How smart does your security need to be?

Issue 2/3 2023 Perimeter Security, Alarms & Intruder Detection

Ever-increasing rates of violent crime in South Africa, coupled with the explosion of new smart security technologies leave many people and businesses questioning how to upgrade their systems. Intelligent visual monitoring software, video analytics with artificial intelligence (AI), thermal cameras, biometric scanning and the Internet of Things (IoT) are transforming the level to which we can protect life, limb and property. But how much of this new technology do we really need to build a truly smart security system to keep people, property and possessions safe?

Violent crime

South Africa is, unfortunately, one of the most violent countries in the world. There were over 200 000 home robberies in 2021/22, many of which ended in assault or even murder. In its latest crime statistics, the South African police said almost 40 000 violent robberies took place in the third quarter of 2022 alone, including hijacking and home and bank robberies. Given the high incidence of violent crime, alarm visual verification and being able to monitor security systems and react in real-time has become increasingly important.

Installing the most advanced security technology, particularly remote monitoring, is now much easier thanks to cloud-based software. Artificial Intelligence enables proactive monitoring and video analysis to detect intrusion and filter out nuisance alarms. Sophisticated algorithms can recognise whether the warm body moving along the perimeter of your house, office or warehouse is a cat or an actual intruder.

But what type of smart security is actually needed? And what happens to any legacy systems you may already have installed?

Finding the right solution

South Africa’s towns, cities and compounds are filled with surveillance cameras and security equipment. There are very sophisticated solutions to meet the needs of almost any situation, from a retail store or bank to a remote farmer protecting their livestock, or a warehouse filled to the rafters with expensive stock. Each is a different situation with different needs, different budgets and different legacy systems that need to be considered.

Sometimes PIR-activated cameras are needed. Dark car parks and rural roads may need infrared technology to detect unwanted intruders at night and distinguish between friend or foe. On a well-lit high street, a camera with built-in motion detection technology may negate the need for a PIR. However, do they give you eyes on the site, with access to before and after the event video clips, in under four seconds? Only by bridging a series of intelligent technologies together can the security system become truly smart.

An alarming realisation

When choosing to upgrade security, the old technology can seem redundant, but replacing all that hardware with an expensive state-of-the-art security system can also be hard to justify. That is where OPTEX’s CHeKT can help, by effective ‘joining up’, different systems to turn legacy hardware into smart IoT devices. Users or monitoring services can see exactly what is going on in real-time and deter intruders with lights or warn would-be intruders off site through audio systems. It can deter all would be thieves, while waiting for your security response team.

Cloud cover

Cloud-based software solutions can also provide upgrades to existing security hardware quickly and cost-effectively. OPTEX’s CHeKT uses very secure protocol software and ONVIF standards to integrate several third-party alarms, cameras, video and sensor technologies. It is both backward and forwards compatible, creating an IoT solution that does not need infrastructure upgrades. It can connect different home and business systems to centralised control rooms and monitoring services provided by private security companies.

The level of security that is potentially available today is incredible. But not every business, farmer or homestead needs a hugely expensive new security system. Matching available technology to need is key, and harnessing legacy investment where it can re-utilised is a desired result.

For more information, contact Optex, [email protected], www.optex-europe.com


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Adding AI analytics to security monitoring
SEON South Africa News & Events Perimeter Security, Alarms & Intruder Detection Residential Estate (Industry) AI & Data Analytics
SEON has announced its latest integration with Refraime, an AI-powered video analytics platform designed to elevate CCTV surveillance through real-time object detection and intelligent alerting.

Read more...
Keenfinity launches Radionix as new intrusion brand
Perimeter Security, Alarms & Intruder Detection News & Events
Keenfinity Group’s Intrusion & Access Business Unit has launched Radionix as its new brand for intrusion alarm systems, unlocking new potential and growth opportunities.

Read more...
The first choice for electric fence management
Stafix Perimeter Security, Alarms & Intruder Detection Residential Estate (Industry) Products & Solutions
In South Africa, over 500 housing estates use JVA Perimeter Patrol, making it a widely used Electric Fence Management providing seamless integration with alarms, CCTV, VMS, access control and control room third-party software.

Read more...
New JVA MBxL energiser range
Stafix Perimeter Security, Alarms & Intruder Detection Residential Estate (Industry) Products & Solutions
The latest MBxL energisers stand out for their simplicity, allowing you to push the “On” button and have the unit tick away, or to configure it through our virtual keypad (VKP).

Read more...
Smart protection for modern living
Products & Solutions Perimeter Security, Alarms & Intruder Detection Residential Estate (Industry)
Recognised globally for their performance and sleek design, AJAX solutions combine professional-grade security with user-friendly control, making them ideal for both residential and commercial environments.

Read more...
How intrusion protection helps secure O&G operations
Axis Communications SA Surveillance Perimeter Security, Alarms & Intruder Detection Industrial (Industry)
For O&G operators in Africa, physical security remains one of the biggest considerations, particularly when it comes to perimeter protection and the ability to mitigate intruder-related incidents.

Read more...
New AI perimeter app package
Dallmeier Electronic Southern Africa Perimeter Security, Alarms & Intruder Detection
With the new AI Perimeter App Package, Dallmeier has extended the application range of its neural AI perimeter network. Previously only available for the Panomera S4 Perimeter camera, this technology is now also available for additional models.

Read more...
JVA 4-line LCD keypad
Perimeter Security, Alarms & Intruder Detection
The JVA 4-line LCD keypad is integral to the JVA Security Electric Fence product range and provides a centralised interface between the customer and their perimeter security solution.

Read more...
Gallagher’s Integrate 360 event in Durban
Gallagher News & Events Perimeter Security, Alarms & Intruder Detection
Gallagher Security held its Integrate 360 event in Durban, South Africa. The event attracted 65 channel partners, end users, and consultants from across KwaZulu-Natal and broader South Africa to showcase the latest in Gallagher’s technology suite.

Read more...
Nice launches DC Blue Astute garage door motor
Nice Group South Africa Technews Publishing News & Events Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Nice Systems SA has launched the Nice DC Blue Astute, a garage door motor for the South African market featuring a pre-installed lithium-ion battery instead of traditional lead-acid batteries.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.