Global GPS tracking and IoT management platform

Issue 4 2022 Asset Management

Another exhibitor at Securex this year was Gurtam, a company specialising in fleet operations and vehicle management. Gurtam employs over 300 people at its offices in Vilnius, Boston, Dubai and Buenos Aires. Wialon, a telematics and IoT platform, is the flagship product of the company and has over 3.3 million units it is currently tracking in over 150 countries. Wialon is available locally through a number of distributors.


Aliaksandr Kuushynau.

Hi-Tech Security Solutions spoke to Aliaksandr Kuushynau, head of Wialon about the company’s market offerings since South Africa already has a number of local and international fleet management systems and solutions available. To see the scope of the company’s global operations via its cloud-based services, go to https://gurtam.com/en/datacenter. One can also find its current partners at https://gurtam.com/en/dealers.

As an IoT platform, Wialon can track and manage just about anything. As such, when it comes to fleet management it offers the ‘usual’ services such as GPS tracking and operational functionality. However, it also specialises in video, with many mobile recorders and transmitters installed globally. In-vehicle cameras can be set up to handle a range of functions, from surveilling various aspects of the vehicle and can be linked to other IoT services, such as providing video feeds every time the cargo doors are opened, through to providing driver assistance as well as monitoring and scoring.

Naturally, the platform displays its findings on-screen in control rooms, but reports can also be sent to management at regular intervals, or in real time in exceptional circumstances.

BI functionality

The platform includes business intelligence functionality to allow operations managers to obtain an overview of their entire fleet’s performance, or they can drill down to manage each drive and/or vehicle. Additional functionality, such as cold chain monitoring across the supply chain, can also be handled by the service.

Wialon includes a range of video analytics solutions, including those enhanced by AI. For driver safety, for example, the analytics can detect and warn of driver’s sleeping, cell phone usage or unusual behaviours. It can even build a profile of the driver and detect if one is blinking in an unusual manner, which may indicate weariness or some form of stress.

In South Africa, Kuushynau says the service is also used to monitor objects that are meant to be stationary, such as generators or vehicles parked for the night, and raise the alarm if they suddenly start moving. Vehicles can also be geo-fenced, raising an alert if a vehicle leaves its operational area or takes a different route unexpectedly.

IoT functionality can include switching vehicles’ engines off in certain circumstances, or alerting companies if fuel levels dip below a specified level. Any functionality that can be measured by an IoT device can be incorporated and the data can become part of management operations.

A summary of the functionality available on Wialon includes:

• GPS tracking in real time.

• Fuel consumption control.

• Video monitoring.

• Tachograph data analysis.

• Tracker and CAN bus data analysis.

• Geofences for tracking units and events within a specific area.

• Driving behaviour control.

• Maintenance management.

• Prevention of the vehicle and fuel theft.

• Monitoring of cargo transportation conditions.

Channel focus

Kuushynau adds that the company operates via a local channel in order to ensure that regional customers get the service they require from people who understand the environment. While the platform is cloud based, customers still need someone who can install, configure and maintain devices, as well as integrate reports into corporate ERP systems if that is required.

The platform is already integrated into over 690 hardware brands and close on 3000 device models, which makes it simple for partners to offer the best hardware solutions on the market to customers to be monitored and controlled by Wialon.

As part of its white label offering, Gurtam allows partners to use the system under their own brand. And while the platform is cloud based and available globally, partners can also install the platform onsite, depending on their or their customers’ business models.

Find out more at https://gurtam.com/en/wialon


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Driving down fleet management costs
Asset Management Transport (Industry) Logistics (Industry)
As we move into the latter part of the first quarter of 2026, businesses operating fleets can expect expenses to increase from the procurement stage through to termination, due to various local and international factors.

Read more...
Surveillance & AI roundtable
DeepAlert Lytehouse Refraime SMART Security Solutions Technews Publishing Editor's Choice Surveillance Integrated Solutions AI & Data Analytics
SMART Security Solutions held an online roundtable with a few surveillance experts to explore the intersection of surveillance and AI, gaining insights into the market and how control rooms are evolving.

Read more...
SMARTpod talks about HomeSec Expo 2026
SMART Security Solutions Technews Publishing News & Events Residential Estate (Industry) Videos
SMARTpod, the podcast from SMART Security Solutions, finds out more about the upcoming HomeSec Expo happening at Gallagher Estate on 4 & 5 March 2026.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
From the editor's desk: It’s all about data
Technews Publishing News & Events
      Welcome to the SMART Access and Identity Handbook 2026. We have slightly changed the handbook this year, specifically the selection guides, but there is still a lot of industry information inside, and ...

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.