Enhancing innovation with training

Issue 5 2023 Editor's Choice

Innovation is a word we use far too frequently today to describe any advances in technology or new products, even for simple updates. However, while innovation is key to the success of any company in the security market, whether they develop hardware, software or services, or a combination of the three, ensuring those who sell and support your product are able to promote and support the brand name is critical.

If your distribution channel, whether an installer or integrator, is unable to install and configure correctly, as well as keep it running, the bad reviews always come back to the brand name in question – irrespective of what may have caused the problem. This is why Impro Technologies puts a significant focus on training its partners and ensuring they are able to do the brand proud.

Retha Nieuwoudt, who’s been the Training Manager at Impro for 12 years explains, “Having professional, competent and skilled partners throughout the channel builds not only on our partners’ brand, but that of Impro Technologies too. Impro was founded in 1986 and our focus has always been on forging long-term business partnerships. Critical to this is continually training and upskilling our business partners as our systems and technology evolved over the years, and this remains a core value within Impro Technologies.”

She adds that with Impro access control systems covering an enormous range of applications, from basic access control, to multi-site enterprise solutions with numerous third-party integrations, the demand for quality technical installations and support by its partners is key to the continual success of all involved. “Having Impro as their product partner with a dedicated training department and technical support team is our commitment to both the end customer as well as to our valuable business partners.”

Why training and certification?

It is no surprise to anyone that technical skills are in short supply in South Africa, and with the current economy, people may want to offer installation services without having the proper skillset. “Specialised technical skillsets within South Africa are highly sought after,” adds Nieuwoudt, “and installers that can demonstrably highlight these valuable resources when interacting with clients can immediately differentiate their company from their competitors and that is definitely a tangible competitive advantage.”

She adds that successful companies with a professional focus understand the value of continual investment and improvement of their employees and certified training is one of the crucial ways to achieve this. Moreover, often project tenders and RFQs (Request for Quotations) specifically highlight the requirement that companies be certified on the systems to be installed.

“When installers are competent and confident on the Impro systems they are installing or maintaining, there are a multitude of cost savings that they can obtain, such as efficient system design, less time spent on-site installing and commissioning, streamlining and simplifying operator processes (in terms of simplicity and ease of use), and less time spent on fault finding.”

She also adds that poorly installed equipment, both visually and technically, plus time taken to get a system fully functional as per the project scope, is often highlighted and commented on through social media and within industry forums.

Courses Impro offers

Nieuwoudt says that Impro provides comprehensive sales, and technical and operator/end user training programmes. These include:

A. Technical Certified Training

Level 1: The primary level consists of Access Portal hardware installation and optimum cabling course. This is a practical cabling course for all Access Portal products and forms an essential basis for the levels that follow.

Level 2: The intermediate level consists of basic installer software configuration for Access Portal systems including the application of diagnostic tools to ascertain whether the hardware and cabling installation adheres to Impro installation standards and best practices.

Level 3: The comprehensive level consists of training on biometric integration on the Access Portal systems. It covers third-party products such as HID, IDEMIA, Suprema, Hikvision, Nedap and Aperio.

Level 4: The expert level encompasses advanced and comprehensive Access Portal system configurations, which includes virtual hardware, advanced zone configuration, interlocking, customisation and more.

B. Operator/End User Training

This training is specifically tailored to the client’s on-site application and allows their team to optimise and fully understand the full range of features and benefits they can extract from their Impro access control system.

C. CPD (Continuous Professional Development) Training

Impro’s CPD training course targets consulting engineers, architects and similar professionals looking to update their access control knowledge, acquire CPD points and maintain their professional status.

The specially designed CPD course takes place over four hours, and enables attendees to:

• Plan, design and specify an access control solution.

• Understand the integration options and benefits.

• Upgrade or migrate existing legacy solutions.

An assessment and/or exam is undertaken at the end of all training to ensure competency and certification. Delegates passing all modules, will receive their Impro certification (a certificate is issued). This certification is valid for 18 months and allows their clients to have the confidence in their Impro partner or installer in terms of keeping up to date with the latest designs and system improvements when undertaking projects or maintaining their Impro access control systems.

“We offer certified classroom training in Cape Town, Johannesburg and KZN,” ends Nieuwoudt. Customers can visit https://www.impro.net/training-centre/ for the training schedule.


Credit(s)





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
From the editor's desk: The beginning of the end
Technews Publishing News & Events
            As we come to the final issue of SMART Security Solutions, we can look back on a tough year: long decision-making cycles, squeezed budgets and the expectation of miracles on a shoestring. SMART Security ...

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
AI and automation are rewriting the cloud security playbook
Technews Publishing AI & Data Analytics
Old-school security relied on rules-based systems that flagged only what was already known. AI flips the script: it analyses massive volumes of data in real-time, spotting anomalies that humans or static rules would miss.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Toxic combinations
Editor's Choice
According to Panaseer’s latest research, 70% of major breaches are caused by toxic combinations: overlapping risks that compound and amplify each other, forming a critical vulnerability to be exploited.

Read more...
Cybersecurity operations done right
LanDynamix SMART Security Solutions Technews Publishing Information Security
For smaller companies, the costs associated with acquiring the necessary skills and tools can be very high. So, how can these organisations establish and maintain their security profile amid constant attacks and evolving technology?

Read more...
Is your entrance security secure?
SMART Security Solutions Centurion Systems Technews Publishing News & Events Access Control & Identity Management Smart Home Automation
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security.

Read more...
The impact of AI on security
Technews Publishing Information Security AI & Data Analytics
Today’s threat actors have moved away from signature-based attacks that legacy antivirus software can detect, to ‘living-off-the-land’ using legitimate system tools to move laterally through networks. This is where AI has a critical role to play.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.