Tiers of remote monitoring

CCTV Handbook 2018 Surveillance, Perimeter Security, Alarms & Intruder Detection, Integrated Solutions

Remote monitoring is nothing new in the security market, alarm verification monitoring companies have been at it for years. Today, however, we have seen the remote-control room advance to offering a range of services apart from simple alarm monitoring and response though to a full remote CCTV surveillance operation.

Kevin Monk.
Kevin Monk.

Hi-Tech Security Solutions spoke to Kevin Monk, MD of the electronic security division of Stallion Security to find out what the options are when retaining a third party, such as Stallion, as a remote monitoring service provider.

Traditionally, Stallion provided guards and armed response to customers throughout South Africa. Just over a year ago, the company sold its armed response function to 7Arrows and embarked on a new strategy. Part of this was the expansion of its electronic division in terms of remote monitoring services and technical integration services.

In explaining the various remote monitoring services provided by Stallion, Monk says there are different tiers of services available, third-tier service sees the control room monitoring customers’ alarms and making use of visual verification to provide a supervisory service for guards as well as an alarm verification service using Videofied.

This service sees the company installing a control unit and camera at the client’s premises, for example in the guardhouse. At random times during the guard shift, an alarm is sounded from the control box and the guard has a certain amount of time to register with the unit. If there is no response from the guard in this time, the system (using Videofied), takes a 10-second video clip and sends it to the control room to allow the operators to see what is going on and react according to the client’s operating procedures.

Monk says the same product is used for visual alarm verification. When an alarm is raised, a video clip is sent to the control room to allow the operators to determine if it is real alarm or a false alarm.

Full surveillance

The second-tier service offers more as Stallion deploys a full CCTV installation at the client’s premises, including all the necessary communications infrastructure and so on. The service is driven by fixed alarm peripherals. When an alarm sounds, the control room calls up any of the cameras on the client’s site and verifies what the issue is. Once it has been determined that a real problem has occurred, the operators can contact the response company and the police if necessary.

The first-tier service is similar, but these incudes high-level systems that offer intelligent functionality to assist in driving the service. As an example, Monk says it could be perimeter detection system making use of video analytics on thermal cameras. Again, when an alarm is raised the operators follow the operating procedures set up with the client to respond to the situation.

He adds that thermal cameras on the perimeter are a popular option today as they cover more ground than optical cameras and are not handicapped by low light or mist etc. The company also uses optical cameras when required that are triggered by radar or other detection systems in the field.

Armed response

As noted above, Stallion sold its armed response business to 7Arrows, but the two companies still work together when an armed reaction component is required. In areas where 7Arrows may not have a presence, Stallion will collaborate with a local company and set operating processes with them. Alternatively, if a customer has a specific response company it already has a relationship with, Stallion will work with them too. The result is a turnkey solution run by Stallion according to the processes it set up with the client.

Stallion also includes its special operations division for specific security requirements clients may have. Whether it is staff protection during periods of industrial unrest, individual protection, a chauffeur and close order protection, or crisis management in the face of an environmental threat to a company that is required, Stallion Special Operations’ employees have what it takes to handle the most adverse situations. The division consists of 300 personnel and ex-military vehicles equipped with CCTV and other security technology. They are trained to deal with these high-pressure situations while collecting evidence for later use.

The above is a brief glimpse into the various offerings from Stallion designed to provide different levels of remote monitoring services to clients. Remote monitoring does not have to be the traditional alarm-response solution of the past (although it can be if that is all that is required), nor does it have to be a full surveillance installation of cameras offering full access to the client’s premises. A remote monitoring service can be tailored to the requirements of the client, offering the security they require, which obviously means the costs can be tailored to meet the customer’s budget requirements without weakening their security posture.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

South African counter-drone system completes trials
Products & Solutions Perimeter Security, Alarms & Intruder Detection IoT & Automation
Pretoria-based military engineering company Centauri Technologies has announced that its TriAD counter-drone system successfully completed integrated, multi-layered C-UAS (counter-unmanned aerial system) capability trials in a vehicle-mounted configuration.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Navigating a modern, layered security landscape
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
The convergence of perimeter control and access automation is driving demand for solutions that work together. This is the focus of HomeSec Expo 2026, which takes place on 4th and 5th March 2026 at the Gallagher Convention Centre in Johannesburg.

Read more...
Edge AI-powered night vision
Surveillance Products & Solutions
By eliminating the need for supplemental lighting, the VIVOTEK Chroma24 low-light full-colour AI camera series provides quiet, unobtrusive protection, while also reducing power consumption and minimising impact on people, ecosystems, and the environment.

Read more...
CAA-compliant ground drone outsourcing
Surveillance IoT & Automation
South African mines, estates, utility companies, independent power producers, ports, municipalities and others can now own and operate a CAA-compliant drone dock ground station in just six to eight weeks.

Read more...
AI-powered classification across large areas
Axis Communications SA Surveillance Products & Solutions AI & Data Analytics
Axis Communications announced the upcoming launch of two innovative radars. Each device delivers a 180° or 270° horizontal field of detection, with accurate AI-powered classification across large areas, 24/7, in all weather and lighting conditions.

Read more...
Gallagher releases Command Centre v9.40
Gallagher Products & Solutions Integrated Solutions
Gallagher Security has released Command Centre v9.40, introducing new capabilities for the Controller 7000 product range and supporting optional licencing expansion to up to 24 doors per controller, more than doubling the previous limit of 10.

Read more...
Unified, AI-powered security platform
Suprema neaMetrics Access Control & Identity Management Surveillance Products & Solutions
Suprema recently announced the launch of BioStar X, its advanced unified security platform. BioStar X unifies biometric access control and video surveillance into a single, scalable platform.

Read more...
Axis signs CISA Secure by Design pledge
Axis Communications SA News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.

Read more...
Five key technology trends for the security sector in 2026
Axis Communications SA News & Events Surveillance
Axis Communications examines trends it considers important for 2026, as technology and customer requirements continue to evolve, but the basic security needs of end users remain constant.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.