The services model adds value

Access & Identity Management Handbook 2022 Editor's Choice, Access Control & Identity Management, Integrated Solutions, Infrastructure

Cloud computing in all its forms, along with the related services gets an enormous amount of attention today. The whole idea of cloud also causes some confusion among users. Some see cloud as simply an online mechanism to store data, but the reality is cloud today represents far more than a remote backup. The concept of services is key in this respect and we have many ‘as-a-service’ acronyms doing the rounds, from Software-as-a-Service (SaaS) to platforms (PaaS) and so on.

But what do companies mean when offering a cloud service? To understand the concept as well as the benefits of the cloud, Hi-Tech Security Solutions asked Gary Chalmers, CEO of iPulse, to tell us the story of how and why iPulse moved from a biometric hardware manufacturer to a cloud-based identity management company. We also asked Chalmers how iPulse benefited from this change, what challenges it faced, as well as about the benefits and additional value the new model offers the company’s customers.


Gary Chalmers.

To be clear, iPulse still builds its own access control readers (focused on fingerprint biometrics, for now), but it has moved its business away from hardware sales to selling a service. As Chalmers explains, “As a hardware-only company based in South Africa, it became harder to compete against the cheaper products coming in from the Far East and the only competitive edge became margin-driven rather than quality- or performance-driven. We wrote our own software, but the burden of support for locally installed software made it a loss-leading business for us.

“By moving to cloud, we were able to reduce our on-site support by over 95% within the first six months and to offer significantly enhanced uptime and service to our clients. By incorporating our own hardware ‘free’ as part of the service or solution, we are further able to differentiate ourselves by guaranteeing the entire solution from end-to-end and backing our own quality when we offer ‘lifetime’ support on the hardware as part of the overall solution.”

Readers can find out more about Chalmers’ background and the current focus of iPulse at www.securitysa.com/11894r and www.securitysa.com/12236r.

So what is the business model?

Obviously, manufacturing biometric readers and continually developing and refining the software that runs them costs money, as does paying for cloud services and the staff required to support the company’s customers. What then is the business model iPulse implements to pay for all this and hopefully make enough of a profit to grow the company?

Adding to his comments above, Chalmers states that iPulse now offers a complete solution ‘as-a-service’. “This includes the installation, configuration, training, hardware, software, support, maintenance and hosting and is offered as a monthly service fee to clients. Clients are able to pay for these solutions as a pure operational expense (opex), which is interest free, or with an upfront capital expenditure (capex) payment for hardware and installation and then a lower monthly fee that covers everything else.”

The model lends itself to flexibility. A customer can pay a monthly fee and own the hardware after a number of years or keep paying for the service and have its readers refreshed every few years. However, the idea of ownership of the devices is the wrong way to look at a service offering (from any company).

The traditional model (or dare we say ‘old-fashioned’ model) of business was that a customer would buy security equipment, whether from cash reserves or a loan of some sort and then pay for an SI to design and install the system. Maintenance contracts were another expense that some companies avoid, but they can assist in ensuring the installation works properly over the medium- to long-term.

The idea of a service is that you pay for the service. Whether it is Internet connectivity or security guards or access control, the customer makes use of the service and the supplier provides the service and everything incorporated into that service at a single cost. When the service does not work, it’s the supplier’s problem as the customer is not involved in hiring guards or technicians or even the brand of technology used. The service provider can use the cheapest technology on the market if it so chooses, but they are responsible for keeping it working, often with clawback agreements should the service fail for whatever reason.

A different client relationship

The client/supplier relationship therefore changes under the services model. Chalmers says the biggest value-add for having a cloud-based business rather than a hardware business is the nature of support with clients. “Hardware almost always requires on-site support and physical maintenance, whilst cloud is typically supported remotely and often automatically with AI-driven algorithms to monitor uptime and potential issues.

“To offer physical support, you need resources wherever your clients are situated geographically and the costs of sending someone out in a vehicle, with petrol, time, insurance and tools has escalated dramatically over the past decade. It is the savings on the cost of this support that drives the prices down, thereby giving customers exponential value in price and service.”

iPulse has a monitoring centre where its staff monitors the ‘health’ of their devices wherever they are located over the Internet. Most traditional support calls can be solved remotely from the monitoring centre, often before the client realises there is a problem. In the few cases where the problem can’t be solved remotely, iPulse simply sends a technician to replace the faulty reader and worries about repairing it later. This ensures little to no downtime for the client.

