The services model adds value

Access & Identity Management Handbook 2022 Editor's Choice, Access Control & Identity Management, Integrated Solutions, Infrastructure

Cloud computing in all its forms, along with the related services gets an enormous amount of attention today. The whole idea of cloud also causes some confusion among users. Some see cloud as simply an online mechanism to store data, but the reality is cloud today represents far more than a remote backup. The concept of services is key in this respect and we have many ‘as-a-service’ acronyms doing the rounds, from Software-as-a-Service (SaaS) to platforms (PaaS) and so on.

But what do companies mean when offering a cloud service? To understand the concept as well as the benefits of the cloud, Hi-Tech Security Solutions asked Gary Chalmers, CEO of iPulse, to tell us the story of how and why iPulse moved from a biometric hardware manufacturer to a cloud-based identity management company. We also asked Chalmers how iPulse benefited from this change, what challenges it faced, as well as about the benefits and additional value the new model offers the company’s customers.


Gary Chalmers.

To be clear, iPulse still builds its own access control readers (focused on fingerprint biometrics, for now), but it has moved its business away from hardware sales to selling a service. As Chalmers explains, “As a hardware-only company based in South Africa, it became harder to compete against the cheaper products coming in from the Far East and the only competitive edge became margin-driven rather than quality- or performance-driven. We wrote our own software, but the burden of support for locally installed software made it a loss-leading business for us.

“By moving to cloud, we were able to reduce our on-site support by over 95% within the first six months and to offer significantly enhanced uptime and service to our clients. By incorporating our own hardware ‘free’ as part of the service or solution, we are further able to differentiate ourselves by guaranteeing the entire solution from end-to-end and backing our own quality when we offer ‘lifetime’ support on the hardware as part of the overall solution.”

Readers can find out more about Chalmers’ background and the current focus of iPulse at www.securitysa.com/11894r and www.securitysa.com/12236r.

So what is the business model?

Obviously, manufacturing biometric readers and continually developing and refining the software that runs them costs money, as does paying for cloud services and the staff required to support the company’s customers. What then is the business model iPulse implements to pay for all this and hopefully make enough of a profit to grow the company?

Adding to his comments above, Chalmers states that iPulse now offers a complete solution ‘as-a-service’. “This includes the installation, configuration, training, hardware, software, support, maintenance and hosting and is offered as a monthly service fee to clients. Clients are able to pay for these solutions as a pure operational expense (opex), which is interest free, or with an upfront capital expenditure (capex) payment for hardware and installation and then a lower monthly fee that covers everything else.”

The model lends itself to flexibility. A customer can pay a monthly fee and own the hardware after a number of years or keep paying for the service and have its readers refreshed every few years. However, the idea of ownership of the devices is the wrong way to look at a service offering (from any company).

The traditional model (or dare we say ‘old-fashioned’ model) of business was that a customer would buy security equipment, whether from cash reserves or a loan of some sort and then pay for an SI to design and install the system. Maintenance contracts were another expense that some companies avoid, but they can assist in ensuring the installation works properly over the medium- to long-term.

The idea of a service is that you pay for the service. Whether it is Internet connectivity or security guards or access control, the customer makes use of the service and the supplier provides the service and everything incorporated into that service at a single cost. When the service does not work, it’s the supplier’s problem as the customer is not involved in hiring guards or technicians or even the brand of technology used. The service provider can use the cheapest technology on the market if it so chooses, but they are responsible for keeping it working, often with clawback agreements should the service fail for whatever reason.

A different client relationship

The client/supplier relationship therefore changes under the services model. Chalmers says the biggest value-add for having a cloud-based business rather than a hardware business is the nature of support with clients. “Hardware almost always requires on-site support and physical maintenance, whilst cloud is typically supported remotely and often automatically with AI-driven algorithms to monitor uptime and potential issues.

“To offer physical support, you need resources wherever your clients are situated geographically and the costs of sending someone out in a vehicle, with petrol, time, insurance and tools has escalated dramatically over the past decade. It is the savings on the cost of this support that drives the prices down, thereby giving customers exponential value in price and service.”

iPulse has a monitoring centre where its staff monitors the ‘health’ of their devices wherever they are located over the Internet. Most traditional support calls can be solved remotely from the monitoring centre, often before the client realises there is a problem. In the few cases where the problem can’t be solved remotely, iPulse simply sends a technician to replace the faulty reader and worries about repairing it later. This ensures little to no downtime for the client.

The client’s only responsibility in this service is to ensure they have Internet connectivity. When the Internet is down or Eskom breaks the power supply, the readers will continue working (as each company’s access data is synchronised to the reader). When connectivity is restored, the devices synchronise to the cloud and vice versa if there are updates for firmware etc.

“All of our devices are installed with power supplies that have battery backup and function perfectly in an offline mode,” says Chalmers. “This allows the solution to continue operating when power is off, then when the power comes back on, the battery recharges and the data stored locally is batch uploaded to the cloud. The biggest issue lies in creating a regular maintenance schedule for the batteries in the devices and power supplies, as with all this load-shedding the life expectancy of these batteries reduces substantially faster than under normal operating conditions.”

