How smart does your security need to be?

Issue 2/3 2023 Perimeter Security, Alarms & Intruder Detection

Ever-increasing rates of violent crime in South Africa, coupled with the explosion of new smart security technologies leave many people and businesses questioning how to upgrade their systems. Intelligent visual monitoring software, video analytics with artificial intelligence (AI), thermal cameras, biometric scanning and the Internet of Things (IoT) are transforming the level to which we can protect life, limb and property. But how much of this new technology do we really need to build a truly smart security system to keep people, property and possessions safe?

Violent crime

South Africa is, unfortunately, one of the most violent countries in the world. There were over 200 000 home robberies in 2021/22, many of which ended in assault or even murder. In its latest crime statistics, the South African police said almost 40 000 violent robberies took place in the third quarter of 2022 alone, including hijacking and home and bank robberies. Given the high incidence of violent crime, alarm visual verification and being able to monitor security systems and react in real-time has become increasingly important.

Installing the most advanced security technology, particularly remote monitoring, is now much easier thanks to cloud-based software. Artificial Intelligence enables proactive monitoring and video analysis to detect intrusion and filter out nuisance alarms. Sophisticated algorithms can recognise whether the warm body moving along the perimeter of your house, office or warehouse is a cat or an actual intruder.

But what type of smart security is actually needed? And what happens to any legacy systems you may already have installed?

Finding the right solution

South Africa’s towns, cities and compounds are filled with surveillance cameras and security equipment. There are very sophisticated solutions to meet the needs of almost any situation, from a retail store or bank to a remote farmer protecting their livestock, or a warehouse filled to the rafters with expensive stock. Each is a different situation with different needs, different budgets and different legacy systems that need to be considered.

Sometimes PIR-activated cameras are needed. Dark car parks and rural roads may need infrared technology to detect unwanted intruders at night and distinguish between friend or foe. On a well-lit high street, a camera with built-in motion detection technology may negate the need for a PIR. However, do they give you eyes on the site, with access to before and after the event video clips, in under four seconds? Only by bridging a series of intelligent technologies together can the security system become truly smart.

An alarming realisation

When choosing to upgrade security, the old technology can seem redundant, but replacing all that hardware with an expensive state-of-the-art security system can also be hard to justify. That is where OPTEX’s CHeKT can help, by effective ‘joining up’, different systems to turn legacy hardware into smart IoT devices. Users or monitoring services can see exactly what is going on in real-time and deter intruders with lights or warn would-be intruders off site through audio systems. It can deter all would be thieves, while waiting for your security response team.

Cloud cover

Cloud-based software solutions can also provide upgrades to existing security hardware quickly and cost-effectively. OPTEX’s CHeKT uses very secure protocol software and ONVIF standards to integrate several third-party alarms, cameras, video and sensor technologies. It is both backward and forwards compatible, creating an IoT solution that does not need infrastructure upgrades. It can connect different home and business systems to centralised control rooms and monitoring services provided by private security companies.

The level of security that is potentially available today is incredible. But not every business, farmer or homestead needs a hugely expensive new security system. Matching available technology to need is key, and harnessing legacy investment where it can re-utilised is a desired result.

For more information, contact Optex, sales-sa@optex-europe.com, www.optex-europe.com


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Exhibitions across the security spectrum
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
HomeSec Expo has become the security industry’s premier trade event. Visitors will experience a live showcase of how different aspects of the security spectrum come together under one roof.

Read more...
A clear vision for a safer, smarter future
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
With its authoritative lineup of sponsors and exhibitors, HomeSec Expo 2026 embodies an authoritative, yet pragmatic vision, for the security industry. It is a vision that recognises both the urgency of current threats and the excitement of technological innovation.

Read more...
South African counter-drone system completes trials
Products & Solutions Perimeter Security, Alarms & Intruder Detection IoT & Automation
Pretoria-based military engineering company Centauri Technologies has announced that its TriAD counter-drone system successfully completed integrated, multi-layered C-UAS (counter-unmanned aerial system) capability trials in a vehicle-mounted configuration.

Read more...
Navigating a modern, layered security landscape
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
The convergence of perimeter control and access automation is driving demand for solutions that work together. This is the focus of HomeSec Expo 2026, which takes place on 4th and 5th March 2026 at the Gallagher Convention Centre in Johannesburg.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...
2026 Industry Trends Report calls out security’s next opportunity
Integrated Solutions Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Gallagher Security has released its 2026 Security Industry Trends Report, drawing on insights from end users, channel partners, consultants, and technology stakeholders; highlighting a growing opportunity for security to play a more strategic, value-driven role across organisations worldwide.

Read more...
Inaugural Command the Future event in Cape Town
Gallagher News & Events Perimeter Security, Alarms & Intruder Detection
Gallagher Security Africa’s inaugural Command the Future 2025 event was a resounding success, reinforcing Gallagher’s commitment to innovation, collaboration, and long-term growth in Africa’s rapidly evolving security industry.

Read more...
VM2 vibration detection monitor
Stafix Security Centres Products & Solutions Perimeter Security, Alarms & Intruder Detection
The JVA VM2 is a perimeter intrusion detection system designed to monitor one or two zones of microphonic (acoustic) cable to detect a perimeter breach through the noise and vibrations created by unauthorised access or vandalism.

Read more...
Short-range indoor LiDAR sensor
OPTEX Perimeter Security, Alarms & Intruder Detection Infrastructure Products & Solutions
The REDSCAN Lite RLS-1010L has been developed to provide comprehensive coverage and protect high-risk security zones and vulnerable, narrow indoor spaces that are difficult to protect with traditional sensors.

Read more...
Adding AI analytics to security monitoring
News & Events Perimeter Security, Alarms & Intruder Detection Residential Estate (Industry) AI & Data Analytics
SEON has announced its latest integration with Refraime, an AI-powered video analytics platform designed to elevate CCTV surveillance through real-time object detection and intelligent alerting.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.