The value of having a maintenance contract or SLA

April 2019 Security Services & Risk Management

Similarly to the way a motor plan provides peace of mind when buying a vehicle, a maintenance contract or a service level agreement (SLA) offers a company peace of mind regarding the functioning of their security installation, over and above the warranties on the pieces of equipment themselves.

According to Archibald Makatini, regional general manager for Africa at Johnson Controls Building Efficiency, the above analogy is highly pertinent as it is a situation any vehicle owner can relate to. “It’s tempting as a customer to think that a warranty should be good enough, as it commits the manufacturer to standing behind their product, but even a high-quality car will not continue to operate correctly without regular maintenance such as oil changes,” he elaborates.

Exactly what is and is not covered under a maintenance contract varies from equipment to equipment and situation to situation. For example, a premium-level contract will cover things over and above the equipment itself, such as hardware and software upgrades. In the case of a security or access control system, this could extend far beyond the functioning of individual cameras and biometric terminal, and go right to the heart and guts of the system.

“For example, a frontend that runs on, let’s say, a Microsoft platform, might not always play nice with the other systems if the latest software patches are not installed,” Makatini says. “The coverage provided by a maintenance contract allows you to sleep at night, because you get into a cycle where a company like Johnson Controls will make regular visits to make sure your software is functioning correctly, and that you have the right version.”

An added benefit for the client is that they are not required to be experts on every aspect of their operations, but can rely on the specialists at the contracted company to provide the knowledge and expertise necessary. In the case of a fire alarm system, for example, legal codes and regulations are extremely important in terms of maintaining the system and providing inspection records in the event that the worst happens.

In some cases companies do try and save money by doing everything in-house, but Makatini warns that risks opening a can of worms: “This can result in company’s maintenance crew becoming stretched so thin that they end up running around like chickens without heads. This affects productivity since those individuals are not able to focus on other important things. This is where subject matter experts come in and really stand behind whatever fixes they have to make – it takes away the headaches and makes it easier to manage your site to the best of your abilities.”

Mandatory maintenance

At Mustek Security Technologies (MST), it is mandatory for clients to sign a maintenance contract. Explaining the reasoning behind this, MST projects product manager, Sergio Pedregal, says that “maintenance is not the core business of our clients – if the system is accidentally damaged by uncertified personnel, this could lead to costly repair and replacement costs to bring the system back to working order.

“MST ensures that our engineers are fully compliant and certified to install and maintain any solution provided to our clients. Many clients do not have the expertise, knowledge or manpower to maintain systems themselves. The cost of not maintaining a system is much larger should there be a system failure.”

Pedregal therefore believes that a maintenance contract is extremely important. “Regular maintenance of a client’s site ensures that the systems installed are kept in proper working order throughout the expected system lifetime. Regular maintenance ensures optimal uptime, and identifies possible problems which may arise after installation and due to the client’s daily operations.

“Maintenance should cover all aspects of the installation and products – not only cleaning of equipment, but ensuring that all components of the systems are operational. MST performs an audit on the systems installed twice a year to ensure they are working according to the client’s operational requirements, which may shift from time to time. Maintenance should also include identifying possible training requirements due to staff turnover.”

An SLA should be a win-win

Service level agreements cover more than a typical maintenance contract, by generally adding extra clauses covering issues of liability and penalties. “A service level agreement is part of the maintenance contract, and performance goals and targets need to be maintained,” Pedregal explains. “These need to be negotiated and agreed by both parties, to ensure the client is happy with the services to be performed and that all expectations are met. The maintenance contract should be implemented in order to ensure that the client receives the maximum return on their investment.

“Both parties can benefit from an SLA, as long as the terms are agreed to and are realistic in terms of the procurement and provisioning of spares. Sometimes access to the site or power-related problems can influence turnaround times and these issues need to be highlighted. Sometime health and safety regulations can also affect the SLA.”

