Tech holds the future of home security

1 April 2019 Surveillance

The future of home security will see threats detected and responded to before a crime can be committed. Making use of big data, home security systems are now able to analyse camera streams and proactively alert armed response service providers. This is a massive stride in improving the means we use to secure our neighbourhoods, believes co-founder of Syntech, Ryan Martyn.

“Research indicates that South Africa has among the most security cameras per capita in the world. That creates a great platform to offer a solution on legacy infrastructure. This new approach to security actually prevents incidents from happening.”

According to Deep Data CEO Jasper Horrell, “There has been a shift in terms of what we can do with data gathering and processing. It’s now become possible to store large quantities of data gathered from different sensors, and also to process it in intelligent ways.”

The latest in home security technology uses big data analysis to revolutionise how threats are assessed. This technology is provided in a partnership between Syntech, which provides Giada commercial computer systems as hardware, and Deep Data, which develops the Deep Alert software.

The Deep Alert system makes use of analytics to identify and analyse threats based on security camera footage, it also sends alerts to homeowners or security service providers based on the type of threats that it identifies.

A proactive approach

Traditional security systems rely on cameras to record footage which, in the event of a security breach, identifies suspects and provides evidence. With this model, a perimeter breach triggers the alarm and an armed response service provider attends the scene – an entirely reactive approach. Future systems making use of big data fundamentally challenge traditional security systems by proactively identifying threats and allowing security monitoring services to respond to alerts before an incident takes place.

The software attaches to existing camera streams and analyses motion triggers, tracks the trigger and then classifies the type of object – such as a dog, person walking down the street, or somebody climbing over the wall. This software runs on a Giada computer – small, lightweight and low energy commercial grade computers – which can monitor up to 12 concurrent camera streams. Potential threats are instantaneously sent to a cloud service, where most of the intensive analytics run. From here, an alert will be sent should a valid threat be detected.

“It’s all very well installing alarms, beams and fences, but every false alarm plants a seed of doubt in terms of how reliable that information is. Over time, repeated false alarms create vulnerability because you stop reacting to them. Big data adds a layer which helps you to trust the system much more,” says Martyn.

The future of fighting crime

South Africa has proven an ideal testing ground for new security features and the big data systems have already been successfully rolled out among neighbourhood watches and residential communities.

Key to the effectiveness of this technology is how it assists armed response services: They receive more accurate information which allows assessment of threats before dispatching a patrol vehicle. This ensures resources are diverted to critical incidents and reduces the number of false alarms, while saving money for the armed response service provider.

The potential for using similar systems is extensive, and could be adapted for businesses to monitor deliveries or operations. Networks of cameras in the same neighbourhood would allow for patterns to be monitored – the difference between a car that frequents an area during a daily commute and one circling an area to carry out a crime would be immediately apparent.

“There will be analytics on analytics. Instead of intelligently telling you what’s there, the technology will be detecting interesting patterns or threats between a range of cameras or classes of objects,” explains Horrell.

For more information about Deep Alert visit https://www.deepdata.works/





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...
Make BIG and COMPLEX small and manageable
neaMetrics Suprema AI & Data Analytics Surveillance Integrated Solutions
Traditional CCTV and access systems often operate separately, creating gaps in visibility and efficiency. TRASSIR and Suprema have partnered to develop an integrated platform that improves security, operations, and situational awareness.

Read more...
Get the AI fundamentals right
Technews Publishing SMART Security Solutions Leaderware Editor's Choice Surveillance AI & Data Analytics
Much of the marketing for CCTV AI detection implies the client can just drop the AI into their existing systems and operations, and they will be detecting all criminals and be far more efficient when doing it.

Read more...
SMART Surveillance Conference in Johannesburg
Arteco Global Africa Technews Publishing SMART Security Solutions Axis Communications SA neaMetrics Editor's Choice Surveillance Security Services & Risk Management Logistics (Industry) AI & Data Analytics
SMART Security Solutions hosted its annual SMART Surveillance Conference in Johannesburg in July, welcoming several guests, sponsors, and speakers for an informative and enjoyable day examining the evolution of the surveillance market.

Read more...
Securing South Africa’s logistics sector
Secutel Technologies Products & Solutions Surveillance Logistics (Industry)
Unlike traditional guarding services, Visual Verifier operates on an ‘Always On’ principle, ensuring continuous 24/7 coverage of warehouses, depots, transit hubs, and delivery points.

Read more...
Unlock the future of security operations in Bloemfontein
DeepAlert News & Events Surveillance
Security professionals and business leaders are invited to revolutionise their offsite monitoring operations at the DeepAlert Product Road Show, taking place on 16 – 17 September 2025, at the Schoemanspark Golf Club, Bloemfontein.

Read more...
Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
Protect your smart home devices
Kaspersky IoT & Automation Information Security Smart Home Automation
Voice assistants, kitchen robots, smart lights and many other intelligent devices have become part of our everyday life. However, with the rise of smart technology comes the need for robust protection against potential vulnerabilities.

Read more...
2025 video surveillance market set for improved fortunes
News & Events Surveillance
Novaira Insights has unveiled its latest report, World Market for Video Surveillance Hardware and Software – 2025 Edition, forecasting a healthy growth rate of 8,1% until 2029, excluding China.

Read more...
The dangers of poor-quality solar cables
Security Services & Risk Management Smart Home Automation
Reports indicate that one in six fires attended by South African firefighters is linked to substandard solar installations, often due to faulty wiring or incompatible components.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.