Tech holds the future of home security

1 April 2019 Surveillance

The future of home security will see threats detected and responded to before a crime can be committed. Making use of big data, home security systems are now able to analyse camera streams and proactively alert armed response service providers. This is a massive stride in improving the means we use to secure our neighbourhoods, believes co-founder of Syntech, Ryan Martyn.

“Research indicates that South Africa has among the most security cameras per capita in the world. That creates a great platform to offer a solution on legacy infrastructure. This new approach to security actually prevents incidents from happening.”

According to Deep Data CEO Jasper Horrell, “There has been a shift in terms of what we can do with data gathering and processing. It’s now become possible to store large quantities of data gathered from different sensors, and also to process it in intelligent ways.”

The latest in home security technology uses big data analysis to revolutionise how threats are assessed. This technology is provided in a partnership between Syntech, which provides Giada commercial computer systems as hardware, and Deep Data, which develops the Deep Alert software.

The Deep Alert system makes use of analytics to identify and analyse threats based on security camera footage, it also sends alerts to homeowners or security service providers based on the type of threats that it identifies.

A proactive approach

Traditional security systems rely on cameras to record footage which, in the event of a security breach, identifies suspects and provides evidence. With this model, a perimeter breach triggers the alarm and an armed response service provider attends the scene – an entirely reactive approach. Future systems making use of big data fundamentally challenge traditional security systems by proactively identifying threats and allowing security monitoring services to respond to alerts before an incident takes place.

The software attaches to existing camera streams and analyses motion triggers, tracks the trigger and then classifies the type of object – such as a dog, person walking down the street, or somebody climbing over the wall. This software runs on a Giada computer – small, lightweight and low energy commercial grade computers – which can monitor up to 12 concurrent camera streams. Potential threats are instantaneously sent to a cloud service, where most of the intensive analytics run. From here, an alert will be sent should a valid threat be detected.

“It’s all very well installing alarms, beams and fences, but every false alarm plants a seed of doubt in terms of how reliable that information is. Over time, repeated false alarms create vulnerability because you stop reacting to them. Big data adds a layer which helps you to trust the system much more,” says Martyn.

The future of fighting crime

South Africa has proven an ideal testing ground for new security features and the big data systems have already been successfully rolled out among neighbourhood watches and residential communities.

Key to the effectiveness of this technology is how it assists armed response services: They receive more accurate information which allows assessment of threats before dispatching a patrol vehicle. This ensures resources are diverted to critical incidents and reduces the number of false alarms, while saving money for the armed response service provider.

The potential for using similar systems is extensive, and could be adapted for businesses to monitor deliveries or operations. Networks of cameras in the same neighbourhood would allow for patterns to be monitored – the difference between a car that frequents an area during a daily commute and one circling an area to carry out a crime would be immediately apparent.

“There will be analytics on analytics. Instead of intelligently telling you what’s there, the technology will be detecting interesting patterns or threats between a range of cameras or classes of objects,” explains Horrell.

For more information about Deep Alert visit https://www.deepdata.works/





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Genetec launches Cloudlink 2210
Genetec Infrastructure Surveillance
New cloud-managed appliance addresses the practical challenges when adopting a cloud-managed model at scale, including storage costs, support for devices that do not enable direct-to-cloud connectivity, and the need to maintain local operation during connectivity disruptions

Read more...
Enhancing control room operations
iFacts Security Services & Risk Management Surveillance
As South Africa faces complex and more advanced security challenges, the demand for advanced surveillance solutions, including CCTV and security control rooms, continues to surge, but what about the people in front of the screens?

Read more...
The AI goldrush has a credibility problem
Refraime Editor's Choice Surveillance AI & Data Analytics
The single most important question a surveillance buyer can ask is deceptively simple: “Was this system programmed or was it trained?” That question alone will reveal more about what you are evaluating than any feature list or marketing video.

Read more...
Crime behaviour insights more important than ever
Leaderware Editor's Choice Surveillance Training & Education AI & Data Analytics
Behavioural surveillance skills are as essential now as they have ever been, especially in situations where quick evaluation of context is needed. Training operators in behavioural recognition skills is a vital part of control room success.

Read more...
Security’s three defining forces for 2026
Milestone Systems AI & Data Analytics Surveillance IoT & Automation
As we move into 2026, several technology trends that were once mostly confined to research labs and conference keynotes are now becoming part of the daily reality of the security industry.

Read more...
From false alarm filtering to intelligent decision-making
DeepAlert AI & Data Analytics Surveillance
As AI continues to evolve, the most successful surveillance operations will be those that not only reduce nuisance alerts, but also derive meaningful business intelligence from video data.

Read more...
Camera Selection Guide 2026
Camera Selection Guide Surveillance
The Camera Selection Guide 2026 features a range of cameras designed to meet a wide variety of needs and use cases for professional security operations.

Read more...
Storage Selection Guide 2026
Storage Selection Guide Surveillance
The Storage Selection Guide 2026 provides video storage and management options customised for small, medium, and large surveillance operations, ensuring effective support for various security requirements.

Read more...
Surveillance & AI roundtable
DeepAlert Lytehouse Refraime SMART Security Solutions Technews Publishing Editor's Choice Surveillance Integrated Solutions AI & Data Analytics
SMART Security Solutions held an online roundtable with a few surveillance experts to explore the intersection of surveillance and AI, gaining insights into the market and how control rooms are evolving.

Read more...
Centurion raises the bar at HomeSec Expo
Centurion Systems News & Events Access Control & Identity Management Residential Estate (Industry) Smart Home Automation Commercial (Industry)
Centurion Systems unveiled its latest product lines at HomeSec Expo 2026, introducing SMART+, a simpler way for installers and end users to manage their Centurion installations - as well as a few new products.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.