Assets on track

November 2012 Asset Management, Transport (Industry)

Do you know where your company’s assets are at any given time? More to the point, do you know where they are once criminals have removed them from your chosen mode of transportation? Asset tracking and asset recovery are not to be confused, as Hi-Tech Security Solutions discovered in the compilation of this article.

Do you know where your company’s assets are at given time? More to the point, do you know where they are once criminals have removed them from your chosen mode of transportation? Asset tracking and asset recovery are not to be confused, as Hi-Tech Security Solutions discovered in the compilation of this article.

Hide and seek

Deon Bayly, MD of Mtrack said it is a common misconception that the two terms are interchangeable. “It is important to differentiate between tracking and recovery of assets if one hopes to implement a successful security system. The management of assets is not the main problem, as this can be undertaken by electronic means. The issue at hand is what companies can do to find their assets when they go missing.”

Bayly pointed out that because asset tracking devices require a great deal of power for successful operation, systems are generally wired into the vehicle, and are specifically attached to the battery. “This unfortunately means that the first place the criminal will search for a tracking device is in the horse or cab of the vehicle. Once found, the unit is fairly easy to disable, rendering its security function obsolete. In general, a wired tracking system can have two, limited roles: fleet management and as an early warning device of asset theft.”

Bayly believes that most criminals are not interested in the horse and trailer or other mode of transport, but rather in the cargo. “Therefore, placing a tracking device in the vehicle is really not the solution. The best case scenario is to have a wireless tracking device placed in the cargo. However, this then presents the problem of the device having no access to a power system.

“The solution is to have a battery-powered tracking device. A second problem then becomes apparent. Standard batteries traditionally have a very short lifespan. You do not want to compromise the security of the system by having to constantly change batteries in the unit, so the solution is to acquire a system that has been designed around a battery with a lifespan of 12 months or more,” Bayly explained. By setting a high upper limit, it allows companies to incorporate a battery change into the annual scheduled maintenance programme for vehicles. As a caution, any battery changes or maintenance of the unit should take place in a private area, away from prying eyes, with limit access provided to trusted employees. It is ideal if one can shrink wrap the tracking device within the palletised goods. This will deter theft for two reasons: the criminal will not want to damage the packaging since this affects the ease of re-transportation of goods and devalues them, and the process of looking for the device is time-consuming.

Unfortunately, according to Bayly, many South African businesses rely on old technology to perform their asset tracking function. “Industry needs to undertake an extensive educational process in order to change the ‘false economy’ mindset which is endemic to many companies. Sadly, the adage ‘you get what you pay for’ results in many companies only realising the true extent of scrutinising the bottom line at the expense of asset retention.”

He added that there is no product that can perform both tracking and recovery of assets. “This means that you need to acquire both systems. However, it is a good idea to secure a single vendor for both systems in order to ensure compatibility. In addition, this vendor can monitor both systems concurrently from a single control room. This methodology substantially reduces any delays in recovery of assets and provides a higher probability of securing the arrest of the perpetrators.”

Fit to purpose

Eddie Kartun, MD of Digifleet and managing member ITSS, said that managing and securing the flow of goods and people depends on a client’s specific requirements. “There are a number of solutions available on the market, but in order to secure an asset, the equipment should be able to pick up and relay information in real-time. While some solutions are used primarily for security, others are more concerned with fleet management.”

Kartun pointed out that the solution should be customised and adaptable to suit both customer requirements as well as the particular mode of transportation. “For instance, sea freight depends more on satellite communication whereas rail transportation is perfectly suited to a telematics mode of communication.

“In the latter instance, security forms one small part of the equation. Train driver action, as recorded by onboard cameras, allows rail operators to determine liability in case of accidents. The cameras can also pinpoint cases of vandalism and violence within passenger carriages.

With regard to air transportation, Kartun said that the choice is based on network availability, which could be either Wi-Fi or 3G. “Obviously the tracking device used is governed by the rules and regulations of the Civil Aviation Authority.”

Cost consciousness is most often the overriding factor in the choice of tracking solution selected. “Transport operators need to be educated in the correct choice of system for each individual application. In many instances, due to the increasing sophistication of technology, operators are forced to become pseudo computer technicians/programmers in order to effectively operate the systems,” said Kartun.

“Ethical suppliers will look at an integrated solution for the client, based on the incorporation of a number of products designed around providing a complete tracking and recovery system, rather than merely promoting standalone products.”

