Customised personal security app for your workforce

Issue 4 2020 Editor's Choice

The COVID-19 virus and the harsh reactions from governments all around the world have thrown a spanner into almost every aspect of the economy, including the security industry. And while many companies are struggling to maintain a positive outlook and keep the wheels turning, some are looking forward to changing the way the industry works as soon as we revert to some form of normality.

One company that is ready for the post-lockdown future is Zecure, headed by Gordon Knight, who was also behind PanicGuard, a white label ‘personal security’ mobile platform – www.panicguard.com – which assisted the FirstRand Group in creating a personal safety app for its employees – read about it here.

Zecure takes the idea of app-based security to the business world. Organisations of any size can sign up for the app, which will contain their logo and be branded as their own. The app can be given to the employees of a company or residents of an estate, for example, and they will have a suite of applications on hand to cater to their personal security needs. This can range from a personal panic button, a way to communicate with the control room, and even having an armed response unit dispatched to their location. Knight says the app has been designed to allow for any number of clients, each with their own branding and suite of solutions.

In an emergency, Zecure has contracted with Aura, South Africa’s largest national ‘on-demand armed response network’ (more about Aura here), for armed response services. Currently, Aura’s network has around 1200 active armed response vehicles and 3600 armed response officers around the country.

The app handles all the client’s security needs, including communications and even mass communication in an emergency – such as having to evacuate a building. Individual users can also make use of the app to communicate with security personnel if they see something suspicious. Anonymous reports can be sent to the control room, along with data such as a timestamp, GPS coordinates, images, etc.

Zecure has been designed to meet customers’ needs and Knight says getting the system up and running will take about 30 minutes. Clients simply send a list of their employees in CSV format to have them loaded onto the system and assigned access credentials. They then download the app and sign in, and will be presented with an app that looks as if it was designed specifically for their company.

And while Zecure is aimed at the business world, if there is a demand from consumers, the company may look into launching a personal version under a different brand.

As it is, the Zecure ecosystem is ready to offer organisations of any size a customised and branded personal security app for their staff members (or anyone the organisation wants to protect). These organisations pay a monthly fee for the service based on the number of people they are securing, leaving the infrastructure issues up to the team at Zecure and the armed response responsibilities up to the Aura network.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Surveillance & AI roundtable
DeepAlert Lytehouse Refraime SMART Security Solutions Technews Publishing Editor's Choice Surveillance Integrated Solutions AI & Data Analytics
SMART Security Solutions held an online roundtable with a few surveillance experts to explore the intersection of surveillance and AI, gaining insights into the market and how control rooms are evolving.

Read more...
SMARTpod talks about HomeSec Expo 2026
SMART Security Solutions Technews Publishing News & Events Residential Estate (Industry) Videos
SMARTpod, the podcast from SMART Security Solutions, finds out more about the upcoming HomeSec Expo happening at Gallagher Estate on 4 & 5 March 2026.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
From the editor's desk: It’s all about data
Technews Publishing News & Events
      Welcome to the SMART Access and Identity Handbook 2026. We have slightly changed the handbook this year, specifically the selection guides, but there is still a lot of industry information inside, and ...

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.