classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2018


Why own when you can rent?
November 2017, Access Control & Identity Management, Security Services & Risk Management

In a rapid changing environment, business is moving away from owning security equipment to a model of serviced rentals. This is in line with the global trend for businesses today to deploy resources on their core activities.

Capital and time are the two most valuable and limited resources in business and therefore have to be preserved. Customers deploy capital when buying equipment, but also waste a lot of time managing and maintaining these specialised technologies.

The rental model protects these two resources. The model is convenient in that the capital requirement and maintenance is managed by the service provider. Customers can focus on their core business while their provider takes care of non-core activities.

Discussing the advantages of the rental model, Almero Jacobs, business unit head of EOH Technology Rental Solutions, says flexibility is one of the main benefits. “When the economy forces business to upscale or downscale, the rental model proves its worth. The customer has the flexibility to extend the rental at a reduced rate and get longer use of the equipment, or the option to return items at no further cost. An existing contract can even be re-negotiated to improve cash flow.”

Another benefit Jacobs highlights is the buy-back option in a rental agreement. “EOH will buy and rent equipment back to the customer. A buy-back transaction returns cash flow to the customer that can again be deployed somewhere else. In the current economic climate where cash flow improvement is a main focus area, EOH’s buy-back agreements can contribute great value to customers.”

The company has also made the process of credit vetting as simple as possible, with the EOH team driving the process. It has drafted a simple Master Rental Agreement (MRA) that is easily understandable. Equipment will be signed on a schedule by schedule basis, implying that the MRA only needs to be signed once. Every order subsequent to signature of the MRA will be done through a one page schedule, making additions and changes to the contract easy and fast.

What type of equipment can be rented?

“We offer a wide spread of equipment on a rental basis,” explains Jacobs. “Over and above access control equipment, EOH also offers the following assets on rental: specialised security, software, networking equipment, solar solutions, generators, unified communication and AV.”

The company applies two main rules to determine whether equipment is rentable or not:

1. Is there a serial number attached to the asset?

2. Can the asset be removed from the premises?

“The above allows us to offer a rental solution to almost any technology related asset,” concludes Jacobs.

EOH Security and Building Technologies is a fully owned EOH subsidiary and has been in the technology security space for decades, offering technology and services to its various customers via the rental model.

For more information, contact EOH Security and Building Technologies, +27 (0)11 844 3276, technology.rentals@eoh.com


Credit(s)
  Share via Twitter   Share via LinkedIn      

Further reading:

  • Directory of access and identity management suppliers 2019
    November 2018, Access Control & Identity Management

  • Open source identity initiative
    November 2018, Access Control & Identity Management
    Industry-first open source identity initiative promises to eliminate vendor lock-in and reduce costs for governments around the world.
  • Significant differences in ­perceptions on state of digital trust
    November 2018, CA Southern Africa, Access Control & Identity Management, Security Services & Risk Management
    Nearly half of businesses admit to selling customer data, despite claiming data ­protection as paramount; consumer behaviour shows strong correlation between loss of business and lack of digital trust.
  • Trust but continually verify
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Hi-Tech Security Solutions looks at access and identity management and asks some industry players what ‘zero trust’ and ‘least privilege’ access means.
  • The expanding role of IT in access control
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, IT infrastructure
    What role is IT playing in the world of physical access control and how far will its role expand in future?
  • Taking augmented identity to the world
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    Hi-Tech Security Solutions spoke to Gary Jones, VP Global Channel and Marketing biometric access and time solutions) at IDEMIA (formerly Morpho) about his career with the company and its new vision of Augmented Identity.
  • A scan of fingerprint biometrics
    November 2018, Technews Publishing, Access Control & Identity Management
    Given the increase in the use of fingerprint technology in public and private organisations, as well as some recent announcements on the reliability or lack or reliability of certain types of sensors and algorithms in the fingerprint biometric market, Hi-Tech Security Solutions spoke to some of the leading fingerprint biometric vendors in the market to find out more about the state of this market.
  • BIMS set to change identity ­management
    November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Local biometrics integrator, Ideco Biometric Security Solutions, has announced that its Biometric Identity Management System (BIMS) has been launched to market.
  • Tracking biometrics into a brave new digital world
    November 2018, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    The industry is increasingly transitioning from unimodal to more integrated multimodal biometric solutions for more accurate identity verification and faster real-time results.
  • Panasonic’s Face Recognition Server
    November 2018, Panasonic South Africa, Access Control & Identity Management, CCTV, Surveillance & Remote Monitoring, Products
    Panasonic has adopted deep learning technology in its face recognition products that overcomes the difficulties of conventional technologies.
  • A better approach to fingerprint biometrics
    November 2018, This Week's Editor's Pick, Access Control & Identity Management
    Not all optical biometric fingerprint scanners are created equal. The type of sensor used has a powerful impact on speed, accuracy, reliability and portability.
  • Your face tells a story
    November 2018, Technews Publishing, Access Control & Identity Management, CCTV, Surveillance & Remote Monitoring, Government and Parastatal (Industry)
    Facial recognition has advanced to the point where it can be rolled out over large areas and accuracy is no longer a hit-and-miss affair.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.