Q&A with Telkom

December 2006 News & Events

Operating as a commercial company since October 1991, Telkom has grown into the largest telecommunications services provider in Africa based on operating revenue and assets. The group, consisting of the fixed-line company Telkom and a 50% shareholding in mobile operator Vodacom, was listed on the JSE Limited (JSE) and the New York Stock Exchange (NYSE) in March 2003.

Hi-Tech Security Solutions posed some security-related questions to Wayne Louis from the Telkom Asset and Revenue Protection Services. A core part of Louis's responsibility entails managing staff and processes responsible for the physical (guarding) and technical (technology) security for Telkom. He is also pivotally involved in all aspects of security projects, pilots, VIP protection and TSCM (technical security counter measures) functions. Budgetary considerations, strategies, policy and procedural matters and security-related operational functions fall under his ambit too. Also under his control is the National Security Control Centre, which remotely monitors company security.

Q What are the main security issues/threats faced by Telkom and why?

A One of the main security challenges at present is the issue of cable theft. We have deployed extensive security measures in order to combat cable theft but this remains a national problem, largely because copper fetches a high price. In order to minimise interruptions to our customers' services as well as contain the negative impact on the company, apart from Telkom's own proactive security measures, there is also close liaison with the Non-Ferrous Crime Combating Committee, Business Against Crime and the South African Police Services.

In addition, security considerations are also factored into the need to protect Telkom technical staff whose safety is sometimes at risk while performing maintenance work, especially emergency maintenance at night and in remote areas.

Q Have these threats always been the same, or have the security issues changed in any way over time?

A As is the case with general crime trends in the country, the incidence and patterns of crime - and consequently, the security challenges - are constantly changing. Criminals who steal Telkom property such as cables and solar panels (used as a power source), always seek to beat the security measures the company implements or change the areas in which they operate. As a result, one of my primary responsibilities is to proactively formulate and assess strategies that identify and, where possible, eliminate new forms of security risks before they actually manifest themselves.

Q What solutions are in place to prevent and/or control these situations?

A I obviously cannot compromise our own security measures and mechanisms by going into too much detail but the following are some of the solutions:

* Physical guarding security contracts.

* Armed response to cable systems.

* Armed response to buildings.

* Integrated remote access control systems, intruder detection systems and CCTV systems on a security platform are remotely monitored and actioned within our National Security Control Centre. We have had many other corporate companies visit our Control Centre in order to develop or upgrade their own operations.

Q How much of the security is handled in-house and how much is outsourced?

A We have permanent staff that manage the security functions nationally as well as security consultants in each region. The physical guarding and armed reaction services are outsourced to external suppliers.

Q What difference have these solutions made to the overall security issues at Telkom?

A I think the security solutions deployed have been effective and beneficially to Telkom and its customers. The main objective is to deploy effective security systems as well as to manage and sustain these. An awareness of security issues has become a way of life and this is no difference in the workplace. In essence, our security interventions and solutions enable Telkom's staff to operate and function in a safe environment. Our technology also enables us to detect when certain crimes are in progress and to respond expeditiously to these. Finally, our customers also benefit because our initiates help to contain the incidence of service interruptions.

While certain challenges remain, our security measures have helped to provide adequate protection for Telkom's technology, property and personnel. As previously stated, this benefits the company and our customers.

Q Does Telkom follow any specific international trends or is the South African market actually the leader?

A As a leading national and global telecommunications player, Telkom is at the cutting edge of security trends locally and internationally. Many of the country's leading corporate companies seek to implement the security strategies formulated by Telkom. Some of the international telcos also benchmark themselves against Telkom's security measures, technologies and strategies.

Q What are Telkom's short-term plans, specifically with 2010 on the horizon?

A As a company, we are constantly looking at ways to improve and upgrade the efficiency of our security measures and technologies. From a security perspective, we are firmly on track and closely aligned with the broader telecommunications provisioning around the requirements for 2010.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Hytera supports communication upgrade for Joburg
News & Events Infrastructure Government and Parastatal (Industry)
By equipping Johannesburg’s metro police and emergency services with multimode radios which integrate TETRA and LTE networks, Hytera is bridging coverage gaps and improving response times across the city.

Read more...
The global generative AI market surpassed $130 billion in 2024
News & Events AI & Data Analytics
According to a new research report from the IoT analyst firm, Berg Insight, the Generative AI (GenAI) market grew substantially in 2024, experiencing triple-digit growth rates in all three major segments: GenAI hardware, foundation models, and development platforms.

Read more...
Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
ProtecLink 2025: Ithegi Electronics supports a safer, smarter security ecosystem
News & Events
If you are a security buyer, operations lead, or technology partner, do not miss ProtecLink 2025, to be held in Polokwane on 16 September 2025, at the Polokwane Royal Hotel.

Read more...
IZI Group acquires G4S Cash Solutions South Africa
News & Events
IZI Africa, a sister company within the IZI Group, has acquired G4S Cash Solutions (SA) following the receipt of all necessary regulatory approvals. This transaction marks a significant consolidation in the South African cash handling industry.

Read more...
Secutel maintains ISO certifications
News & Events Fire & Safety
Secutel Technologies has successfully recertified all four of its ISO standards, a reflection of its continued commitment to excellence, client trust, and operational integrity.

Read more...
SABRIC appoints Andre Wentzel as interim CEO
News & Events Financial (Industry) Associations
The South African Banking Risk Information Centre (SABRIC) has announced the appointment of Andre Wentzel as interim chief executive officer, effective immediately.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Paxton cuts emissions by over a third
Paxton News & Events
Paxton has announced a significant reduction in its carbon footprint, cutting emissions by 961 tonnes of CO2e in its 2023 second reporting year.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.