Mines require proof of performance

SMART Mining Security Solutions 2024 Mining (Industry)

Africa and its deep connection to the continent’s mineral wealth is undeniable. It is a connection that far precedes the impact that colonialism had across the continent in the first wave of mineral and personnel exploitation. This exploitation continued for many decades, while the continent’s wealth was exported with no benefit to the local populace. Slowly, Africa began to benefit from wealth-sharing initiatives.

Some of the colonial practices, sadly, still exist in some parts of Africa, but the drive towards responsible mining practices in the majority of African states takes continuous effort and attention from security managers, IT directors, health & safety executives and compliance officers. The efforts of these teams of people mean that mining is safer than ever, and mining properties are more secure than ever. Now is the time for more efficient processes and accountability.

The relatively hostile environment and remote locations of mining establishments mean that any electronic/technical implementations have to be easily installed, require little or no maintenance and, once commissioned, require no adjustment. These challenges have seen many come, many try, and most fail, while vast sums of money have been squandered in the pursuit of effective solutions.

How do you avoid repeating past mistakes and installing expensive white elephants?

The most common approach is to ask for specific reference sites.

o This is not a very scientific approach because most reference sites cannot be proven and almost definitely cannot be inspected to see what was installed, how it was installed, and if, in fact, it works as specified and the client is happy.

Visit a trade show.

o Speak to very well-dressed and extremely knowledgeable employees who will sell you ideas with a few specifics and convince you that their way is the only way. (It is worth noting I am also one of these people.)

Request a proof of performance.

o The most reliable way to gauge the performance of the manufacturer’s proposal versus your request, thus identifying any expectation gap, is to have a small-scale installation to replicate your larger requirements and use the products and solution in a real-world environment for a period of time before evaluating the results and then making an educated purchasing decision.

You might want to try any of the above, but any combination of the three would help the decision-making process immeasurably.

The most commonly implemented applications in African mining currently involve UHF technology and vehicle-related issues. Fuel, truck loading/unloading and vehicular movement onsite. UHF is a tricky technology to get right because of its susceptibility to environmental conditions, but if installed correctly can be one of the greatest assets a mine can have onsite. Completely passive technology provides 100% reading 100% of the time. Request a proof of performance and see first hand what is possible.

For more information, contact STid, Jethro Lakin, jethro.lakin@stid.com, John Lakin, john.lakin@stid.com, www.stid-security.com


Credit(s)





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

SMARTpod talks about HomeSec Expo 2026
SMART Security Solutions Technews Publishing News & Events Residential Estate (Industry) Videos
SMARTpod, the podcast from SMART Security Solutions, finds out more about the upcoming HomeSec Expo happening at Gallagher Estate on 4 & 5 March 2026.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
From the editor's desk: It’s all about data
Technews Publishing News & Events
      Welcome to the SMART Access and Identity Handbook 2026. We have slightly changed the handbook this year, specifically the selection guides, but there is still a lot of industry information inside, and ...

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
Holding all the cards
neaMetrics Suprema SMART Security Solutions Technews Publishing Access Control & Identity Management
After so many years of offering alternatives to card technology for access control, one could be forgiven for assuming we are all using biometrics or mobile credentials for all our physical and digital access requirements.

Read more...
From the editor's desk: The beginning of the end
Technews Publishing News & Events
            As we come to the final issue of SMART Security Solutions, we can look back on a tough year: long decision-making cycles, squeezed budgets and the expectation of miracles on a shoestring. SMART Security ...

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.