Physical and cyber defence centre

November 2017 Editor's Choice, Information Security, News & Events

XON and NEC Africa launched their joint Cyber Defence Operation Centre (CDOC), the only such facility from a single service provider in Africa that offers end-to-end physical and cyber defence services, with all the underlying IT infrastructure necessary for a turnkey solution.

The key difference between this and other similar operations is the bridged physical and cybersecurity services combined into a single service, focused on safety and security for organisations ranging from state entities to individual commercial operations.

“The service we provide from our purpose-built facility in Midrand, ensures people are safe and secure in a world beset by many difficult issues,” says Vernon Fryer, who heads up NEC Africa’s African cyber business and CDOC.

NEC collaborates closely with Interpol and various other global organisations in the fight to secure the safety and wellbeing of citizens in many countries. NEC has established several cyber defence and operations centres around the globe to assist in that ongoing cause.

XON and NEC Africa’s centre differs markedly in that it provides that same world class service in Africa, from Africa, and also integrates the dependable solutions and services of XON’s enterprise-class systems integration business for the complete solution.

Bertus Marais, GM of Public Safety and Security at XON.
Bertus Marais, GM of Public Safety and Security at XON.

“Our customers get the full range of services and solutions from creating data centres to field infrastructure and services, even including alternative energy, and the networks that connect everything,” says Bertus Marais, GM of public safety and security at XON. “The CDOC unites the worlds of physical and cybersecurity and include analytics and biometrics systems. The individual services are too numerous to mention but range from access and perimeter control and surveillance to fingerprinting, iris recognition, to big data analytics to provide facial recognition at scale, crowds in public areas behaviour monitoring and control, and then the increasingly crucial cybersecurity technologies and services.”

Africa, like other parts of the world, faces several challenges from terrorism to political instability, crime, and other socio-economic-related trials.

The City of Cape Town’s recent three-phase disaster plan outlines the deployment of army and police personnel to issue rationed water in the severest scenario. The CDOC from XON and NEC Africa could provide surveillance, monitor the situation, manage the emergency resources, and facilitate a smooth and successful water distribution process. To do so it would tap into social media channels, even limited by geography, monitor conversations, establish tone of discussions among citizens for any imminent threats to public safety, combine visual and other surveillance from several sources, overlay emergency resources, and provide emergency control personnel options for dealing with several potential scenarios.

The same technology can be used elsewhere in Africa to monitor and manage terrorism threats, including scanning tens of thousands of faces at ports, facilitate electoral security, counter narcotics and other smuggling, help the fight against human trafficking, monitor and manage natural resources, key infrastructure, and much more.

“The CDOC centre is a specialised combination of technologies and skilled personnel who monitor cyber situations 24-7 on behalf of clients who don’t have the expertise to do so themselves,” says Fryer. “The reality is that this is a rapidly evolving scenario that few organisations have the resources to effectively mitigate.

“The recent Deloitte hack is still being investigated. Although, they say few customers were affected. In another case, last year November, it emerged that someone used the Mirai botnet to conduct a denial of service (DDoS) attack against Liberia. Much closer to home, an unscrupulous person used Twitter to lure unsuspecting candidates into his fake South African Defence Force enrolment scheme, charging them, and essentially keeping them prisoner at a property in Pretoria. A South African woman was also rescued from a human trafficking syndicate in Malaysia after being lured in by a fake modelling competition online that attracted women from 14 countries.

“These examples combine the cyber world with the physical world,” says Fryer. “The borders between the two are increasingly blurred as the ramifications span from one to the other and back. The ability to reveal a wealth of personal information, from our physical locations to contacting us, anonymously, and tapping our supposedly restricted personal data, means criminals and other nefarious elements have unprecedented power to corrupt and subvert our safety and security. It’s a difficult world for the authorities and emergency responders to navigate as it relies on skills and infrastructure usually foreign to them.”

For more information, contact www.xon.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

IQSight SmartSuite integration with XProtect
Surveillance News & Events AI & Data Analytics
Milestone Systems and IQSight have strengthened their collaboration with the release of SmartSuite, a consolidated plug-in suite for Milestone XProtect video management software, to cut installation time for system integrators by 70%.

Read more...
Claude Mythos wake-up call
Technews Publishing AI & Data Analytics Information Security
AI has crossed a critical cybersecurity threshold and frontier models are accelerating attack lifecycles and will enable attackers to identify and exploit vulnerabilities at scale and speed, through novel methods that were previously the domain of advanced nation-state entities.

Read more...
The future of smart living and connected security
Securex South Africa Smart Home Automation News & Events
From controlling access and surveillance remotely to managing energy use during blackouts, smart technologies are transforming how organisations and property owners operate, protect assets, and maintain uptime across residential and commercial environments.

Read more...
If you cannot prove identity, you cannot claim security
Access Control & Identity Management Information Security
Cybersecurity planning for 2026 is a structural change in how attacks are executed and how trust is exploited, demanding that companies stop layering tools on top of infrastructure and instead prioritise intelligence and identity.

Read more...
Gallagher Security releases new fence controllers
Perimeter Security, Alarms & Intruder Detection News & Events
Gallagher Security has announced the release of its new F5 and F6 Fence Controllers, marking the latest generation of enhanced-safety, monitored-pulse fence technology, designed to meet the demands of modern security environments.

Read more...
Paxton set to launch game-changing new system
Paxton Access Control & Identity Management News & Events
Access control is evolving fast. Installers and end users are looking for systems that are simple to install, easy to manage remotely, and flexible enough to scale. In response, Paxton is exploring how emerging technologies can reshape access control.

Read more...
The AI goldrush has a credibility problem
Refraime Editor's Choice Surveillance AI & Data Analytics
The single most important question a surveillance buyer can ask is deceptively simple: “Was this system programmed or was it trained?” That question alone will reveal more about what you are evaluating than any feature list or marketing video.

Read more...
Crime behaviour insights more important than ever
Leaderware Editor's Choice Surveillance Training & Education AI & Data Analytics
Behavioural surveillance skills are as essential now as they have ever been, especially in situations where quick evaluation of context is needed. Training operators in behavioural recognition skills is a vital part of control room success.

Read more...
Proactive estate security in Cape Town
neaMetrics OneSpace Technologies Technews Publishing SMART Security Solutions Fang Fences & Guards ATG Digital Editor's Choice News & Events Integrated Solutions Infrastructure Residential Estate (Industry)
SMART Security Solutions started the year with our annual SMART Estate Security Conference in Cape Town on 26 February 2026. Held at Anna Beulah Farm, the conference saw a number of delegates enjoying the farm’s excellent cuisine, while listening to outstanding presenters.

Read more...
How AI video is reshaping real estate security
neaMetrics TRASSIR - neaMetrics Distribution Editor's Choice
Globally, property maintenance and facility operations spending is projected to grow to over US$145 billion by 2034, reflecting rising complexity, compliance pressures, and increased exposure to operational costs. AI systems can protect properties, automate access, and optimise building management.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.