Bank on safety

May 2018 Financial (Industry), Security Services & Risk Management

When looking to limit your risk of a residential robbery or burglary, storing your valuables off-site is marketed as a safe choice. Popular storage options include safety deposit boxes and vaults. The use of these facilities is governed by contract, most of which limit the provider’s liability in the event of loss or damage to your stored possessions.

With crime on the rise, one calls into question the measures in place to limit loss or damage occurring at these facilities. Deployment of security officers is commonplace, but in the event of an armed robbery a security officer can only be expected to offer limited resistance.

The Active Track device is a way to protect property and life and has been implemented successfully by various banks and vaults throughout South Africa. The device is a hand-held, versatile unit designed with the pressures of the security industry in mind.

The Active Track’s built-in RFID reader allows the security officer to check in at the various scanning points set up by the security service provider. Its GPS functionality, combined with the mobile and GSM capabilities ensures that the precise location and time of each scanning event is recorded in real-time. The device can be used in areas with limited signal, by relying on a connectivity of as little as seven per cent for optimal functionality. This is useful where security services are rendered below ground or in similar areas of poor signal.

The data captured by each Active Track is available to both management and the security service provider in real-time via Active View, the Active Track’s online portal. The data is available in numerous formats to suit the needs of the various users.

Active Track can also be used to assist security officers in panic or distress situations. If an emergency arises, the security officer can activate the built-in panic button. This triggers an automated SMS to the security service provider, and an alarm in the Active Track 24-hour call centre. The call centre responds by calling the device to determine the nature of the emergency, and what action needs to be taken. If the emergency is such that a panic button cannot be triggered, the security officer can activate the shock sensor by simply dropping the device.

The call centre will place a silent call through to the device and listen in on the situation, whereafter it will notify the security services provider of the events on site. This enables the security provider to take swift and appropriate action.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Chubbsafes celebrates 190 years
Gunnebo Safe Storage Africa News & Events Security Services & Risk Management
Chubbsafes marks its 190th anniversary in 2025 and as a highlight of the anniversary celebrations it is launching the Chubbsafes 1835, a limited edition 190th-anniversary collector’s safe.

Read more...
New law enforcement request portal
News & Events Security Services & Risk Management
inDrive launches law enforcement request portal in South Africa to support safety investigations. New portal allows authorised South African law enforcement officials to securely request user data related to safety incidents.

Read more...
Continuous AML risk monitoring
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
AU10TIX, launched continuous risk monitoring as part of its advanced anti-money laundering (AML) solution, empowering businesses to detect behavioural anomalies and emerging threats as they arise.

Read more...
SAFPS issues SAPS impersonation scam warning
News & Events Security Services & Risk Management
The Southern African Fraud Prevention Service (SAFPS) is warning the public against a scam in which scammers pose as members of the South African Police Service (SAPS) and trick and intimidate individuals into handing over personal and financial information.

Read more...
Rewriting the rules of reputation
Technews Publishing Editor's Choice Security Services & Risk Management
Public Relations is more crucial than ever in the generative AI and LLMs age. AI-driven search engines no longer just scan social media or reviews, they prioritise authoritative, editorial content.

Read more...
How can South African organisations fast-track their AI initiatives?
AI & Data Analytics Security Services & Risk Management
While the AI market in South Africa is anticipated to grow by nearly 30% annually over the next five years, tapping into the promise and potential of AI is not easy.

Read more...
Efficient, future-proof estate security and management
Technews Publishing ElementC Solutions Duxbury Networking Fang Fences & Guards Secutel Technologies OneSpace Technologies DeepAlert SMART Security Solutions Editor's Choice Information Security Security Services & Risk Management Residential Estate (Industry) AI & Data Analytics IoT & Automation
In February this year, SMART Security Solutions travelled to Cape Town to experience the unbelievable experience of a city where potholes are fixed, and traffic lights work; and to host the Cape Town SMART Estate Security Conference 2025.

Read more...
Stallion repositions itself as a services provider
News & Events Security Services & Risk Management
Stallion has rebranded as Stallion Integrated Solutions to reflect its expanded capabilities beyond traditional security services to delivering integrated solutions that enhance safety, asset management, and operational efficiency.

Read more...
Seven tips to help ensure your backup batteries work
Power Management Security Services & Risk Management
Load shedding is back, officially or not. Lance Dickerson offers seven tips to prolong the life of your power backup systems and ensure they perform as intended when needed.

Read more...
Cybersecurity best practice
Information Security Security Services & Risk Management
Breach and attack simulation has become an essential element of cybersecurity strategies in any modern business by allowing companies to actively detect and resolve vulnerabilities through real-world attack simulations.

Read more...