Powerful access at Kusile

Access & Identity Management Handbook 2018 Access Control & Identity Management, Products & Solutions

South Africa has been plagued by numerous planned and unplanned power outages as the existing power stations struggle to cope with reduced capacity. The completion of the Kusile Power Station will therefore have a significant impact on reducing the current load on the country’s power generation infrastructure. Once fully completed and online, expected in 2021, Kusile Power Station’s six units will generate 4800 MW.

Situated in the Nkangala district of Mpumalanga, this coal-fired power plant will be the fourth-largest coal-fired power station in the world. The Kusile project will include a power station precinct, power station buildings, administrative buildings (control buildings and buildings for medical and security purposes), roads and a high-voltage yard.

The associated infrastructure will include a coal stockyard, coal and ash conveyors, water-supply pipelines, temporary electricity supply during construction, water and wastewater treatment facilities, ash disposal systems, a railway line, limestone offloading facilities, access roads (including haul roads) and dams for water storage, as well as a railway siding and/or a railway line for the transportation of the limestone supply.

Unit 1 was connected in December 2016 and is expected to reach full load in March 2018. This landmark event means that pedestrian traffic into the power station has increased significantly as the labour force expands accordingly.

With an estimated operational life of 60 years and given its contribution to the national grid, protection of the power station is paramount. Craig Sacks, MD of Turnstar, says that the company was approached to provide 22 Triumph full-height double turnstiles to enhance security levels at the plant.

Turnstar’s full-height industrial turnstiles are the appropriate fit for Kusile as they are the biggest selling turnstile in Africa, providing security of premises within the mining industry, as well as in factories, warehouses and busy stadiums.

The Triumph turnstiles supplied to Kusile have been powder coated and fitted with brackets to house biometric readers, thereby enhancing the level of security provided. Powder coating is not only aesthetically pleasing but furthermore provided superior resistance to cracking, peeling, and chipping and offers abrasion-, corrosion- and chemical-resistance.

Sacks points out that all Turnstar products are designed for the harshest of environments and the Triumph turnstiles are therefore perfectly suited to the demanding operating conditions found at power stations. “Our products are manufactured with state-of-the-art CNC machinery and robotic welding to ensure that the highest quality and tightest tolerances are achieved.”

For more information contact Turnstar Systems, +27 (0)11 786 1633, [email protected], www.turnstar.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...
T&A in South Africa’s retail sector
ERS Biometrics Access Control & Identity Management
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Paxton opens second experience centre
Paxton News & Events Access Control & Identity Management
Security technology manufacturer, Paxton, has opened a new experience centre in Cape Town on 12 February in partnership with its exclusive distributors, Reditron and Regal Security.

Read more...
DoorBell with built-in AI
Ajax Systems Access Control & Identity Management Products & Solutions Smart Home Automation
Ajax Systems has announced the release of Ajax DoorBell, which features built-in AI, an IR sensor, and app control, seamlessly integrating into the Ajax ecosystem to ensure efficiency and security confidence.

Read more...
Physical security evolving beyond security teams
ATG Digital Access Control & Identity Management
The landscape of physical security is undergoing a major shift. Traditionally, selecting access control and visitor management solutions fell squarely on the shoulders of security professionals, but today includes legal, IT, technical operations and more.

Read more...
A passwordless future?
Access Control & Identity Management
The digital landscape is evolving rapidly, and with it comes the urgent need for more secure authentication methods. Passwords, once the cornerstone of online security, are now easy targets for cybercriminals.

Read more...