Combine technologies for effective intruder detection

1 May 2019 Perimeter Security, Alarms & Intruder Detection, Surveillance

Physical security is never about a single layer of technology – the tighter the mesh, the stronger your security. The secret is to have an integrated solution where devices talk to each other; for example, when a beam, seismic sensor or vibration sensor is triggered the nearest camera should be automatically activated to zoom in on that zone. This is the holy grail of intelligent intruder detection and perimeter security.

Rudi Potgieter
Rudi Potgieter

In its simplest form, cameras can be associated to alarm zones, allowing a feed to automatically pop up when an alarm is triggered. There are products out there that condenses this feed into, say, 10 x 1 frame pictures, providing you with a short video clip of the event, without abusing bandwidth. One must be cognisant that while connectivity on premise might not be a problem, the user might be mobile without access to stable, high-speed connectivity.

Connectivity is the conduit to deliver next-generation services. Faster, stable connectivity enables the delivery of rich content. An alarm signal on a radio frequency network has now evolved to a video alarm over a fibre network. This starts a larger movement in the market, driving the industry towards self-monitoring.

By getting the client to eliminate false alarms before they even hit the armed response control room, we assist in driving down operational expenses, which in turn should result in a decrease in armed response subscription fees. This ultimately will drive the industry towards an Uber-like model for security, where armed response becomes about the person who gets to the incident first, as opposed to the dinosaur model of being locked into a single provider.

Video verification is still in its infancy, but slowly but surely making inroads. The current rate of adoption is higher in the corporate industry than with the consumer, with access to technology being the biggest inhibiting factor. With the evolution of artificial intelligence (AI) and computer vision and access to cloud-based products, the adoption rate is set to increase in the consumer space.

Ultimately, it is important to have a healthy mix of technology. There is no silver bullet here, but rather strength in numbers. One does not need to break the bank when securing your valuables, but rather have the right mix of various layers of technology.

For more information contact Rudi Potgieter, Vox, +27 87 805 0000, rudi.potgieter@voxtelecom.co.za, www.vox.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Five signs your storage is holding you back
Infrastructure Surveillance
In the drive for business growth, organisations across South Africa are investing heavily in talent, applications, and strategy. Yet the foundational technology that underpins every digital interaction - data storage - is often overlooked.

Read more...
Dahua expands wireless 4G security monitoring
Products & Solutions Surveillance Smart Home Automation
Dahua Technology has launched a new wireless 4G security camera under its WITHS series, designed to deliver simplified deployment, continuous monitoring, and dependable performance in remote and power-limited environments.

Read more...
Smart port monitoring and automated container tracking
LD Africa AI & Data Analytics Surveillance Logistics (Industry)
A leading shipping port set out to improve visibility, security, and operational efficiency across its site, turning to an advanced monitoring solution powered by Axxon PSIM.

Read more...
When your security starts thinking with you
Secutel Technologies Surveillance Perimeter Security, Alarms & Intruder Detection AI & Data Analytics
If you manage a warehouse or logistics environment, you already understand how quickly risk can escalate during the day and after hours. The question is: how quickly can you respond?

Read more...
Gallagher Security releases new fence controllers
Perimeter Security, Alarms & Intruder Detection News & Events
Gallagher Security has announced the release of its new F5 and F6 Fence Controllers, marking the latest generation of enhanced-safety, monitored-pulse fence technology, designed to meet the demands of modern security environments.

Read more...
Genetec launches Cloudlink 2210
Genetec Infrastructure Surveillance
New cloud-managed appliance addresses the practical challenges when adopting a cloud-managed model at scale, including storage costs, support for devices that do not enable direct-to-cloud connectivity, and the need to maintain local operation during connectivity disruptions

Read more...
Enhancing control room operations
iFacts Security Services & Risk Management Surveillance
As South Africa faces complex and more advanced security challenges, the demand for advanced surveillance solutions, including CCTV and security control rooms, continues to surge, but what about the people in front of the screens?

Read more...
The AI goldrush has a credibility problem
Refraime Editor's Choice Surveillance AI & Data Analytics
The single most important question a surveillance buyer can ask is deceptively simple: “Was this system programmed or was it trained?” That question alone will reveal more about what you are evaluating than any feature list or marketing video.

Read more...
Crime behaviour insights more important than ever
Leaderware Editor's Choice Surveillance Training & Education AI & Data Analytics
Behavioural surveillance skills are as essential now as they have ever been, especially in situations where quick evaluation of context is needed. Training operators in behavioural recognition skills is a vital part of control room success.

Read more...
Security’s three defining forces for 2026
Milestone Systems AI & Data Analytics Surveillance IoT & Automation
As we move into 2026, several technology trends that were once mostly confined to research labs and conference keynotes are now becoming part of the daily reality of the security industry.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.