Trends in intruder detection

October 2017 Editor's Choice, Access Control & Identity Management, Perimeter Security, Alarms & Intruder Detection

Passive infrared (PIR) sensors seem to have been around for almost as long as electronic alarm systems*, and they continue to form the basis of most interior intruder detection systems. The technologies that have built up around them, though, continue to push the boundaries in terms of intelligence and integration with other systems such as access control. Hi-Tech Security Solutions spoke to Elvey’s Ingo Mutinelli and Secutel Technologies’ Danny Pringle to learn about the trends shaping the market.

(*In fact the first PIR sensors were commercialised in the 1970s, whereas the American Edwin Holmes is credited with inventing the first electromagnetic alarm as far back as 1853. Having created a successful market in the burglary-ridden city of New York, he also went on to develop a networking system to monitor the alarms from a central station. His son later developed a way to network the alarms using pre-existing telephone cabling, rather than laying new cables.)

Essential features

According to Mutinelli, top of the list of must-have features today is an application for the end user to drive certain features such as arming, disarming, bypassing and driving certain home automation features through Z-Wave devices, as well as allowing for video verification and push notification on events. “The end user is demanding this as a standard feature as push notifications and home control become easier,” he says. “Security managers also look to these capabilities from a site management and safety perspective as it is always better to have a view of what's happening on a site before you actually get there. Previously this info was not available to the security manager or end user.”

Pringle believes that visual verification is already an essential feature in many applications, and is becoming more so in almost every security application that relies on intruder detection. In fact, he has built Secutel Technologies around this principle, having worked closely with security control room managers and operators to recognise the fact that visuals provide an invaluable way to augment an operator’s insight into what’s happening at a client’s site and to mitigate against false alarms.

“In this context, having visuals goes a long way toward seeing that there are actually people on the premises, or other visual evidence of an intrusion (sparks coming from a grinder, for example, or a foot or another part of a human body in the scene),” says Pringle. “This effectively makes it easier for a control room operator to make informed decisions in a timely manner.”

Secutel designs and builds its hardware and software in South Africa to meet local conditions, in order to deal with issues like unstable power supply. Another issue that is important to address is the data bandwidth constraints often experienced in remote rural locations. For this reason, the company’s technology is not designed to provide continuous streams of high-definition video, but rather to take snapshots upon an event being triggered. These snapshots are then compressed to just a few tens of kilobytes before being sent via GSM, making the systems viable even when only a basic GPRS connection is available.

The company has enjoyed success with various types of business where valuables are stored on site, and in particular with several leading financial institutions where they monitor safe rooms as well as remote ATM machines. “A primary benefit of our system is that it is managed, so the client can configure everything remotely, and each camera is continuously monitored for any communications dropout. The cameras are equipped with a flash to ensure that good quality colour photos can be captured, even at night.”

Another way Secutel focuses on the needs of its target market is by employing a rental business model, rather than selling systems outright. “This benefits our clients from a capex point of view, and also because the hardware is offered on a swap-out warranty basis, so when a unit fails we automatically send a replacement one and swap it on site, rather than having to bring it back for repairs before it goes into operation again.”

Summarising the importance he places on visual verification, Pringle says: “Although the ’horses for courses’ argument cannot be dismissed, I believe the days of normal alarm systems that only employ PIR sensors and an alarm are numbered. Visual verification provides such a decisive advantage that it’s making less and less sense not to incorporate it.”

Integration is vital

With extra capabilities often comes added complexity, and Mutinelli insists that seamless and easy is how it should be when it comes to integration. “Adding bits and pieces from different manufacturers often creates many small issues which compromise security and takes the ease out of what should, in the end, be easier to work with and manage,” he states.

Mutinelli highlights DSC, UTC and Risco as three leading manufacturers of alarm security products that offer in-house integrated solutions that can be driven through an app and managed from a control room. “This means it is an end-to-end solution that gives the service provider and the end user much more power to deliver on their offering, services and requirements,” he says.

