Serene security

Access & Identity Management Handbook 2007 Access Control & Identity Management

Motivation

Southdowns Residential Estate, set within 50 ha of farmland in the tranquil Irene district near Pretoria, has the vision of being the premier residential estate in Gauteng offering a unique lifestyle in an environmentally sustainable manner.

Within the boundaries, a complete lifestyle experience has evolved with the Southdowns Shopping Centre, the Irene Dairy Farm and Southdowns College (an independent, combined school with a focus on developing students' academic, physical, social and spiritual potential), many sporting and recreational facilities set amongst the oak trees and the meandering Hennops River.

Patty Ferreira of Southdowns Management Services says that Southdowns is like 'a piece of the past that has found its way to the future'.

"From the outset the intention was to centralise all security and surveillance and to treat the entire Southdowns area as one secure precinct. A security services company was chosen with an outstanding background to ensure that homeowners at Southdowns use all of the facilities provided without any second thought about safety."

Security teams patrol the estate round the clock. The farm has controlled access with an electrified perimeter fence. Digital motion detection cameras are to be used. Wireless cameras will be deployed where required.

'Greenfield' residential developments always face a challenge in the timing of the initial building contracts. While the estate has perimeter protection, the access of contractors has to be managed responsibly.

Rewards

Southdowns' requirements were clear: control access to the estate and to perform on-the-spot verification of contractors. Later all residents are also to be included as part of the same access control solution.

At any one time Southdowns wanted to know which contractors are on site and where they are authorised to be working. The estates also wanted to have all the relevant information of each contractor so that in the event of a breach of security, it can accurately determine whether a contractor was on site at the time of an alleged offence.

Implementation

The developers got an independent electronics consultant to assess the security technology requirements and to filter the various potential system integrators.

The electronics consultant designed the solution over a period of six months. Julian Thorrold, managing director of IDtek, adds, "Southdowns required a specialist in fingerprint biometrics and IP-based CCTV. IDtek's track record of excellence with implementing these products secured the contract." Together with the consulting engineer, IDtek assisted in the determining the equipment to be used in the solution.

Meetings followed where the equipment specifications as well as the implementation were agreed and formalised. IDtek entered into a JBCC Minor Works Agreement - Third Edition contract with the client. In terms of this agreement the preparation, execution and completion of the project is prescribed, as are the terms and procedures for payment.

Two Sagem Enrolment Stations were installed to capture all relevant personal details, a face shot and fingerprint templates from both hands of every contractor. At the same time, stand number data was also collected so that, at any given time, a contractor can be verified for authorised access to the specific site. Two Sagem OMA 300 fingerprint readers ware also installed to perform the access control verification when contractors presented themselves at Southdowns' gatehouses.

Challenges

Thorrold comments, "Access to the estate is controlled through two gatehouses over a kilometre apart. Until such time as a fibre-optic network has been installed, the solution is required to operate over a wireless bridge so that templates and access privileges could be distributed from one centralised enrolment station to both gatehouses."

Initial enrolment procedures began on the Sagem Enrolment Stations before the Sagem biometric fingerprint readers were on site. This allowed management prepare users and to populate the database so that the system could swing into operation the day the readers were installed. A wireless Ethernet LAN was established between the two gatehouses.

Review

The implementation process ran smoothly as a result of good forward planning.

However, Thorrold advises others considering a similar solution to: "Avoid cheaper biometric technology at all costs - it simply will not perform in an environment where people work with their hands and where a significant number of users are proposed.

"Because Southdowns' initial goals were clearly identified by a suitably-qualified consulting engineer prior to awarding any contracts, there was very little change from the specified plan."

Further development may take place to add time recording features for contractors so that it will be possible to accurately establish time on site for work efficiency or payment hours. "This additional functionality would be possible at nominal cost because the backbone of the system is already in place," explains Thorrold.

Ferreira concludes, "IDtek was a pleasure to work with. The residents - and the contractors - are experiencing the benefits and the security levels offered by this comprehensive access control solution."





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Palm-vein biometric kiosks secure SAP at Transnet Engineering
Access Control & Identity Management Transport (Industry) Videos
Securing access to SAP is essential to avoid fraud or corruption. Ensuring that users can access the software quickly, easily, and conveniently to do their jobs is also essential.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
Nice launches DC Blue Astute garage door motor
Nice Group South Africa Technews Publishing News & Events Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Nice Systems SA has launched the Nice DC Blue Astute, a garage door motor for the South African market featuring a pre-installed lithium-ion battery instead of traditional lead-acid batteries.

Read more...
Towards a global digital passport?
Access Control & Identity Management
In a world where borders are more connected and closely monitored, the idea of a universal digital passport could revolutionise how we travel, work, and even perceive citizenship.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
A platform for access and identity at Securex 2025
Securex South Africa Access Control & Identity Management Facilities & Building Management
South African companies involved in supplying access control technology, security services, and data management are well-positioned to tap into the expanding access control market at Securex 2025.

Read more...
Background checks: risk levels and compliance
iFacts Access Control & Identity Management Security Services & Risk Management
Conducting background checks is a vital step in the hiring process for employers or when engaging service providers; however, it is crucial to understand the legal framework and regulations governing these checks.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
Identity is a cyber issue
Access Control & Identity Management Information Security
Identity and access management telemetry has emerged as the most common source of early threat detection, responsible for seven of the top 10 indicators of compromise leading to security investigations.

Read more...