Verifying your alarm

CCTV Handbook 2018 Surveillance, Perimeter Security, Alarms & Intruder Detection

Visual verification has become a key element in many security installations. The key benefit of visual verification is to reduce false alarms and prevent the dispatching of response teams for no good reason. This wastes time and money, and could result in an incident that really requires armed response being kept waiting while the teams run after alarms caused by cats coming in the window or kids forgetting to disable the alarm.

The benefits extend to the response teams as well. How many security officers have run into a situation only to find themselves outnumbered by armed intruders? With visual verification, the officers (as well as the police, if they are called) will know what they are up against before getting into trouble.

Rory Webber, sales and marketing manager at Videofied SA says video verification has evolved over many years with many manufacturers competing in this market segment. “The link between effective CCTV and normal blind alarm systems [a system that raises the alarm but has no way of informing the control room what caused the alarm] has always meant that the end-users needed both platforms on site. The consequence of that also meant that security companies need two separate monitoring platforms in their control rooms.

Rory Webber.
Rory Webber.

“Verification of an alarm now provides the end-user with both an alarm and video/picture using a single secure platform,” Webber continues. “The advantage for monitoring and armed response companies also means a single point monitoring platform which is secure, reliable and effective, especially when it comes to providing armed response services. Verification systems assist in keeping everyone informed, end-user and monitoring company, which ultimately reduces operational expenses and leads to successful arrests of intruders and a huge reduction of false alarms.”

Elvey’s business development director, Ingo Mutinelli backs this up: “As the name suggests you are now able to receive visual verification on an event. This verification is in real time and has some major benefits:

• Verify real versus false alarms – monitoring stations can now save on deployment of expensive resources to false/nuisance alarms.

• Visual verification allows for an audit trail that eliminates a “he said she said” finger-pointing scenario between security company and end user.

• End-users and security companies can verify the threat before sending key holders/site manager/response officers to dangerous sites.

• Verification to self-monitored alarms gives the end-user visual information of what is happening at their site/home when the alarm sounds.

• Visual verification on remote sites gives the end-user or security company the option to make a call on whether to go to the site or not.

Ingo Mutinelli.
Ingo Mutinelli.

CCTV or PIR?

The standard option for visual verification is having a PIR with a camera on board that takes a short video every time motion is detected. In the past, these products, while useful, did not provide the optimal images. More recently, we have seen local companies combining certain CCTV installations with alarm management platforms to offer the same facility (see www.securitysa.com/59226n). Which of these solutions is optimal depends on your situation and what you already have on site.

Webber says CCTV is a “process management tool driven through a DVR or NVR. The challenge has always been for the security companies to adapt their systems for monitoring conventional (blind) alarms to cater for running a separate CCTV monitoring division on a separate platform.”

In other words, if the end-user wants to use existing CCTV systems for verification of intruders, then an off-site monitoring company that monitors that brand of cameras/NVRs will need to watch all the cameras 24/7. However, technology has evolved and smart systems are also available where end-users can log into their CCTV systems or have push notifications sent to them. He says this solution remains expensive and data-hungry but is used extensively in the market.

As noted above, the first verification systems were not known for the quality of their video, but were still accepted because users or their alarm monitors could see if there was something going on. Others allow you to store footage in the cloud for later review or searching. But is it worth using a full surveillance installation for verification?

Webber explains that verification systems differ from manufacturer to manufacturer so both the alarm monitoring company and end-user need to educate themselves with a clear understanding of all pros and cons of each system. Some systems propose that the user logs in and retrieve video or pictures from the cloud after an event, others string still images together and send it to an end-user, and others send a 10-second video clip to both the alarm company and the end-user.

“We believe that real-time information that is delivered has and will continue to grow in South Africa and abroad. Effective real-time information cuts enormous running costs and delivers information that everyone can benefit from.”

On the other hand, streaming always becomes tricky due to bandwidth and storage concerns, adds Mutinelli. “Visual verification in its truest form needs to send clips or pictures of an event so that the controller or end-user can make a snap decision on what has transpired on site. The action thereafter can be to engage with the surveillance system for full video, but to begin with the verification system is there to instantaneously send a visual of what caused the alarm so that the best course of action can be followed.”

He says this has worked extremely well in detecting the threat, mitigating that threat and then acting according to the threat in a very short space of time. “The information should be kilobytes of data so that it’s quick and doesn’t get affected by signal issues or bandwidth constraints such as throttling, etc.”

Upgrading your alarm

For the average user with a traditional alarm system at home or in their office, what options are there to add a visual verification component to their system? Do you need to opt for new technology or is there a way to add-on components while still making use of your existing installation? Integration with existing kit has obvious cost benefits as well as avoiding the installation hassles.

