Enhancing innovation with training

Issue 5 2023 Editor's Choice

Innovation is a word we use far too frequently today to describe any advances in technology or new products, even for simple updates. However, while innovation is key to the success of any company in the security market, whether they develop hardware, software or services, or a combination of the three, ensuring those who sell and support your product are able to promote and support the brand name is critical.

If your distribution channel, whether an installer or integrator, is unable to install and configure correctly, as well as keep it running, the bad reviews always come back to the brand name in question – irrespective of what may have caused the problem. This is why Impro Technologies puts a significant focus on training its partners and ensuring they are able to do the brand proud.

Retha Nieuwoudt, who’s been the Training Manager at Impro for 12 years explains, “Having professional, competent and skilled partners throughout the channel builds not only on our partners’ brand, but that of Impro Technologies too. Impro was founded in 1986 and our focus has always been on forging long-term business partnerships. Critical to this is continually training and upskilling our business partners as our systems and technology evolved over the years, and this remains a core value within Impro Technologies.”

She adds that with Impro access control systems covering an enormous range of applications, from basic access control, to multi-site enterprise solutions with numerous third-party integrations, the demand for quality technical installations and support by its partners is key to the continual success of all involved. “Having Impro as their product partner with a dedicated training department and technical support team is our commitment to both the end customer as well as to our valuable business partners.”

Why training and certification?

It is no surprise to anyone that technical skills are in short supply in South Africa, and with the current economy, people may want to offer installation services without having the proper skillset. “Specialised technical skillsets within South Africa are highly sought after,” adds Nieuwoudt, “and installers that can demonstrably highlight these valuable resources when interacting with clients can immediately differentiate their company from their competitors and that is definitely a tangible competitive advantage.”

She adds that successful companies with a professional focus understand the value of continual investment and improvement of their employees and certified training is one of the crucial ways to achieve this. Moreover, often project tenders and RFQs (Request for Quotations) specifically highlight the requirement that companies be certified on the systems to be installed.

“When installers are competent and confident on the Impro systems they are installing or maintaining, there are a multitude of cost savings that they can obtain, such as efficient system design, less time spent on-site installing and commissioning, streamlining and simplifying operator processes (in terms of simplicity and ease of use), and less time spent on fault finding.”

She also adds that poorly installed equipment, both visually and technically, plus time taken to get a system fully functional as per the project scope, is often highlighted and commented on through social media and within industry forums.

Courses Impro offers

Nieuwoudt says that Impro provides comprehensive sales, and technical and operator/end user training programmes. These include:

A. Technical Certified Training

Level 1: The primary level consists of Access Portal hardware installation and optimum cabling course. This is a practical cabling course for all Access Portal products and forms an essential basis for the levels that follow.

Level 2: The intermediate level consists of basic installer software configuration for Access Portal systems including the application of diagnostic tools to ascertain whether the hardware and cabling installation adheres to Impro installation standards and best practices.

Level 3: The comprehensive level consists of training on biometric integration on the Access Portal systems. It covers third-party products such as HID, IDEMIA, Suprema, Hikvision, Nedap and Aperio.

Level 4: The expert level encompasses advanced and comprehensive Access Portal system configurations, which includes virtual hardware, advanced zone configuration, interlocking, customisation and more.

B. Operator/End User Training

This training is specifically tailored to the client’s on-site application and allows their team to optimise and fully understand the full range of features and benefits they can extract from their Impro access control system.

C. CPD (Continuous Professional Development) Training

Impro’s CPD training course targets consulting engineers, architects and similar professionals looking to update their access control knowledge, acquire CPD points and maintain their professional status.

The specially designed CPD course takes place over four hours, and enables attendees to:

• Plan, design and specify an access control solution.

• Understand the integration options and benefits.

• Upgrade or migrate existing legacy solutions.

An assessment and/or exam is undertaken at the end of all training to ensure competency and certification. Delegates passing all modules, will receive their Impro certification (a certificate is issued). This certification is valid for 18 months and allows their clients to have the confidence in their Impro partner or installer in terms of keeping up to date with the latest designs and system improvements when undertaking projects or maintaining their Impro access control systems.

“We offer certified classroom training in Cape Town, Johannesburg and KZN,” ends Nieuwoudt. Customers can visit https://www.impro.net/training-centre/ for the training schedule.


Credit(s)





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
From the editor's desk: It’s all about data
Technews Publishing News & Events
      Welcome to the SMART Access and Identity Handbook 2026. We have slightly changed the handbook this year, specifically the selection guides, but there is still a lot of industry information inside, and ...

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
Holding all the cards
neaMetrics Suprema SMART Security Solutions Technews Publishing Access Control & Identity Management
After so many years of offering alternatives to card technology for access control, one could be forgiven for assuming we are all using biometrics or mobile credentials for all our physical and digital access requirements.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.