The modern monitoring facility

October 2008 News & Events

When ROM was established in 1997 it was the front runner of off-site monitoring and has today become the largest control room monitoring company in South Africa.

Remote off-site monitoring is a specialised field of security and not to be taken lightly. ROM's control room is a 24 hour operation that never gets quiet during any hour of the day. A well built team consisting of installers, installation managers, IT specialists, sales department, financial department, and of course the controllers and control room managers, making sure each customer receives full attention on their site through remote off-site monitoring. It is not just having a PC with a camera, the concept of the remote off-site monitoring was fully examined by the directors first.

With ROM's solutions we are able to remotely view cameras as well as manage the cameras, speak to any person on the site through voice over IP, open and close doors, switch lights on and off, open and close gates for access control and trigger any apparatus on site. This is just a few of the basic everyday operations that ROM deals with. Included in these services that are offered are also a range of maintenance contracts to suit any facility. As installers of access control as well as asset control, ROM does not leave the painful headache to the client of a camera that is down or a turnstile with biometric readers not working, ROM fix it.

Another major advantage of remote off-site monitoring is its inherent impartiality and its imperviousness to collusion. While it might be possible to intimidate, confuse or even bribe a security guard to gain access to a business premises, there is simply no way to influence the person monitoring the premises from off-site control room.

With the permission of its IT managers ROM can allow the directors of any business to also remotely view his own camera system. When travelling is required to most owners or simply wanting to see what is happening at night, it can allow extra charges to software or access charges.

Based on its security level agreement, it will submit an activity report to the site representative at intervals agreed upon. This report will comprise of how many motion alarms were received, what caused the alarms and what action was taken by the surveillance controllers, how often did the security officer patrol the site and any other activity that took place? CCTV camera faults will also be reported and managed.

Being in the security business for as long as ROM has, relationships with not only business owners are built each day, but also with suppliers making sure ROM has the right product on the market and software is running to full capacity for smooth success. Due to the high prices of technology, ROM offers a rent-to-own equipment affordable while cost.

Why remote video monitoring

Primary causes of false alarms are poorly designed and installed security systems or human error in operating them. Even simple actions like the positioning of an advertising module or display near a ventilation outlet may result in a false alarm when it moves in the air currents. Therefore, it is not a practical proposition to eliminate all false alarms at the source, though careful design and installation of the motion detectors can dramatically improve the situation.

A viable alternative to physical attendance on site is to provide a means of remote verification from a centralised monitoring location. Attendance is then only necessary when a real threat is judged to exist. For this approach to be truly effective, it must be quick and easy to determine the cause of each and every alarm. Most people understand the theory of the intruder alarm system: this being detectors strategically positioned in a building, door contacts and a control panel that is usually connected to internal and external sirens on site, and connected via a standard telephone line to a remote off-site facility.

Clients are under the illusion that this protects their premises, but in reality it does not make the doors any stronger or the windows any tougher, they still break when struck.

What does it achieve?

An intruder alarm system works predominantly when the premises are unoccupied. An intruder will approach a building and spend some minutes looking through windows, trying doors etc, and, if challenged, will make the lame excuse of "Oh, sorry are you closed?" or simply run.

If left unchallenged the intruder has free access to the building perimeter and any items that are stored outside the premises are susceptible to theft. An ideal opportunity is also presented to the would-be intruder to determine the best access point to the building. An intruder can, by simply looking through a window, see all manner of expensive office equipment including laptops, PCs and digital cameras left on desks. The building occupants assume they are protected by the alarm and the 'it will not happen to them scenario'.

The intruder who has been left unchallenged will eventually smash a window or force a door, which in turn will activate the alarm and send a signal through to the Alarm Response Facility. The experienced intruder, having surveyed the site prior and knowing what he is going to target, once inside will quickly gather the equipment and leave through the same route prior to the arrival of the patrol officer. Nothing has stopped them and the client has sustained a loss and damage to the premises.

The loss can be viewed in a number of ways:

1. Costs incurred due to damage to the premises and the ensuing repair and maintenance works. Additional costs may also arise if alternative premises need to be sourced whilst these repairs are being undertaken. The often unconsidered cost is the uninsurable value of loss of time.

2. Actual loss of capital equipment is covered by an insurance policy, but what if the items are scheduled to be delivered to a client tomorrow and there are penalty clauses for late delivery and again an uninsurable cost eventuates. A worse scenario would be if all your business critical information was stored on the stolen PC, you could severely jeopardise the long-term viability of your company.

In fact, intruder alarm systems are useful, but you should understand what they are designed to do. An intruder alarm system is designed to detect an intruder after they have broken into the premises and at best will limit. In a single sentence, an intruder alarm system is designed to limit loss and not prevent the actuality.

Remote Off-Site Monitoring's main purpose is to detect and deter before the criminal element breaches the alarm activation.

For more information contact Laurence Strydom, Raw Fire Security, +27 (0)11 425 0146, [email protected] or Remote Off-Site Monitoring.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Is your entrance security secure?
SMART Security Solutions Centurion Systems Technews Publishing News & Events Access Control & Identity Management Smart Home Automation
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security.

Read more...
Continuum launches centralised access and identity management
News & Events Access Control & Identity Management Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...
From prevention to protection
Securex South Africa News & Events Fire & Safety
The Western Cape’s varied landscapes and rapid urban development present a range of fire safety challenges, from densely populated city centres to remote industrial sites, and from heritage buildings to new high-rise developments.

Read more...
Workflow and asset management solutions
Asset Management News & Events
Zamatrack’s innovative workflow and asset management solutions feature the Worxit platform. This all-in-one solution allows businesses to streamline operations with real-time tracking, GPS data, and custom reports.

Read more...
SAQCC Gas awareness
Associations News & Events
SAQCC Gas will raise awareness within the gas industry by emphasising the importance of using registered gas practitioners and getting a Certificate of Compliance (CoC) for all your gas systems.

Read more...
Why Securex matters more than ever
Securex South Africa News & Events Fire & Safety Facilities & Building Management
Visitors will observe the application of integrated security solutions, including AI-enhanced surveillance, cloud-based access control, cybersecurity tools, and perimeter protection within residential, commercial, logistics, and industrial environments

Read more...
Fire Ops SA Partners with Matrix
News & Events Fire & Safety Residential Estate (Industry)
Fire Ops SA, a South African private fire and rescue service, has announced its partnership with Matrix Vehicle Tracking to launch FireStop, providing Matrix and Beame clients with direct access to a dedicated professional private fire service.

Read more...
SABRIC Annual Crime Statistics 2024
News & Events Security Services & Risk Management Residential Estate (Industry)
SABRIC has released its Annual Crime Statistics for 2024, reflecting a significant decline in financial crime losses, but also warning of the growing threat posed by artificial intelligence (AI) in fraud schemes.

Read more...
Adding AI analytics to security monitoring
SEON South Africa News & Events Perimeter Security, Alarms & Intruder Detection Residential Estate (Industry) AI & Data Analytics
SEON has announced its latest integration with Refraime, an AI-powered video analytics platform designed to elevate CCTV surveillance through real-time object detection and intelligent alerting.

Read more...
Advances in electric fence management
Nemtek Electric Fencing Products News & Events Perimeter Security, Alarms & Intruder Detection
Nemtek will demonstrate its newly enhanced FG7C+ Fence Controller, now featuring an advanced software upgrade that connects all Nemtek devices, aggregating data to a single point for efficient electric fence alarm monitoring and control.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.