classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn

Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2017

IoT enhances intruder detection
October 2017, Perimeter Security, Alarms & Intruder Detection, Integrated Solutions

Justifiably, the Internet of Things (IoT) is this year’s buzz phrase. But how is it impacting on intruder detection and how are traditional intruder detection companies changing their mindset and design strategies to leverage it?

Ingo Mutinelli, business development director at Elvey, says that while some companies may be slower to adopt IoT when designing intruder detection panels, there is a definite trend towards making intruder detection equipment smarter, with an increased ability to integrate with other security and home/business management solutions.

According to Mutinelli there is extensive development in technology in this space, with three predominant areas that are increasingly evolving. IP (Internet protocol) communications entails all intruder detection panels being connected to an IP backbone; many intruder detection panels (all panels that Elvey distributes) have video verification as an option; and the game changer – home automation or ‘connected home’ capabilities are built into panels.

“This means that one’s intruder detection panel is linked to the Internet and allows the user to, for instance, switch lights and geysers on and off, as well as to program a sequence of events to take place in specific instances. These functions are all made possible through a real-time app, so connectivity for users is expedited simply and rapidly from a mobile device such as a smartphone, laptop or tablet,” says Mutinelli.

Many control panels now have GPRS communicators and IP connections as standard, with 128-Bit encryption providing the assurance of secure communications to the cloud services and apps. Microsoft Azure, for example, provides secure hosting facilities, eliminating server downtime or any opportunities to hack into these apps.

In terms of hardware, there has been a marked departure from compartmentalising user devices and we are witnessing a shift towards security systems (intruder detection panels) becoming a hub of sorts. This hub seamlessly pulls together all features such as arming, disarming, bypassing, stay zones and away zones and also draws in home automation and video verification onto one platform.

Zones are demarcated and when, for example, there is an alarm event, the video verification feature will send a video clip to the monitoring company or the homeowner via the app, using the cloud. This feature further allows users to visually distinguish, in real-time, whether alarm activations are false or actual. Furthermore, this capability provides response officers with a quick overview of the environment in terms of who is on site, thereby allowing for the deployment of a suitable number of reaction officers to counter any threat. Push notifications to the homeowner provide them with the correct information regarding on-site conditions.

Mutinelli points out that most home automation systems leverage a generic platform such as Z-Wave. This wireless protocol creates a mesh network around one’s property, whereby any home equipment such as lighting, gates, door openers, electrical appliances and HVAC systems that are plugged into a Z-Wave device, automatically become a wireless device.

“So, when you enrol the device on your system and on your app, you will be able to view the device and you can then remotely activate and deactivate that device. Each Z-Wave device acts as a transceiver repeating signals of devices in a ‘mesh’ like configuration, allowing for total wireless coverage. This provides users with benefits in terms of managing power consumption, since you can now remotely activate and deactivate your energy-hungry home equipment. This is very exciting as your alarm system now becomes the main brain of your home automation system,” Mutinelli explains.

He continues that the possibilities are truly endless for connected and self-monitored homes. Security systems are now proving that they are more than just a security system, they have shifted from being a cost centre to fulfilling the role of a multi-function lifestyle solution.

Mutinelli cautions clients to select systems from reputable suppliers who have invested time and capital in extensive research and development and secure cloud platforms.

Supplied By: Elvey
Tel: +27 11 401 6700
  Share via Twitter   Share via LinkedIn      

Further reading:

  • Measurable policies and multi-layered approach hit the mother lode
    October 2017, This Week's Editor's Pick, Integrated Solutions, Mining (Industry)
    Securing mines is often a logistical nightmare as threats from common thieves to illegal miners are added to the inherent safety and security risks synonymous with mine complexes.
  • What’s in a platform?
    October 2017, Milestone Systems, Naxian Systems, Genetec, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
    Hi-Tech Security Solutions looks at what today’s security management platforms offer users from both small and large organisations.
  • Changing the SMB VMS landscape
    October 2017, Pelco by Schneider Electric, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
    Video surveillance innovations have changed the landscape for enterprise security with the ability to provide real-time monitoring, forensic investigations, risk mitigation and business operations management.
  • Trends in intruder detection
    October 2017, Elvey, Secutel Technologies, This Week's Editor's Pick, Access Control & Identity Management, Perimeter Security, Alarms & Intruder Detection
    Ease of use, integration and visual verification rule the roost in the modern intruder solution.
  • Hikvision reaches new heights
    October 2017, Hikvision South Africa, News, CCTV, Surveillance & Remote Monitoring, Perimeter Security, Alarms & Intruder Detection
    Hikvision held an event to celebrate the launch of its perimeter defence solutions on 15 September on the 20th Floor of The Venue, Green Park.
  • Beware of PoPI non-compliance
    October 2017, iFacts, Security Services & Risk Management, Integrated Solutions
    Ignorance of the law may not be sufficient to save you from the Act when it comes into operation.
  • Qognify secures global bank
    October 2017, Security Services & Risk Management, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
    Qognify announced that one of the world’s largest banks and financial services companies has selected Qognify Situator and its Operational Intelligence Centre (OIC) module to help manage its global security ...
  • Keeping pace with change
    October 2017, Johnson Controls, This Week's Editor's Pick, Integrated Solutions
    Hospitals need to secure not just their patients but their staff, their high value assets and sensitive areas like pharmacies. It requires an integrated approach.
  • PDS for Sasol coal mines
    October 2017, This Week's Editor's Pick, Perimeter Security, Alarms & Intruder Detection, Asset Management, EAS, RFID, Mining (Industry)
    Monitech Mining Monitoring Systems was recently commissioned to supply and install a proximity detection system to a number of Sasol Mining’s underground operations.
  • Secure mining with integrated solutions
    October 2017, Forbatt SA, Mining (Industry), Integrated Solutions
    Securing a mine is a vast undertaking requiring one to use almost every security technology and process if you are to get it right.
  • Enabling secure and efficient mining
    October 2017, Gallagher, Mining (Industry), Perimeter Security, Alarms & Intruder Detection, Security Services & Risk Management
    Mining is a high-value industry with long-term return on investment. Initial capital investment is substantial and it can take years from exploration to market-ready product.
  • Integrated mining surveillance
    October 2017, Cathexis Technologies, Mining (Industry), CCTV, Surveillance & Remote Monitoring, Integrated Solutions
    Gus Brecher, MD of Cathexis Africa and business development director of Cathexis Technologies, offers some insight into the challenges that securing mining ­operations poses.

Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Terms & conditions of use, including privacy policy
PAIA Manual
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.