Tiers of remote monitoring

CCTV Handbook 2018 Surveillance, Perimeter Security, Alarms & Intruder Detection, Integrated Solutions

Remote monitoring is nothing new in the security market, alarm verification monitoring companies have been at it for years. Today, however, we have seen the remote-control room advance to offering a range of services apart from simple alarm monitoring and response though to a full remote CCTV surveillance operation.

Kevin Monk.
Kevin Monk.

Hi-Tech Security Solutions spoke to Kevin Monk, MD of the electronic security division of Stallion Security to find out what the options are when retaining a third party, such as Stallion, as a remote monitoring service provider.

Traditionally, Stallion provided guards and armed response to customers throughout South Africa. Just over a year ago, the company sold its armed response function to 7Arrows and embarked on a new strategy. Part of this was the expansion of its electronic division in terms of remote monitoring services and technical integration services.

In explaining the various remote monitoring services provided by Stallion, Monk says there are different tiers of services available, third-tier service sees the control room monitoring customers’ alarms and making use of visual verification to provide a supervisory service for guards as well as an alarm verification service using Videofied.

This service sees the company installing a control unit and camera at the client’s premises, for example in the guardhouse. At random times during the guard shift, an alarm is sounded from the control box and the guard has a certain amount of time to register with the unit. If there is no response from the guard in this time, the system (using Videofied), takes a 10-second video clip and sends it to the control room to allow the operators to see what is going on and react according to the client’s operating procedures.

Monk says the same product is used for visual alarm verification. When an alarm is raised, a video clip is sent to the control room to allow the operators to determine if it is real alarm or a false alarm.

Full surveillance

The second-tier service offers more as Stallion deploys a full CCTV installation at the client’s premises, including all the necessary communications infrastructure and so on. The service is driven by fixed alarm peripherals. When an alarm sounds, the control room calls up any of the cameras on the client’s site and verifies what the issue is. Once it has been determined that a real problem has occurred, the operators can contact the response company and the police if necessary.

The first-tier service is similar, but these incudes high-level systems that offer intelligent functionality to assist in driving the service. As an example, Monk says it could be perimeter detection system making use of video analytics on thermal cameras. Again, when an alarm is raised the operators follow the operating procedures set up with the client to respond to the situation.

He adds that thermal cameras on the perimeter are a popular option today as they cover more ground than optical cameras and are not handicapped by low light or mist etc. The company also uses optical cameras when required that are triggered by radar or other detection systems in the field.

Armed response

As noted above, Stallion sold its armed response business to 7Arrows, but the two companies still work together when an armed reaction component is required. In areas where 7Arrows may not have a presence, Stallion will collaborate with a local company and set operating processes with them. Alternatively, if a customer has a specific response company it already has a relationship with, Stallion will work with them too. The result is a turnkey solution run by Stallion according to the processes it set up with the client.

Stallion also includes its special operations division for specific security requirements clients may have. Whether it is staff protection during periods of industrial unrest, individual protection, a chauffeur and close order protection, or crisis management in the face of an environmental threat to a company that is required, Stallion Special Operations’ employees have what it takes to handle the most adverse situations. The division consists of 300 personnel and ex-military vehicles equipped with CCTV and other security technology. They are trained to deal with these high-pressure situations while collecting evidence for later use.

The above is a brief glimpse into the various offerings from Stallion designed to provide different levels of remote monitoring services to clients. Remote monitoring does not have to be the traditional alarm-response solution of the past (although it can be if that is all that is required), nor does it have to be a full surveillance installation of cameras offering full access to the client’s premises. A remote monitoring service can be tailored to the requirements of the client, offering the security they require, which obviously means the costs can be tailored to meet the customer’s budget requirements without weakening their security posture.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Inaugural Command the Future event in Cape Town
Gallagher News & Events Perimeter Security, Alarms & Intruder Detection
Gallagher Security Africa’s inaugural Command the Future 2025 event was a resounding success, reinforcing Gallagher’s commitment to innovation, collaboration, and long-term growth in Africa’s rapidly evolving security industry.

Read more...
Smarter investigations in Security Center SaaS
Genetec Surveillance
Genetec has announced new intelligent automation (IA)-powered investigation capabilities in Security Center SaaS to help operators quickly locate video evidence, understand the context surrounding an event, and close cases in minutes.

Read more...
ONVIF to end support for Profile S
News & Events Surveillance
ONVIF has announced that it will end support for ONVIF Profile S and recommends using its successor, Profile T. Profile S is the first-ever profile introduced by ONVIF in 2011.

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
VM2 vibration detection monitor
Stafix Security Centres Products & Solutions Perimeter Security, Alarms & Intruder Detection
The JVA VM2 is a perimeter intrusion detection system designed to monitor one or two zones of microphonic (acoustic) cable to detect a perimeter breach through the noise and vibrations created by unauthorised access or vandalism.

Read more...
Recording 40 high-resolution channels
Dallmeier Electronic Southern Africa Surveillance Products & Solutions
With the new MK4 revision of the DMS 2400, Dallmeier introduces a more powerful version of its video appliance, enabling the recording of up to 40 high-resolution video streams, and offering significantly increased capacity.

Read more...
New Edge AI Plus PTZ cameras with analytics
Products & Solutions Surveillance
IDIS has unveiled two new PTZ cameras that are NDAA-compliant, delivering AI auto-tracking, rapid 40x zoom, EIS image stabilisation, and advanced automated AI functionality.

Read more...
Direct-to-cloud surveillance platform
Surveillance Infrastructure
Oncam has announced a forthcoming end-to-end, direct-to-cloud video platform that combines AI-enabled cameras, intelligent IoT devices, and cloud-integrated video management software to deliver smarter performance with reduced complexity.

Read more...
Smarter security for real-world challenges
Secutel Technologies Surveillance
SecuVue connects existing CCTV cameras directly to the cloud, delivering exception-based alerts instead of endless footage. Visual Messenger ensures every alert and event reaches the control room securely and instantly.

Read more...
Continuum launches centralised access and identity management
Editor's Choice Access Control & Identity Management Integrated Solutions Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.