Centralised security for universities

September 2017 Editor's Choice, Asset Management, Integrated Solutions, Products & Solutions

South Africa dominates the annual listings of the best African universities. The prestige of its higher education institutions has made them sought after by students from many countries, and in some cases foreign students make up between 10 and 30% of all students. Security is an essential matter in maintaining this level of attractiveness.

Most students who last year participated in the ‘Fees Must Fall’ protests did so peacefully, but images of a violent minority were seen around the world. As everyone involved in this field knows, just a few problematic incidents are enough to tarnish the image of a peaceful and secure environment that is the result of years of effort and implementation of good security practices.

Universities face specific security challenges. Their campuses comprise many diverse areas, such as education buildings, residence halls and outdoor spaces, that need different security procedures.

There are diverse physical and psychological threats, including thefts, muggings, vandalism, assaults and other examples of violence against students and staff members. Preventing and countering such different dangers also requires different security procedures to be established.

In February’s edition of this magazine, several campus protection managers highlighted communication as an essential part of responding to incidents: communication between key players like university directors, security staff, law enforcement authorities and protesting students.

There is currently a need for security management software solutions that can speed up communication between these key players by promptly supplying the proper procedures to be followed for each type of incident. Agora SMS (Security Management Software) is an example of such a software solution.

Procedures, procedures, procedures…

As soon as an incident has been identified, Agora shows the security operator the proper procedure to be followed, such as, for example, calling on law enforcement or simply closing a gate. This reduces response times, whether the incident is a burglary, a fire or simply a broken window.

The procedures implemented with Agora also provide for night escort patrols, which are increasingly requested at universities all over South Africa. Agora provides this service, which is so important for post-graduate students and members of staff leaving the university at late hours when there is almost nobody around.

Agora also allows configuring procedures for daily on-demand situations, such as delivering keys or requesting cleaning and maintenance services. Agora displays to the security operator the proper procedures to streamline the resolution of routine situations that, although common in everyday campus life, could potentially represent a security threat or a future liability.

In short, Agora provides pre-defined and auditable procedures, thus enabling a more effective, quicker and less costly security management when compared to the option of increasing the number of guards patrolling the campus on foot.

Centralising information and management based on real data

Agora does not live by procedures alone: it also stands out by automatically selecting the most suitable camera for evaluating a certain event, however far away it is taking place. If control centres receive better information, it is possible to drastically reduce the number of false alarms, a situation that causes operational disturbances as well as unnecessary costs.

With ubiquitous control from a central point there is no need for multiple control centres spread around the campus. All the data collected by cameras and sensors is channelled into the same place, which is also, of course, good news for university budgets. Also, sensible security data is safely stored at a unique restricted-access location.

The data collected by the software also makes it possible to improve operations by using its business intelligence tools. Agora provides university security officers with activity and incident reports that are essential to allow them to achieve the best balance between tight security supervision and resource allocation.

There are many reasons for Agora to be used in South African universities. Investment and resources are used to their best, running costs are reduced to an optimal level, and most importantly, the identity that makes South African universities so attractive to students is preserved.

For more information contact Bernardo Motta at [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Hikvision launches AcuSeek NVR
Surveillance Products & Solutions AI & Data Analytics
By integrating natural language interaction, Hikvision’s AcuSeek NVR enables precise video and image retrieval within seconds, marking a transformative milestone for the security industry's advance into intelligent and efficient applications.

Read more...
Analyse, automate, and optimise logistics processes
neaMetrics Surveillance Transport (Industry) Products & Solutions Logistics (Industry)
In today’s rapidly evolving logistics sector, the pressure to improve process efficiency, optimise resource usage, and ensure seamless security is more intense than ever. Smart, proactive surveillance is no longer a luxury — it is a critical operational necessity.

Read more...
Winners of the 2025 Southern Africa OSPAs
Editor's Choice
The winners of the 2025 Southern Africa Outstanding Security Performance Awards (OSPAs) were revealed on Wednesday, 4th June, at Securex South Africa. Winners from all categories (except the Lifetime Achievement) will be featured in the second Global OSPAs set to take place in 2026.

Read more...
Deepfakes and digital trust
Editor's Choice
By securing the video right from the specific camera that captured it, there is no need to prove the chain of custody for the video, you can verify the authenticity at every step.

Read more...
A new generational framework
Editor's Choice Training & Education
Beyond Generation X, and Millennials, Dr Chris Blair discusses the seven decades of technological evolution and the generations they defined, from the 1960’s Mainframe Cohort, to the 2020’s AI Navigators.

Read more...
Back-up securely and restore in seconds
Betatrac Telematic Solutions Editor's Choice Information Security Infrastructure
Betatrac has a solution that enables companies to back-up up to 8 TB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Read more...
Key design considerations for a control room
Leaderware Editor's Choice Surveillance Training & Education
If you are designing or upgrading a control room, or even reviewing or auditing an existing control room, there are a number of design factors that one would need to consider.

Read more...
Smart cities and the role of video security
Surveillance Integrated Solutions
As cities around the world continue to embrace smart technology, including IoT that not only connects to people, but also the surrounding activity, the integration of advanced video security systems is crucial to ensure safety and efficiency in environments.

Read more...
Advanced surveillance storage from ASBIS
Infrastructure Surveillance Products & Solutions
From a video storage solutions perspective, SkyHawk drives, designed for DVRs and NVRs, offer high capacity, optimised firmware, and a reliability workload rating of hundreds of terabytes per year.

Read more...
The benefits of offsite control rooms
Astrosec Surveillance Integrated Solutions
As the security landscape grows more intricate, control rooms – the crucial hub of security operations – need to adapt. With escalating costs, mounting threats, and a heightened demand for immediate responses, many organisations are reassessing the operations of their control rooms.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.