While it’s natural for an end user to have doubts about whether the terms and conditions in an SLA will be met in the event something does go wrong, Makatini sees it as a win-win scenario for the service provider and the client. “In my opinion, once you get into that agreement it is actually a partnership because at that point you’re tied to the hip with the customer.

“For us as Johnson Controls, you get into a cycle where you’re in front of the customer regularly, you don’t just install and run away, so you become a part of their whole solution. As a vendor, what those SLAs do for us is they allow us to be involved in new projects at the planning or design stage, since we’re always having those conversations with our clients and they trust us to provide a broad range of knowledge and expertise.”

By its nature, an SLA fosters a more proactive approach, Makatini continues: “Downtime is very expensive for a business, so you don’t want to have to wait until you have to place a call to report that your equipment is not running properly. If you have an SLA whereby someone comes to check things every so often, they’ll often be able to identify a potential problem and run a diagnostic check. Having a technician employee proactively approach the client and suggest there may be a problem, helps to bolster faith in us and strengthen our relationship with the client.”

Having choices is important

There is no such thing as a one-size-fits-all SLA, and Makatini likens it to offering a buffet rather than a set menu of options. “We drill this into our sales executives to make sure they educate their customers on options. That way the customer can weigh it up and make a decision based on their needs – and their needs are the most important thing. You have to listen to what they want and look at the site, the demands and how it functions – a 24/7 operation has very different demands from a nine-to-five operation,” he says.

Pedregal echoes these sentiments: “MST would tailor the contract/SLA for each particular client and site, as it is not often that all sites use the same equipment and have the same operational requirements. Maintenance is part of the solution proposal and needs to be tailored accordingly,” he says.

For more information contact:

Archibald Makatini, Johnson Controls Building Efficiency, +27 11 921 7129, archibald.f.makatini@jci.com, www.johnsoncontrols.com

Sergio Pedregal, Mustek Security Technologies, +27 11 237 1364, sergiop@mstprojects.co.za, http://mst.mustek.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

“This Is Theft!” SASA slams Mafoko Security
News & Events Security Services & Risk Management Associations
The Security Association of South Africa (SASA) has issued a stark warning that the long-running Mafoko Security Patrols scandal is no longer an isolated case of employer misconduct, but evidence of a systemic failure in South Africa’s regulatory and governance structures.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...
Security ready to move out of the basement
AI & Data Analytics Security Services & Risk Management
Panaseer believes that in 2026, a board member at a major corporation will lose their job amid rising breaches and legal scrutiny, as organisations recognise that cyber risk is a business risk that CISOs cannot shoulder alone.

Read more...
Cyber remains top business risk, but AI fastest riser at #2
News & Events Security Services & Risk Management
The Allianz Risk Barometer 2026 ranks cybersecurity, especially ransomware attacks, as the #1 risk, while AI is the biggest riser and jumps from #10 to #2, highlighting the emerging risks for companies in almost all industry sectors.

Read more...
OT calculator to align cyber investments with business goals
Industrial (Industry) Information Security Security Services & Risk Management
The OT Calculator has been developed specifically for industrial organisations to assess the potential costs of insufficient operational technology (OT) security. By offering detailed financial forecasts, the calculator empowers senior management to make well-informed decisions.

Read more...
From digital transformation to digital sovereignty
Security Services & Risk Management IoT & Automation
As cyberthreats grow, data regulations tighten, and AI becomes central to economic competitiveness, countries are recognising the need to control and protect their own digital assets.

Read more...
The age of Lean 4.0: Orchestrating intelligence and efficiency
Security Services & Risk Management
The convergence of Lean principles and AI (what we now call Lean 4.0) is no longer a theoretical exercise; it is the defining operational paradigm for survival and growth in a complex, data-intensive economy.

Read more...
Risks of open-source intelligence escalating in crime
Security Services & Risk Management Residential Estate (Industry) Smart Home Automation
CMS estimates that open-source intelligence has played a role in 20 - 30% of robberies over the past 12 months. In cybercrime, global research consistently shows that many offences rely on some form of open-source data exploitation.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.