Addressing crime through technology

March 2010 Integrated Solutions

Effective enterprise security is the cornerstone of a growing economy.

Much-vaunted 2010, expected by President Jacob Zuma to be South Africa’s most important year since 1994 as a result of its host status to the 2010 FIFA World Cup is here. Along with the potential it brings for the country to bask in the spotlight of international approval for a job well done, this year also brings opportunity for economic growth and development on the back of a variety of state and private sector development initiatives.

All good, says Jack Edery, CEO of Elvey Security Technologies, who believes the country is climbing slowly out of the financial quagmire that enveloped the entire world during 2009, but he adds a word of caution. “Enterprises, no matter how dynamic, will have a difficult job succeeding if they do not have the right security architecture in place, especially in countries like South Africa, where unfortunately our enthusiasm has to be tempered by the reality that we are still one of the world’s crime capitals.

“Pivotal to the economic future of this country is the development of initiatives that will in turn lead to job creation and then hopefully a decrease in crime,” he continues. “In particular, we are talking about growth in sectors such as manufacturing, which is reportedly now on the mend. However, there is no avoiding the fact that security has to be factored into the equation if healthy bottom lines are to be achieved.”

Accordingly, he urges consumers to treat security not as a grudge purchase but rather as a long-term, cost-saving, productivity-enhancing tool. “Many people still picture a security system as a mix of keypad, siren, high wall or fence, and possibly some human guards. They are not aware that security technology’s movement into the realms of IP (Internet Protocol) and GSM has made it possible not only to safeguard staff, clients, premises, stock and information, but also monitor productivity, control access and egress and even send and access video images of an event. The bottom line growth of any entrepreneurial enterprise, whether small, medium or large, depends in part on having an effective security system in place.”

Keeping the bad guys out

The fundamentals of good security have not changed, even if the technology has. The first consideration for most enterprises, large or small, is preventing criminals from getting into the buildings. This need is best met today by an IP-based, integrated security solution that includes an access control element. For those questioning the need for an IP-based security solution, Edery does not pull any punches. “You are fooling yourself if you think that you can rely completely on a cut-price, one-size-fits-all, unmonitored alarm in this day and age of criminal desperation and determination, and where false alarms are all too common, to the point that most are simply ignored.”

Monitoring via IP dual path

Today’s most efficient enterprise security solution lies in dual path technology, which is characterised by two paths: a main transmission path (Internet) and a back-up path (GSM or cellular network), says Zane Greeff technical director for Elvey Security Technologies.

Since most people have access to the Internet and cellphones, he says it makes sense for them to choose these two paths, the Internet for its cost-effectiveness and the cellular network for its near-100% security.

“Just as broadband or IP technology has changed the face of communication in the business world, so it has opened up a whole new world of alarm and data communication for the security sector and its clients,” he explains. “Driven by its reputation for reliability and cost-effectiveness, the technology’s ability to transfer data over the Internet, PSTN line or GSM networks has seen it become the global security solution standard for enterprises, steadily replacing the conventional telephone line as a message channel. Specifically, he says dual path alarm monitoring is hogging the spotlight because of its ability to supervise continuously the delivery of an alarm signal, one way or another, thereby ensuring that the flow of data between the enterprise and the monitoring or control centre is never compromised.

There are other benefits of dual part alarm technology too, he adds, including that it can monitor multiple sites, and that it can receive data at high-speed anywhere in the world.

Cost saving

“While operational cost-cutting is being embraced by enterprises the world over, I am amazed at how many entrepreneurs overlook the amount of money that is wasted on communication between the alarm panel and the central monitoring station,” says Kenny Chiu, marketing manager for Elvey. “Consider an average scenario in which an alarm panel sends an opening and a closing signal to the monitoring station every day, as well as 24 test messages during the course of the day. That is 26 messages per day, at a cost of 70 cents each, which equates to R6643,00 a year. Should the enterprise change its security message path from a normal Public Switched Telephone Network (PSTN) to GPRS or Internet, the cost would drop tremendously, using around 516 MB of bandwidth per month.”

Another area of saving when using IP technology is that of call-outs. According to Chiu, IP technology allows for remote site programming and maintenance, thereby significantly reducing the need for expensive on-site visits.

Further cost savings are to be had in terms of data security and employee downtime. “Traditional phone lines by their nature experience regular physical attack or damage by nature, thereby compromising data integrity and resulting in employee downtime. The Internet, though vulnerable to hacking and viruses, can be made fairly safe through the use of various forms of protection such as firewalls and anti-virus programmes, and the GSM network is almost impossible to breach,” Chiu says.

In-house monitoring

Armed response companies are increasingly replacing their telephone line links to their monitoring station receivers with Internet links in the interests of providing their commercial clients with safer, more reliable signal paths, notes Greeff. The end result for them is not only more secure data transmissions, but also higher speeds, lower communication costs and system safeguards such as immediate notification of line interruptions.

Enterprises of all shapes and sizes are at risk of attack, whether by dissatisfied ex-employees, criminally-inclined staff members, robbers or thieves. The larger the entity and the more employee, customer and visitor traffic it experiences, the more vulnerable it is to loss of some sort. Today’s security technology makes it possible – and affordable – to monitor and control people’s access not only to the premises as a whole but also to specific areas, via one central control room.

For more information, contact Kenny Chui of Elvey at +27 (0)11 401 6700 or [email protected]



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Digitising security solutions with AI and smart integration
Regal Security Distributors SA Technews Publishing Integrated Solutions
The Regal Projects Team’s decades of experience and commitment to integration have brought the digital security guard to life as a trusted force for safer, smarter living.

Read more...
Smart cities and the role of video security
Surveillance Integrated Solutions
As cities around the world continue to embrace smart technology, including IoT that not only connects to people, but also the surrounding activity, the integration of advanced video security systems is crucial to ensure safety and efficiency in environments.

Read more...
Surveillance to unjam the traffic
Integrated Solutions Transport (Industry)
Traffic is a challenge that affects urban areas across Africa. The city of Johannesburg, South Africa’s most populous city, experiences severe traffic resulting from a confluence of issues, including power outages, faulty traffic lights, and infrastructure theft.

Read more...
The future of the surveillance channel
Duxbury Networking Technews Publishing Elvey Security Technologies SMART Security Solutions Surveillance
The video surveillance market has evolved from camera-based specifications to integrated solutions that solve customers’ problems. Moreover, the growth of AI and cloud has changed the channel even more, with more to come.

Read more...
The benefits of offsite control rooms
Astrosec Surveillance Integrated Solutions
As the security landscape grows more intricate, control rooms – the crucial hub of security operations – need to adapt. With escalating costs, mounting threats, and a heightened demand for immediate responses, many organisations are reassessing the operations of their control rooms.

Read more...
edgE:Tower video analytics integrated with SEON
Surveillance Integrated Solutions AI & Data Analytics
Sentronics has announced a new integration between its edgE:Tower advanced AI-driven video analytics solution and SEON, a Central Monitoring Software (CMS) platform. This integration enhances real-time situational awareness and automated threat detection for control rooms.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
The power of knowing your client
Ideco Biometrics Access Control & Identity Management Integrated Solutions
One of the most effective ways to combat the threat of fraud, identity theft, and financial crime threats is through a robust Know Your Client (KYC) process, which safeguards both businesses and clients.

Read more...
Smarter ways to secure your space
Elvey Security Technologies Access Control & Identity Management Products & Solutions
Ensuring the safety of people and assets has become more crucial than ever, and access control systems provide essential tools to regulate and monitor who can enter specific areas or access sensitive resources.

Read more...