Security Port of Tauranga

Access & Identity Management Handbook 2006 Access Control & Identity Management

At the front line of the supply chain, ports have a critical role to maintain the ­credibility of their country as secure ­trading partners.

The history

New Zealand's preferred export gateway and fastest-growing import port, Port of Tauranga sees its efficiency in terms of its systems and network as a key indication of success. Activities of the port include the provision of wharf facilities, storage and transit of cargoes, berthage, cranes, tug and pilotage services, leasing of land and buildings, container terminal ownership and rail links to Auckland.

Among its many assets, Port of Tauranga has 2055 m of linear berth face. Immediately adjacent to the wharf are cargo sheds and a 20 000-tonne capacity coldstore. Spread along the wharf are 22 bunker points to allow ships to re-fuel while loading or unloading. A total of more than 90 hectares of backup land is available for cargo handling and storage.

The port also has facilities for discharging and/or loading tankers carrying bulk fluids such as oil products, chemicals and cement. A conveyor system is also used for loading wood-chips. 'Sulphur Point' features 600 m of heavy-duty wharf, three container cranes (two of post-panamax size) and 27 hectares of paved container yard. More than 25 000 m² of covered storage is available for cargo handling and a further 9000-tonne cool-store caters for temperature controlled cargo.

Dedicated road and rail access streamlines cargo movement to and from the terminal. Total land area in and around the terminal is 78 hectares, providing for significant future growth.

Operating under the changing international environment and new maritime security regime, the port undertook a risk assessment and consequently reviewed its control measures. At the frontline of the supply chain, the port looked to employ security technology that would exceed their obligations.

The solution and benefits

For the Port of Tauranga, Cardax FT surpassed alternative systems for access control, intruder alarms and central management and monitoring of site security.

Using fibre-optic cable through the massive site area, the Cardax FT system resides on the port's wide area network, and requires every person to use a card to gain access. "We have 50 companies, some key exporters, operating within our boundary. The port manages the on-site security for those companies, and the system will have some 4000 cardholders," explains Mike Letica, manager Port Security Services. Contractors are also managed with the system.

The port has varying levels of security around the site, with protection of cargo against tampering, sabotage, smuggling of terrorists, or terrorist-related goods being crucial. Identification of individuals on site is key.

Letica says he saw a live demonstration of the PhotoID of a cardholder in India being verified against a live image (from a third party system). Using Cardax FT Challenge, the port has achieved a significant cost saving by reducing the number of manned gates while still achieving the required verification of who is coming and going, as stipulated by the Maritime Security Authority.

Two sets of intercoms, cameras and Cardax readers are installed at every guard house, at heights that will suit car or truck. All truck drivers are required to use access cards. The access cards have printed PhotoID, which is checked by the operator in the main administration building against the live image provided by the camera. Coverage of the gates is 24 hours every day.

"The constant flow of trucks throughout the day is essential, with the public roads - arteries to the city - only metres away. The trucks dropping off containers can not be backed up waiting," says Letica. This needed to be taken on board with the 30 000 vehicle movements occurring in any given month through the gates. He estimates it takes no more than three seconds from the time the driver badges his card, to the time the arm of the gate goes up.

Cards are another consideration for the port environment. With the Universal Card Format tool, the system can facilitate other card formats, a notable practicality for the site and the truck drivers passing through. Letica envisages that one-day truck drivers need only carry one card to access the ports nationwide, Cardax FT would accommodate this.

Existing third party readers were replaced with Cardax 125 readers, as they have the ability to read multiple formats of cards and are cost effective with Cardax FT Controllers, providing additional capacity for future expansion.

Economic hub of the Bay of Plenty and Waikato regions, and number one port in the country in terms of shipping movement, Port of Tauranga will continue to grow. Cardax FT is an investment that will facilitate the future expansion of the port and maintain that smooth flow of trade.

Fact file

Gallagher PowerFence South Africa, +27 (0) 11 397 2986, [email protected], www.cardax.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...
T&A in South Africa’s retail sector
ERS Biometrics Access Control & Identity Management
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Paxton opens second experience centre
Paxton News & Events Access Control & Identity Management
Security technology manufacturer, Paxton, has opened a new experience centre in Cape Town on 12 February in partnership with its exclusive distributors, Reditron and Regal Security.

Read more...
Gallagher’s Integrate 360 event in Durban
Gallagher News & Events Perimeter Security, Alarms & Intruder Detection
Gallagher Security held its Integrate 360 event in Durban, South Africa. The event attracted 65 channel partners, end users, and consultants from across KwaZulu-Natal and broader South Africa to showcase the latest in Gallagher’s technology suite.

Read more...
DoorBell with built-in AI
Ajax Systems Access Control & Identity Management Products & Solutions Smart Home Automation
Ajax Systems has announced the release of Ajax DoorBell, which features built-in AI, an IR sensor, and app control, seamlessly integrating into the Ajax ecosystem to ensure efficiency and security confidence.

Read more...
Physical security evolving beyond security teams
ATG Digital Access Control & Identity Management
The landscape of physical security is undergoing a major shift. Traditionally, selecting access control and visitor management solutions fell squarely on the shoulders of security professionals, but today includes legal, IT, technical operations and more.

Read more...