classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn

Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2017

Best practices in intruder prevention
May 2018, Perimeter Security, Alarms & Intruder Detection

The aim of preventing intruder access to a premises encompasses a number of components stretching all the way from physical barriers around the site, through devices like sensors and cameras, to control room monitoring that could even take place off-site and many kilometres away.

Many technologies exist to fine-tune a solution to a site’s particular requirements, but it is important to have an holistic approach in order to get an effective system that fits the budget. To learn more about the issues involved, we interviewed Rex Pennefather, head of business development at IDS (Inhep Digital Security); Maurice Williamson, CEO of Stafix Electric Fence Centre; and Kevin Monk, technical managing director at Stallion Security.

What are the best practices when installing or upgrading a system?

Rex Pennefather: Clients need to ask themselves exactly what their environment requires to ensure the solution is fit for purpose. For example, factors to consider are how simple the system is to interact with, and how intuitive it is for their needs. It is important to have an in-depth discussion with the sales consultant during which you advise them where you would like devices mounted, which areas are most vulnerable, any environmental issues such as animals on the premises, and the normal set of expected activities for the particular application.

Maurice Williamson: In the case of a perimeter electric security fence installation, the customer should start by ensuring that the system they are proposing to install meets all the current requirements of the OHS Act, namely that the energisers have valid certificates of compliance (COC) and letters of authority (LOA); that the installer quoting is registered with the Department of Labour and has completed a certificate of competence course; that the installer is competent to install the system it is quoting on; and that it can provide reference sites.

It is also always a good idea to have a professionally drawn up tender spec sheet and to have two or three installers quote on the same specs for an apples-for-apples comparison. Then the customer should make sure they are aware of exactly what the system can and cannot provide.

Kevin Monk: In terms of the perimeter, it is important to understand who the client is, what they do, and what risks they have, to determine what is put up for perimeter detection.

If you have an electric fence that stretches over multiple kilometres, your zoning is not as precise as a thermal camera’s detection accuracy. Also, by the time you reach the place where an electric fence alarm was triggered, the intruder may have moved and you don’t know where they are. Thermal cameras allow you to track them within the detection area in real-time.

On the other hand, for a commercial business in a built-up area with a relative small yard to monitor, electric fencing is the better means of deterring and creating an alarm, combined with CCTV cameras with virtual tripwire analytics.

What visual verification methods are recommended?

Rex Pennefather: Essentially visual verification is available in two current formats. Firstly, a detector with built-in GPRS chip which sends images from the device directly to the control room or end user. This will send a few snapshots but cannot stream in most cases due to the data intensity of video footage and the cost of data. Secondly, a fully integrated IP CCTV system that allows the user or control room to access the camera and view live or retrieved footage to validate an alarm. An alarm trigger can come from the cameras themselves or from an input via a detector or device.

Visual verification is the most effective method of confirming an alarm. Faster response minimises losses in a genuine robbery situation, and reduces the inconvenience and penalties associated with false alarms. Less time spent reacting to false alarms means that private security companies’ resources are freed up to react immediately to genuine alarms. This also creates peace of mind for the end user.

Maurice Williamson: It is important the client gets usable information from his system. On a basic one- or two-zone house system, a keypad in the house will give them fence information like voltages and alarms in the house. Better keypads will keep a log of the last events and times of problems. On larger sites, PCs and tablets are added to the system to give visual graphical site displays easily showing the controller where the problems on the estate are and the exact condition of each energiser in the system, such as battery condition, fence condition, log history etc.

Optional extras such as Wi-Fi and GSM can also get the site information off-site to secondary control rooms and storage facilities. It is important the controller has good, understandable graphical representation that is backed by logs so that the controller himself can be managed too.

Kevin Monk: Visual verification is becoming more of a necessity than a trend. Stallion Security performs visual verification and has constant communication with the armed response, continuously updating them with high-level info about how many people are on site, whether they are armed, and so on. This type of info is vital so they don’t end up getting into a situation where lives are put at risk.