The client’s only responsibility in this service is to ensure they have Internet connectivity. When the Internet is down or Eskom breaks the power supply, the readers will continue working (as each company’s access data is synchronised to the reader). When connectivity is restored, the devices synchronise to the cloud and vice versa if there are updates for firmware etc.

“All of our devices are installed with power supplies that have battery backup and function perfectly in an offline mode,” says Chalmers. “This allows the solution to continue operating when power is off, then when the power comes back on, the battery recharges and the data stored locally is batch uploaded to the cloud. The biggest issue lies in creating a regular maintenance schedule for the batteries in the devices and power supplies, as with all this load-shedding the life expectancy of these batteries reduces substantially faster than under normal operating conditions.”

As good as it may sound, there are challenges involved in moving to a service model. Companies are used to the whole ‘ownership thing’ (which they can also have in iPulse’s model). “Migrating was tough initially,” adds Chalmers. “Trying to convince customers that cloud was safe for access control was an uphill battle at first, but this has changed radically over the past five years since our journey began and clients are now initiating this requirement, which is fantastic.”

The PoPIA Act was another concern among customers as they are responsible for the information of staff and visitors accessing their premises. However, Chalmers notes, “these days, most companies are comfortable that online data storage is acceptable, provided it follows a few general rules, like being stored locally in the country where the data is generated. Since Microsoft Azure has two local data centres in South Africa, this is easily possible for our clients, with even their backup data being stored within the country’s borders at the second failover site.”

The value-added options of a service

As with many other services in various vertical markets, the Access Control-as-a-Service (ACaaS) model allows for more value to be extracted and analysed from what used to be boring ‘in and out’ data. A simple example, used in services and traditional business models, is time and attendance. In this case the data is stored remotely in the cloud and can automatically feed the client’s payroll application, making use of biometrics to cut out buddy-clocking etc.

Even without the additional value mentioned, Chalmers states that the key value-add services “are typically based on significant uptime improvements, pre-emptive maintenance as our team is able to monitor the clients’ sites and often notifies clients of issues before they are even aware of them, or even better, fixes them before the client even knows there is a problem. Remote support, training and troubleshooting offers huge value to the client over time, as the cost of call-outs and site visits which often used to drive the TCO (total cost of ownership) up substantially over the lifetime of the product) is now reduced, whilst the ‘all-in’ offering we now employ allows for free support and maintenance to be built into the controlled monthly fee.”

Having proven the value of the service model and gaining clients in South Africa and abroad, Chalmers says iPulse’s goal is to “drive expansion in the South African market, concentrating on expanding our market share in key verticals, whilst also partnering with large organisations both in South Africa, the USA and UK to drive expansion into other markets – both geographic and segment-wise.”


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
From the editor's desk: The beginning of the end
Technews Publishing News & Events
            As we come to the final issue of SMART Security Solutions, we can look back on a tough year: long decision-making cycles, squeezed budgets and the expectation of miracles on a shoestring. SMART Security ...

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
AI and automation are rewriting the cloud security playbook
Technews Publishing AI & Data Analytics
Old-school security relied on rules-based systems that flagged only what was already known. AI flips the script: it analyses massive volumes of data in real-time, spotting anomalies that humans or static rules would miss.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Toxic combinations
Editor's Choice
According to Panaseer’s latest research, 70% of major breaches are caused by toxic combinations: overlapping risks that compound and amplify each other, forming a critical vulnerability to be exploited.

Read more...
Cybersecurity operations done right
LanDynamix SMART Security Solutions Technews Publishing Information Security
For smaller companies, the costs associated with acquiring the necessary skills and tools can be very high. So, how can these organisations establish and maintain their security profile amid constant attacks and evolving technology?

Read more...
Short-range indoor LiDAR sensor
OPTEX Perimeter Security, Alarms & Intruder Detection Infrastructure Products & Solutions
The REDSCAN Lite RLS-1010L has been developed to provide comprehensive coverage and protect high-risk security zones and vulnerable, narrow indoor spaces that are difficult to protect with traditional sensors.

Read more...
Direct-to-cloud surveillance platform
Surveillance Infrastructure
Oncam has announced a forthcoming end-to-end, direct-to-cloud video platform that combines AI-enabled cameras, intelligent IoT devices, and cloud-integrated video management software to deliver smarter performance with reduced complexity.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.