From the inside out

May 2017 Editor's Choice, Perimeter Security, Alarms & Intruder Detection, Integrated Solutions

In the traditional layered approach to security, securing the perimeter is a critical aspect of the full security solution. When it comes to large areas that need to be secured, however, such as one finds on mines, ports, game reserves, borders and large industrial plots, protecting your perimeter is a complex task.

Charles Harrison, MD of local system integrator Secu-Systems explains that while there are many products that can detect a perimeter breach and raise the alarm, there are few which can then track the suspect once inside the perimeter of large environments. Due to the large open spaces of these environments, by the time security personnel get to the breach location, the suspects will have moved off and can be anywhere on the site.

Secu-Systems’ Spotter is a solution to this problem that uses thermal and visual surveillance cameras, as well as Panoptes MTI software to set up a perimeter protection solution from well within the perimeter. The system needs to be set up on a high site where it can view the area to be monitored, and from where it provides 360-degree protection.

Due to the combination of visual and thermal cameras, the system works 24-hours per day, irrespective of light or weather conditions. Moreover, the Panoptes software, developed for the Australian military, will identify intruders from kilometres away

and then track them as they breach the perimeter and move into the area. Security personnel can therefore be sent to their exact location.

Security and safety

Spotter can also be used to monitor specific sites to prevent theft of anything from fuel to pipes and cabling, as well as malicious damage to property. Keeping an eye on the movement around vehicles and diesel pumps will quickly identify unauthorised movement after hours, for example, preventing theft and damage.

From a safety perspective, the Secu-Systems solution also provides an additional layer of security in dangerous environments. In the mining field, for example, illegal miners are a problem throughout Africa and are often injured or killed during normal mining operations – such as dumping. With the solution in place, Harrison says it is easy to identify where people are and ensure there are no injuries and therefore that the mine will not have to lose money from being forced to shut down while an investigation is conducted.

Harrison provides an example of a solution installed at a mine with a perimeter of well over 50 km. Ten Spotter systems (in other words, 10 camera installations at high points) were installed and they cover the whole mine, and area of about 150 square kilometres.

Another example he offers is from a West African mine in Guinea. This mine is plagued by over 100 000 illegal miners. Six Spotter systems were installed to cover an area of about 63 square kilometres. Image 1 shows an illegal mining camp on the mine, while Image 2 shows a few of these miners at work.

Image 1.
Image 1.
Image 2.
Image 2.

In all cases, Harrison says the savings customers have experienced as a result of installing the Secu-Systems’ solution has been substantial. In fact, he says that not only is the solution the cheapest per square metre in the industry, it delivers the best in terms of measurable reduction in losses in the mining environment – not to mention the life safety aspect.

Image 3.
Image 3.

Image 4.
Image 4.

Image 5.
Image 5.

Self-sufficient

Spotter solutions are housed in self-sufficient containers fitted with their own power reticulation, which includes solar panels mounted to the roof of the container and battery banks installed within the container. Security systems are integrated with the camera solution and include wall-top and/or additional freestanding electric fencing with energisers operating off the internal power reticulation. All sides of the container are equipped with nozzles and high-pressure hydraulic piping. It also includes wireless communication back to a centralised control room (as long as line of sight can be attained).

The cameras can detect movement in as little as four pixels. Therefore, with high-powered, PTZ thermal cameras placed on high sites, intruders cannot hide and are followed throughout the location until removed, thus giving management complete 360-degree situational awareness and peace of mind.

For more information, contact Secu-Systems, +27 (0)11 794 7834, charles@secusystems.co.za, www.secusystems.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Inaugural Command the Future event in Cape Town
Gallagher News & Events Perimeter Security, Alarms & Intruder Detection
Gallagher Security Africa’s inaugural Command the Future 2025 event was a resounding success, reinforcing Gallagher’s commitment to innovation, collaboration, and long-term growth in Africa’s rapidly evolving security industry.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Toxic combinations
Editor's Choice
According to Panaseer’s latest research, 70% of major breaches are caused by toxic combinations: overlapping risks that compound and amplify each other, forming a critical vulnerability to be exploited.

Read more...
VM2 vibration detection monitor
Stafix Security Centres Products & Solutions Perimeter Security, Alarms & Intruder Detection
The JVA VM2 is a perimeter intrusion detection system designed to monitor one or two zones of microphonic (acoustic) cable to detect a perimeter breach through the noise and vibrations created by unauthorised access or vandalism.

Read more...
Continuum launches centralised access and identity management
Editor's Choice Access Control & Identity Management Integrated Solutions Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...
ArxTech: Over 30 years of evolving security solutions for South Africa’s toughest challenges
Security Services & Risk Management Integrated Solutions
[Sponsored] For over 30 years, a Centurion-based company has helped shape how security technology is designed, deployed, and supported in South Africa. Originally known as CellSecure, it now operates as ArxTech.

Read more...
Adding AI analytics to security monitoring
News & Events Perimeter Security, Alarms & Intruder Detection Residential Estate (Industry) AI & Data Analytics
SEON has announced its latest integration with Refraime, an AI-powered video analytics platform designed to elevate CCTV surveillance through real-time object detection and intelligent alerting.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.