manager.

Melville is expecting similar figures for 2004 to be similar. He subscribes these losses, which are the true reflection of the success of Cell C investment in modern integrated security systems, as the yardstick of the company's risk management policies and strategy.

Obstacles en route to a final solution

There has been some staff resistance to the introduction of transaction control technology access doors. This was caused by staff piggybacking previous to the doors being fitted and to overcome this resistance required a change of corporate culture.

There was also concern that overweight or disabled staff would not be able to use the doors and also the doors would hamper the movement of large or bulky items. These concerns were soothed as staff became more familiar with the doors and they saw they could be manually overridden by the security officers to allow for this type of passage.

Tenders, specs and implementation

Cell C security doctrine was to source and have accepted standardised security infrastructure from major suppliers, and then to fulfil the requirements of the Cell C tendering process which takes full account of all equity requirements allowing suitably experienced and qualified installers to go ahead and tender.

This approach has allowed maximium participation from local as well as national installers and has greatly assisted companies that have formed and registered from the previously disadvantaged sectors of the community to tender.

Project managers were appointed to oversee the installation process. There were distinct phases to each project roll out. These were:

Initial design by head of corporate security of access and CCTV systems.

Initial design of fire and HVAC by suitably qualified consultants.

Detailed specifications by suitably qualified consultants.

Tendering process handled by the project management company and Cell C Procurements & Contracts.

Installation by the tender winner.

Snagging.

Acceptance.

Fact file

Key service providers, products and solutions.

CCTV and HVAC: Ultrak Honeywell, Mike Emery, 011 574 2500.

Fire detection systems: Ziton, 021 462 4020.

Access control: Grintek, Piet Pistorius, 012 421 6200.

Access doors to high value areas: Transaction Control Technology, Malcolm Thomas, 011 888 1210.

Cell C, Andrew Melville, 011 324 4425, [email protected]



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Digitising security solutions with AI and smart integration
Regal Security Distributors SA Technews Publishing Integrated Solutions
The Regal Projects Team’s decades of experience and commitment to integration have brought the digital security guard to life as a trusted force for safer, smarter living.

Read more...
Smart cities and the role of video security
Surveillance Integrated Solutions
As cities around the world continue to embrace smart technology, including IoT that not only connects to people, but also the surrounding activity, the integration of advanced video security systems is crucial to ensure safety and efficiency in environments.

Read more...
Surveillance to unjam the traffic
Integrated Solutions Transport (Industry)
Traffic is a challenge that affects urban areas across Africa. The city of Johannesburg, South Africa’s most populous city, experiences severe traffic resulting from a confluence of issues, including power outages, faulty traffic lights, and infrastructure theft.

Read more...
The benefits of offsite control rooms
Astrosec Surveillance Integrated Solutions
As the security landscape grows more intricate, control rooms – the crucial hub of security operations – need to adapt. With escalating costs, mounting threats, and a heightened demand for immediate responses, many organisations are reassessing the operations of their control rooms.

Read more...
edgE:Tower video analytics integrated with SEON
Surveillance Integrated Solutions AI & Data Analytics
Sentronics has announced a new integration between its edgE:Tower advanced AI-driven video analytics solution and SEON, a Central Monitoring Software (CMS) platform. This integration enhances real-time situational awareness and automated threat detection for control rooms.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
The power of knowing your client
Ideco Biometrics Access Control & Identity Management Integrated Solutions
One of the most effective ways to combat the threat of fraud, identity theft, and financial crime threats is through a robust Know Your Client (KYC) process, which safeguards both businesses and clients.

Read more...
Managing identities for 20 years
Ideco Biometrics Technews Publishing SMART Security Solutions Access Control & Identity Management Integrated Solutions IoT & Automation
Many companies are now more aware of the risks associated with unauthorised access to locations and sensitive data and are investing in advanced identity authentication technologies to mitigate these threats.

Read more...
Cost-effective and reliable remote connectivity
Agriculture (Industry) Integrated Solutions Infrastructure
Companies that operate in hard-to-connect areas now have access to reliable connectivity due to a collaboration between MTN South Africa, Vox and Tarana technology.

Read more...