Partnering with estates for security success September 2017, This Week's Editor's Pick, Perimeter Security, Alarms & Intruder Detection, Integrated Solutions, Residential Estate (Industry)
The team at Elf Rentals considers themselves to be specialist partners in the electronic security sector in terms of the financing, installation and maintenance of security contracts.
The company’s Chris Lovemore points out that that the sophistication of electronic security equipment, including fencing, access control, biometric access, power supplies and networking, results in long-term reliability issues. “This sophisticated equipment, by its very nature, is not able to be installed and run smoothly ad infinitum. This means that it requires continual maintenance and upgrading during its lifetime.”
This, he says, is where Elf Rentals enters the fray. “By offering clients a number of customised options, we are able to eliminate the issues they commonly face with security system purchases, such as unreliable suppliers who go out of business and can no longer support the equipment.
“Any residential estate that is serious about their security needs to enter into a partnership with a company that is able to provide a great knowledge base, as well as high levels of service and technical capabilities,” he adds. Lovemore says that a number of defining elements differentiate the company. Firstly, Elf automatically extends the warranties on all security equipment it supplies to clients from the standard 12 months to 60 months. This additional cover is supplied to clients at no additional cost to them, thereby providing them with complete peace of mind, as Elf covers the risk of failure on all equipment it provides.
Secondly, Elf insures all the equipment supplied. Typically, if equipment is damaged by, for example a lightning strike, the downtime that ensues while insurers are contacted and forms are submitted, could compromise the security of the estate and its residents. In what can be deemed a completely seamless operation, Elf simply goes straight to site and fixes the equipment and thereafter makes the necessary claims with its insurers. This ensures that systems are never inoperational for extended periods of time.
“We are able to link to third-party guarding companies, providing equipment training for the security requirement. We are also able to provide direct financing for clients. We do not use an intermediary financier and are therefore able to write contracts where we can take much more risk, and we are not holding clients to ransom, as with some finance contracts. We see ourselves as technical partners who make sure systems work 100% efficiently all of the time,” says Lovemore.
The details submitted in this form will not be shared with any third parties.
Trust but continually verify November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions, IT infrastructure Hi-Tech Security Solutions looks at access and identity management and asks some industry players what ‘zero trust’ and ‘least privilege’ access means.
Managing who, what and why November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security Today’s access control isn’t only concerned with who has access, but also what has access, why they need it and what they are doing with it.
Physical/logical convergence November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Integrated Solutions, IT infrastructure The convergence between physical and logical (or cyber) security will be a game-changer because it will change the way we do everything, from planning to design and all the way to installation and maintenance.
Physical and logical convergence is a fact November 2018, This Week's Editor's Pick, Integrated Solutions, IT infrastructure Convergence, the next buzzword? A dated buzzword? Is convergence merely integration on steroids? What is convergence?
The expanding role of IT in access control November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, IT infrastructure What role is IT playing in the world of physical access control and how far will its role expand in future?
Taking augmented identity to the world November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions Hi-Tech Security Solutions spoke to Gary Jones, VP Global Channel and Marketing biometric access and time solutions) at IDEMIA (formerly Morpho) about his career with the company and its new vision of Augmented Identity.
BIMS set to change identity management November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions, IT infrastructure Local biometrics integrator, Ideco Biometric Security Solutions, has announced that its Biometric Identity Management System (BIMS) has been launched to market.
Tracking biometrics into a brave new digital world November 2018, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions The industry is increasingly transitioning from unimodal to more integrated multimodal biometric solutions for more accurate identity verification and faster real-time results.
A better approach to fingerprint biometrics November 2018, This Week's Editor's Pick, Access Control & Identity Management Not all optical biometric fingerprint scanners are created equal. The type of sensor used has a powerful impact on speed, accuracy, reliability and portability.
Key components of access control November 2018, Paxton Access, Access Control & Identity Management, Integrated Solutions Dan Drayton speaks to Hi-Tech Security Solutions about what the key components in modern access control systems are.
The right access decisions November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management Making the right access control decision depends on what you want secured and how secure it should be.
IP is no stranger to access control November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions, IT infrastructure Just as the surveillance market made the move to IP-based communications, the access control market is also moving to IP (or some say it already has).