The drone era in residential security has arrived

Issue 3 2021 Editor's Choice

Private security is reaching new heights in the northern suburbs of Johannesburg as Fidelity Services Group becomes the first security provider to introduce drones, under the banner of Fidelity Drones, in specified residential estates in the greater Fourways area.

Fidelity is no stranger to the technology, having already successfully used drones in the commercial space to secure infrastructure like pipelines and cables.

This exciting new offering, which is being implemented in partnership with the UDS Group, a certified drone operations company, will be trialled in the greater Fourways area for two months and then extended to other suburbs, estates and shopping centres.

According to Wahl Bartmann, chief executive officer of Fidelity Services Group, the offering consists of a mobile command centre with a qualified drone pilot and a fully equipped state-of-the-art drone.

“The command centre is linked to a tactical response unit for both reactive and proactive purposes. Customers contact a call centre to activate the drone response and on sites where Fidelity ADT already provides guarding, and the drone response will be worked into the incident escalation procedure,” he explains.

“We believe drones and the deployment of a mobile drone team will not only act as a highly effective visible deterrent to criminals, but also assist to immediately track down and locate criminal elements once an outer perimeter on an estate has been breached, or in any scenario where suspects are at large on a security estate.”

Bartmann says the deployment is ideally suited to security estates and will increase proactive crime prevention and the ability to plan crime prevention operations. It will also facilitate a more rapid response to live criminal incidents and scenes.

“Drones can also play an important role in other emergency situations that require monitoring, such as dangerous fires and land invasions,” he adds.

Fidelity Drones will work hand in hand with the Vumacam suburb surveillance system and in strict accordance with all privacy and aviation laws.

“Drones need to be licenced and flight details have to be approved to fly in certain areas,” explains Bartmann. Drone operations can also only be conducted with the permission of the landowner and/or other designated person able to provide such authority.

“We are very excited about the introduction of drone technology in the residential space as an added means to tighten the net for criminals and add an additional layer of security. Its success has already been proven in remote areas and we have no doubt we will have similar success in specific residential areas,” concludes Bartmann.

For more information contact Fidelity Services Group, [email protected], www.fidelity-services.com / www.adt.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What South Africans need to know about smart devices
Technews Publishing Editor's Choice
We live in a world surrounded by smart devices, from our pockets to our driveways and living rooms.

Read more...
From overwhelm to oversight
Editor's Choice Cyber Security Products
Security automation is vital in today’s world, and Microsoft Sentinel is a widely adopted, but complex answer. ContraForce is an easy-to-use add-on that automatically processes, verifies and warns of threats round-the-clock.

Read more...
SMART Surveillance Conference 2023
Technews Publishing Editor's Choice CCTV, Surveillance & Remote Monitoring Conferences & Events
Some people think the future is all about cloud technologies, but the SMART Surveillance conference demonstrated that AI is making edge surveillance much more attractive, over distributed sites, than ever before.

Read more...
Has your business planned for the worst?
Editor's Choice Cyber Security Security Services & Risk Management
Incident response is a specialised part of security, like a hospital's intensive care unit: IR kicks in when the organisation detects a breach of its systems to stop criminals from doing more damage.

Read more...
Making a difference with human intelligence gathering
Kleyn Change Management Editor's Choice
Eva Nolle believes that woman should stand their ground as they often bring an entirely different skill set to the table, which enhances the overall service delivered.

Read more...
Milestone celebrates women in security
Milestone Systems Technews Publishing Editor's Choice News Conferences & Events
The Milestone Systems’ African team wanted to express their appreciation for the incredible contributions of the women in the security industry and held a breakfast in honour of the hard-working women in the industry on 8 August.

Read more...
Supporting CCTV intelligence with small and big data
Leaderware Editor's Choice CCTV, Surveillance & Remote Monitoring
The increasing development of AI and its role in enhancing investigation-led surveillance, and the increasing capacity of control rooms and local analysts to deliver data in return, can increase the synergy between intelligence and surveillance.

Read more...
Overcoming resistance to changing your current operating model
Editor's Choice Integrated Solutions
Business survival goes beyond cutting costs and driving efficiency, it’s about using data and technology as strategic assets to develop speed, agility and resilience, keep up with customer demands, beat the competition and grow the business.

Read more...
The road to Zero Trust not necessarily paved with gold
Editor's Choice Access Control & Identity Management Cyber Security
Paul Meyer says that while Zero Trust must be the goal, there are a few potholes to navigate on the journey. Here he expands on these caveats, but also exposes the greatest ally of Zero Trust.

Read more...
More agile, flexible access management
ASSA ABLOY South Africa Editor's Choice Access Control & Identity Management
Tim Timmins from ASSA ABLOY Opening Solutions examines the growing shift towards cloud access management. How can organisations benefit, and what should they look for when choosing a cloud access control solution?

Read more...