SAIDSA celebrates 50 years

July 2017 Editor's Choice, Associations

The South African Intruder Detection Services Association (SAIDSA) used Securex 2017 as a platform to start its 50th birthday celebrations, and to recognise the winners of its Techman competition.

SAIDSA was first formed in 1968 as the SA Burglar Alarm Systems Association, with a view to setting the standards for alarm installations in the country. Its motto was “By the members, for the members,” and its initial committee served for the next 20 years.

When the Security Officers’ Board was formed, the association linked itself to this organisation and its principles, and in 1982 renamed itself to the South Africa Intruder Detection Systems Association. To ensure it stayed relevant in the market, in 1995 it became the South African Intruder Detection Services Association we know today.

Then association has remained relevant and has been active in writing bylaws and standards for the industry among its other functions. SAIDSA today is an association of service providers of security systems, ranging from basic alarms to sophisticated electronic intruder detection systems and CCTV. It also incorporates signal monitoring as well as the provision of armed reaction services. As the industry watchdog, SAIDSA has the interests of both its members and the public at heart.

The association will celebrate its 50th birthday in 2018 and has already started its celebrations. Far from slowing down, SAIDSA will remain a relevant influencer in the industry going forward and invites the industry to join the association and be a part of the next 50 years.

Techman winners

Securex also saw the 2017 Techman competition where a number of SAIDSA-certified technicians competed in the wiring and installation of an intruder alarm system. The technicians were required to plan, wire, terminate, glue, harness and mark each product to a control panel according to SAIDSA minimum installation standards within a specific time limit.

Each technician that managed to complete the task within the allotted time was presented with a certificate of completion at the awards ceremony, before the top five competitors received their awards. The winners this year were:

• First place: Amitham Doolabh from Blue Security.

• Second place: Jakobus Putter from Mayday Alarms.

• Third place: Anton Strydom from Crime Stop.

• Fourth place: Frikkie Janse van Rensburg from CSS Security.

• Fifth place: Tyneal Pillay from Blue Security.

For more information go to www.saidsa.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Toxic combinations
Editor's Choice
According to Panaseer’s latest research, 70% of major breaches are caused by toxic combinations: overlapping risks that compound and amplify each other, forming a critical vulnerability to be exploited.

Read more...
Continuum launches centralised access and identity management
Editor's Choice Access Control & Identity Management Integrated Solutions Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...
Standards for fire detection
Fire & Safety Associations
Nick Collins discussed SANS 246 – Fire Protection for Electronic Equipment Installations – Code of Practice, as it pertains to electronic equipment installations, including construction, furniture and fittings, air conditioning, raised flooring and more.

Read more...
Making drone security more accessible
Editor's Choice Integrated Solutions Residential Estate (Industry) AI & Data Analytics IoT & Automation
Michael Lever discusses advances in drone technology, focusing on cost reductions and the implementation of automated services, including beyond line of sight capabilities, for residential estates with SMART Security Solutions.

Read more...
Private fire services becoming the norm?
Technews Publishing SMART Security Solutions Editor's Choice
As the infrastructure and service delivery in many of South Africa’s major cities decline, with a few, limited exceptions, more of the work that should be done by the state has fallen to private companies.

Read more...
View from the trenches
Technews Publishing SMART Security Solutions Editor's Choice Integrated Solutions Security Services & Risk Management Residential Estate (Industry)
There are many great options available to estates for effectively managing their security and operations, but those in the trenches are often limited by body corporate/HOA budget restrictions and misunderstandings.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.