Has anything changed?

April 2013 Perimeter Security, Alarms & Intruder Detection

Intruder detection and alarm monitoring goes back many years. So has anything changed? Are we seeing technologies such as surveillance and video verification, coming to the fore or is this reserved for wealthier clientele? Hi-Tech Security Solutions asked Videofied MD, Wynand Beneke and Elvey Security Technologies’ regional sales manager, Tinus Jansen van Vuuren, about the current trends in the market.

Wynand Beneke
Wynand Beneke

“The intruder and alarm market has been a very conservative industry over the past 15 to 20 years. However, we have recently seen a broad acceptance of wireless technology and visual verification. There are also more manufacturers introducing new products to South Africa, whereas in the past only a handful of suppliers dominated the market. This will have a huge impact on pricing and is definitely moving the industry forward to more advanced IP-based technologies, utilising bi-directional wireless transmission,” says Beneke.

“The main challenge of the alarm monitoring and intruder industry is the extremely high rate of false, unverified alarms. The cost of these false alarms is very high and lead to a slower response.”

Some new products are tackling the actual cause of the problem; that is, poor detection and the absence of verification. Historically, most suppliers were tackling only the consequences of the issue. The advance of new technologies, with better detection and built-in verification, is very welcome.

Tinus Jansen van Rensburg
Tinus Jansen van Rensburg

Jansen van Vuuren believes that there is an increasing focus on wireless detection and App-related technology. “CCTV surveillance, previously predominantly in the domain of the commercial sector, is gaining popularity and acceptance in the domestic market. Likewise, we are seeing more domestic installations utilising mobile DVRs and anti-vandal domes for intruder detection.”

“With the introduction of a wider range of perimeter security products, the market has become very competitive and the benefits of choice and cost-effectiveness are passed on to the consumer. We have seen the advent of mobile App solutions that provide the consumer with pre-warning and allow them to interact with other solutions.”

Not too long ago, an invisible boundary wall existed only in story books, but today it is a reality. Used with great effect to prevent criminals from gaining access to private premises, its photo beam sensors create an invisible fence and will trigger an alarm in the event of a breach, thereby ensuring the heightened protection of people, products and vehicles.

The tough economic environment and the huge increase in fuel costs have had a direct impact on the cost of response. Add to this the upcoming increase in the wages of the registered security officers and it is obvious that many players in the market would wish to investigate new solutions. These new solutions are bi-directional wireless, spread spectrum radio and voice-video integration. Products that do not rely on Eskom-generated power, such as the new military-grade battery-powered products with an energy supply of up to four years, are also gaining market share.

What about CCTV?

Neither Beneke nor Jansen van Vuuren believes that CCTV surveillance is a good solution for intruder detection. “There are definitely plenty of great high-end cameras providing some very impressive quality videos, but from a monitoring perspective, CCTV is very limited. The big players of our alarm industry can monitor hundreds of thousands of alarm systems. You can only monitor a very limited number of CCTV with the same infrastructure,” Beneke clarifies.

Integrated systems

People do explore the possibility of integrated security systems, but the mere cost of such systems makes them affordable only for the wealthy. Some service providers do provide full system integrations, but the target client base is limited.

“IP integration is definitely happening. Most new transmitters are now IP, either via Ethernet or GPRS. There is still no broadly accepted protocol for alarm IP transmission and providers bring their own protocol/software to the table. However, most of the newer IP systems are integrated with local monitoring software such as Oryx-Listener, Watch Manager, QTWatch and Patriot. Likewise, video verification is becoming a necessity,” said Beneke.

Jansen van Vuuren believes that IP integration is still isolated to the industrial/commercial or high-income private consumer markets.

Peanuts and monkeys

Are security companies promoting the right technology or is it still a matter of palming off the cheapest system?

