From the inside out

May 2017 Editor's Choice, Perimeter Security, Alarms & Intruder Detection, Integrated Solutions

In the traditional layered approach to security, securing the perimeter is a critical aspect of the full security solution. When it comes to large areas that need to be secured, however, such as one finds on mines, ports, game reserves, borders and large industrial plots, protecting your perimeter is a complex task.

Charles Harrison, MD of local system integrator Secu-Systems explains that while there are many products that can detect a perimeter breach and raise the alarm, there are few which can then track the suspect once inside the perimeter of large environments. Due to the large open spaces of these environments, by the time security personnel get to the breach location, the suspects will have moved off and can be anywhere on the site.

Secu-Systems’ Spotter is a solution to this problem that uses thermal and visual surveillance cameras, as well as Panoptes MTI software to set up a perimeter protection solution from well within the perimeter. The system needs to be set up on a high site where it can view the area to be monitored, and from where it provides 360-degree protection.

Due to the combination of visual and thermal cameras, the system works 24-hours per day, irrespective of light or weather conditions. Moreover, the Panoptes software, developed for the Australian military, will identify intruders from kilometres away

and then track them as they breach the perimeter and move into the area. Security personnel can therefore be sent to their exact location.

Security and safety

Spotter can also be used to monitor specific sites to prevent theft of anything from fuel to pipes and cabling, as well as malicious damage to property. Keeping an eye on the movement around vehicles and diesel pumps will quickly identify unauthorised movement after hours, for example, preventing theft and damage.

From a safety perspective, the Secu-Systems solution also provides an additional layer of security in dangerous environments. In the mining field, for example, illegal miners are a problem throughout Africa and are often injured or killed during normal mining operations – such as dumping. With the solution in place, Harrison says it is easy to identify where people are and ensure there are no injuries and therefore that the mine will not have to lose money from being forced to shut down while an investigation is conducted.

Harrison provides an example of a solution installed at a mine with a perimeter of well over 50 km. Ten Spotter systems (in other words, 10 camera installations at high points) were installed and they cover the whole mine, and area of about 150 square kilometres.

Another example he offers is from a West African mine in Guinea. This mine is plagued by over 100 000 illegal miners. Six Spotter systems were installed to cover an area of about 63 square kilometres. Image 1 shows an illegal mining camp on the mine, while Image 2 shows a few of these miners at work.

Image 1.
Image 1.
Image 2.
Image 2.

In all cases, Harrison says the savings customers have experienced as a result of installing the Secu-Systems’ solution has been substantial. In fact, he says that not only is the solution the cheapest per square metre in the industry, it delivers the best in terms of measurable reduction in losses in the mining environment – not to mention the life safety aspect.

Image 3.
Image 3.

Image 4.
Image 4.

Image 5.
Image 5.

Self-sufficient

Spotter solutions are housed in self-sufficient containers fitted with their own power reticulation, which includes solar panels mounted to the roof of the container and battery banks installed within the container. Security systems are integrated with the camera solution and include wall-top and/or additional freestanding electric fencing with energisers operating off the internal power reticulation. All sides of the container are equipped with nozzles and high-pressure hydraulic piping. It also includes wireless communication back to a centralised control room (as long as line of sight can be attained).

The cameras can detect movement in as little as four pixels. Therefore, with high-powered, PTZ thermal cameras placed on high sites, intruders cannot hide and are followed throughout the location until removed, thus giving management complete 360-degree situational awareness and peace of mind.

For more information, contact Secu-Systems, +27 (0)11 794 7834, charles@secusystems.co.za, www.secusystems.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

South African counter-drone system completes trials
Products & Solutions Perimeter Security, Alarms & Intruder Detection IoT & Automation
Pretoria-based military engineering company Centauri Technologies has announced that its TriAD counter-drone system successfully completed integrated, multi-layered C-UAS (counter-unmanned aerial system) capability trials in a vehicle-mounted configuration.

Read more...
Navigating a modern, layered security landscape
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
The convergence of perimeter control and access automation is driving demand for solutions that work together. This is the focus of HomeSec Expo 2026, which takes place on 4th and 5th March 2026 at the Gallagher Convention Centre in Johannesburg.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
Gallagher releases Command Centre v9.40
Gallagher Products & Solutions Integrated Solutions
Gallagher Security has released Command Centre v9.40, introducing new capabilities for the Controller 7000 product range and supporting optional licencing expansion to up to 24 doors per controller, more than doubling the previous limit of 10.

Read more...
2026 Industry Trends Report calls out security’s next opportunity
Integrated Solutions Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Gallagher Security has released its 2026 Security Industry Trends Report, drawing on insights from end users, channel partners, consultants, and technology stakeholders; highlighting a growing opportunity for security to play a more strategic, value-driven role across organisations worldwide.

Read more...
Inaugural Command the Future event in Cape Town
Gallagher News & Events Perimeter Security, Alarms & Intruder Detection
Gallagher Security Africa’s inaugural Command the Future 2025 event was a resounding success, reinforcing Gallagher’s commitment to innovation, collaboration, and long-term growth in Africa’s rapidly evolving security industry.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.