With the integration and interoperability of products now, certain manufacturers have developed integrated solutions that offer video verification through traditional alarm platforms, states Mutinelli. “That means you still have the high security features and functionality of an alarm system with the addition of visual verification through integrated PIR cameras. That makes the verification on event/alarm exact as the camera sends what the PIR detects in its field of view. If the camera has IR (infrared) it will work at night as well.”

In addition, Mutinelli notes that roadmaps for these visual verification systems have IP integration on the way, meaning that the user/security company will be able to integrate IP cameras already on site to the alarm system giving more of a surveillance angle to the system.

Piggy back or not?

There are two options to choose from in this scenario, according to Webber. First, if an end-user has an existing blind alarm system, most verification systems offer a ‘piggy back’ option. This allows the two panels, the existing alarm and the new verification panel to be connected so the customer can use both.

Once the verification panel is connected, the end-user can add as many devices onto the verification panel in line with the manufacturer’s specifications.

Secondly, if there is nothing on site, he suggests that a security company or system integrator is contacted and a comprehensive site inspection arranged to ascertain the client’s security requirements and risk. “I would also confirm that the monitoring company is able to monitor the verification system in their control room. Verification systems come in many variants, wired or wireless or as a combination, on power or totally Eskom-free. All aspects should be considered based on the customer’s needs and the site dynamics.”

Solutions available right now

Both Mutinelli and Webber have products available that meet the various requirements of visual verification.

Webber believes that any solution that is cost-effective, easy to manage and implement should be encouraged. “Our goal is to reduce risk and save lives of end-users, security officers and guards. Verification systems need to be proactive, so outdoor detection with verification is encouraged. It is too late if the intruders are already inside the commercial or residential property.”

Videofied SA has been in the African market for nine years and services over 100 alarm monitoring control rooms around the continent. “We understand video verification and provide a hands-on approach with solid relationships throughout Africa. We believe in video verification and our solutions make a 10 second video clip available to both the monitoring company as well as the end-user.”

Elvey with its partners has successfully deployed thousands of intrusion systems with visual verification into corporate and residential South Africa, says Mutinelli. “Elvey’s demo facility in Greenstone is open to all security companies and we would be happy to showcase this technology in a working environment. A bespoke solution for any business or market vertical can be designed and the team is ready to assist.”

For more information, contact:

• Videofied SA, +27 (0)87 820 7010, [email protected], www.videofied.co.za.

• Elvey, +27 (0)11 401 6700, [email protected], www.elvey.co.za.



Credit(s)





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...
Make BIG and COMPLEX small and manageable
neaMetrics Suprema AI & Data Analytics Surveillance Integrated Solutions
Traditional CCTV and access systems often operate separately, creating gaps in visibility and efficiency. TRASSIR and Suprema have partnered to develop an integrated platform that improves security, operations, and situational awareness.

Read more...
Get the AI fundamentals right
Technews Publishing SMART Security Solutions Leaderware Editor's Choice Surveillance AI & Data Analytics
Much of the marketing for CCTV AI detection implies the client can just drop the AI into their existing systems and operations, and they will be detecting all criminals and be far more efficient when doing it.

Read more...
SMART Surveillance Conference in Johannesburg
Arteco Global Africa Technews Publishing SMART Security Solutions Axis Communications SA neaMetrics Editor's Choice Surveillance Security Services & Risk Management Logistics (Industry) AI & Data Analytics
SMART Security Solutions hosted its annual SMART Surveillance Conference in Johannesburg in July, welcoming several guests, sponsors, and speakers for an informative and enjoyable day examining the evolution of the surveillance market.

Read more...
LiDAR protects railways from new and existing dangers
Surveillance
3D LiDAR (Light Detection and Ranging) sensors are being installed to monitor rail traffic and ensure safety of passengers as well as individuals walking near the tracks, or trying to perform dangerous stunts for social media.

Read more...
Securing South Africa’s logistics sector
Secutel Technologies Products & Solutions Surveillance Logistics (Industry)
Unlike traditional guarding services, Visual Verifier operates on an ‘Always On’ principle, ensuring continuous 24/7 coverage of warehouses, depots, transit hubs, and delivery points.

Read more...
Unlock the future of security operations in Bloemfontein
DeepAlert News & Events Surveillance
Security professionals and business leaders are invited to revolutionise their offsite monitoring operations at the DeepAlert Product Road Show, taking place on 16 – 17 September 2025, at the Schoemanspark Golf Club, Bloemfontein.

Read more...
Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
Secure, modernise and optimise CCTV
Surveillance Products & Solutions
Industrial and commercial organisations are navigating complex digital transformation processes. With SecuVue, companies can bridge the gap between operational technology and information technology for safer, smarter operations.

Read more...
Eagle Eye Precision Person & Vehicle Detection
Surveillance Products & Solutions AI & Data Analytics
Eagle Eye’s new Precision Person & Vehicle Detection feature detects people and vehicles at long distances with high accuracy and is especially designed for customers who actively monitor for intruders

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.