Technology or human

March 2012 Security Services & Risk Management

Hi-Tech Security Solutions asked Roy Alves, country general manager, Axis Communications, about the right mix of technology and guards.

Roy Alves
Roy Alves

Hi-Tech Security Solutions: How does the modern security or operations manager decide how best to integrate technology and human resources to achieve the best results for their companies?

Roy Alves: Operations managers have come to realise that camera security has helped resolve several major and minor incidents ranging from collisions, damage and theft, to the presence of uninvited guests. Operations/security managers can ensure that every corner of even an extremely large property is monitored with the help of camera surveillance. However, once the crime has been spotted with the help of surveillance cameras, armed guards/personnel are required in order to tackle the situation at hand. Thus, one can safely say that technology and human resources go hand-in-hand when talking about security.

Hi-Tech Security Solutions: When and where should the emphasis be placed on technology, and when are human guards the best solution?

Roy Alves: Technology comes into play when large areas need to be monitored and you cannot rely solely on human guards or patrolling vehicles. Proactive monitoring techniques allow for early detection and intervention before serious crimes are committed. Guarding would come into play when you have to act upon an intrusion/crime. Although guarding can be a deterrent to a criminal, it is most effective when integrated with a high-quality technology solution to obtain the key benefits.

Hi-Tech Security Solutions: What questions should you be asking if you want the best of both worlds?

Roy Alves: Wanting the best of both worlds is key in these scenarios. As mentioned before, for the optimal solution, guarding and technology systems such as an IP-based surveillance system work hand in hand to offer and provide the best results. There are often shortcomings of relying solely on the physical presence of patrol cars/guards in very vast and large areas. Guards and reaction vehicles require direction and can only respond to incidents that are immediately visible to security personnel. An IP surveillance solution would be the most effective method of coordinating the movements of armed response and law enforcement, thereby providing a safer environment.

Hi-Tech Security Solutions: How do you ensure humans and technology are managed properly to ensure they work together optimally?

Roy Alves: Training of guards and personnel to work with technology is key to the success of these two working optimally. With the help of technology, companies can ensure that they have quicker response time from their guards, coupled with the capability of monitoring numerous zones at once.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

From the editor's desk: It’s all about data
Technews Publishing News & Events
      Welcome to the SMART Access and Identity Handbook 2026. We have slightly changed the handbook this year, specifically the selection guides, but there is still a lot of industry information inside, and ...

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
Holding all the cards
neaMetrics Suprema SMART Security Solutions Technews Publishing Access Control & Identity Management
After so many years of offering alternatives to card technology for access control, one could be forgiven for assuming we are all using biometrics or mobile credentials for all our physical and digital access requirements.

Read more...
From digital transformation to digital sovereignty
Security Services & Risk Management IoT & Automation
As cyberthreats grow, data regulations tighten, and AI becomes central to economic competitiveness, countries are recognising the need to control and protect their own digital assets.

Read more...
The age of Lean 4.0: Orchestrating intelligence and efficiency
Security Services & Risk Management
The convergence of Lean principles and AI (what we now call Lean 4.0) is no longer a theoretical exercise; it is the defining operational paradigm for survival and growth in a complex, data-intensive economy.

Read more...
Risks of open-source intelligence escalating in crime
Security Services & Risk Management Residential Estate (Industry) Smart Home Automation
CMS estimates that open-source intelligence has played a role in 20 - 30% of robberies over the past 12 months. In cybercrime, global research consistently shows that many offences rely on some form of open-source data exploitation.

Read more...
Seeing is no longer believing
Security Services & Risk Management
Fraud has shifted. It is no longer just about financial theft; it is about identity theft in the most visceral sense. The most effective control is often completely non-technical: the ‘pause and verify’ rule.

Read more...
The year of machine deception
Security Services & Risk Management AI & Data Analytics
The AU10TIX Global Fraud Report, Signals for 2026, warns of the looming agentic AI and quantum risk, leading to a surge in adaptive, self-learning fraud, and outlines how early warning systems are fighting back.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.