Seriti chooses two-way technology for security ops

February 2001 Infrastructure

The security industry depends on rapid communication to ensure the safety of its personnel as well as its customers and Seriti Protection Services is no exception. From single to multiguard postings, two-way radio communication is key to coordinating the company's security patrols and operations.

"Two-way radios are crucial to our security operations," says Neville Dos Ramos, CEO of Seriti Protection Services. "We have to have rapid and reliable communication to protect our customers and their assets. Apart from the high cost of cellular communication, the time it takes to dial each time you need to contact a person and the delays caused by engaged signals or network downtime do not make it a viable alternative.

"If a guard needs to alert the control room to suspicious activity or call for back-up, he can do so immediately by pressing a single button. In multiple-guard postings, guards can communicate simultaneously to coordinate their activities, saving critical time in emergency situations," adds Dos Ramos.

Research recently conducted by the University of Michigan Business School has shown that guards using two-way radio communicate more frequently with other guards to discuss issues such as site access, site coverage and suspicious activities because there is no per-call incremental charge. Two-way radio also gives them quick and easy access to managers, expediting decision-making time.

Dos Ramos explains that the company chose Motorola GP340 two-way radios for its operations. "These 16-channel radios have a voice-activated feature for hands-free operation, an LED indicator and battery alert, so you are notified when battery power is running low.

They are also robust enough to withstand tough conditions," he explains.

"The GP340 professional two-way radios have emergency signalling so users can send a pre-recorded voice-message to a pre-determined group of people, enabling the location and status of the caller to be determined immediately by those receiving the call," adds Cedric Robertson, owner of PVR Supplies & Services, a Motorola authorised dealer.

"The lone worker function is also ideally suited to the security industry, as it provides added safety for guards posted on their own at sites. This feature sends a signal to the user at regular intervals and causes the radio to enter emergency mode if the user does not respond to the warning signal," he says.

Seriti Protection Services is using PVR's community repeater located at Tygerberg to service clients ranging from retail companies to campuses in the western Cape region.

For more details about Seriti Protection Services, contact Neville Dos Ramos on tel: 082 872 5939.

For more details about PVR Services & Supplies, contact Cedric Robertson on tel: (021) 906 2102.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

A passport to offline backups
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure Smart Home Automation
SMART Security Solutions tested a 6 TB WD My Passport and found it is much more than simply another portable hard drive when considering the free security software the company includes with the device.

Read more...
Five tech trends shaping business in 2025
Information Security Infrastructure
From runaway IT costs to the urgent need for comprehensive AI strategies that drive sustainable business impact, executives must be prepared to navigate a complex and evolving technology environment to extract maximum value from their investments.

Read more...
Threats, opportunities and the need for post-quantum cryptography
AI & Data Analytics Infrastructure
The opportunities offered by quantum computing are equalled by the threats this advanced computer science introduces. The evolution of quantum computing jeopardises the security of any data available in the digital space.

Read more...
Navigating today’s cloud security challenges
Information Security Infrastructure
While the cloud certainly enables enterprises to quickly adapt to today’s evolving demands, it also introduces unique challenges that security teams must recognise and manage. Vincent Hwang offers insights from the 2025 State of Cloud Security Report.

Read more...
The rise of autonomous data recovery
Information Security Infrastructure
Escalating cyberthreats and attacks constantly put businesses under pressure, increasingly prompting organisations to shift their mindsets towards ensuring continuous operations and thus avoiding downtime and revenue loss.

Read more...
Can we really fight AI cybersecurity threats with more AI?
Information Security Infrastructure
In a world where artificial intelligence (AI) is increasingly being weaponised by cybercriminals, the question of whether we can effectively combat AI threats with more AI is not just a technical inquiry but a pressing global concern

Read more...
Partnership delivers 40% storage savings for surveillance
Surveillance Infrastructure
Large-scale video surveillance users and applications demanding extended storage periods will benefit from up to 40% savings on video storage hardware stacks thanks to a new partnership between IDIS and Secure Logiq.

Read more...
How smart video is transforming storage at the edge
Infrastructure Surveillance
As these technologies come together, they are impacting the architecture of the edge and what we require from data storage. More specifically, they are driving a demand for specialised storage.

Read more...
VPS hosting set to dominate in 2025
Infrastructure
SME market growth and the increasing need for a digital footprint are pushing VPS growth in South Africa, especially since it is now perceived as a viable business tool, scalable by nature, with improved performance.

Read more...
Threats, opportunities and the need for post-quantum cryptography
AI & Data Analytics Infrastructure
The opportunities offered by quantum computing are equalled by the threats this advanced computer science introduces. The evolution of quantum computing jeopardises the security of any data available in the digital space.

Read more...