Keeping tabs from a distance

CCTV Handbook 2013 Surveillance

How do you decide when a remote surveillance service is the solution for your application? Is there scope for cloud-based solutions for remote surveillance in Africa?

Some may see CCTV as a grudge purchase, but the extractable operational benefits of remote surveillance are manifold, according to Mark Chertkow, MD of Graphic Imaging Technologies (GIT). “By moving monitoring of surveillance offsite, one can gain a completely objective overview of onsite activities from anywhere at any time. Any possible tampering with footage is eliminated.”

Policies and procedures are only as good as the employees implementing them. By adopting remote offsite surveillance, companies are able to save thousands of rands. However, in addition to the monetary benefits derived from instituting remote offsite surveillance, the practice also allows the company to employ a covert health and safety watchdog. Unsafe operating practices and behaviours that infringe the health regulations of an organisation are quickly identified by an independent operator and tagged for immediate resolution.

“Often companies only realise after an incident has occurred that physical guarding or technology on their own are simply not a sufficient security tool,” said Roy Wyman, MD of Remote Offsite Monitoring (ROM).

“The vast choice of remote surveillance companies is starting to become a real issue, with low-cost emerging companies dominating the market. Unfortunately, unless these companies do a full needs analysis of customer needs, the likelihood of the service providing a return on investment are highly unlikely,” said Jacques du Toit, CEO of Vox Telecom.

“It is critical to match the customer’s requirements with the correct system. A bona fide remote offsite surveillance operator will spend time with the client discussing and establishing specific risk areas. Decisions on whether the client requires hi-res cameras, or a number plate identification system, or even cameras with night vision will be made once their advantages and applicability to the environment are determined.”

Remote surveillance removes collusion and intimidation once one eliminates the human element from the onsite security equation. This also releases capital that can be invested in installing surveillance cameras, which are capable of providing eight times more visibility due to their constant coverage of areas.

Around 95% of alarms received by armed reaction companies are actually false alarms. Remote surveillance will confirm the extent of a security breach and provide the armed reaction company with accurate information on the number of intruders and their positions within the premises. Finally, offsite footage and incident reports provide customers with a chain of evidence for prosecutory purposes.”

Floating on a cloud

Given the mixed response to the advantages of cloud or hosted surveillance internationally, do local companies believe that this is a viable option for Africa?

“On the current model, one pays for bandwidth, so by pushing footage onto the cloud, one increases the operational costs,” said Chertkow. “However, one could feed only event-driven footage onto the cloud and download it offsite.”

“The management of companies tends to be wary about having critical business data and footage hosted remotely. There is an overriding fear of systems being hacked. We suggest that companies install a separate firewall for business-critical data that only the client can access,” said Du Toit.

“There is definitely a place for hosting on the cloud. The international market is not faced with the same high levels of crime and collusion that Africa does. By moving footage offsite into the cyber realm, one is able to sidestep collusion. The biggest stumbling block at present is the lack of knowledge around the benefits of cloud/hosted solutions and remote monitoring,” said Wyman.

“The bottom line is that customers need to be educated on these benefits in an objective manner. There will be instances where remote offsite monitoring is not the solution. Only by talking to an experienced and reputable company will this be determined. Customers are advised to ask prospective remote offsite monitoring companies to provide them with references. Visit working sites and establish whether the company you are entrusting the security of your assets to is able to provide you with the system and service you really need,” Wyman concluded.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
Edge AI-powered night vision
Surveillance Products & Solutions
By eliminating the need for supplemental lighting, the VIVOTEK Chroma24 low-light full-colour AI camera series provides quiet, unobtrusive protection, while also reducing power consumption and minimising impact on people, ecosystems, and the environment.

Read more...
From the editor's desk: It’s all about data
Technews Publishing News & Events
      Welcome to the SMART Access and Identity Handbook 2026. We have slightly changed the handbook this year, specifically the selection guides, but there is still a lot of industry information inside, and ...

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
Holding all the cards
neaMetrics Suprema SMART Security Solutions Technews Publishing Access Control & Identity Management
After so many years of offering alternatives to card technology for access control, one could be forgiven for assuming we are all using biometrics or mobile credentials for all our physical and digital access requirements.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.