Integrated anything

September 2018 Editor's Choice, Integrated Solutions, Security Services & Risk Management

When it comes to management platforms, the security industry has no lack of products to choose from. There are systems designed for single products and the larger ones designed to integrate multiple products and solution categories into a single interface. Then there’s Babylon, or officially, XMP-Babylon.

In development for over three decades by German company Autec, Babylon is designed to manage access control systems and more. However, its utility goes beyond management. Alvin Flaum, director of Veracitech, a Babylon OEM partner in southern Africa describes it as an automation platform that allows for the management of numerous and diverse business processes across diverse industries.

Autec appoints companies like Veracitech as OEM partners because the system is a complex platform that allows you to do almost anything, and Veracitech through some 28 years’ experience as OEM partners for Babylon systems, has capitalised on this with a number of in-house developed products that run on the platform aimed to serve its clients’ various requirements.

At a basic level, Babylon offers a fully configurable high-performance access automation system, which is fast, secure and flexible. It can be integrated with multiple access technologies and different types of identification, such as badges, card readers and biometrics. The data collected is stored in a secure environment and its encrypted in transit. For distributed operations, the master database continually updates all branches wherever they are to ensure all sites are using the current dataset. The system adds to this by offering time recording and accounting according to a modular-based model offering custom solutions for any application purpose.

You can also make use of a configurable security and facility management system that offers a graphical dashboard for easy management. CCTV systems and IP cameras, key management systems, phone and radio systems can be integrated into the system along with fire alarms, parking systems, intrusion detection and the usual security offerings. Depending on how the system is set up and what custom plug-ins are used, customers can have integrated video analytics, guard patrol management, X-ray scanning of objects or people, and other functionality running on the system.

Building management modules are also available for larger projects that can include functions such as energy, lighting and ventilation management, and you can even manage manufacturing systems from the Babylon interface. But that is only the start.

OEM benefits

Flaum says Babylon is used globally and is a standard at many African reserve banks and on many mines (as well as other large organisations) because of the system’s versatility and the ease with which Veracitech’s engineers can develop plug-ins for almost any purpose. This is not a plug-and-play system, however, it requires skilled engineers to implement successfully, but has a reputation for extreme reliability once installed. Veracitech also offers certified operator, administrator and service technician training on the Babylon platform.

Veracitech partners with a host of security suppliers, from Avigilon through to Traka, Idemia, Qognify, Dallmeier, Axis and others. All these systems are integrated into Babylon, and in some cases Veracitech has written its own integration to better meet customer demands. Some of the solutions Veracitech has developed and deployed as plug-ins for active client applications include the following:

• Babylon Avigilon: VMS Integration with Veracitech Soft Matrix feature, including fully integrated alarm and event video management and the ability to utilise multiple Babylon workstation monitors for video matrix switching.

• Babylon Key Management: High level database integration with Traka (ASSA Abloy).

• Babylon Enrolment: Morpho (Idemia) biometric enrolment and template management allowing for cardless fingerprint-only transactions on Babylon / Idemia (Morpho) equipped systems.

• Babylon Certifications: Access control incorporating health and safety as well as other statutory accreditations and training prerequisites. Integrating with HR databases and more, the system can control access to certain areas based on whether the person requesting access meets corporate requirements. For example, if a miner has been for a scheduled medical check-up or has been certified in a specific skill. Before allowing anyone to start a truck on a mine, the system may first check to ensure the individual’s licence is up to date and that he underwent a breathalyser test that morning.

• Babylon Rules IBO: Integrating with maintenance and scheduling databases and more, the system can control temporary access to certain areas or machines.

• Babylon Toolstore: Technicians can be issued with tools or any assets at the start of a workday or when required, with each asset allocated to them according to their access credentials. The same person can be prevented from leaving the workplace if they have not checked their tools back in, or if they are allowed to take certain equipment home, it will be checked out to them until it is returned.

• Babylon Baggage X-Ray Search: In areas where people are regularly subjected to baggage X-Ray scans, Veracitech has integrated the system to include video images and RFID tags for bags people may carry, irrefutably linking people to their belongings – just in case someone tries to sneak out something in their bag only to claim it isn’t theirs when caught.

• Babylon VLPR Access Control: Veracitech can also manage access in Babylon via licence plate recognition (LPR) using on-camera LPR systems. The client can manage vehicle entrance and exits in real-time. The camera is treated as a virtual access control reader on the Babylon system.

• Babylon Alarm Receiver Base Integration: This enables the monitoring and handling of alarm signals from alarm monitoring systems from companies such as RDC, FSK, and MAMI.

• Hardware developments: Veracitech has also developed client specific hardware components for Babylon.

There are numerous other applications Veracitech has developed on the platform. All told, Veracitech offers the design, installation, configuration and custom development and integration of multiple security and operational systems into the Babylon platform, which will allow clients to more efficiently manage their operations, even distributed operations, reliably from a central source.

Veracitech currently has a client list that includes companies like Anglo Platinum, De Beers, Petra Diamonds, Namdeb, Debmarine, Gemfields, South32, DTI, Transnet and others, including clients in Namibia, Botswana and Mozambique.

For more information, contact Veracitech, [email protected], www.veracitech.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Local is a lekker challenge
Secutel Technologies Technews Publishing AI & Data Analytics
There are a number of companies focused on producing solutions locally, primarily in the software arena, but we still have hardware producers churning out products, many doing business locally and internationally.

Read more...
A passport to offline backups
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure Smart Home Automation
SMART Security Solutions tested a 6 TB WD My Passport and found it is much more than simply another portable hard drive when considering the free security software the company includes with the device.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Rewriting the rules of reputation
Technews Publishing Editor's Choice Security Services & Risk Management
Public Relations is more crucial than ever in the generative AI and LLMs age. AI-driven search engines no longer just scan social media or reviews, they prioritise authoritative, editorial content.

Read more...
How can South African organisations fast-track their AI initiatives?
AI & Data Analytics Security Services & Risk Management
While the AI market in South Africa is anticipated to grow by nearly 30% annually over the next five years, tapping into the promise and potential of AI is not easy.

Read more...
Efficient, future-proof estate security and management
Technews Publishing ElementC Solutions Duxbury Networking Fang Fences & Guards Secutel Technologies OneSpace Technologies DeepAlert SMART Security Solutions Editor's Choice Information Security Security Services & Risk Management Residential Estate (Industry) AI & Data Analytics IoT & Automation
In February this year, SMART Security Solutions travelled to Cape Town to experience the unbelievable experience of a city where potholes are fixed, and traffic lights work; and to host the Cape Town SMART Estate Security Conference 2025.

Read more...
From the editor's desk: What’s a trillion between friends?
Technews Publishing News & Events
Back in the bad old days of 2015, some (who didn’t want to take the blame for coming up with that number) estimated the amount of money lost to corruption by the South African government to be around ...

Read more...
Stallion repositions itself as a services provider
News & Events Security Services & Risk Management
Stallion has rebranded as Stallion Integrated Solutions to reflect its expanded capabilities beyond traditional security services to delivering integrated solutions that enhance safety, asset management, and operational efficiency.

Read more...
Seven tips to help ensure your backup batteries work
Power Management Security Services & Risk Management
Load shedding is back, officially or not. Lance Dickerson offers seven tips to prolong the life of your power backup systems and ensure they perform as intended when needed.

Read more...
Cybersecurity best practice
Information Security Security Services & Risk Management
Breach and attack simulation has become an essential element of cybersecurity strategies in any modern business by allowing companies to actively detect and resolve vulnerabilities through real-world attack simulations.

Read more...