Leasing perimeter security

August 2015 Editor's Choice, Perimeter Security, Alarms & Intruder Detection

A full maintenance lease is defined as a lease where the lessor accepts full responsibility for the supply, installation, maintenance and insurance of the equipment for the duration of the lease. Depending on the contract signed, at the end of the lease the customer may keep the equipment installed (or some of it), or it may revert to the lessor.

Chris Lovemore, CEO of ELF Rentals says this model lends itself well to the supply of perimeter security equipment for the following reasons:

1. If the service provider who installs the system is also accountable and responsible for the maintenance of the system, they will suffer the consequences of poor installation workmanship or inferior materials and not the client.

2. Should the service provider not perform his maintenance obligations correctly, the client has the authority to withhold payments, including those relating to the capital outlay.

3. Should there be an insurance issue, the service provider is able to immediately respond and install new equipment and process the claim.

4. Most manufacturers guarantee equipment for a maximum of one year. The full maintenance lease provides for a longer term warranty of the equipment at the service provider’s risk, providing a fixed budget for the client for the full duration of the contract.

5. A dedicated and committed service provider who has invested their capital and resources into a client’s premises develops good skills in maintaining the systems, which benefits the client.

6. The depreciating nature of perimeter systems as well as the rapid advance in technology means that these systems need to be upgraded at least every five years. A full maintenance lease is able to provide adequately for the continuation of service and the upgrading of equipment at required intervals.

For more information contact Elf Rentals, +27 (0)41 368 3701, www.elfrentals.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Exhibitions across the security spectrum
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
HomeSec Expo has become the security industry’s premier trade event. Visitors will experience a live showcase of how different aspects of the security spectrum come together under one roof.

Read more...
A clear vision for a safer, smarter future
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
With its authoritative lineup of sponsors and exhibitors, HomeSec Expo 2026 embodies an authoritative, yet pragmatic vision, for the security industry. It is a vision that recognises both the urgency of current threats and the excitement of technological innovation.

Read more...
South African counter-drone system completes trials
Products & Solutions Perimeter Security, Alarms & Intruder Detection IoT & Automation
Pretoria-based military engineering company Centauri Technologies has announced that its TriAD counter-drone system successfully completed integrated, multi-layered C-UAS (counter-unmanned aerial system) capability trials in a vehicle-mounted configuration.

Read more...
Navigating a modern, layered security landscape
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
The convergence of perimeter control and access automation is driving demand for solutions that work together. This is the focus of HomeSec Expo 2026, which takes place on 4th and 5th March 2026 at the Gallagher Convention Centre in Johannesburg.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
2026 Industry Trends Report calls out security’s next opportunity
Integrated Solutions Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Gallagher Security has released its 2026 Security Industry Trends Report, drawing on insights from end users, channel partners, consultants, and technology stakeholders; highlighting a growing opportunity for security to play a more strategic, value-driven role across organisations worldwide.

Read more...
Inaugural Command the Future event in Cape Town
Gallagher News & Events Perimeter Security, Alarms & Intruder Detection
Gallagher Security Africa’s inaugural Command the Future 2025 event was a resounding success, reinforcing Gallagher’s commitment to innovation, collaboration, and long-term growth in Africa’s rapidly evolving security industry.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.