Taking the pain out of maintenance

June 2017 Integrated Solutions, Infrastructure

In terms of interoperability, it is common knowledge that electronic security systems have not evolved at the same rate as information technology and telecommunication systems. With the advent of IP this has started to change, but at a far slower rate than expected. Even though an attempt at implementing standards is underway, it is driven mostly by manufacturers rather than independent third-party organisations.

Bernard  Senekal.
Bernard Senekal.

According to Bernard Senekal, Naxian Systems director, interoperability is therefore very much the Achilles heel of the electronic security industry. “This ‘ransomware’ approach, where manufacturers lock clients into bespoke solutions and closed system architectures has created dissonance between the electronic security industry and the world of technology at large.

“Combine this with the fact that the electronic security industry has no real regulatory barriers to entry and you have a knock-on effect that translates directly into a reactive, antiquated method by which systems are supported and maintained.” This, he continues, is the case for small through to large enterprise systems, the result of which is the negative impact on the cost of maintaining systems by implementers as well as the creation of unnecessary risk and operational inefficiencies, due to system downtime for end users.

The secret, Senekal believes, is the provision of a safe passage between interoperability and electronic security systems. Naxian Systems’ IoT (Internet of Things) platform, Synapse, provides the bridge that allows a quick way to cross from this sinking island onto the technology mainland.

Figure 1.
Figure 1.

The challenge is that technologies that allow for predictive and preventative maintenance are not available to the mass market inside the security industry. Naxian is changing this with its smart services offer.

Senekal points out that technical support for sites typically requires the process outlined in Figure 1. The cost in productivity, operational efficiency and increased risk in the above scenario is based on the following:

• The time between when the incident occurs and when it is reported

• The time between when the incident is reported and the technician is able to visit the site

• The time taken to diagnose and determine the root cause of the problem

• The time to source and collect the necessary resources and return to site in order to resolve the issue and bring the system online again.

Figure 2.
Figure 2.

Naxian Systems’ Smart Services Platform (SSP) introduces a combination of Internet of Things (IoT), Artificial Intelligence (AI) and Deep Learning technologies to ensure the scenario outlined in Figure 2. Ultimately, this results in:

• The right technical resource, with the correct spares and full diagnostic being deployed to site,

• Inside the correct time frame,

• With the predictive ability to ensure that technical resources are notified of things that will go wrong, before they actually go wrong.

Monitoring and managing system and device health

So how exactly does it work? “First and foremost, this is a software solution that allows for any security and/or networkable device to be connected to a cyber secure and hosted/cloud environment from where Naxian’s Smart Services Centre collects the relevant system and device health data. The processing of the data occurs in the cloud while the output and results are managed securely inside the secure SAIDSA-approved control room environment. The platform is completely product- and discipline-agnostic,” says Senekal.

Operators who are proficient at dealing with electronic security and information technology systems manage the risk of the system and device health through automated monitoring and the issuance of responses back to allocated technical resources, who can respond to the issue with a complete diagnostic and problem resolution listing.

Naxian’s Everywhere application allows for users with mobile devices to receive events, acknowledge the receipt of these events and then have performance measured against SLAs or an acceptable response and resolutions set for the client or site. A technical support call cannot be flagged as ‘COMPLETE’ unless Naxian’s Artificial Intelligent agent, Annie, accepts the resolution of the technical issue that was reported.

Before a support ticket is allocated to a resource, Annie will survey the geolocation of the closest technical resources available to assist with the problem. Based on her understanding of the timeframe allowed to acknowledge, respond and resolve the incident, she will consider the profile and historic performance of the technical resources available. She will then allocate the best available resource to resolve the category and incident type for the specific system in question and provide route optimisation based on Google Map analytics for the resource to make his way to the site.

Reporting will indicate strengths and weaknesses of technical resources in order for skills development activities to be planned and customised for resources. Senekal says that the company is currently investigating an e-learning platform that will automatically suggest courses designed specifically for the needs of a group or individual resources.

Future Naxian Systems services will include:

• Video analytics as a service for:

- Retail

- Perimeter security

- Traffic management

- Logistics and supply chain environments.

• Process visualisation as a service (the integration of video surveillance and analytics into business process systems such as warehouse management, HR, ERP, CRM, scanning and RFID).

• Real-time incident backup into the cloud.

“In an industry where your relationship is as good as your last technical support call, we see this service as ground breaking, disruptive and a non-negotiable for any forward thinking electronic security company,” says Senekal.

For more information contact Naxian, +27 (0)87 820 0620, bernard@naxian.co.za, www.naxian.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Gallagher releases Command Centre v9.40
Gallagher Products & Solutions Integrated Solutions
Gallagher Security has released Command Centre v9.40, introducing new capabilities for the Controller 7000 product range and supporting optional licencing expansion to up to 24 doors per controller, more than doubling the previous limit of 10.

Read more...
2026 Industry Trends Report calls out security’s next opportunity
Integrated Solutions Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Gallagher Security has released its 2026 Security Industry Trends Report, drawing on insights from end users, channel partners, consultants, and technology stakeholders; highlighting a growing opportunity for security to play a more strategic, value-driven role across organisations worldwide.

Read more...
The global state of physical security
Genetec News & Events Infrastructure
Physical security has become a strategic business function, improving IT collaboration and decision-making. Moreover, interest in AI has more than doubled among users, and organisations seek flexibility to deploy workloads on-premises, in the cloud, or hybrid.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Short-range indoor LiDAR sensor
OPTEX Perimeter Security, Alarms & Intruder Detection Infrastructure Products & Solutions
The REDSCAN Lite RLS-1010L has been developed to provide comprehensive coverage and protect high-risk security zones and vulnerable, narrow indoor spaces that are difficult to protect with traditional sensors.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.