Armed response companies are instituting higher levels of occupational health and safety nowadays, so it is more important than ever to avoid the situation of ‘cowboys’ running into engagement scenarios. You won’t see a situation where an armed response officer will scale over a wall anymore – if there is no safe ingress/egress to the premises he instead waits until the key holder gets there. This has driven the stronger demand for visual verification, since the control room can see a lot more than the security officer standing outside.

What makes for an effective control room?

Rex Pennefather: The South African Intruder Detection Services Association (SAIDSA) provides a detailed control room setup guide, which is a good reference to work from. Essentially for video verification, a control room will need to have either a proprietary GPRS base or an IP Enigma-type base station, allowing images or data to be transferred into monitoring software, and integrated with alarm events to offer meaningful data than can be acted on.

To be operationally effective, it is important that a control room implement redundancy principles in its systems. Depending on the requirements of its clients, it may also need to provide robust support for multiple platforms to cater for a broad variety of needs.

Maurice Williamson: The ergonomics of the control room are very important. All too often the control room is an afterthought and is a pokey little corner overfilled with badly situated equipment, leaving very little room for the

controller to operate in. The control room is the heart of the system and as the controller has to stay focused for long periods, it is important that their needs are catered for.

The operator’s seating should be at a comfortable height and the monitors set at a height that doesn’t strain their neck. Depending on the degree of sophistication of the system and the number of monitors installed, the operator should be able to observe them all from his seat at eye height. Curving the control panel can also make a difference. Finally, ablution and catering facilities, and even some recreation facilities, should be considered.

Kevin Monk: The main point is to understand the software platform that the control room runs on, to ensure it provides a full audit trail, an occurrence book, and that all the alarms coming in have to be acknowledged before they are dismissed. Make sure the platform the service provider is using has full compliances and a full audit trail.

The video management system (VMS) being used should have comprehensive facilities for acknowledging an alarm, being able to type in the circumstances that took place, and the site operational procedure (SOP) needs to pop up with a list of instructions for the control room operator to follow.

What big-picture issues must be considered?

Rex Pennefather: To boil it down to three simple points:

• Know clearly what your objective is – do you want to stop, defend or deter?

• Make sure you have as much visibility as possible at your fingertips, without having to rely on an armed response company.

• Know what your system can do, to make the most of the technology and ensure your return on investment.

Maurice Williamson: The customer should ensure that the system installed covers, as many aspects of perimeter security as is possible within their budgetary constraints. Will it deter would-be intruders – does the barrier look formidable while at the same time not detracting from the aesthetics of the premises? Will the system give adequate warning in the form of sirens or lights? Can the controllers visually monitor the suspected break-in point via cameras? What is the access control system capable of, e.g. number plate recognition and facial recognition? What form of backup will the controller receive, the company’s own armed response or will they be relying on an outside source?

Kevin Monk: One must never forget the ‘delay’ aspect of a detect-deploy-delay security strategy. You can buy the most advanced detection technology in the world, but if someone can gain easy access into the premises, pick up a couple of PCs and be out in three minutes, no armed response company can react quickly enough. Something as simple as securing computers with locks and bolting screens to walls can limit the number of items a perpetrator can make off with, or even serve as a deterrent altogether.

The intelligence on-board modern equipment such as cameras and sensors on fences is advancing rapidly, and the power of these analytics is making huge differences to the perimeter security options that can be deployed. Light detection and ranging (Lidar) is an up-and-coming technology that I expect to see a lot more of in this arena in the near future, as its capacity for identifying the physical properties of objects is far more advanced than radar.

For more information contact:

• Inhep Digital Security, +27 (0)31 705 1373,,

• Ndlovu Fencing T/A Stafix Electric Fence Centre, +27 (0)33 342 6727,,

• Stallion Security, +27 (0)11 533 8888,,

Supplied By: Stafix
Tel: +27 11 397 3507
Fax: +27 11 397 7610
Supplied By: Stallion Electronic Security
Tel: +27 11 533 8888
Fax: 086 667 6618
Supplied By: Inhep Electronics Holdings
Tel: +27 31 705 1373
Fax: +27 31 705 4445
  Share via Twitter   Share via LinkedIn      

Further reading:

