Maru Towers secures infrastructure with cloud-based access control

Issue 5 2023 Access Control & Identity Management

Maru Towers, a company specialising in communications infrastructure, are now able to provide access securely and remotely, across all of its sites nationwide, through cloud-based access control.

Maru Towers’ primary business is the leasing of antenna space on multi-tenant communications towers to mobile network providers, fibre backhauling and other wireless broadcast companies. South African owned and operated, the company invests heavily in the communities where they build infrastructure sites and knew they needed a suitable protection solution for all their sites from the get-go.

As remote critical sites are accessed by multiple contractors and employees each day, it was important for them to have real-time visibility in order to secure their assets and manage access remotely for all stakeholders. After experiencing vandalism on site, it was also important to find a robust solution which would provide them with audit trails of access.

Having worked with FS Connect before and being familiar with the Sera4 technology, Maru Towers took advantage of this potential solution. As their number of sites are still growing, the solution needed to be scalable and easy to use, which is why the Sera4 access control technology was the best and ultimate option at the end.

As employees work remotely sometimes, Sera4 has made a big impact in the company being able to manage all their sites from any location and at any time. They manage access of the padlocks used on site. With the Connected Latch feature, Managers are able to confirm the lock status and get verification that the site is secured.

The Sera4 technology is a cloud-based access control solution, a keyless platform for physical access control that is both easy to use and highly secure. The Teleporte mobile app makes it easy for contractors or employees to request access on site, which then can be approved or declined on the Teleporte portal remotely.

The NOC Manager receives email notifications where she can approve/deny access via her mobile phone. With this, audit trails have greatly improved, and their operations have become digitised. Access can be approved or denied remotely and a digital audit trail of access is available for each site.

“Our relationship with our partners goes beyond business transactions; it is built on trust, collaboration, and a shared commitment to excellence. We are proud to have partnered with FS Connect who delivers safety solutions, such as the Sera4 Keyless access control padlocks, that protect our telecommunication sites. Together, we strive to create a safe and secure environment for our sites,” says NOC Manager, Thoko Dubula.

Watch the Case Study here: http://bit.ly/3MPCBPo

For more information, contact FS-Systems, [email protected], www.fs-systems.co.za




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...
T&A in South Africa’s retail sector
ERS Biometrics Access Control & Identity Management
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Paxton opens second experience centre
Paxton News & Events Access Control & Identity Management
Security technology manufacturer, Paxton, has opened a new experience centre in Cape Town on 12 February in partnership with its exclusive distributors, Reditron and Regal Security.

Read more...
DoorBell with built-in AI
Ajax Systems Access Control & Identity Management Products & Solutions Smart Home Automation
Ajax Systems has announced the release of Ajax DoorBell, which features built-in AI, an IR sensor, and app control, seamlessly integrating into the Ajax ecosystem to ensure efficiency and security confidence.

Read more...
Physical security evolving beyond security teams
ATG Digital Access Control & Identity Management
The landscape of physical security is undergoing a major shift. Traditionally, selecting access control and visitor management solutions fell squarely on the shoulders of security professionals, but today includes legal, IT, technical operations and more.

Read more...
A passwordless future?
Access Control & Identity Management
The digital landscape is evolving rapidly, and with it comes the urgent need for more secure authentication methods. Passwords, once the cornerstone of online security, are now easy targets for cybercriminals.

Read more...