Know where your asset is - not was

Issue 4 and 5 2025 IoT & Automation, Asset Management

Violent crime may be declining in South Africa, according to the latest SAPS statistics, but that is not the case with commercial and business crime. The result is that asset tracking continues to be a service demanded by many companies as they attempt to keep vehicles, parcels and equipment safe.


Norman Parkin.

Unfortunately, asset protection has always told us where an asset is - or was. The sad reality is that knowing where something was stolen most often does not get it back. It certainly does nothing to stop the crime in the first place.

IOTI’s view is that traditional asset protection developed as a stopgap response to South Africa’s exploding crime problem of the 1990s. As a result, almost all current solutions are not effective enough to find an asset once it is gone, or to render it useless to criminals.

To properly prevent loss, companies need the following:

Early warning: The ability to be notified instantly when a parcel, a roller cage, or even something as small as a file is moved or tampered with.

Traceability: Knowing not just the location, but the entire chain of custody—loading, unloading, storage conditions, and handling.

Intelligence: Recording parameters such as temperature, humidity, and impact on the asset, so that the full story of what happened is clear.

When it comes to the above, perhaps the biggest challenge lies in the fact that no technology in the world today is immune to jamming, blocking, or detection. Criminals are sophisticated, and most of us have realised from traditional news sources and social media that the use of jamming devices to disable conventional security and tracking systems is widespread.

Fortunately, opportunity lies in the fact that while jamming can never be eliminated, its impact can be mitigated through clever design. If there was nothing to jam, there would be nothing to scan and no obvious signal to interfere with.

This is the approach IOTI has taken. With our edge processing strategy, we have developed smart electronics with edge processing capabilities. Instead of relying on constant signals that criminals can easily detect, our devices think for themselves. They monitor conditions locally, make decisions at the edge, and only transmit when necessary.

This technology is designed to be undetectable, hard to jam, and capable of turning even the smallest tagged item into a source of intelligence.

This means South African businesses can now benefit from tracking solutions that are affordable enough to be applied to even the smallest items. At the same time, instant alerts are emitted when assets are moved. Combine this with complete event logs of loading, unloading, and handling conditions, coupled with the fact that assets are now both traceable and tamper-evident.

Some implications of this include:

• A logistics company knows immediately if a parcel has been removed from its cage.

• A retailer can monitor not just the movement of goods, but also their condition—temperature, humidity, impact—from warehouse to shelf.

• A bank or government office can secure files or sensitive equipment in a way that makes them unstealable, because once removed, they can be traced back to the source.

• A fleet operator can use E-Seals and asset-level monitoring to cut inspection times, improve security, and protect high-value items, even in transit.

Edge processing is the best way to know if a breach has occurred, while also providing the tools to recover what was taken.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Verification is reshaping South Africa’s labour market
Security Services & Risk Management Asset Management Commercial (Industry)
Hiring faster, trusting less: in a labour market defined by both constraint and potential, the ability to hire with confidence may well become one of the most important competitive advantages.

Read more...
Smarter surveillance in a connected world
Securex South Africa Surveillance IoT & Automation
The security sector is moving rapidly towards integrated, intelligence-led environments. Organisations want systems that communicate with each other, deliver meaningful insight, and support operational efficiency without compromising cybersecurity or privacy.

Read more...
Security’s three defining forces for 2026
Milestone Systems AI & Data Analytics Surveillance IoT & Automation
As we move into 2026, several technology trends that were once mostly confined to research labs and conference keynotes are now becoming part of the daily reality of the security industry.

Read more...
Data privacy best practices for physical security teams
Genetec Surveillance Integrated Solutions IoT & Automation
Physical security systems produce large amounts of information from video footage, access control records, and licence plate data. Recommendations assist organisations in safeguarding sensitive data, while ensuring effective security operations.

Read more...
South African counter-drone system completes trials
Products & Solutions Perimeter Security, Alarms & Intruder Detection IoT & Automation
Pretoria-based military engineering company Centauri Technologies has announced that its TriAD counter-drone system successfully completed integrated, multi-layered C-UAS (counter-unmanned aerial system) capability trials in a vehicle-mounted configuration.

Read more...
Managing access for devices, bots, and systems
Securex South Africa IoT & Automation
South African access control environments are becoming more complex. It is no longer only people who need identities; machines, IoT devices, service accounts, and even AI tools now require secure authentication.

Read more...
CAA-compliant ground drone outsourcing
Surveillance IoT & Automation
South African mines, estates, utility companies, independent power producers, ports, municipalities and others can now own and operate a CAA-compliant drone dock ground station in just six to eight weeks.

Read more...
Top five AIoT trends in 2026
IoT & Automation AI & Data Analytics
As we enter 2026, the convergence of artificial intelligence (AI) and IoT infrastructure is reshaping industries, unlocking unprecedented opportunities to optimise operations, enhance security, and improve sustainability.

Read more...
From digital transformation to digital sovereignty
Security Services & Risk Management IoT & Automation
As cyberthreats grow, data regulations tighten, and AI becomes central to economic competitiveness, countries are recognising the need to control and protect their own digital assets.

Read more...
The IoT is a criminal’s worst nightmare
IoT & Automation
For South Africans who want to stay here and build a better country for our kids, grandkids, friends, and others, the Internet of Things gets us really excited because it enables ‘edge processing’.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.