A tangible return on investment

CCTV Handbook 2019 Surveillance, Integrated Solutions

We have enough megapixels to see minute detail and an assortment of low-light and thermal cameras to see in the most challenging conditions. Perimeter protection and intrusion verification technology is undergoing constant advances. Solutions to trace, monitor and manage the movement of staff and visitors to our facilities and residences is at the cutting edge of innovation. Why then, are so many security solutions still viewed in a negative light?

The answer does not only lie in the technology itself, but in the experience of true business value. Whilst we have technology that can deliver on our most complex requirements, when it comes to specifying the solution, the objective is often from a single-function security perspective. Generally, the misnomer of the more devices or manpower one engages to resolve the issue applies. The objectives should rather be the maximisation of the investment and the ability to extract and deliver tangible value from the solution.

Adding value to security

We all know that traditional security solutions are often regarded as grudge purchases. We have to have some form of security to feel safer and somehow protected – especially in South Africa. Bidvest Protea Coin is determined to change this perception though a combination of innovative design and the application of traditional security systems to deliver a significant and tangible impact on its clients’ business as a whole.

Today it is possible to have a state-of-the-art security solution that delivers results that can be measured, as well as adding value beyond just the security function

If we look at the financial sector, Bidvest Protea Coin has a proof of concept in one particular institution where the business is integrating the concept of customer experience into its security surveillance installation. On arrival at the organisation, the client will be recognised via facial recognition and be personally greeted by name by the receptionist.

This level of personal attention creates an overall enhancement of the client’s experience and allows for the effective conduct of their business within the organisation. Frustration which usually accompanies queuing or delayed service is mitigated and the client is left feeling valued and satisfied.

More than that, the system will also provide business intelligence to the organisation, allowing management to understand how many and which clients are in the branch at any particular time of day, and what they are there for. This will allow for the more efficient allocation of resources and even provide indicators as to what can be added to online or mobile apps to make dealing with the organisation more convenient for the clients.

Within a factory setting, the security cameras can be used to monitor access to the facility, directional flow of processes and the immediate identification of safety risks. Thermal cameras can detect overheating machines, allowing supervisors to respond so as to avoid a breakdown or production interruption and thereby avoiding the resultant financial loss.

A number of Bidvest Protea Coin’s clients have implemented biometric clocking, not only for access control, but also for time and attendance purposes. This delivers an accurate payroll at the end of the month, avoiding discrepancies and possible disruption

You don’t have to be on site

Another benefit of security is that the communication options we have today means that you don’t always require guards on your premises 24x7. In the evening, for example, cameras can monitor the property and the video analytics (and increasingly, video analytics enhanced by artificial intelligence) can alert a remote control room when there is an irregularity or movement within a shutdown, vulnerable or high-risk area.

The advances in AI and analytics mean that recognition is much better than ever before and the system can determine if the movement is a positive event or a false alarm. On receipt of a positive incident, an alarm is triggered in the control room and the operator will react in accordance with the pre-determined SOP (standard operating procedures).

It’s an IoT world

The ability to link many different products and make so many unique solutions is one of the benefits of the IoT (Internet of Things). Security is part of this revolution and the value that integrated solutions can add to your security operation and your business in general – whether marketing, operations or facilities management, etc. – is almost infinite.

The catch to realising this value, however, lies in retaining the right solutions partner that is able to understand its client’s particular needs and determine the best strategy to meet and exceed those needs.


Credit(s)





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

When your security starts thinking with you
Secutel Technologies Surveillance Perimeter Security, Alarms & Intruder Detection AI & Data Analytics
If you manage a warehouse or logistics environment, you already understand how quickly risk can escalate during the day and after hours. The question is: how quickly can you respond?

Read more...
SWEAR integrates with Milestone
Milestone Systems Surveillance Products & Solutions
Security footage, legal evidence, and other critical surveillance assets face increasing risks of tampering, raising chain-of-custody questions, jeopardising admissibility, and undermining the timely operational decisions that depend on credible video.

Read more...
Genetec launches Cloudlink 2210
Genetec Infrastructure Surveillance
New cloud-managed appliance addresses the practical challenges when adopting a cloud-managed model at scale, including storage costs, support for devices that do not enable direct-to-cloud connectivity, and the need to maintain local operation during connectivity disruptions

Read more...
Data privacy best practices for physical security teams
Genetec Surveillance Integrated Solutions IoT & Automation
Physical security systems produce large amounts of information from video footage, access control records, and licence plate data. Recommendations assist organisations in safeguarding sensitive data, while ensuring effective security operations.

Read more...
Gallagher Security strengthens KwaZulu-Natal presence
Gallagher News & Events Integrated Solutions
Gallagher Security has reinforced its commitment to the KwaZulu-Natal region with its Command the Future event. The full-day event welcomed over 100 channel partners, end users, and consultants, marking Gallagher’s third major event in Durban.

Read more...
Duxbury SA Milesight distributor
Duxbury Networking News & Events Surveillance
Duxbury Networking has been appointed the exclusive distributor of Milesight surveillance solutions in South Africa, expanding its surveillance portfolio with a platform designed to deliver AI-driven analytics, rapid deployment, and open integration for modern security environments.

Read more...
Transforming video surveillance into strategic intelligence
Secutel Technologies Products & Solutions Surveillance
In a world where risk moves faster, and operations are more interconnected than ever, you need more than footage — you need insight.

Read more...
SMARTpod talks about HomeSec Expo 2026
SMART Security Solutions Technews Publishing News & Events Residential Estate (Industry) Videos
SMARTpod, the podcast from SMART Security Solutions, finds out more about the upcoming HomeSec Expo happening at Gallagher Estate on 4 & 5 March 2026.

Read more...
Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.