Taking the pain out of maintenance

June 2017 Integrated Solutions, Infrastructure

In terms of interoperability, it is common knowledge that electronic security systems have not evolved at the same rate as information technology and telecommunication systems. With the advent of IP this has started to change, but at a far slower rate than expected. Even though an attempt at implementing standards is underway, it is driven mostly by manufacturers rather than independent third-party organisations.

Bernard  Senekal.
Bernard Senekal.

According to Bernard Senekal, Naxian Systems director, interoperability is therefore very much the Achilles heel of the electronic security industry. “This ‘ransomware’ approach, where manufacturers lock clients into bespoke solutions and closed system architectures has created dissonance between the electronic security industry and the world of technology at large.

“Combine this with the fact that the electronic security industry has no real regulatory barriers to entry and you have a knock-on effect that translates directly into a reactive, antiquated method by which systems are supported and maintained.” This, he continues, is the case for small through to large enterprise systems, the result of which is the negative impact on the cost of maintaining systems by implementers as well as the creation of unnecessary risk and operational inefficiencies, due to system downtime for end users.

The secret, Senekal believes, is the provision of a safe passage between interoperability and electronic security systems. Naxian Systems’ IoT (Internet of Things) platform, Synapse, provides the bridge that allows a quick way to cross from this sinking island onto the technology mainland.

Figure 1.
Figure 1.

The challenge is that technologies that allow for predictive and preventative maintenance are not available to the mass market inside the security industry. Naxian is changing this with its smart services offer.

Senekal points out that technical support for sites typically requires the process outlined in Figure 1. The cost in productivity, operational efficiency and increased risk in the above scenario is based on the following:

• The time between when the incident occurs and when it is reported

• The time between when the incident is reported and the technician is able to visit the site

• The time taken to diagnose and determine the root cause of the problem

• The time to source and collect the necessary resources and return to site in order to resolve the issue and bring the system online again.

Figure 2.
Figure 2.

Naxian Systems’ Smart Services Platform (SSP) introduces a combination of Internet of Things (IoT), Artificial Intelligence (AI) and Deep Learning technologies to ensure the scenario outlined in Figure 2. Ultimately, this results in:

• The right technical resource, with the correct spares and full diagnostic being deployed to site,

• Inside the correct time frame,

• With the predictive ability to ensure that technical resources are notified of things that will go wrong, before they actually go wrong.

Monitoring and managing system and device health

So how exactly does it work? “First and foremost, this is a software solution that allows for any security and/or networkable device to be connected to a cyber secure and hosted/cloud environment from where Naxian’s Smart Services Centre collects the relevant system and device health data. The processing of the data occurs in the cloud while the output and results are managed securely inside the secure SAIDSA-approved control room environment. The platform is completely product- and discipline-agnostic,” says Senekal.

Operators who are proficient at dealing with electronic security and information technology systems manage the risk of the system and device health through automated monitoring and the issuance of responses back to allocated technical resources, who can respond to the issue with a complete diagnostic and problem resolution listing.

Naxian’s Everywhere application allows for users with mobile devices to receive events, acknowledge the receipt of these events and then have performance measured against SLAs or an acceptable response and resolutions set for the client or site. A technical support call cannot be flagged as ‘COMPLETE’ unless Naxian’s Artificial Intelligent agent, Annie, accepts the resolution of the technical issue that was reported.

Before a support ticket is allocated to a resource, Annie will survey the geolocation of the closest technical resources available to assist with the problem. Based on her understanding of the timeframe allowed to acknowledge, respond and resolve the incident, she will consider the profile and historic performance of the technical resources available. She will then allocate the best available resource to resolve the category and incident type for the specific system in question and provide route optimisation based on Google Map analytics for the resource to make his way to the site.

Reporting will indicate strengths and weaknesses of technical resources in order for skills development activities to be planned and customised for resources. Senekal says that the company is currently investigating an e-learning platform that will automatically suggest courses designed specifically for the needs of a group or individual resources.

Future Naxian Systems services will include:

• Video analytics as a service for:

- Retail

- Perimeter security

- Traffic management

- Logistics and supply chain environments.

• Process visualisation as a service (the integration of video surveillance and analytics into business process systems such as warehouse management, HR, ERP, CRM, scanning and RFID).

• Real-time incident backup into the cloud.

“In an industry where your relationship is as good as your last technical support call, we see this service as ground breaking, disruptive and a non-negotiable for any forward thinking electronic security company,” says Senekal.

For more information contact Naxian, +27 (0)87 820 0620, [email protected], www.naxian.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Future trends for electronic safety and security in mining
Fang Fences & Guards Mining (Industry) Integrated Solutions AI & Data Analytics
The mining industry is ever evolving, driven by technological advancements and the growing need for enhanced safety and security measures, with significant innovation seen in turnkey electronic security for mining operations.

Read more...
Unlocking enhanced security for mining
Mining (Industry) Integrated Solutions
In the dynamic landscape of African mining, security remains of paramount concern as threats evolve and challenges persist, and mining companies seek innovative solutions to safeguard their operations, assets, and personnel.

Read more...
A constant armed struggle
Technews Publishing XtraVision Editor's Choice Integrated Solutions Mining (Industry) IoT & Automation
SMART Security Solutions asked a few people involved in servicing mines to join us for a virtual round table and give us their insights into mine security today. A podcast of the discussion will be released shortly-stay tuned.

Read more...
Navigating South Africa's cybersecurity regulations
Sophos Information Security Infrastructure
[Sponsored] Data privacy and compliance are not just buzzwords; they are essential components of a robust cybersecurity strategy that cannot be ignored. Understanding and adhering to local data protection laws and regulations becomes paramount.

Read more...
Access and identity in 2024
Technews Publishing Gallagher HID Global IDEMIA Ideco Biometrics Enkulu Technologies neaMetrics Editor's Choice Access Control & Identity Management Integrated Solutions
SMART Security Solutions hosted a round table discussion with various players in the access and identity market, to find out what they experienced in the last year, as well as their expectations for 2024.

Read more...
Creating a cybersecurity strategy in a world where threats never sleep
Information Security Infrastructure
[Sponsored Content] The boom of Internet of Things (IoT) technology and the chaos that surrounded the sudden shift to work-from-home models in 2020 kick-started the age of cybercrime. In that period, incidents rose by 600%, affecting every industry and showing no signs of slowing down.

Read more...
Advanced security solution for high-risk areas
Secutel Technologies Surveillance Integrated Solutions
The need for a sophisticated intrusion detection system is paramount when faced with persistent security challenges, particularly in isolated battery rooms or high-risk areas prone to vandalism, cable theft, and battery theft.

Read more...
Vumacam and NAVIC enhance SafeCity initiative
Integrated Solutions Security Services & Risk Management
Vumacam and NAVIC, two of South Africa's most respected surveillance technology and vehicle intelligence providers, are proud to announce an alliance that will greatly expand the coverage and impact of the SafeCity initiative across the country.

Read more...
Gallagher Security’s achieves SOC2 Type 2 recertification
Gallagher News & Events Integrated Solutions Infrastructure
Gallagher has achieved System and Organization Controls (SOC2 Type 2) recertification after a fresh audit of the cloud-hosted services of its integrated security solution, Command Centre. The recertification was achieved on 21 December 2023.

Read more...
Cyberattacks the #1 cause of business outages
Editor's Choice Information Security Infrastructure
The latest survey by Veeam Software shows that 92% of organizations will increase their spending on data protection by 2024 to achieve cyber resilience due to continued threats of ransomware and cyberattacks.

Read more...