What a National Key Point project actually involves - and why very few integrators in South Africa qualify to work on one.
Most enterprise clients give you a brief. A National Key Point gives you a legal instrument.
Under South Africa’s National Key Points Act, a facility designated as critical national infrastructure carries a security obligation that is prescribed, legally enforced, and subject to ongoing inspection. The specification is not yours to interpret. It is not negotiable with the client. And it does not accommodate the kind of value-engineering that happens on most commercial projects.
When we were appointed to design and install the security and communications infrastructure at the Department of Agriculture, Land Reform and Rural Development’s national headquarters in Pretoria, that was the context. The facility spans five buildings and 80,000 square metres. It is the operational centre of a government department that administers land policy for the entire country.
Here is what the project actually involved.
400 cameras can find one person across an entire campus in seconds. Most “AI” installations cannot.
Every major security vendor ships cameras described as AI-enabled. Buying them is straightforward. Making them perform is not.
The global AI surveillance market is growing at 30% per year and is projected to reach $28 billion by 2030. What that figure masks is that the majority of AI-capable cameras installed today are configured to do exactly what a CCTV camera from 1998 did – record footage and store it. The AI capability is purchased and left dormant.
At the DALRRD campus we deployed 400 Avigilon high-resolution cameras running the ACC analytics platform – appearance search across the full camera network, real-time motion classification, unusual activity detection, and archive search that can locate prior appearances of an individual across all cameras in seconds.
There is a meaningful difference between a building with AI cameras and a building with AI surveillance. It does not appear in the specification document. It appears at 2am when no one is watching.
“There is a meaningful difference between a building with AI cameras and a building with AI surveillance. It does not appear in the specification document. It appears at 2am when no one is watching.”
– Errol Boolkin, Founder & MD, Data Connectivity Solutions
220 controlled entry points. Every credential logged. Every zone tiered. No exceptions.
National Key Point compliance means every restricted access point must operate to the defined standard – not most of them, and not only in the high-security areas.
We installed 220 Gallagher-controlled entry and exit points across the campus. Each operates on biometric and smart card two-factor authentication. Every zone carries a tiered access configuration: the right credential, in the right area, in the right time window. Every movement is logged. Every access event is auditable.
Asset tracking was integrated into the same platform, so equipment movement through the campus is recorded alongside the movement of personnel. X-ray and metal detection screening covers the key ingress points.
The value of that level of integration is not what it prevents under normal operating conditions. It is what it enables the moment something goes wrong.
A 25-year certified warranty is not a sales promise. It is a technical threshold.
The structured cabling on this project is Molex Cat6, certified for 25 years of performance. Most installations don’t carry that warranty – not because the manufacturer won’t offer it, but because the installation quality, specification, and test certification don’t meet the threshold required to claim it.
Industry data suggests 70% of data centres require major cabling upgrades within five years of installation. The reason is almost always the same: the original specification was not planned for the actual long-term data load, and the installation was not certified to a standard that would hold the contractor accountable if it failed.
A 25-year warranty shifts that accountability. It also means the cabling was specified, installed, and documented to a standard that most projects never reach.
“Very few integrators in South Africa have delivered at National Key Point specification. The credential is either in the portfolio or it isn’t.”
– Errol Boolkin, Founder & MD, Data Connectivity Solutions
The part of the project no one photographs.
The compliance documentation on an NKP project is its own workstream. Every system must be specified to the required standard, installed to specification, tested, certified, and handed over with documentation that can withstand regulatory scrutiny.
There is no flexibility in that process. If the specification requires biometric two-factor authentication at every restricted access point, then that is what gets installed – at every access point, without exception.
Very few integrators in South Africa have delivered at National Key Point specification. The regulatory framework, the system design requirements, and the documentation discipline involved are a category of complexity above a standard enterprise project. The credential is either in the portfolio or it isn’t.
DCS has been delivering high-specification enterprise security projects since 2003.
If you have a project that demands it, we should talk.
Errol Boolkin
Founder & Managing Director, Data Connectivity Solutions. Errol founded the company in Johannesburg in 2003 and has since led the delivery of security and network infrastructure across South Africa’s most demanding public and private sector facilities. For project enquiries, contact errolb@dcsafrica.co.za or call +27 (011) 646 0950.