Back to the future

Residential Estate Security Handbook 2017 Editor's Choice, Information Security, Integrated Solutions, Residential Estate (Industry)

The last 10 years has seen substantial change in the security technology world. So, what will the next 10 years bring? It is worth considering the possibilities because if you don’t, in 10 years you may not be offering the most viable solution. That would not be good for your business, or if you are a user, it could be difficult to survive the changes necessary to stay secure.

We hear so much about the ‘disrupters‘ in the environment around us. For instance, the electric car could ‘disrupt‘ the fuel industry. If so, the fuel industry needs to make plans to make the necessary changes for survival.

There are a few potential disruptors in the security sector, or we may just see it as technology advances. Let’s list a few (technical or otherwise):

1. The guarding industry is becoming too expensive for the average client. Not only must there be annual increases, but removing the E-grade, and at the end of this year, the D-grade, has a knock-on effect and big cost increases. So, something must happen to reduce the total cost of manpower.

2. The ever-increasing application of technical solutions, require that better ‘pilots‘ or operators be employed. They need to be more skilled, trained and better paid. If we don’t, the technology spend is not a good choice and the results will be far less than required.

3. The increased computing power of electronics in the security devices has opened big opportunities. Much of the analysis is being achieved in the camera for instance.

4. Improved analytics is providing more consistent results. Some solutions even have a level of learning to improve the efficiency of the system.

5. We are starting to have a greater number of open systems, that allow for system integration to take place at low cost with high returns. The open systems allow for the interconnection of different brands and products. The days are gone when the product chosen locked you in to the brand for life.

Without listing any more ‘disruptors ‘, we can see a trend:

• Less people employed.

• These employed, being much higher skilled than the current deployment.

• Technology supports greater level of automated reaction to events.

If a machine (an ATM) can be good enough to hand out cash, why can’t the entrance gate have an automated guard machine (AGM) to decide if you can enter? This is possible already. The use of drones in all aspects of life is already happening. So, the drone will become the first response to an alarm.

We have many on-line methods of paying for goods. It relies on making sure there is positive identification. Visitors to an estate may have to use ‘Pay System‘ to register as a visitor to get access through the AGM. Of course, the AGM will be a wonderful solution to those people that shout at the guards and abuse them.

The world of robotics and artificial intelligence (AI) is making these sorts of suggestions well within our capabilities. With this scenario in front of us there are a few challenges. And they are not technical, they are people challenges:

(a) Lots of people will be out of work, a big social problem.

(b) Training and upskilling of the few left to pilot the system will become vital. This training does not exist yet.

(c) The quality of communication systems, including the Internet, needs to be top class with fail-over solutions.

(d) The installer/integrator will need to be top quality. All the outcomes and results will be based on the build quality and maintenance of the system.

(e) But be careful, the AI systems monitor your actions and try to think for you. That may be the next risk we have to be aware of.

So, in the new world of less people, more technology and systems in the residential estate security space, what else can be expected? As a start:

(a) A new breed of criminal who is a technical expert. They exist already.

(b) A security manager who is a technical manager.

(c) An investigator who is skilled in the technology sector and equipment operation.

(d) Training facilities that need to have improved training courses for the new demand.

(e) Companies that offer technical audit and technical risk management services to continually evaluate the health of your system.

(f) A legal system and court procedures that will have to be able to perform in the new environment. Much of the crime may be based on technology manipulation, to the advantage of the techno-crook.

As much as we may feel this is not for us, the increasing labour costs and reducing technology costs are going to win the day. The clients will be demanding that we rise to the occasion.

It’s not the badly trained guard that is going to fail. It’s going to be the badly designed/installed/maintained technology that is going to fail. How are we going to manage that risk?

As I have been told many times, “The future is not what it used to be”.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...
Data privacy best practices for physical security teams
Genetec Surveillance Integrated Solutions IoT & Automation
Physical security systems produce large amounts of information from video footage, access control records, and licence plate data. Recommendations assist organisations in safeguarding sensitive data, while ensuring effective security operations.

Read more...
Gallagher Security strengthens KwaZulu-Natal presence
Gallagher News & Events Integrated Solutions
Gallagher Security has reinforced its commitment to the KwaZulu-Natal region with its Command the Future event. The full-day event welcomed over 100 channel partners, end users, and consultants, marking Gallagher’s third major event in Durban.

Read more...
Cloud security in visitor management and access control
SA Technologies Access Control & Identity Management Infrastructure Residential Estate (Industry) Commercial (Industry)
Cloud has become the default platform for modern security operations, from visitor management portals and remote access control to incident logging, reporting, analytics, and integrations. But “in the cloud” does not mean “someone else is securing it for us”.

Read more...
Rise in malicious insider threat reports
News & Events Information Security
Mimecast Study finds 46% of SA organisations report a rise in malicious insider threat reports over the past year: reveals disconnect between security awareness and technical controls as AI-powered attacks accelerate.

Read more...
Centurion raises the bar at HomeSec Expo
Centurion Systems News & Events Access Control & Identity Management Residential Estate (Industry) Smart Home Automation Commercial (Industry)
Centurion Systems unveiled its latest product lines at HomeSec Expo 2026, introducing SMART+, a simpler way for installers and end users to manage their Centurion installations - as well as a few new products.

Read more...
New campaign exploiting Google Tasks notifications
News & Events Information Security
New phishing scheme abuses legitimate Google Tasks notifications to trick corporate users into revealing corporate login credentials, which can then be used to gain unauthorised access to company systems, steal data, or launch further attacks.

Read more...
SMARTpod talks about HomeSec Expo 2026
SMART Security Solutions Technews Publishing News & Events Residential Estate (Industry) Videos
SMARTpod, the podcast from SMART Security Solutions, finds out more about the upcoming HomeSec Expo happening at Gallagher Estate on 4 & 5 March 2026.

Read more...
Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.