Who is your ­competition?

February 2014 News & Events

As you recovered from your December break and adjusted to your first days back in the slave galley, you may have noticed a news article about Google buying a company called Nest Labs for just over $3 billion. So what? you may ask.

Nest is described as “a maker of Internet-connected fire alarms and thermostats”. The idea is you can control your home and save energy with its clever thermostats (in countries where they have things like that). It also offers clever fire/smoke/gas alarms (in countries where they have things like that). Naturally you can control these products from your phone, or they manage themselves. Apparently the smart thermostat manages the environment according to your activity.

Not only is Google getting into people’s homes with this buy, but it has just set its sights on the traditional fire industry. Of course, it is very early days so I wouldn’t reach for the anti-depressants just yet, but it reflects a growing move of ‘other’ companies into the traditional security space.

We’ve seen a few traditional IT companies buying security operations in SA over the past year or so as IT wants to start expanding its area of influence to boost its marginal profits – excluding services in the concept of marginal profits – and knows the security market still makes a nice margin. Last year also saw some industry stalwarts getting a big surprise as their long-term partners dumped their exclusive agreements in the chase for an extra buck (which they will get in the short term).

Other international game-changing players are also sticking their noses into the security market, such as IBM and Microsoft, who are making software do awesome things in managing cities, highways and so on. Fortunately for us, they are focused on the enormous projects that we don’t see in Africa – but for how much longer?

Once the big projects, or big money projects are over, their technology will be scaled down to meet other needs, eventually ending up at the consumer level. With Google’s expertise at dealing with huge volumes of data, for example, it would be a doddle to manage video surveillance.

And when we look at handling big chunks of data, all the hype in IT today about ‘Big Data’ really makes one sit up and take notice when it comes to video surveillance. Data doesn’t get much bigger and the ability to analyse terabytes of video data quickly for security and business intelligence reasons is going to become essential.

Let’s be honest: how many local security companies have what it takes to compete with guys who can spend $3 billion in cash on a thermostat and smoke detector?

So enjoy the nice friendly security industry while you can over the next few years, there are some unpleasant changes in store in the future – hopefully far in the future. Maybe it’s a stroke of luck that we’re at the bottom of Africa in a country as attractive to foreign investors as appendicitis.

Andrew Seldon

Editor



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Hytera supports communication upgrade for Joburg
News & Events Infrastructure Government and Parastatal (Industry)
By equipping Johannesburg’s metro police and emergency services with multimode radios which integrate TETRA and LTE networks, Hytera is bridging coverage gaps and improving response times across the city.

Read more...
The global generative AI market surpassed $130 billion in 2024
News & Events AI & Data Analytics
According to a new research report from the IoT analyst firm, Berg Insight, the Generative AI (GenAI) market grew substantially in 2024, experiencing triple-digit growth rates in all three major segments: GenAI hardware, foundation models, and development platforms.

Read more...
Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
ProtecLink 2025: Ithegi Electronics supports a safer, smarter security ecosystem
News & Events
If you are a security buyer, operations lead, or technology partner, do not miss ProtecLink 2025, to be held in Polokwane on 16 September 2025, at the Polokwane Royal Hotel.

Read more...
Directory of suppliers
Technews Publishing SMART Security Solutions Fire & Safety
The Directory of Product and Solution Suppliers for the fire safety industry includes details of companies that provide security and risk mitigation products, advice, and services within this market.

Read more...
Fire safety in commercial kitchens
Technews Publishing Kestrel Distribution Products & Solutions Fire & Safety Commercial (Industry)
Fire safety in commercial kitchens is becoming increasingly critical. Defender is Europe’s first EN 17446:2021-approved kitchen hood fire suppression system and offers the indispensable safety measures required.

Read more...
IZI Group acquires G4S Cash Solutions South Africa
News & Events
IZI Africa, a sister company within the IZI Group, has acquired G4S Cash Solutions (SA) following the receipt of all necessary regulatory approvals. This transaction marks a significant consolidation in the South African cash handling industry.

Read more...
Secutel maintains ISO certifications
News & Events Fire & Safety
Secutel Technologies has successfully recertified all four of its ISO standards, a reflection of its continued commitment to excellence, client trust, and operational integrity.

Read more...
SABRIC appoints Andre Wentzel as interim CEO
News & Events Financial (Industry) Associations
The South African Banking Risk Information Centre (SABRIC) has announced the appointment of Andre Wentzel as interim chief executive officer, effective immediately.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.