Visual verification raises the security game

SMART Alarm, Intrusion & Perimeter Detection 2024 Editor's Choice, Perimeter Security, Alarms & Intruder Detection

Visual verification is essential for security, as it improves the effectiveness of alarm systems and decreases false alarm rates. By incorporating alarm signals with live surveillance footage, visual verification enables a human observer in a control room (onsite or offsite) to gain a clear understanding of the situation, thereby facilitating informed decision-making (the old story of sending an unarmed guard to confront armed attackers applies).

To find out what general visual verification options there are in our market today, SMART Security Solutions spoke to IDS and Videofied to learn more about how they ‘do’ visual verification. For Videofied, it is a core focus, while for IDS, it is about integrating surveillance and other alarming systems to keep people and assets safe. We spoke to:

• Wynand Beneke, MD of Videofied SA.

• Andrew Walden, Commercial Development Director, IDS.

SMART Security Solutions: How important is visual verification in the alarm industry today? Do armed response companies have the technology to visually verify alarms in their control rooms, and do they use it?

Beneke: Visual verification is increasingly becoming a critical component in the alarm industry due to its ability to enhance the accuracy and reliability of alarm systems. By integrating visual components, such as cameras, into alarm systems, it is possible to provide real-time visual data that can help quickly verify an alarm’s legitimacy, thereby reducing false alarms and improving response times. Armed response companies are indeed utilising this technology, with advanced analytics and monitoring services that enable them to confirm alarms visually and manage security tasks more effectively. This technological advancement supports a more efficient allocation of resources and a faster response to actual security threats.

Walden: Video verification is essential because it leads to quicker response times and prevents armed response officers from wasting time and resources on false alarms. While larger armed response companies utilise video verification, there is limited integration between different alarm monitoring and CCTV monitoring platforms. This type of monitoring is primarily used in corporate, commercial, government, and agricultural sectors.

SMART Security Solutions: What is the difference between specialised visual verification products and using a surveillance camera with analytics?

Beneke: Visual verification from Videofied differs from traditional surveillance cameras with motion detection in several key aspects. Videofied systems prioritise video verification to confirm intrusions, sending a short video clip when the built-in PIR motion sensor is triggered, which allows for immediate verification and rapid response.

On the other hand, standard surveillance cameras with motion detection typically record footage upon detecting movement without immediate verification, which can lead to a delay in response and potential false alarms. Videofied’s approach is designed to provide a quick and verified alert to security personnel, enhancing the chances of timely intervention. Videofied does not require power to operate (the devices are battery-powered), nor does it rely on a fast internet connection.

Walden: AI verification is conducted on the back end, so if communication between the camera and the software is lost, incidents can be missed. Our solutions, provided by the respective camera manufacturers, have AI pick-ups managed on the front end, with management and metadata handled on the back end. This approach is more effective because as soon as the camera communicates with the software, the incident is updated. However, these solutions are typically manufacturer specific.

SMART Security Solutions: What integration capabilities do your solutions have with other alarm products, such as alarm control panels, etc.?

Beneke: Videofied offers a range of integration capabilities with other alarm products, including alarm control panels. Its systems are designed to be versatile, allowing for easy installation and integration with various third-party devices. The control panels can communicate over military-grade RF and to the central station over cellular, Ethernet/IP, or Ethernet/IP with cell backup, providing multiple options for connectivity. Additionally, Videofied’s solutions are suitable for indoor and outdoor use, adaptable to different environments, and scalable to meet the needs of any project of any size.

Walden: The IDS alarm system is integrated with all major alarm communication GSM products, allowing it to communicate with 99% of alarm monitoring platforms. Additionally, IDS offers joint manufacturing integration with OPTEX wireless detectors, meaning we are approved to manufacture our Xwave 2 transmitter onto OPTEX detectors. This integration provides a more effective solution than traditional wireless transmitters with separate inputs.

In simple terms, our solution uses one battery set to power both the detector and the transmitter, allowing for unified battery monitoring. With traditional transmitters, separate batteries are needed for the detector and transmitter, and only the transmitter’s battery is monitored for low power. We are unique in this regard.

SMART Security Solutions: What additional products do you offer besides the visual verification alarm device/s?

Beneke: Videofied offers a range of products designed to enhance security measures for various settings. Apart from the visual verification alarm device, its offerings include control panels that communicate over military-grade RF and to the central station over cellular or Ethernet/IP, with options for cell backup.

It also provides arming devices like alpha keypads, prox tag arming stations, and indoor and outdoor detection devices such as MotionViewers, contact sensors, and sirens. These products are part of the Videofied brand and are intended to work seamlessly with the systems to provide a comprehensive security solution. The integration of these devices aims to offer a versatile security system that can be tailored to the specific needs of a home, office, warehouse, or construction site.

