Specialised surveillance and communications

Issue 5 2022 Editor's Choice, News & Events, Integrated Solutions, Residential Estate (Industry)

Communications are the backbone of security, and a fairly new company on the security scene in South Africa is Arcanum Africa. The company sells a range of products not typically found in the local security market, most of which were developed for military or intelligence use.


Hi-Tech Security Solutions spoke to Arcanum’s Peter Stolwerk and Aaron van Schaik to find out a bit more about the company and the products it is bringing to the local market.

Stolwerk explains that his background is in military and law enforcement work in Europe and the UK, which has enabled him to gain exposure to these solutions, none of which have been available in South Africa before. The range of products is continually growing, but Stolwerk and Van Schaik highlighted a few that have already proved their worth in the local arena. The products are generally aimed at private security, commercial security and wildlife protection.

The first product is uSwitch, which Stolwerk describes as a “relay on steroids.” This little box provides users with control over almost anything on a network (whether a private network or connected to the Internet) in a couple of minutes.

uSwitch is an electromechanical relay with a built-in web server that allows you to switch things on or off, or open and close gates, and more, from a computer or mobile device. In an environment with many IP cameras, connecting cameras to the uSwitch monitors the cameras around the clock. If a camera freezes or becomes unresponsive, the system will automatically trigger a reboot without having to physically go to the camera – which is useful in covert operations, or to save time and money to send out a service vehicle at a remote location. Rebooting can also be done manually.

In remote regions, like game farms or mining sites without cellular connectivity, the uSwitch works just as well on a private network that has no Internet connectivity.

Failsafe mesh network

Another communications solution the company offers is HyphaMesh. These devices communicate with each other and form a mesh network in almost any setting. Whether tethered to a fixed position or on a person, the Hypha devices communicate with each other and are able to find another route to a bridge or switch if one device goes down. The bridge is a Hypha device that is connected to a satellite or GSM network, allowing the whole network to function as if everything were connected.

In a situation like this, every individual carrying a device (for example) will be able to use their phone or tablet as if they were in an area of connectivity. It is also possible to create a private network that does not have Internet access, allowing the Hypha devices to create and use their own network for communications. Each device is pre-programmed to search for other devices and automatically become a node in the network.

Arcanum also provides a range of surveillance cameras that can be used in a mesh network in remote areas. The battery power on one of these cameras will last about 400 days before it needs a recharge (unless it has a solar charger). The cameras can communicate via 4G connections, or to a bridge or hub (at a distance of up to 500 m as long as it has line-of-sight; less if there is dense bush or some other obstacle in the way).

To save bandwidth, the cameras take high-resolution images when the PIR detects movement and sends these to the hub, where the AI analytics will determine if the images contain a person, vehicle or other object of interest. In anti-poaching efforts, this will prevent false alarms when animals walk in front of the cameras, only raising an alert when a person or vehicle is identified.

Arcanum says these cameras take only 10 minutes to install and one can have up to eight cameras per bridge, and multiple bridges. They also include low-light functionality up to about 35 m, with up to 80 m in daylight with a clear view.

All communications are secure by default, encrypted according to the AES-128 (128-bit encryption) standard. In addition, any images stored on the devices will be similarly encrypted.

Just off the boat

Among other ‘toys’ Arcanum has released, or will be releasing shortly, are artificial intelligence solutions (including for drones), as well as a jamming detector that alerts you if someone decides to jam your wireless communications network. The anti-jamming device is very sensitive, so companies will know the moment a jamming operation begins.

Arcanum is also selling Camect, touted as the most private camera hub for your home. The Camect hub detects IP surveillance devices installed in your home and takes control of them. It includes a range of AI algorithms to differentiate between people, pets, cars, bicycles and others. It is controllable from a computer, smartphone or tablet, allowing users to set zones and times when alerts should be raised.

Camect allows you to view live and recorded video from your mobile device, and is compatible with a host of cameras, including ONVIF-conformant devices (or it can access the RTSP stream). All of this is managed from one hub.

Arcanum currently sells direct to end-users, but is open to partnerships with companies that have the required skills to support its product range effectively.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
From the editor's desk: The beginning of the end
Technews Publishing News & Events
            As we come to the final issue of SMART Security Solutions, we can look back on a tough year: long decision-making cycles, squeezed budgets and the expectation of miracles on a shoestring. SMART Security ...

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
AI and automation are rewriting the cloud security playbook
Technews Publishing AI & Data Analytics
Old-school security relied on rules-based systems that flagged only what was already known. AI flips the script: it analyses massive volumes of data in real-time, spotting anomalies that humans or static rules would miss.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Toxic combinations
Editor's Choice
According to Panaseer’s latest research, 70% of major breaches are caused by toxic combinations: overlapping risks that compound and amplify each other, forming a critical vulnerability to be exploited.

Read more...
Global Threat Intelligence Report for October 2025
Information Security News & Events
Africa was pipped to the post as the most attacked region by Latin America, which averaged 2966 attacks per organisation per week (+16% YoY). Africa followed with (2782, – 15%) and APAC (2703, – 8%).

Read more...
Is your entrance security secure?
SMART Security Solutions Centurion Systems Technews Publishing News & Events Access Control & Identity Management Smart Home Automation
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security.

Read more...
The impact of AI on security
Technews Publishing Information Security AI & Data Analytics
Today’s threat actors have moved away from signature-based attacks that legacy antivirus software can detect, to ‘living-off-the-land’ using legitimate system tools to move laterally through networks. This is where AI has a critical role to play.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.