Data communication is critical

July 2016 Perimeter Security, Alarms & Intruder Detection

It is a common belief in large sections of South African society that living in residential estates or closed communities greatly enhances security levels and contributes to a more open and free lifestyle. Due to consistently high levels of crime and attacks on residential properties, people have gradually bought into communal living and quite understandably believe that the ‘safety in numbers’ approach is the best way forward.

While there is a valid argument for this approach, one needs to bear in mind that as security barriers are introduced, the ability of criminal elements to overcome these is also evolving. Most reputable security companies offer a multi-level solution focused on back up and redundancy based systems. This takes various forms and includes the human element as well as a number of technology-based layers.

Regardless of the type of on-site security resources such as guards, vehicles and CCTV elements, one of the critical denominators is always communication. This includes the on-site point-to-point aspects as well as the links to off-site control rooms, monitoring centres and vehicle assets.

An important part of the security solution is to be able to offer honest and consistent assessments to the providers and customers regarding which types of products and which service providers should be used. A number of consultants tend to push either a single range of their own products or products closely related to theirs. We at RDC have always held the belief that a wide range of different manufacturers and products is in the best interest of the clients as this spreads the risk and the customer is not trapped or tied in too tightly to one or two providers.

If one accepts that the basics of estate security are in place, walls, gates etc., the next step is to identify the critical elements that are needed and how these will form an integrated turnkey solution. These can be broken up as follows:

1. Human resource deployment – guards.

2. Access control – gates, booms, turnstiles.

3. Electronic visual monitoring – CCTV.

4. Communication centres – control rooms.

5. Incident management – armed response units.

The key to providing a manageable and trustworthy solution lies in being able to communicate quickly and reliably with the various components listed above. Current technology platforms are widely used by manufacturers and herein lies one of the challenges. The question is “which type of platform do we use?” The answer is not quite as easily reached when one considers the strengths and weaknesses inherent in electronic solutions. Once again we are directed back to the RDC philosophy of using a multi-layered approach to support the basic security components and provide redundancy. RDC offers VHF radio, GPRS and SMS communication options.

For more information contact Roelene Taylor, RDC, +27 (0)11 452 1471/2, exports@radiodata.co.za, www.radiodata.co.za


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Securing Savannah Hills Estate
August 2019, Rhyco Risk Projects , CCTV, Surveillance & Remote Monitoring, Perimeter Security, Alarms & Intruder Detection
Savannah Hills Estate in Midrand planned a security upgrade which was awarded to Rhyco Risk Projects. The project started in March 2019 and was completed in May 2019.

Read more...
Multiple methods for motion detection
August 2019, Axis Communications SA , Perimeter Security, Alarms & Intruder Detection
There are strengths and weaknesses with all motion detection solutions, and their effectiveness will be dictated by the environment and the components they are being used with.

Read more...
Ensuring your electric fence is compliant
August 2019, Stafix , Perimeter Security, Alarms & Intruder Detection, Security Services & Risk Management
A challenge facing both existing and potentially new perimeter electric fence installations is how to economically meet the legal requirements required in the SANS 10222-3:2016 standards document.

Read more...
From fog to foxes
August 2019, Axis Communications SA , Perimeter Security, Alarms & Intruder Detection, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
What makes radar devices so valuable is the fact that they can provide a high range of accurate data while barely relying on external factors, such as weather or light.

Read more...
AI-based malware detection
August 2019 , Perimeter Security, Alarms & Intruder Detection, Cyber Security
Check Point Software introduces Malware DNA, a new artificial intelligence-based malware detection engine to accelerate zero-day threat prevention.

Read more...
RDC’s IceCube Video
August 2019, Radio Data Communications , Perimeter Security, Alarms & Intruder Detection
IceCube Video gives the benefit of adding CCTV cameras to the system with control and monitoring integrated in the same app.

Read more...
Manage exceptions only
July 2019, Secutel Technologies , Perimeter Security, Alarms & Intruder Detection, Products
Secutel Technologies brings intelligence to all cameras with its locally designed, manufactured and marketed SecuVue Cloud Video Recorder (CVR), turning cameras into intelligent sources of information.

Read more...
GSM IceCube Gateway
July 2019, Radio Data Communications , Perimeter Security, Alarms & Intruder Detection
The GSM IceCube Gateway unit is a new generation, multi-directional interactive gateway module which replaces the traditional radio, and is a key component to generating future revenue for security companies.

Read more...
Network cameras with strobe light and alarm
June 2019, Hikvision South Africa , Perimeter Security, Alarms & Intruder Detection
Hikvision has introduced the new AcuSense network camera series to its EasyIP 4.0 security solutions, featuring a strobe light and an audio alarm.

Read more...
Enhancing perimeter security with video
June 2019, Pelco by Schneider Electric , CCTV, Surveillance & Remote Monitoring, Perimeter Security, Alarms & Intruder Detection
Securing perimeters, whether they surround an airport, seaport, or an oil and gas facility, require a layered approach.

Read more...