Walden: IDS offers a complete solution through our manufactured products and partnerships. Clients can utilise video verification via the HYYP app, and we provide a full range of beams and detectors from OPTEX, SELCO, and other partners. Additionally, Dahua supplies us with a comprehensive range of radar and camera protection, supported by the high-quality AI capabilities in its product lines.

SMART Security Solutions: How important is it for customers to have an app to view their alarms? If your security service provider can view alarms, why would the customer also need this capability?

Beneke: Providing customers with an app to view their alarms is a significant aspect of modern security services. It empowers customers with direct control over their security systems, offering them real-time access to alerts and the ability to monitor their premises remotely. This enhances the customer’s sense of security and allows for immediate personal response, which can be crucial in emergencies. While security providers monitor alarms, customer access ensures transparency and trust in the service provided, fostering a proactive partnership in maintaining security.

Walden: Video verification from the HYYP platform is essential for reducing false alarm responses, which helps security companies improve response times and reduce costs. Integrated with Dahua, this solution allows customers to receive quick notifications and control their alarm systems remotely via a keypad function on their phones. For example, if a branch falls in front of an outdoor detector and triggers continuous alarms while the client is away on holiday, they can bypass the affected zone from their phone and re-arm the system, ensuring continued functionality until the issue is resolved. This is just one of many reasons why app control has become essential.

SMART Security Solutions: What are the latest products, features, and functionalities you have made available?

Beneke: Videofied launched its 4G control panels in 2022. These new panels are compatible with a power supply or 100% off the grid (Eskom free), making it the only control panel on the market that can operate anywhere without being connected to power. Battery life expectancy is 2 – 4 years. Videofied also launched a new indoor MotionViewer, with a higher quality 10-second video and better images in low light environments. Soon to come will be Videofied’s latest range of panels and detectors. More information will be available towards the end of this year.

Videofied firmly believes that technology is the way of the future, and we need to rely more on technology to keep us safe. Audio fightback solutions and fog solutions are some of the best additions you can make to your security systems. Products like URFOG are ideal for reducing theft and claim a 97% reduction in loss. Criminals can not steal what they can not see.

Walden: IDS continues to expand its product offerings in alarms, intrusion, and perimeter protection with several new and upcoming innovations:

Onyyx wireless hub: The newly introduced Onyyx hub integrates seamlessly with all current wireless detectors, including those from OPTEX. It provides the same benefits as the existing wireless range, ensuring flexibility and ease of installation.

Video verification: Onyyx now offers video verification with Dahua cameras, enhancing the accuracy and efficiency of security monitoring.

Coming soon: The wireless siren, soon to be released, will enhance audible alerts and deterrence, and the wireless relay switch will add functionality and integration options, completing the Onyyx offering.

For more information, contact, IDS, +27 31 705 1373, info@idsprotect.co.za, www.idsprotect.co.za


Credit(s)





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Inaugural Command the Future event in Cape Town
Gallagher News & Events Perimeter Security, Alarms & Intruder Detection
Gallagher Security Africa’s inaugural Command the Future 2025 event was a resounding success, reinforcing Gallagher’s commitment to innovation, collaboration, and long-term growth in Africa’s rapidly evolving security industry.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
From the editor's desk: The beginning of the end
Technews Publishing News & Events
            As we come to the final issue of SMART Security Solutions, we can look back on a tough year: long decision-making cycles, squeezed budgets and the expectation of miracles on a shoestring. SMART Security ...

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
AI and automation are rewriting the cloud security playbook
Technews Publishing AI & Data Analytics
Old-school security relied on rules-based systems that flagged only what was already known. AI flips the script: it analyses massive volumes of data in real-time, spotting anomalies that humans or static rules would miss.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Toxic combinations
Editor's Choice
According to Panaseer’s latest research, 70% of major breaches are caused by toxic combinations: overlapping risks that compound and amplify each other, forming a critical vulnerability to be exploited.

Read more...
Cybersecurity operations done right
LanDynamix SMART Security Solutions Technews Publishing Information Security
For smaller companies, the costs associated with acquiring the necessary skills and tools can be very high. So, how can these organisations establish and maintain their security profile amid constant attacks and evolving technology?

Read more...
VM2 vibration detection monitor
Stafix Security Centres Products & Solutions Perimeter Security, Alarms & Intruder Detection
The JVA VM2 is a perimeter intrusion detection system designed to monitor one or two zones of microphonic (acoustic) cable to detect a perimeter breach through the noise and vibrations created by unauthorised access or vandalism.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.