Complete security solution for Unilever

Access & Identity Management Handbook 2009 Integrated Solutions

Unilever implemented fire and intruder detection, as well as surveillance solutions at its new 40 000 square metre warehouse in Pietermaritzburg.

Unilever supplies 400 brands spanning 14 categories of home, personal care and foods products. Brand portfolio ranges from Lipton, Knorr, Dove and Omo, to local brands such as Blue Band and Suave.

The company required an access control, fire detection, surveillance and intruder detection solution at its new 40 000 square metre warehouse in Pietermaritzburg, as well as for a small office component at the site. The warehouse serves as Unilever’s regional distribution centre.

“As it was a new facility there were no existing controls and the client needed to prevent, monitor and record any unauthorised activity and be sure that business controls and processes are adhered to,” explains IDtek’s Julian Thorrold.

The developer issued a tender to certain system installers based on predetermined criteria. Submissions were evaluated on functionality and price and the ability to deliver in terms of the scope of the product.

The technology was recommended by a consultant from M. Peterson & Associates, who had visited various landmark sites where tenants had faced similar business and operational risks to ascertain what technology and design had been implemented and whether it had been providing the desired results.

IDtek was retained to supply:

* A biometric access control solution to ensure that only authorised employees enter the facility and that the correct information with regard to work hours is collected for payroll.

* Vesda systems to detect any smoke in the facility at a very early stage before fire becomes unmanageable or sprinklers damage stock.

* Camera surveillance to record movement of people and vehicles in the facility. Unilever now has an audit trail of loading, off loading, weighing procedures, visitor movement, health and safety compliance, compliance with other internal controls and procedures from an accounting point of view. Vehicle accidents in loading and offloading areas can also be monitored, perimeter surveillance warns of intruders and shrinkage is also reduced by use of surveillance.

* Intruder detection to prevent unauthorised access and protect all high value items are protected, as are people working after hours.

Centralised control

Halfway through the project a violent storm caused severe damage to large sections of the warehouse. This meant that the timeline had to be rearranged with configuration and commissioning in certain areas, the result of this was that certain equipment could only be installed later than originally planned.

Unilever required very strict compliance with certain internal requirements and all key design decisions had to be motivated and substantiated before being signed-off for installation. For instance, camera positions were decided on-site based on practical demonstrations of the fields of view and the desired result. Unilever remained closely involved throughout the process to ensure that implementation catered for any changing requirements.

Unilever put together a project team to oversee the project and involved members of the different disciplines as soon as certain issues impacted their scope of responsibility (eg, HR, IT finance, security, legal).

Design and specification was done by Martin Peterson of M. Peterson & Associates and Hilton McAvinchey of McAvinchey Consulting Engineers based on their combined experience in similar projects. The progress was measured against an overall construction plan for the entire facility. For example, Vesda sample piping needed to be installed taking into consideration the flooring and racking programme. All cabling needed to follow the installation of the wiring infrastructure, cable trays and baskets.

The primary benefit is that the client is now able to control the entire operation from a single control room – with all alarms being directed through a single-user interface, with a standard set of follow-up procedures and with consistency in predetermined operating procedures. The technology was selected based upon criteria of reliability, local support and proven track record. The objective was long-term delivery of tangible risk-management benefits as a whole.

The operators have a floor plan of the entire facility that is populated with graphic images of all devices including intruder detectors, smoke detectors, cameras and access control devices. Icons change colour in the event of an alarm, and require that follow-up action is recorded for subsequent audit trails. The operator is also able to use one technology, for example surveillance to follow up on an alarm event from other technology, such as an early warning smoke alarm on the Vesda fire system. In addition, certain alarms can be sent through to the building management system (BMS) to direct certain consequences – eg, shut down of any mechanical equipment that may cause the situation to further deteriorate.

For more information contact Julian Thorrold, IDtek Solutions, +27 (0)11 706 0101, julian@idtek.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Your partner in contemporary business continuity
Issue 3 2020 , Integrated Solutions
Horizon Risk Management aims to provide optimum contemporary, but affordable, business continuity techniques for business in South Africa and abroad through stable, durable and incorruptible practices.

Read more...
Financing for the systems integrator
Issue 3 2020, Elvey Security Technologies , Integrated Solutions
Financing your security project through your technology distributor can benefit both the systems integrator and the end user.

Read more...
Safe and efficient buildings
Issue 3 2020, Hikvision South Africa , Integrated Solutions
With united systems, a building security solution then can work as a whole to create a safe and efficient environment.

Read more...
Building a nervous system for smart cities
Issue 1 2020, Pinnacle Instruments SA , Integrated Solutions
Build a central nervous system for smart cities, by employing real-time situation reporting and analysis that unites the powers of cloud computing, AI, IoT and big data.

Read more...
The secret to 5G security? Turn the network into a sensor
Issue 1 2020 , Integrated Solutions
We are about to make the leap from being a civilisation that uses networks to one that runs on them in a fundamental and inextricable way.

Read more...
The move to services and RMR
Issue 1 2020, Merchant West, G4S South Africa, Technews Publishing , Integrated Solutions
Project work used to be the staple diet for system integrators, but that was before the services model changed the way businesses buy and use their security systems.

Read more...
Global security industry adopts servistisation models
Issue 1 2020 , Integrated Solutions
New as-a-service business models are gaining traction because they reduce capital expenditure and cost of ownership, finds Frost & Sullivan.

Read more...
Looking ahead with mobile access technologies
Access & Identity Management Handbook 2020, Technews Publishing, HID Global, dormakaba South Africa, Salto Systems Africa, Suprema, Gallagher , Access Control & Identity Management, Integrated Solutions
Given the broad use of smartphones around the world and the numerous technologies packed into these devices, it was only a matter of time before the access control industry developed technology that would ...

Read more...
Scalable access solution
Access & Identity Management Handbook 2020 , Access Control & Identity Management, Integrated Solutions
Bosch Building Technologies makes access management simple, scalable and always available with Access Management System 2.0.

Read more...
Securing perimeters of secure locations
November 2019, Axis Communications SA, Modular Communications, Hikvision South Africa, Nemtek Electric Fencing Products, Technews Publishing, Stafix , Government and Parastatal (Industry), Perimeter Security, Alarms & Intruder Detection, Integrated Solutions
Hi-Tech Security Solutions asked a number of companies offering perimeter security solutions for their insights into protecting the boundaries of national key points.

Read more...