“After years of suffering the consequences of cheap solutions, our local end users have become very educated when it comes to the issue of low-cost intruder alarm systems. Problems faced include false alarms, lightning damage and poor response. Promoting the right technology is the best way to differentiate your company in the market, especially because the right technology is now affordable to a broader audience,” says Beneke.

“Unfortunately, security is still considered by the consumer to be a grudge purchase and as such, they are not prepared to spend any more money on it than they need to. Affordability and simplicity are the predominant factors for the average domestic consumer. However, a reputable security service provider can offer customised solutions that will provide excellent results without exceeding the budget. Service providers need to sell the benefits of new, more reliable technology to their clients. By strategically subsidising this new technology, they are able to pass the money saved on false alarm reductions on to their clients in the form of more reliable systems,” Jansen van Vuuren concludes.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Banking’s AI reckoning
Commercial (Industry) Surveillance Access Control & Identity Management Fire & Safety Perimeter Security, Alarms & Intruder Detection Information Security Asset Management News & Events Integrated Solutions Infrastructure Security Services & Risk Management Education (Industry) Entertainment and Hospitality (Industry) Financial (Industry) Healthcare (Industry) Industrial (Industry) Mining (Industry) Residential Estate (Industry) Retail (Industry) Transport (Industry) Conferences & Events Products & Solutions Associations Videos Training & Education Smart Home Automation Agriculture (Industry) Logistics (Industry) AI & Data Analytics Facilities & Building Management IoT & Automation Power Management
From agentic commerce disputes to quantum-powered risk modelling, SAS experts offer a ‘banker’s dozen,’ 13 industry-defining predictions that will separate institutions that master intelligent banking from those still struggling with the basics.

Read more...
2026 Industry Trends Report calls out security’s next opportunity
Integrated Solutions Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Gallagher Security has released its 2026 Security Industry Trends Report, drawing on insights from end users, channel partners, consultants, and technology stakeholders; highlighting a growing opportunity for security to play a more strategic, value-driven role across organisations worldwide.

Read more...
Inaugural Command the Future event in Cape Town
Gallagher News & Events Perimeter Security, Alarms & Intruder Detection
Gallagher Security Africa’s inaugural Command the Future 2025 event was a resounding success, reinforcing Gallagher’s commitment to innovation, collaboration, and long-term growth in Africa’s rapidly evolving security industry.

Read more...
From the editor's desk: The beginning of the end
Technews Publishing News & Events
            As we come to the final issue of SMART Security Solutions, we can look back on a tough year: long decision-making cycles, squeezed budgets and the expectation of miracles on a shoestring. SMART Security ...

Read more...
AI and automation are rewriting the cloud security playbook
Technews Publishing AI & Data Analytics
Old-school security relied on rules-based systems that flagged only what was already known. AI flips the script: it analyses massive volumes of data in real-time, spotting anomalies that humans or static rules would miss.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Cybersecurity operations done right
LanDynamix SMART Security Solutions Technews Publishing Information Security
For smaller companies, the costs associated with acquiring the necessary skills and tools can be very high. So, how can these organisations establish and maintain their security profile amid constant attacks and evolving technology?

Read more...
VM2 vibration detection monitor
Stafix Security Centres Products & Solutions Perimeter Security, Alarms & Intruder Detection
The JVA VM2 is a perimeter intrusion detection system designed to monitor one or two zones of microphonic (acoustic) cable to detect a perimeter breach through the noise and vibrations created by unauthorised access or vandalism.

Read more...
Short-range indoor LiDAR sensor
OPTEX Perimeter Security, Alarms & Intruder Detection Infrastructure Products & Solutions
The REDSCAN Lite RLS-1010L has been developed to provide comprehensive coverage and protect high-risk security zones and vulnerable, narrow indoor spaces that are difficult to protect with traditional sensors.

Read more...
Is your entrance security secure?
SMART Security Solutions Centurion Systems Technews Publishing News & Events Access Control & Identity Management Smart Home Automation
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.