Leasing perimeter security

August 2015 Editor's Choice, Perimeter Security, Alarms & Intruder Detection

A full maintenance lease is defined as a lease where the lessor accepts full responsibility for the supply, installation, maintenance and insurance of the equipment for the duration of the lease. Depending on the contract signed, at the end of the lease the customer may keep the equipment installed (or some of it), or it may revert to the lessor.

Chris Lovemore, CEO of ELF Rentals says this model lends itself well to the supply of perimeter security equipment for the following reasons:

1. If the service provider who installs the system is also accountable and responsible for the maintenance of the system, they will suffer the consequences of poor installation workmanship or inferior materials and not the client.

2. Should the service provider not perform his maintenance obligations correctly, the client has the authority to withhold payments, including those relating to the capital outlay.

3. Should there be an insurance issue, the service provider is able to immediately respond and install new equipment and process the claim.

4. Most manufacturers guarantee equipment for a maximum of one year. The full maintenance lease provides for a longer term warranty of the equipment at the service provider’s risk, providing a fixed budget for the client for the full duration of the contract.

5. A dedicated and committed service provider who has invested their capital and resources into a client’s premises develops good skills in maintaining the systems, which benefits the client.

6. The depreciating nature of perimeter systems as well as the rapid advance in technology means that these systems need to be upgraded at least every five years. A full maintenance lease is able to provide adequately for the continuation of service and the upgrading of equipment at required intervals.

For more information contact Elf Rentals, +27 (0)41 368 3701, www.elfrentals.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

AI-enabled tools reducing time to value and enhancing application security
Editor's Choice
Next-generation AI tools are adding new layers of intelligent testing, audit, security, and assurance to the application development lifecycle, reducing risk, and improving time to value while augmenting the overall security posture.

Read more...
2024 State of Security Report
Editor's Choice
Mobile IDs, MFA and sustainability emerge as top trends in HID Global’s 2024 State of Security Report, with artificial intelligence appearing in the conversation for the first time.

Read more...
Cyberthreats facing SMBs
Editor's Choice
Data and credential theft malware were the top two threats against SMBs in 2023, accounting for nearly 50% of all malware targeting this market segment. Ransomware is still the biggest threat.

Read more...
Are we our own worst enemy?
Editor's Choice
Sonja de Klerk believes the day-to-day issues we face can serve as opportunities for personal growth and empowerment, enabling us to contribute to creating a better and safer environment for ourselves and South Africa.

Read more...
How to spot a cyberattack if you are not a security pro
Editor's Choice
Cybersecurity awareness is straightforward if you know what to look for; vigilance and knowledge are our most potent weapons and the good news is that anyone can grasp the basics and spot suspicious activities.

Read more...
Protecting IP and secret data in the age of AI
Editor's Choice
The promise of artificial intelligence (AI) is a source of near-continuous hype for South Africans. However, for enterprises implementing AI solutions, there are some important considerations regarding their intellectual property (IP) and secret data.

Read more...
Super election year increases risks of political violence
Editor's Choice
Widening polarisation is expected in many elections, with terrorism, civil unrest, and environmental activism risks intensifying in a volatile geopolitical environment. Multinational businesses show an increasing interest in political violence insurance coverage in mitigation.

Read more...
Enhance control rooms with surveillance and intelligence
Leaderware Editor's Choice Surveillance Mining (Industry)
Dr Craig Donald advocates the use of intelligence and smart surveillance to assist control rooms in dealing with the challenges of the size and dispersed nature common in all mining environments.

Read more...
A long career in mining security
Technews Publishing Editor's Choice Security Services & Risk Management Mining (Industry)
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.

Read more...
A constant armed struggle
Technews Publishing XtraVision Editor's Choice Integrated Solutions Mining (Industry) IoT & Automation
SMART Security Solutions asked a few people involved in servicing mines to join us for a virtual round table and give us their insights into mine security today. A podcast of the discussion will be released shortly-stay tuned.

Read more...