  • Martin Electronics
    Securex 2018 Preview, CCTV, Surveillance & Remote Monitoring, Perimeter Security, Alarms & Intruder Detection, Security Services & Risk Management
    Martin Electronics will be showcasing a number of new products and solutions under the Sentry brand at Securex 2018. The company will also have some value-added additions and integrations on display, ...
  • Ndlovu Fencing (Stafix)
    Securex 2018 Preview, Stafix, Perimeter Security, Alarms & Intruder Detection
    Ndlovu Fencing, trading as Stafix Electric Fence and Security Centres, is the southern African distributor of the international STAFIX and JVA ranges of agricultural and security solutions. All Stafix ...
  • Matrix Comsec
    Securex 2018 Preview, CCTV, Surveillance & Remote Monitoring, Access Control & Identity Management, Perimeter Security, Alarms & Intruder Detection
    Matrix offers telecom and security solutions designed, engineered, and built specifically for growing enterprises. At Securex it will showcase futuristic technologies from the security domain. Matrix ...
  • Turnstar
    Securex 2018 Preview, Turnstar Systems, Perimeter Security, Alarms & Intruder Detection, Access Control & Identity Management, Security Services & Risk Management
    Africa’s largest manufacturer of physical access control products, Turnstar, is excited about its return to Securex this year. Craig Sacks, MD of Turnstar, says that the company will use the Securex platform ...
  • Tagtron Solutions
    Securex 2018 Preview, Quality Label Solutions t/a TagTron Solutions, Asset Management, EAS, RFID, Perimeter Security, Alarms & Intruder Detection, Security Services & Risk Management
    Tagtron Solutions will showcase a number of systems and innovations at Securex 2018. As specialists in display security, Tagtron supplies anti-theft products for protecting goods on open display. The ...
  • ZKTeco South Africa
    Securex 2018 Preview, ZKTeco, Access Control & Identity Management, Perimeter Security, Alarms & Intruder Detection, Security Services & Risk Management, Products
    Solutions is what ZKTeco is all about for Securex 2018. ZKTeco South Africa will be offering clients an insight into how its products can be integrated into any platform and provide them with a solution ...
  • TeleEye South Africa
    Securex 2018 Preview, TeleEye (South Africa), CCTV, Surveillance & Remote Monitoring, Perimeter Security, Alarms & Intruder Detection, Security Services & Risk Management
    It is well known that farm attacks and farm murders are increasing at an alarming rate in South Africa. According to Afriforum’s latest stats, 156 commercial farmers are murdered per 100 000 people. There ...
  • RikRhino
    Securex 2018 Preview, Rik Rhino, CCTV, Surveillance & Remote Monitoring, Perimeter Security, Alarms & Intruder Detection
    RikRhino specialises in wireless surveillance and deployable technology solutions that offer a range of WCCTV products including the speed dome, the Site Tower and the body-worn camera. The WCCTV 4G ...
  • Nemtek
    Securex 2018 Preview, Nemtek Electric Fencing Products, Perimeter Security, Alarms & Intruder Detection, Security Services & Risk Management, Products
    This year at Securex, Nemtek will be showcasing the Nemtek Taut Wire system, which measures tension changes in a particular direction on an electrified or non-electrified fence, and will set off an alarm ...
  • GLOVent Solutions
    Securex 2018 Preview, Access Control & Identity Management, Perimeter Security, Alarms & Intruder Detection
    With a client-base of more than 650 high-end residential communities, GLOVent Solutions has a direct communication and product/service delivery channel to 90 000+ hyper-localised, high net-worth individuals. GLOVent ...
  • Easy Wi-Fi home surveillance
    May 2018, Syntech, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Perimeter Security, Alarms & Intruder Detection
    Hi-Tech Security Solutions takes a look at two home surveillance cameras that are easy to set up and use.
  • An holistic security solution
    May 2018, Fidelity Security Group, Perimeter Security, Alarms & Intruder Detection, Security Services & Risk Management
    The Fidelity ADT FindU app is a multi-feature emergency button app for smartphones linked to a 24-hour monitoring station and a national footprint of armed response resources.

Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Terms & conditions of use, including privacy policy
PAIA Manual
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.