Remote monitoring benefits

October 2018 Mining (Industry), Surveillance

Security in the mining sector is having to evolve as criminals get smarter and more brazen in their tactics. Traditional security measures used on these large, often isolated pieces of land are no longer effective. Verifier is branching out into the mining space, sourcing and integrating multiple solutions so that we can monitor them in order to optimise perimeter protection and threat detection on site.

Licence plate recognition (LPR) technology is used along roadsides and at access points to facilities in order to alert security personnel on the ground of an approaching threat. The plate is run against a national suspect database, which is populated with intelligence information from various sources across the country. This forewarning enables personnel to mobilise before the threat breaches the perimeter and if need be, additional resources can be operationalised and deployed.

Thermal, laser or infrared camera technology, using an artificial intelligence (AI) engine on the backend, will assist in the deep learning and classification of the threat before it breaches the perimeter. Alongside this, the use of existing analytics for cross-line detection can be coupled with AI for a double-knock effect.

Radar technology has been around for years, however on mines, where there is a lot of dust and particle movement in the air, the radar technology can have misses or many nuisance alarms. By using S-Band radar technology, these issues are no longer apparent.

S-Band is able to look between trees for objects, and then classify them into human, vehicle, animal or aircraft categories. This used in conjunction with fixed and PTZ camera technology, enables controllers to verify the threat visually before deploying reaction teams.

Co-ordination with internal and external reaction teams ensures that on the ground teams are not wasting precious time searching for the threat. Taking monitoring off-site reduces the cost of infrastructure and additional manpower for the client in terms of control room costs and training.

Off-site monitoring and independent deployment of reaction teams dramatically reduces the risk of collusion between criminals and security personnel onsite. Independent virtual guarding assists management in keeping an eye on on-site security, ensuring personnel are alert at all times and reducing the risk of human error.

For sites where, on-site control rooms are necessary, we often take the high priority work off-site to ensure that the client is receiving transparent reporting and feed-back from their site.

For more information contact Verifier, 086 111 6023, info@verifier.co.za, www.verifier.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Five signs your storage is holding you back
Infrastructure Surveillance
In the drive for business growth, organisations across South Africa are investing heavily in talent, applications, and strategy. Yet the foundational technology that underpins every digital interaction - data storage - is often overlooked.

Read more...
Dahua expands wireless 4G security monitoring
Products & Solutions Surveillance Smart Home Automation
Dahua Technology has launched a new wireless 4G security camera under its WITHS series, designed to deliver simplified deployment, continuous monitoring, and dependable performance in remote and power-limited environments.

Read more...
Smart port monitoring and automated container tracking
LD Africa AI & Data Analytics Surveillance Logistics (Industry)
A leading shipping port set out to improve visibility, security, and operational efficiency across its site, turning to an advanced monitoring solution powered by Axxon PSIM.

Read more...
Genetec launches Cloudlink 2210
Genetec Infrastructure Surveillance
New cloud-managed appliance addresses the practical challenges when adopting a cloud-managed model at scale, including storage costs, support for devices that do not enable direct-to-cloud connectivity, and the need to maintain local operation during connectivity disruptions

Read more...
Enhancing control room operations
iFacts Security Services & Risk Management Surveillance
As South Africa faces complex and more advanced security challenges, the demand for advanced surveillance solutions, including CCTV and security control rooms, continues to surge, but what about the people in front of the screens?

Read more...
The AI goldrush has a credibility problem
Refraime Editor's Choice Surveillance AI & Data Analytics
The single most important question a surveillance buyer can ask is deceptively simple: “Was this system programmed or was it trained?” That question alone will reveal more about what you are evaluating than any feature list or marketing video.

Read more...
Crime behaviour insights more important than ever
Leaderware Editor's Choice Surveillance Training & Education AI & Data Analytics
Behavioural surveillance skills are as essential now as they have ever been, especially in situations where quick evaluation of context is needed. Training operators in behavioural recognition skills is a vital part of control room success.

Read more...
Security’s three defining forces for 2026
Milestone Systems AI & Data Analytics Surveillance IoT & Automation
As we move into 2026, several technology trends that were once mostly confined to research labs and conference keynotes are now becoming part of the daily reality of the security industry.

Read more...
From false alarm filtering to intelligent decision-making
DeepAlert AI & Data Analytics Surveillance
As AI continues to evolve, the most successful surveillance operations will be those that not only reduce nuisance alerts, but also derive meaningful business intelligence from video data.

Read more...
Camera Selection Guide 2026
Camera Selection Guide Surveillance
The Camera Selection Guide 2026 features a range of cameras designed to meet a wide variety of needs and use cases for professional security operations.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.