Leasing perimeter security

August 2015 Editor's Choice, Perimeter Security, Alarms & Intruder Detection

A full maintenance lease is defined as a lease where the lessor accepts full responsibility for the supply, installation, maintenance and insurance of the equipment for the duration of the lease. Depending on the contract signed, at the end of the lease the customer may keep the equipment installed (or some of it), or it may revert to the lessor.

Chris Lovemore, CEO of ELF Rentals says this model lends itself well to the supply of perimeter security equipment for the following reasons:

1. If the service provider who installs the system is also accountable and responsible for the maintenance of the system, they will suffer the consequences of poor installation workmanship or inferior materials and not the client.

2. Should the service provider not perform his maintenance obligations correctly, the client has the authority to withhold payments, including those relating to the capital outlay.

3. Should there be an insurance issue, the service provider is able to immediately respond and install new equipment and process the claim.

4. Most manufacturers guarantee equipment for a maximum of one year. The full maintenance lease provides for a longer term warranty of the equipment at the service provider’s risk, providing a fixed budget for the client for the full duration of the contract.

5. A dedicated and committed service provider who has invested their capital and resources into a client’s premises develops good skills in maintaining the systems, which benefits the client.

6. The depreciating nature of perimeter systems as well as the rapid advance in technology means that these systems need to be upgraded at least every five years. A full maintenance lease is able to provide adequately for the continuation of service and the upgrading of equipment at required intervals.

For more information contact Elf Rentals, +27 (0)41 368 3701, www.elfrentals.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Inaugural Command the Future event in Cape Town
Gallagher News & Events Perimeter Security, Alarms & Intruder Detection
Gallagher Security Africa’s inaugural Command the Future 2025 event was a resounding success, reinforcing Gallagher’s commitment to innovation, collaboration, and long-term growth in Africa’s rapidly evolving security industry.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Toxic combinations
Editor's Choice
According to Panaseer’s latest research, 70% of major breaches are caused by toxic combinations: overlapping risks that compound and amplify each other, forming a critical vulnerability to be exploited.

Read more...
VM2 vibration detection monitor
Stafix Security Centres Products & Solutions Perimeter Security, Alarms & Intruder Detection
The JVA VM2 is a perimeter intrusion detection system designed to monitor one or two zones of microphonic (acoustic) cable to detect a perimeter breach through the noise and vibrations created by unauthorised access or vandalism.

Read more...
Continuum launches centralised access and identity management
Editor's Choice Access Control & Identity Management Integrated Solutions Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...
Adding AI analytics to security monitoring
News & Events Perimeter Security, Alarms & Intruder Detection Residential Estate (Industry) AI & Data Analytics
SEON has announced its latest integration with Refraime, an AI-powered video analytics platform designed to elevate CCTV surveillance through real-time object detection and intelligent alerting.

Read more...
Advances in electric fence management
Nemtek Electric Fencing Products News & Events Perimeter Security, Alarms & Intruder Detection
Nemtek will demonstrate its newly enhanced FG7C+ Fence Controller, now featuring an advanced software upgrade that connects all Nemtek devices, aggregating data to a single point for efficient electric fence alarm monitoring and control.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.