classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn

Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2017

Back to the future
September 2017, This Week's Editor's Pick, Cyber Security, Integrated Solutions, Residential Estate (Industry)

The last 10 years has seen substantial change in the security technology world. So, what will the next 10 years bring? It is worth considering the possibilities because if you don’t, in 10 years you may not be offering the most viable solution. That would not be good for your business, or if you are a user, it could be difficult to survive the changes necessary to stay secure.

We hear so much about the ‘disrupters‘ in the environment around us. For instance, the electric car could ‘disrupt‘ the fuel industry. If so, the fuel industry needs to make plans to make the necessary changes for survival.

There are a few potential disruptors in the security sector, or we may just see it as technology advances. Let’s list a few (technical or otherwise):

1. The guarding industry is becoming too expensive for the average client. Not only must there be annual increases, but removing the E-grade, and at the end of this year, the D-grade, has a knock-on effect and big cost increases. So, something must happen to reduce the total cost of manpower.

2. The ever-increasing application of technical solutions, require that better ‘pilots‘ or operators be employed. They need to be more skilled, trained and better paid. If we don’t, the technology spend is not a good choice and the results will be far less than required.

3. The increased computing power of electronics in the security devices has opened big opportunities. Much of the analysis is being achieved in the camera for instance.

4. Improved analytics is providing more consistent results. Some solutions even have a level of learning to improve the efficiency of the system.

5. We are starting to have a greater number of open systems, that allow for system integration to take place at low cost with high returns. The open systems allow for the interconnection of different brands and products. The days are gone when the product chosen locked you in to the brand for life.

Without listing any more ‘disruptors ‘, we can see a trend:

• Less people employed.

• These employed, being much higher skilled than the current deployment.

• Technology supports greater level of automated reaction to events.

If a machine (an ATM) can be good enough to hand out cash, why can’t the entrance gate have an automated guard machine (AGM) to decide if you can enter? This is possible already. The use of drones in all aspects of life is already happening. So, the drone will become the first response to an alarm.

We have many on-line methods of paying for goods. It relies on making sure there is positive identification. Visitors to an estate may have to use ‘Pay System‘ to register as a visitor to get access through the AGM. Of course, the AGM will be a wonderful solution to those people that shout at the guards and abuse them.

The world of robotics and artificial intelligence (AI) is making these sorts of suggestions well within our capabilities. With this scenario in front of us there are a few challenges. And they are not technical, they are people challenges:

(a) Lots of people will be out of work, a big social problem.

(b) Training and upskilling of the few left to pilot the system will become vital. This training does not exist yet.

(c) The quality of communication systems, including the Internet, needs to be top class with fail-over solutions.

(d) The installer/integrator will need to be top quality. All the outcomes and results will be based on the build quality and maintenance of the system.

(e) But be careful, the AI systems monitor your actions and try to think for you. That may be the next risk we have to be aware of.

So, in the new world of less people, more technology and systems in the residential estate security space, what else can be expected? As a start:

(a) A new breed of criminal who is a technical expert. They exist already.

(b) A security manager who is a technical manager.

(c) An investigator who is skilled in the technology sector and equipment operation.

(d) Training facilities that need to have improved training courses for the new demand.

(e) Companies that offer technical audit and technical risk management services to continually evaluate the health of your system.

(f) A legal system and court procedures that will have to be able to perform in the new environment. Much of the crime may be based on technology manipulation, to the advantage of the techno-crook.

As much as we may feel this is not for us, the increasing labour costs and reducing technology costs are going to win the day. The clients will be demanding that we rise to the occasion.

It’s not the badly trained guard that is going to fail. It’s going to be the badly designed/installed/maintained technology that is going to fail. How are we going to manage that risk?

As I have been told many times, “The future is not what it used to be”.

Supplied By: Adamastor Consulting
Tel: 086 099 5269
Fax: 086 211 0993
  Share via Twitter   Share via LinkedIn      

Further reading:

  • People on the move
    November 2017, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Sanjay Dharwadker looks at some of the changes that have been enacted to better manage Europe’s borders.
  • Access and identity: looking ahead
    November 2017, neaMetrics, ZKTeco, Powell Tronics, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    Access and identity is more important than ever with more options than ever for companies looking for solutions that go beyond mere entry and exit.
  • A question of trust and ­accountability
    November 2017, Technews Publishing, Access Control & Identity Management, Integrated Solutions
    Access and identity management is about trust, how you assign it, how much you allow and how you manage it.
  • Trusting your privilege
    November 2017, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    Privileged access management is the starting point for effective enterprise identity and access management, whichever device you're logging in from.
  • Integrating surveillance and access
    November 2017, Cathexis Technologies, Gallagher, Milestone Systems, Paxton Access, Access Control & Identity Management, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
    Integrating access control and surveillance is a good idea, but those who take on this task have their work cut out for them.
  • The access edge
    November 2017, Johnson Controls, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions, Security Services & Risk Management
    With the common denominator of IP networks as their backbone, building automation, security and, in particular, access control systems are increasingly providing opportunities to both security integrators and building managers.
  • Facing the future
    November 2017, neaMetrics, Virdi Distribution SA, This Week's Editor's Pick, Access Control & Identity Management, IT infrastructure
    Facial biometrics is coming into its own today, but is it a 100% reliable means of identity verification and authentication?
  • Access on the edge
    November 2017, Suprema, Access Control & Identity Management, Integrated Solutions
    CoreStation handles half a million users with a fingerprint matching speed of up to 400 000 match/second and simultaneous matching speeds of up to 8 devices in 1 second.
  • Automated facial recognition
    November 2017, Access Control & Identity Management, Integrated Solutions
    NEC provides facial recognition system to South Wales Police in the UK, contributes to safe management of Champions League final.
  • Using biometrics to prevent financial crime
    November 2017, Access Control & Identity Management, Integrated Solutions
    Biometrics is about more than the fingerprint or retina terminal itself, it’s about storing data in forensically-signed databases, that is admissible in a court of law.
  • Securing your access security
    November 2017, G4S South Africa, Impro Technologies, This Week's Editor's Pick, Access Control & Identity Management, Cyber Security
    While one may not consider access control solutions a prime hacking target, any connected device is a target in today’s world.
  • Ding dong, it’s IP
    November 2017, Elvey, TOA Electronics, Zhejiang Dahua Technology, CAME BPT South Africa, This Week's Editor's Pick, Access Control & Identity Management
    IP and open standards have taken the security technology world to a new level where proprietary systems and customer lock-in are no longer the global standard.

Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Terms & conditions of use, including privacy policy
PAIA Manual
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.