ACaaS should be the industry standard

Issue 2/3 2023 Access Control & Identity Management, Products & Solutions


Ariel Flax.

An access control system without built-in support is like a compass without a needle. You will not get anywhere, says Ariel Flax of ATG Digital, who explains why Access Control as a Service (ACaaS) should be the industry standard.

Most businesses and estates consider physical access control a once-off purchase, paying for additional support as and when needed, but ATG Digital, creators of access control technology At The Gate and ATG Facial, has a different take.

“Access control is hardly ‘set and forget’. It is a daily function of security operations. So, maintenance and support should be as well,” says Flax. “In the wake of rolling blackouts and increasing security threats, having a team that can customise your solution in response to (and even anticipating) identified vulnerabilities is essential.”

ATG Digital recently reported an increase in theft in the logistics sector (indicative of the broader business spectrum) and brought to light how load shedding exacerbates theft. Both reports were compiled using findings from the company’s continual monitoring and reporting across their client portfolio. The data reveals how criminals are advancing in their ability to exploit vulnerabilities. Businesses and residential estates, therefore, need proactive security solutions, which are only possible via ACaaS.

“Analytical data is any security manager’s greatest weapon of defence,” says Flax. “ACaaS means that clients receive 24-hour monitoring, reporting, ongoing support, regular updates, training, and unlimited callouts for a fixed monthly fee.”

He believes that pay-as-you-use support models are outdated, “In these economic times, a business should not have to navigate quotes and POs to keep their access control functioning optimally. There was a time when businesses could get away with once-off installation and forego support contracts, but the pace at which threats evolve demands a readily adaptable system.”

ACaaS should be the status quo, access control providers should differentiate themselves by the quality and expanse of support offered. In the case of At The Gate, for example, customisations to ensure a perfect fit with individual clients’ sites are included.

He advises security companies and managers to look for access control providers that offer integrations, flexibility and data intelligence. “An in-house R&D; team ready to adapt the product according to your needs, or as your security needs progress, is the best option for the long haul.”

For more information, contact ATG Digital, +27 10 500 8611, sales@atthegate.biz, www.atthegate.biz


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

If you cannot prove identity, you cannot claim security
Access Control & Identity Management Information Security
Cybersecurity planning for 2026 is a structural change in how attacks are executed and how trust is exploited, demanding that companies stop layering tools on top of infrastructure and instead prioritise intelligence and identity.

Read more...
Paxton set to launch game-changing new system
Paxton Access Control & Identity Management News & Events
Access control is evolving fast. Installers and end users are looking for systems that are simple to install, easy to manage remotely, and flexible enough to scale. In response, Paxton is exploring how emerging technologies can reshape access control.

Read more...
SWEAR integrates with Milestone
Milestone Systems Surveillance Products & Solutions
Security footage, legal evidence, and other critical surveillance assets face increasing risks of tampering, raising chain-of-custody questions, jeopardising admissibility, and undermining the timely operational decisions that depend on credible video.

Read more...
Proactive estate security in Cape Town
neaMetrics OneSpace Technologies Technews Publishing SMART Security Solutions Fang Fences & Guards ATG Digital Editor's Choice News & Events Integrated Solutions Infrastructure Residential Estate (Industry)
SMART Security Solutions started the year with our annual SMART Estate Security Conference in Cape Town on 26 February 2026. Held at Anna Beulah Farm, the conference saw a number of delegates enjoying the farm’s excellent cuisine, while listening to outstanding presenters.

Read more...
NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...
Cloud security in visitor management and access control
SA Technologies Access Control & Identity Management Infrastructure Residential Estate (Industry) Commercial (Industry)
Cloud has become the default platform for modern security operations, from visitor management portals and remote access control to incident logging, reporting, analytics, and integrations. But “in the cloud” does not mean “someone else is securing it for us”.

Read more...
Centurion raises the bar at HomeSec Expo
Centurion Systems News & Events Access Control & Identity Management Residential Estate (Industry) Smart Home Automation Commercial (Industry)
Centurion Systems unveiled its latest product lines at HomeSec Expo 2026, introducing SMART+, a simpler way for installers and end users to manage their Centurion installations - as well as a few new products.

Read more...
Bringing fire safety closer to home
SafeQuip Fire & Safety Products & Solutions Smart Home Automation
SafeQuip’s latest product launch introduces two compact, disposable fire extinguishers for everyday use, one suitable for Class A, B, and C fires, the other rated for Class A, B and F fires.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
Protecting citizens’ identities: a shared responsibility
Access Control & Identity Management
A blind spot in identity authentication today is still physical identity documents. Identity cards, passports, and driver’s licences, biometric or not, are broken, forged, or misused, fueling global trafficking networks and undermining public trust in institutions.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.