Access to mixed-use development

Access & Identity Management Handbook 2013 Access Control & Identity Management, Residential Estate (Industry)

40 on Oak is an upmarket apartment block within the Melrose Arch mixed use development in Johannesburg. The five-storey building has 54 units ranging from one to four bedrooms, and five penthouses on the top floor.

The developers decided that any access control systems installed in 40 on Oak would need to be able to integrate with the systems already running at Melrose Arch. In addition, the systems needed to conform to the planned future expansion and upgrading of the precinct-wide access control and building management system (BMS) requirements.

The UTM Group was approached in November 2011 to assess, determine and design an access control system that would achieve all the client stipulations in terms of both future proofing and backwards compatibility. At the same time, due to the nature of the final development, aesthetics played a large role.

Kelly McLintock, group managing director of the UTM Group, said of the existing access control system at Melrose Arch: “A total of over 450 doors are controlled across all areas of the Melrose Arch precinct. Our challenge was to provide a solution that would integrate with all existing bespoke systems, and which will also be compatible with any future expansion of the precinct. We also looked to streamline the administration process and offer improved monitoring and control.”

Cost and quality were weighed up against the pressing security requirements at 40 on Oak. “As the security integrator and solution provider for the project, our first plan of action entailed consolidating and mapping the existing system to determine areas requiring attention. It was important to then design and implement a system for both 40 on Oak and the rest of the Melrose Arch precinct that will provide the end user with a state-of-the-art and user-friendly solution,” McLintock explained.

“The solution comprised three main components: an access control system, Stentofon IP intecom system and Bosch BVMS CCTV system. The selection allows us to integrate with the site-wide system, with a view to future proofing. The systems will control access to the general areas of the building via all external entrances, as well as individualised access for the lifts.”

The biggest challenge faced by UTM was the software and firmware incompatibility between the systems that are currently in place, and the new system proposed for 40 on Oak. “In order to provide a truly integrated solution, it was necessary to institute upgrades across the board which would not only benefit the 40 on Oak residents, but also all the users across the precinct. The entire project is being tackled in a phased approach over the next three years and UTM is currently on deadline for completion of the 40 on Oak section of the project in early 2013,” McLintock added.

The access control system at 40 on Oak comprises the control of 74 access controlled doors and over 100 monitored doors, using a combination of readers. Each user is enrolled for a specific zone, for example ‘4th floor’, with the ability to customise each user for multi-zone access levels. This not only applies to 40 on Oak but, once again, to the entire precinct. Readers at the lifts ensure that when a user tags in the lift, they will only be able to access their designated floor.

The building, which has received accolades for its green compliance, will possibly in the long term utilise the access control system to control power usage. “When a tenant leaves their unit, the system could switch all non-essential powered items off to eliminate unnecessary power consumption. When the tenant swipes his card to enter his unit, full power would be restored to his unit,” explained McLintock.

Visitors to the building will be required to interact with tenants via the Stentofon IP system. This system interfaces with a building-wide PABX system. Each unit is equipped with a SIP phone that doubles as a VoIP telephone and an intercom handset.

“UTM’s input from the design stage ensured that all conduit and electrical requirements were in place prior to first fix commencement. This meant that there were no surprises or unforeseen problems as the installation progressed,” said McLintock.

The feedback received from the client has been extremely encouraging. “We have been told that the installation and service exceeds their initial expectations and based on the success of the project to date, the customer has extended the scope of the project and contract period,” McLintock concluded.

Once the project is completed, UTM will provide all onsite support, maintenance and servicing requirements.

For more information contact UTM Group, 0860 22 22 66, [email protected], www.utmgroup.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

New State of Physical Access Control Report from HID
HID Global Editor's Choice Access Control & Identity Management News & Events
HID released the 2024 State of Physical Access Control Report, identifying five key trends shaping access control's future and painting a picture of an industry that has been undergoing considerable transformation.

Read more...
Smart intercoms are transforming access control
Access Control & Identity Management Products & Solutions
Smart intercoms have emerged as a pivotal tool in modern access control. They provide a seamless and secure way to manage entry points without the need for traditional security guards to validate visitors before granting them access.

Read more...
Easy, secure access for student apartments
Paxton Access Control & Identity Management Surveillance
Enhancing Security and Convenience at Beau Vie II Student Accommodation, a student apartment block located at Banghoek Road, Stellenbosch, with Paxton's access control and video management solution

Read more...
Invixium acquires Triax Technologies
News & Events Access Control & Identity Management
Invixium has announced it has acquired Triax Technologies to expand its biometric solutions with AI-based RTLS (Real-Time Location Systems) offering for improved safety and productivity at industrial sites and critical infrastructure.

Read more...
ControliD's iDFace receives ICASA certification
Impro Technologies News & Events Access Control & Identity Management
The introduction of Control iD's iDFace facial biometric reader, backed by mandatory ICASA certification, underscores the commitment to quality, compliance, and innovation.

Read more...
The future of workplace access
HID Global Access Control & Identity Management
Mobile credentials are considerably more secure than physical access control, because they eliminate the need for physical cards or badges, support multiple security protocols, and add layers of protection on top of basic card encryption.

Read more...
Integrated, mobile access control
SA Technologies Entry Pro Technews Publishing Access Control & Identity Management
SMART Security Solutions spoke to SA Technologies to learn more about what is happening in the estate access world and what the company offers the residential estate market.

Read more...
Intrusion detection for wide areas
OPTEX Perimeter Security, Alarms & Intruder Detection Residential Estate (Industry)
Securing wide outdoor areas presents several challenges that differ significantly from those faced in smaller, more confined environments. The key to safeguarding these spaces is dependent on choosing the right intrusion detection technology.

Read more...
Natural catastrophes and fire risks top concerns
Security Services & Risk Management Asset Management Residential Estate (Industry)
Natural disasters are the highest risk in the real estate industry, followed by fire and explosions, and then business interruption. Estates must prioritise risk management and take proactive measures to safeguard their assets, employees, and reputation.

Read more...
New ransomware using BitLocker to encrypt data
Technews Publishing Information Security Residential Estate (Industry)
Kaspersky has identified ransomware attacks using Microsoft’s BitLocker to attempt encryption of corporate files. It can detect specific Windows versions and enable BitLocker according to those versions.

Read more...