Century City automates access control

1 March 2017 Access Control & Identity Management, Perimeter Security, Alarms & Intruder Detection, Integrated Solutions

Century City Property Owners Association (CCPOA), the body responsible for the day-to-day running of Century City, a 250 ha mixed-use development in Cape Town, has reinforced its access control and security with the deployment of new technology from South African software solution providers Solution House and At The Gate.

The CCPOA was one of the first organisations in the country to deploy the comprehensive incident management platform, Incident Desk, developed and distributed in South Africa by Solution House.

The system has recently been expanded with the introduction of a simplified access control and visitor management solution from Gauteng-based At The Gate, which uses a handheld device and custom-developed Android app to monitor the flow of all vehicles in and out of entry points to buildings, estates, precincts and almost any other gated thoroughfares.

At The Gate gives site managers instant access to information on a vehicle and driver once the licence plate, licence disc or driver’s card has been scanned. Using a comprehensive licence plate database developed by the CCPOA, any suspicious or flagged vehicle or driver immediately raises an Incident Desk alert, which is automatically sent to CCPOA management and patrol staff.

“We’ve been building a database of suspicious vehicle information from a number of different sources, including SAPS, over the past few years, and through Incident Desk have centralised the access to this data so we can quickly raise an alert if one of our staff encounters a flagged vehicle,” says Marinus Boshoff, safety and security manager, CCPOA.

“With the introduction of At The Gate, we can now push that data to the access devices at booms and other entry points, and automatically get alerts in our control centre about suspicious vehicles as soon as a vehicle is scanned,” he says. “This gives us the time we need to proactively mobilise our staff to the incident, whereas before we would possibly have received the information about a suspicious vehicle too late to act on it.”

Boshoff says that because Incident Desk is closely linked to a detailed map of the precinct, not only can suspicious vehicles be pinpointed, but over time, Incident Desk helps generate hotspot maps that give CCPOA management valuable data on the types, locations and times of incidents.

“Because we know when and where certain incidents occur – be it a criminally-linked vehicle or any other security-related incident captured by Incident Desk, we can start to analyse trends and even predict the likely occurrence of future incidents,” he adds. “This has knock-on benefits in terms of how we allocate our staff and resources to proactively manage incidents across the precinct.”

At The Gate director Barry Resnik, says that At The Gate is configured to push the name and ID number of the expected driver in each vehicle, as well as the image of the driver on the front of the driver’s licence.

“This is a failsafe way to ensure the driver of the vehicle being scanned is correctly identified, and should he or she not be the person whose information was captured, an incident alarm will immediately be triggered,” he says.

“Where this level of access control is particularly useful is in more serious criminally-linked cases, where the information in the database indicates, for example, a certain grouping of driver and passengers in a certain model and colour of car, which can quickly be corroborated by security staff who alert the proper authorities. Since alerts are raised in real time, CCPOA has enough time to take the necessary steps before the vehicle leaves the precinct.”

Tiaan Janse van Rensburg, Solution House.
Tiaan Janse van Rensburg, Solution House.

“Much like At The Gate, which was developed to replace physical access control books, we developed Incident Desk as a replacement for physical site management books,” says Solution House director Tiaan Janse van Rensburg. “Over time, it’s evolved into much more than a centralised management platform, adding functionality such as real-time incident reporting via the mobile app, and giving users an almost infinite number of ways to configure the software to their specific sites.

“Customers like CCPOA use Incident Desk to not only track and respond to serious crime-related incidents, but also structural faults, like potholes or broken lights, fallen trees, and damaged fences, to name a few. It can also be used to generate reports for managers and staff, to monitor and control schedules, or track just about any conceivable management and maintenance function.”

Boshoff says the combination of Incident Desk and At The Gate gives CCPOA unprecedented control over vehicle access inside and around Century City, and the value of the combined system is worth much more than the sum of its parts. “We’ve taken a custom-built and highly configurable platform in Incident Desk and coupled it with another South African innovation with At The Gate, and the result is one of the most detailed and accurate vehicle identification systems that I’ve had the privilege of working with.”

For more information contact Solution House, +27 (0)82 565 8081, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

A platform for access and identity at Securex 2025
Securex South Africa Access Control & Identity Management Facilities & Building Management
South African companies involved in supplying access control technology, security services, and data management are well-positioned to tap into the expanding access control market at Securex 2025.

Read more...
Background checks: risk levels and compliance
iFacts Access Control & Identity Management Security Services & Risk Management
Conducting background checks is a vital step in the hiring process for employers or when engaging service providers; however, it is crucial to understand the legal framework and regulations governing these checks.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
Identity is a cyber issue
Access Control & Identity Management Information Security
Identity and access management telemetry has emerged as the most common source of early threat detection, responsible for seven of the top 10 indicators of compromise leading to security investigations.

Read more...
Embracing contactless access solutions
HID Global Access Control & Identity Management
There has long been a discussion of the perils and virtues of authentication factors. Is it more secure to use something we have (a key card), something we know (a password), or something we are (biometrics)?

Read more...
Smart access for a safer community
neaMetrics Suprema Access Control & Identity Management Residential Estate (Industry) Products & Solutions Commercial (Industry)
Suprema has released its BioEntry W3 facial authentication access control device with multiple authentication options, including RFID cards as well as mobile credentials, designed for durability and resilience.

Read more...
The power of knowing your client
Ideco Biometrics Access Control & Identity Management Integrated Solutions
One of the most effective ways to combat the threat of fraud, identity theft, and financial crime threats is through a robust Know Your Client (KYC) process, which safeguards both businesses and clients.

Read more...
Smarter ways to secure your space
Elvey Security Technologies Access Control & Identity Management Products & Solutions
Ensuring the safety of people and assets has become more crucial than ever, and access control systems provide essential tools to regulate and monitor who can enter specific areas or access sensitive resources.

Read more...
Facial recognition in national security
Access Control & Identity Management Government and Parastatal (Industry)
As global security challenges evolve, facial recognition technology provides a vital edge by turning our unique identities into powerful assets for national defence and changing a sea of anonymity into a line of defence.

Read more...
Federated identity orchestration
Technews Publishing SMART Security Solutions Editor's Choice Access Control & Identity Management Security Services & Risk Management AI & Data Analytics
Understanding exactly who resides at the end of a digital device is key, and simple identity number verification by the Department of Home Affairs is no longer a viable solution on its own.

Read more...