The modern monitoring facility

October 2008 News & Events

When ROM was established in 1997 it was the front runner of off-site monitoring and has today become the largest control room monitoring company in South Africa.

Remote off-site monitoring is a specialised field of security and not to be taken lightly. ROM's control room is a 24 hour operation that never gets quiet during any hour of the day. A well built team consisting of installers, installation managers, IT specialists, sales department, financial department, and of course the controllers and control room managers, making sure each customer receives full attention on their site through remote off-site monitoring. It is not just having a PC with a camera, the concept of the remote off-site monitoring was fully examined by the directors first.

With ROM's solutions we are able to remotely view cameras as well as manage the cameras, speak to any person on the site through voice over IP, open and close doors, switch lights on and off, open and close gates for access control and trigger any apparatus on site. This is just a few of the basic everyday operations that ROM deals with. Included in these services that are offered are also a range of maintenance contracts to suit any facility. As installers of access control as well as asset control, ROM does not leave the painful headache to the client of a camera that is down or a turnstile with biometric readers not working, ROM fix it.

Another major advantage of remote off-site monitoring is its inherent impartiality and its imperviousness to collusion. While it might be possible to intimidate, confuse or even bribe a security guard to gain access to a business premises, there is simply no way to influence the person monitoring the premises from off-site control room.

With the permission of its IT managers ROM can allow the directors of any business to also remotely view his own camera system. When travelling is required to most owners or simply wanting to see what is happening at night, it can allow extra charges to software or access charges.

Based on its security level agreement, it will submit an activity report to the site representative at intervals agreed upon. This report will comprise of how many motion alarms were received, what caused the alarms and what action was taken by the surveillance controllers, how often did the security officer patrol the site and any other activity that took place? CCTV camera faults will also be reported and managed.

Being in the security business for as long as ROM has, relationships with not only business owners are built each day, but also with suppliers making sure ROM has the right product on the market and software is running to full capacity for smooth success. Due to the high prices of technology, ROM offers a rent-to-own equipment affordable while cost.

Why remote video monitoring

Primary causes of false alarms are poorly designed and installed security systems or human error in operating them. Even simple actions like the positioning of an advertising module or display near a ventilation outlet may result in a false alarm when it moves in the air currents. Therefore, it is not a practical proposition to eliminate all false alarms at the source, though careful design and installation of the motion detectors can dramatically improve the situation.

A viable alternative to physical attendance on site is to provide a means of remote verification from a centralised monitoring location. Attendance is then only necessary when a real threat is judged to exist. For this approach to be truly effective, it must be quick and easy to determine the cause of each and every alarm. Most people understand the theory of the intruder alarm system: this being detectors strategically positioned in a building, door contacts and a control panel that is usually connected to internal and external sirens on site, and connected via a standard telephone line to a remote off-site facility.

Clients are under the illusion that this protects their premises, but in reality it does not make the doors any stronger or the windows any tougher, they still break when struck.

What does it achieve?

An intruder alarm system works predominantly when the premises are unoccupied. An intruder will approach a building and spend some minutes looking through windows, trying doors etc, and, if challenged, will make the lame excuse of "Oh, sorry are you closed?" or simply run.

If left unchallenged the intruder has free access to the building perimeter and any items that are stored outside the premises are susceptible to theft. An ideal opportunity is also presented to the would-be intruder to determine the best access point to the building. An intruder can, by simply looking through a window, see all manner of expensive office equipment including laptops, PCs and digital cameras left on desks. The building occupants assume they are protected by the alarm and the 'it will not happen to them scenario'.

The intruder who has been left unchallenged will eventually smash a window or force a door, which in turn will activate the alarm and send a signal through to the Alarm Response Facility. The experienced intruder, having surveyed the site prior and knowing what he is going to target, once inside will quickly gather the equipment and leave through the same route prior to the arrival of the patrol officer. Nothing has stopped them and the client has sustained a loss and damage to the premises.

The loss can be viewed in a number of ways:

1. Costs incurred due to damage to the premises and the ensuing repair and maintenance works. Additional costs may also arise if alternative premises need to be sourced whilst these repairs are being undertaken. The often unconsidered cost is the uninsurable value of loss of time.

2. Actual loss of capital equipment is covered by an insurance policy, but what if the items are scheduled to be delivered to a client tomorrow and there are penalty clauses for late delivery and again an uninsurable cost eventuates. A worse scenario would be if all your business critical information was stored on the stolen PC, you could severely jeopardise the long-term viability of your company.

In fact, intruder alarm systems are useful, but you should understand what they are designed to do. An intruder alarm system is designed to detect an intruder after they have broken into the premises and at best will limit. In a single sentence, an intruder alarm system is designed to limit loss and not prevent the actuality.

Remote Off-Site Monitoring's main purpose is to detect and deter before the criminal element breaches the alarm activation.

For more information contact Laurence Strydom, Raw Fire Security, +27 (0)11 425 0146, [email protected] or Remote Off-Site Monitoring.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Phishing attacks through SVG image files
Kaspersky News & Events Information Security
Kaspersky has detected a new trend: attackers are distributing phishing emails to individual and corporate users with attachments in SVG (Scalable Vector Graphics) files, a format commonly used for storing images.

Read more...
Fully-integrated browser AI
News & Events
Opera Mini now provides all its smartphone users with its own free built-in browser AI, Aria, including AI chat, Ask Aria and image generation. According to an Opera survey, 80% of South Africans want AI tools integrated into their browser.

Read more...
Amendments to the Private Security Industry Regulations
Technews Publishing Agriculture (Industry) News & Events Associations
SANSEA, SASA, National Security Forum, CEO, TAPSOSA, and LASA oppose recently published Amendments to the Private Security Industry Regulations regarding firearms.

Read more...
Local innovation driving excellence in FM
Securex South Africa News & Events
As organisations seek cost-effective, sustainable, and high-quality solutions, home-grown facilities management innovation is proving to be a critical driver of operational efficiency and long-term success.

Read more...
PIV-ready High Sec Controller 7000
News & Events
Gallagher Security announced the release of the latest addition to its controller product range; the High Sec Controller 7000, which incorporates all the core functions of the C7000 Standard variant released less than 18 months ago.

Read more...
The impact of GenAI on cybersecurity
Sophos News & Events Information Security
Sophos survey finds that 89% of IT leaders worry GenAI flaws could negatively impact their organisation’s cybersecurity strategies, with 87% of respondents stating they were concerned about a resulting lack of cybersecurity accountability.

Read more...
Lack of optimism for African economy
News & Events
African Leadership University publishes the 2025 Africa Workforce Readiness Survey, which shows that only 21% of South African employers are optimistic about the future of the country’s economy, the lowest of any country polled.

Read more...
From the editor's desk: What’s a trillion between friends?
Technews Publishing News & Events
Back in the bad old days of 2015, some (who didn’t want to take the blame for coming up with that number) estimated the amount of money lost to corruption by the South African government to be around ...

Read more...
Closing physical security loopholes
Securex South Africa News & Events
Relying on outdated physical security measures can expose businesses and facilities to threats in today’s fast-evolving security landscape. Fortunately, advances in security technology are helping organisations stay ahead of threats by closing critical security gaps.

Read more...