Tighter integration between intruder detection and access control is continuing to evolve as a key requirement, and in this regard Mutinelli singles out DSC’s and Risco’s offerings of integrated access control on the keypad using proximity cards and tags. “This is a built-in feature and offers higher security levels in that turning the alarm off and accessing a door needs to happen on the same platform,” he elaborates. “It works well and is seamless for basic access control applications. A dedicated access control system should still be used for a total solution and in these cases many alarm manufacturers and access control manufacturers have integrated each other’s products to offer a more integrated solution along product disciplines – Impro and DSC integration is an example thereof.”

Pringle concurs that integration with access control is of growing importance, and Secutel has been working with the likes of Salto on this front. “Being able to add visual verification adds a layer of intelligence in a situation where there is a potential breach of access control. We believe strongly that those two security disciplines are converging. A core principle of Secutel’s approach is to take an already existing system and apply it for intrusion detection purposes, rather than expect clients to rip out and replace their existing infrastructure.”

An example of how Secutel exploits existing infrastructure is a technology it has developed which uses already installed IP cameras to take snapshots, for example at night, in the case of an intrusion. The company also has a bridge device which can transparently integrate analogue cameras and upload the data captured by them to the same cloud server as other cameras on the network. Its cloud service is then able to distribute event data to business intelligence systems, for example, while specialised middleware integrates with the software on the control room side.

For more information contact:

• Ingo Mutinelli, Elvey, +27 (0)11 401 6700, [email protected], www.elvey.co.za

• Danny Pringle, Secutel Technologies, +27 (0)10 015 1401, [email protected], www.secutel.co.za



Credit(s)





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Local is a lekker challenge
Secutel Technologies Technews Publishing AI & Data Analytics
There are a number of companies focused on producing solutions locally, primarily in the software arena, but we still have hardware producers churning out products, many doing business locally and internationally.

Read more...
A passport to offline backups
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure Smart Home Automation
SMART Security Solutions tested a 6 TB WD My Passport and found it is much more than simply another portable hard drive when considering the free security software the company includes with the device.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Rewriting the rules of reputation
Technews Publishing Editor's Choice Security Services & Risk Management
Public Relations is more crucial than ever in the generative AI and LLMs age. AI-driven search engines no longer just scan social media or reviews, they prioritise authoritative, editorial content.

Read more...
Efficient, future-proof estate security and management
Technews Publishing ElementC Solutions Duxbury Networking Fang Fences & Guards Secutel Technologies OneSpace Technologies DeepAlert SMART Security Solutions Editor's Choice Information Security Security Services & Risk Management Residential Estate (Industry) AI & Data Analytics IoT & Automation
In February this year, SMART Security Solutions travelled to Cape Town to experience the unbelievable experience of a city where potholes are fixed, and traffic lights work; and to host the Cape Town SMART Estate Security Conference 2025.

Read more...
Paxton opens second experience centre
Paxton News & Events Access Control & Identity Management
Security technology manufacturer, Paxton, has opened a new experience centre in Cape Town on 12 February in partnership with its exclusive distributors, Reditron and Regal Security.

Read more...
Gallagher’s Integrate 360 event in Durban
Gallagher News & Events Perimeter Security, Alarms & Intruder Detection
Gallagher Security held its Integrate 360 event in Durban, South Africa. The event attracted 65 channel partners, end users, and consultants from across KwaZulu-Natal and broader South Africa to showcase the latest in Gallagher’s technology suite.

Read more...
Gallagher Security expands Digital Badge Programme
News & Events Access Control & Identity Management Training & Education
Following a successful launch and roll out across Australia and Papua New Guinea in 2023, Gallagher announced its Digital Badge programme is now available to channel partners and end users across the rest of APAC IMEA.

Read more...
Integrated Control Technology and Ingram Micro sign distribution agreement
News & Events Access Control & Identity Management
Integrated Control Technology, a global manufacturer of intelligent electronic access control and security solutions, announced it has extended its presence in the Middle East and Africa region by entering a distribution agreement with Ingram Micro.

Read more...
Historic Collaboration cuts ATM Bombings by 30%
Online Intelligence Editor's Choice News & Events Security Services & Risk Management
Project Big-Bang, a collaborative industry-wide task team, has successfully reduced ATM bombings in South Africa by 30,7% during the predetermined measurement period of November, December and January 2024/5.

Read more...