Trends in intruder detection

October 2017 Editor's Choice, Access Control & Identity Management, Perimeter Security, Alarms & Intruder Detection

Passive infrared (PIR) sensors seem to have been around for almost as long as electronic alarm systems*, and they continue to form the basis of most interior intruder detection systems. The technologies that have built up around them, though, continue to push the boundaries in terms of intelligence and integration with other systems such as access control. Hi-Tech Security Solutions spoke to Elvey’s Ingo Mutinelli and Secutel Technologies’ Danny Pringle to learn about the trends shaping the market.

(*In fact the first PIR sensors were commercialised in the 1970s, whereas the American Edwin Holmes is credited with inventing the first electromagnetic alarm as far back as 1853. Having created a successful market in the burglary-ridden city of New York, he also went on to develop a networking system to monitor the alarms from a central station. His son later developed a way to network the alarms using pre-existing telephone cabling, rather than laying new cables.)

Essential features

According to Mutinelli, top of the list of must-have features today is an application for the end user to drive certain features such as arming, disarming, bypassing and driving certain home automation features through Z-Wave devices, as well as allowing for video verification and push notification on events. “The end user is demanding this as a standard feature as push notifications and home control become easier,” he says. “Security managers also look to these capabilities from a site management and safety perspective as it is always better to have a view of what's happening on a site before you actually get there. Previously this info was not available to the security manager or end user.”

Pringle believes that visual verification is already an essential feature in many applications, and is becoming more so in almost every security application that relies on intruder detection. In fact, he has built Secutel Technologies around this principle, having worked closely with security control room managers and operators to recognise the fact that visuals provide an invaluable way to augment an operator’s insight into what’s happening at a client’s site and to mitigate against false alarms.

“In this context, having visuals goes a long way toward seeing that there are actually people on the premises, or other visual evidence of an intrusion (sparks coming from a grinder, for example, or a foot or another part of a human body in the scene),” says Pringle. “This effectively makes it easier for a control room operator to make informed decisions in a timely manner.”

Secutel designs and builds its hardware and software in South Africa to meet local conditions, in order to deal with issues like unstable power supply. Another issue that is important to address is the data bandwidth constraints often experienced in remote rural locations. For this reason, the company’s technology is not designed to provide continuous streams of high-definition video, but rather to take snapshots upon an event being triggered. These snapshots are then compressed to just a few tens of kilobytes before being sent via GSM, making the systems viable even when only a basic GPRS connection is available.

The company has enjoyed success with various types of business where valuables are stored on site, and in particular with several leading financial institutions where they monitor safe rooms as well as remote ATM machines. “A primary benefit of our system is that it is managed, so the client can configure everything remotely, and each camera is continuously monitored for any communications dropout. The cameras are equipped with a flash to ensure that good quality colour photos can be captured, even at night.”

Another way Secutel focuses on the needs of its target market is by employing a rental business model, rather than selling systems outright. “This benefits our clients from a capex point of view, and also because the hardware is offered on a swap-out warranty basis, so when a unit fails we automatically send a replacement one and swap it on site, rather than having to bring it back for repairs before it goes into operation again.”

Summarising the importance he places on visual verification, Pringle says: “Although the ’horses for courses’ argument cannot be dismissed, I believe the days of normal alarm systems that only employ PIR sensors and an alarm are numbered. Visual verification provides such a decisive advantage that it’s making less and less sense not to incorporate it.”

Integration is vital

With extra capabilities often comes added complexity, and Mutinelli insists that seamless and easy is how it should be when it comes to integration. “Adding bits and pieces from different manufacturers often creates many small issues which compromise security and takes the ease out of what should, in the end, be easier to work with and manage,” he states.

Mutinelli highlights DSC, UTC and Risco as three leading manufacturers of alarm security products that offer in-house integrated solutions that can be driven through an app and managed from a control room. “This means it is an end-to-end solution that gives the service provider and the end user much more power to deliver on their offering, services and requirements,” he says.

Tighter integration between intruder detection and access control is continuing to evolve as a key requirement, and in this regard Mutinelli singles out DSC’s and Risco’s offerings of integrated access control on the keypad using proximity cards and tags. “This is a built-in feature and offers higher security levels in that turning the alarm off and accessing a door needs to happen on the same platform,” he elaborates. “It works well and is seamless for basic access control applications. A dedicated access control system should still be used for a total solution and in these cases many alarm manufacturers and access control manufacturers have integrated each other’s products to offer a more integrated solution along product disciplines – Impro and DSC integration is an example thereof.”

Pringle concurs that integration with access control is of growing importance, and Secutel has been working with the likes of Salto on this front. “Being able to add visual verification adds a layer of intelligence in a situation where there is a potential breach of access control. We believe strongly that those two security disciplines are converging. A core principle of Secutel’s approach is to take an already existing system and apply it for intrusion detection purposes, rather than expect clients to rip out and replace their existing infrastructure.”

An example of how Secutel exploits existing infrastructure is a technology it has developed which uses already installed IP cameras to take snapshots, for example at night, in the case of an intrusion. The company also has a bridge device which can transparently integrate analogue cameras and upload the data captured by them to the same cloud server as other cameras on the network. Its cloud service is then able to distribute event data to business intelligence systems, for example, while specialised middleware integrates with the software on the control room side.

For more information contact:

• Ingo Mutinelli, Elvey, +27 (0)11 401 6700, ingo.mutinelli@elvey.co.za, www.elvey.co.za

• Danny Pringle, Secutel Technologies, +27 (0)10 015 1401, danny@secutel.co.za, www.secutel.co.za



Credit(s)





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Toxic combinations
Editor's Choice
According to Panaseer’s latest research, 70% of major breaches are caused by toxic combinations: overlapping risks that compound and amplify each other, forming a critical vulnerability to be exploited.

Read more...
Smarter security for real-world challenges
Secutel Technologies Surveillance
SecuVue connects existing CCTV cameras directly to the cloud, delivering exception-based alerts instead of endless footage. Visual Messenger ensures every alert and event reaches the control room securely and instantly.

Read more...
Is your entrance security secure?
SMART Security Solutions Centurion Systems Technews Publishing News & Events Access Control & Identity Management Smart Home Automation
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security.

Read more...
Continuum launches centralised access and identity management
Editor's Choice Access Control & Identity Management Integrated Solutions Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...
Adding AI analytics to security monitoring
News & Events Perimeter Security, Alarms & Intruder Detection Residential Estate (Industry) AI & Data Analytics
SEON has announced its latest integration with Refraime, an AI-powered video analytics platform designed to elevate CCTV surveillance through real-time object detection and intelligent alerting.

Read more...
Advances in electric fence management
Nemtek Electric Fencing Products News & Events Perimeter Security, Alarms & Intruder Detection
Nemtek will demonstrate its newly enhanced FG7C+ Fence Controller, now featuring an advanced software upgrade that connects all Nemtek devices, aggregating data to a single point for efficient electric fence alarm monitoring and control.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.