All on board

Peter Turvey, MD of Radwin SADC Region, said that industry is slowly moving away from the security guard plus dog scenario towards a more video surveillance based IP security option. “This surveillance is wireless, with real-time feedback, is quick to install, provides high-quality video and is suitable for monitoring large areas.”

While Radwin has been involved with a number of road-based projects, Turvey speaks with authority on tracking within the rail sector. “Wireless offers a number of benefits for users, foremost of which is its high-speed connectivity. Coupled with simplicity of installation, flexibility and substantial cost savings, it is fast becoming the only choice for high bandwidth demanding mobile applications,” he said.

He cautioned that in order to obtain high-quality, real-time train-to-ground transmission, it is crucial to install a wireless network infrastructure that is reliable and robust. “The network should also have long-range transmission capabilities and be capable of providing high performance at high speeds.

“A number of systems, which have been adapted for use on trains and buses, run on 3G with its related issue of limited bandwidth. With a typical 6 Mb uplink and 21 Mb downlink, this poses problems for communication on a train, which requires uplink only,” he added.

“However, because 3G is a shared medium which could have many users in a cell, it is highly unlikely that one will ever get this type of throughput. It will typically be in the low megabit per second range but more likely kilobits per second speeds. High-speed video surveillance on trains requires at least 10 Mbps dedicated bandwidth which is mostly uplink traffic,” Turvey clarified.

“The local rail market currently concentrates on how the rolling stock is operating, with minimal security function involved. The Gautrain utilises a system whereby no real-time video surveillance is available. When the train reaches a station, the stored video data is downloaded. A shift to a live feed would enhance both the security and operational benefits available.

“To be completely effective, what you need is a wireless system that has a capacity of 100 Mbps for the base stations and each mobile unit. Base stations should typically be no more than 10 km apart and facilitate a fast handover between each base station that will deliver no service interruption. The solution must be able to have a configurable uplink and downlink, so that it can deliver multiple solutions, for example, uplink for video surveillance and downlink for Internet access,” Turvey concluded.

Who does what

Mtrack provides a battery-operated tracking device that has achieved a 98,4% rolling recovery rate average over the past five years. The unit, which is the size of two cigarette packets, provides companies with the luxury of time when a cab-mounted tracking device activates an alarm to the control room.

The NEXCOM NROK 500 series rugged transportation computer from ITSS is specifically designed for trains. Equipped with 24-volt isolated DC input, the unit is fully compliant with most standards for transportation usage. The system picks up weigh points and the speed of the train. This is of specific importance for rail operators as the major cause of rail accidents is excessive speed, especially on corners.

Radwin has deployed a number of global broadband mobility applications, for example, remote-controlled surveillance vehicles on the infamous Gaza Strip, capable of monitoring 5 km stretches of the high-risk border zone. The company’s rail tracking options, manufactured to European train standards EN50155 and EN5012, are installed in a number of metropolitan lines in cities like Rome in Italy and Sophia in Bulgaria. Options include CCTV surveillance; Internet access for passengers; onboard ticket purchases; and data on locations, door status and the number of passengers. Radwin is in the process of launching an intrinsically safe radio unit suitable for use on ships and tugs within the oil and gas industry that will facilitate wireless broadband mobility applications.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

SMARTpod talks about HomeSec Expo 2026
SMART Security Solutions Technews Publishing News & Events Residential Estate (Industry) Videos
SMARTpod, the podcast from SMART Security Solutions, finds out more about the upcoming HomeSec Expo happening at Gallagher Estate on 4 & 5 March 2026.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
From the editor's desk: It’s all about data
Technews Publishing News & Events
      Welcome to the SMART Access and Identity Handbook 2026. We have slightly changed the handbook this year, specifically the selection guides, but there is still a lot of industry information inside, and ...

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
Holding all the cards
neaMetrics Suprema SMART Security Solutions Technews Publishing Access Control & Identity Management
After so many years of offering alternatives to card technology for access control, one could be forgiven for assuming we are all using biometrics or mobile credentials for all our physical and digital access requirements.

Read more...
Factories, grids, and finance: Critical infrastructure cyber lessons of 2025
Asset Management Information Security Industrial (Industry)
Africa has seen an accelerated, large-scale digitisation of our overall industrial base, and this rapid convergence of IT and OT is happening on a foundation that, in essence, was not designed to be cybersecure.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.