Integrated electronic security at Barloworld

Access & Identity Management Handbook 2009 Access Control & Identity Management

Securing its campus meant protecting its future for Barloworld.

Barloworld Corporate Office in Katherine Street, Sandton, comprises various buildings in an extended office park that houses different divisions within the Barloworld Group, including Barloworld Equipment, Barloworld Logistics, PPC and the corporate head office itself. The group required a reliable security platform to minimise the effects of unauthorised access, theft of physical and intellectual property, damage to property and danger to people.

Together with IDtek, Barloworld decided on a solution that comprised components of IP surveillance and biometric (fingerprint) access control. The objective was a solution that integrates all the security electronics into a single intelligent system.

The Barloworld team sought to achieve the following benefits from the implementation:

1. Deter, monitor and record unauthorised activities, such as intruders that may lead to losses and liabilities.

2. Raise alerts on detection of such activity, enabling the relevant response.

3. Implement a visible deterrent to criminal or unauthorised activities.

4. Have access to reliable proof of crime to aid in identification of criminals and for use as evidence in court.

The solution, an integrated security concept was designed primarily by Garin Harbottle of the IT Department and implemented by IDtek Solutions. “This building represents one of the largest corporate facilities where both IP surveillance and biometrics have been implemented,” says Julian Thorrold, MD of IDtek Solutions.

IDtek’s recent installations included certain logistical superhubs in KwaZulu-Natal and Isando – where biometrics where installed on the back of a full Honeywell EBI platform with surveillance, fire, intruder and time and attendance.

The solution consists of an access control and CCTV system, and is controlled by a single control room which is equipped and operates on the back of Impro’s IXP400 system and Bosch Vidos surveillance software. The intricacy of the undertaking becomes apparent when one considers that the system controls and monitors around 60 Sagem biometric doors and 45 Bosch IP surveillance cameras with various other supporting components, such as intruder beams.

The system allows for automatic communication between the different components in the field. For instance, the administrator could prescribe that a user is only granted access based on certain conditions. A user could be required to present their finger at certain other doors before arriving at a prescribed location.

Where there are areas of extreme sensitivity and no single user is allowed in any specific location alone, the system could prescribe certain supervisory privileges to users.

The system allows for Random Search – a useful feature to have at the gate where the requirement may arise to search employees’ vehicles for items not authorised for removal. Zone counting and muster stations can easily be created in the event of a fire or bomb scare.

The system also features Denied Transaction Alarms, which prevent predetermined people, eg, blacklisted employees, from being allowed access to the facility.

Special actions per user and fingerprint is also a feature. For instance, the administrator could program that certain fingers become panic fingers and each biometric device doubles as a panic station on the intruder component of the platform.

All activity in the software can be viewed using a Web-based reporting facility; and an SMS message can be loaded to initiate an action or to result from an action.

The Bosch IP surveillance system has been configured to allow for remote monitoring on the local area network by users with the required security clearances. It also delivers the following functionality:

1. The integration is realtime and activates cameras as and when the alarm or monitored event takes place.

2. The cameras have intelligence built in, allowing Barloworld to save on infrastructure and installation costs.

3. IP cameras encode the signal before transmission – eliminating the need for additional devices for encoding – and additional points of failure.

4. Progressive scanning built into the Bosch cameras avoids the problems of interlacing where objects are moving in field of view.

All visible hardware also conformed to the overall aesthetics of the building. The project was awarded in June 2008, and the work will be complete in February 2009.

For more information contact Julian Thorrold, IDtek Solutions, +27 (0)11 706 0101,

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Simple steps to protect yourself against identity theft
November 2019 , Access Control & Identity Management
Are you doing enough to reduce the risk of having your identity stolen?

Looking ahead with mobile access technologies
Access & Identity Management Handbook 2020, Technews Publishing, HID Global, dormakaba South Africa, Salto Systems Africa, Suprema, Gallagher , Access Control & Identity Management, Integrated Solutions
Given the broad use of smartphones around the world and the numerous technologies packed into these devices, it was only a matter of time before the access control industry developed technology that would ...

Mobile access is more secure than card systems
Access & Identity Management Handbook 2020 , Access Control & Identity Management
The ability to use mobile phones as access credentials is one of the biggest trends in a market that historically has been slow in adopting new technology.

This is the future. This is what we do.
Access & Identity Management Handbook 2020, ZKTeco , Access Control & Identity Management
ZKTeco has created a unique range of visible light facial recognition products combined with a flexible Android platform.

The security of biometrics
Access & Identity Management Handbook 2020, ViRDI Distribution SA, IDEMIA , Technews Publishing, Suprema , Access Control & Identity Management
Hi-Tech Security Solutions asks whether your personal biometric data is safe from prying eyes.

A picture spoofs a thousand cameras
Access & Identity Management Handbook 2020, NEC XON, Hikvision South Africa, Technews Publishing , Access Control & Identity Management
Hi-Tech Security Solutions looks into the reliability and effectiveness of facial biometrics as well as the concerns about privacy.

IoT and behavioural authentication
Access & Identity Management Handbook 2020, CA Southern Africa , Access Control & Identity Management
IoT represents an increasing security risk to individuals in the form of pervasive, always-on monitoring of your personal activity with a potential compromise of your most personal security credentials.

Border crossing and national identification
Access & Identity Management Handbook 2020 , Access Control & Identity Management
Amidst a choice of technologies, diversity of policy frameworks, and emergent priorities, countries that intend to upgrade their identification systems today find themselves drawn into a complex vortex.

T&A by biometrics in the cloud
Access & Identity Management Handbook 2020 , Access Control & Identity Management
Time and attendance solutions have evolved from punch cards to cost-effective and more accurate cloud-based biometric systems.

Scalable access solution
Access & Identity Management Handbook 2020 , Access Control & Identity Management, Integrated Solutions
Bosch Building Technologies makes access management simple, scalable and always available with Access Management System 2.0.