As good as it may sound, there are challenges involved in moving to a service model. Companies are used to the whole ‘ownership thing’ (which they can also have in iPulse’s model). “Migrating was tough initially,” adds Chalmers. “Trying to convince customers that cloud was safe for access control was an uphill battle at first, but this has changed radically over the past five years since our journey began and clients are now initiating this requirement, which is fantastic.”

The PoPIA Act was another concern among customers as they are responsible for the information of staff and visitors accessing their premises. However, Chalmers notes, “these days, most companies are comfortable that online data storage is acceptable, provided it follows a few general rules, like being stored locally in the country where the data is generated. Since Microsoft Azure has two local data centres in South Africa, this is easily possible for our clients, with even their backup data being stored within the country’s borders at the second failover site.”

The value-added options of a service

As with many other services in various vertical markets, the Access Control-as-a-Service (ACaaS) model allows for more value to be extracted and analysed from what used to be boring ‘in and out’ data. A simple example, used in services and traditional business models, is time and attendance. In this case the data is stored remotely in the cloud and can automatically feed the client’s payroll application, making use of biometrics to cut out buddy-clocking etc.

Even without the additional value mentioned, Chalmers states that the key value-add services “are typically based on significant uptime improvements, pre-emptive maintenance as our team is able to monitor the clients’ sites and often notifies clients of issues before they are even aware of them, or even better, fixes them before the client even knows there is a problem. Remote support, training and troubleshooting offers huge value to the client over time, as the cost of call-outs and site visits which often used to drive the TCO (total cost of ownership) up substantially over the lifetime of the product) is now reduced, whilst the ‘all-in’ offering we now employ allows for free support and maintenance to be built into the controlled monthly fee.”

Having proven the value of the service model and gaining clients in South Africa and abroad, Chalmers says iPulse’s goal is to “drive expansion in the South African market, concentrating on expanding our market share in key verticals, whilst also partnering with large organisations both in South Africa, the USA and UK to drive expansion into other markets – both geographic and segment-wise.”


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Impro announces Primo update
News & Events Access Control & Identity Management Integrated Solutions
Impro Technologies recently held a launch event in which it introduced a series of new products, from new readers through to its updated Primo access management software.

Read more...
Claude Mythos wake-up call
Technews Publishing AI & Data Analytics Information Security
AI has crossed a critical cybersecurity threshold and frontier models are accelerating attack lifecycles and will enable attackers to identify and exploit vulnerabilities at scale and speed, through novel methods that were previously the domain of advanced nation-state entities.

Read more...
The security debt hidden in residential estates
Security Services & Risk Management Integrated Solutions Residential Estate (Industry)
Many residential estates undermine their own security not through a lack of technology, but through hidden weaknesses in gate design, fragmented systems, recurring software dependence, weak operational ownership, and insufficient estate management input.

Read more...
Service robot technology for residential complexes
Suprema AI & Data Analytics Infrastructure Residential Estate (Industry)
Suprema has signed a three-party memorandum of understanding (MOU) with Hyundai Motor Group Robotics LAB and Hyundai Engineering & Construction (Hyundai E&C) to collaborate on advancing residential complexes through service robot technology.

Read more...
The AI goldrush has a credibility problem
Refraime Editor's Choice Surveillance AI & Data Analytics
The single most important question a surveillance buyer can ask is deceptively simple: “Was this system programmed or was it trained?” That question alone will reveal more about what you are evaluating than any feature list or marketing video.

Read more...
From the editor's desk: When the rules change
Technews Publishing News & Events
         Welcome to the SMART Surveillance & AI Handbook 2026. We were a bit nervous about including AI in the title, since it either has a good or bad reputation depending on the individual – very few people ...

Read more...
Crime behaviour insights more important than ever
Leaderware Editor's Choice Surveillance Training & Education AI & Data Analytics
Behavioural surveillance skills are as essential now as they have ever been, especially in situations where quick evaluation of context is needed. Training operators in behavioural recognition skills is a vital part of control room success.

Read more...
Proactive estate security in Cape Town
neaMetrics OneSpace Technologies Technews Publishing SMART Security Solutions Fang Fences & Guards ATG Digital Editor's Choice News & Events Integrated Solutions Infrastructure Residential Estate (Industry)
SMART Security Solutions started the year with our annual SMART Estate Security Conference in Cape Town on 26 February 2026. Held at Anna Beulah Farm, the conference saw a number of delegates enjoying the farm’s excellent cuisine, while listening to outstanding presenters.

Read more...
How AI video is reshaping real estate security
neaMetrics TRASSIR - neaMetrics Distribution Editor's Choice
Globally, property maintenance and facility operations spending is projected to grow to over US$145 billion by 2034, reflecting rising complexity, compliance pressures, and increased exposure to operational costs. AI systems can protect properties, automate access, and optimise building management.

Read more...
Open systems support hybrid surveillance
SMART Security Solutions Axis Communications SA neaMetrics Editor's Choice
Today, end users can select the most suitable surveillance solution for their needs, whether it is on-site, at the edge, or in the cloud; a hybrid approach combining different options is most effective depending on the scenario.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.