Has anything changed?

April 2013 Perimeter Security, Alarms & Intruder Detection

Intruder detection and alarm monitoring goes back many years. So has anything changed? Are we seeing technologies such as surveillance and video verification, coming to the fore or is this reserved for wealthier clientele? Hi-Tech Security Solutions asked Videofied MD, Wynand Beneke and Elvey Security Technologies’ regional sales manager, Tinus Jansen van Vuuren, about the current trends in the market.

Wynand Beneke
Wynand Beneke

“The intruder and alarm market has been a very conservative industry over the past 15 to 20 years. However, we have recently seen a broad acceptance of wireless technology and visual verification. There are also more manufacturers introducing new products to South Africa, whereas in the past only a handful of suppliers dominated the market. This will have a huge impact on pricing and is definitely moving the industry forward to more advanced IP-based technologies, utilising bi-directional wireless transmission,” says Beneke.

“The main challenge of the alarm monitoring and intruder industry is the extremely high rate of false, unverified alarms. The cost of these false alarms is very high and lead to a slower response.”

Some new products are tackling the actual cause of the problem; that is, poor detection and the absence of verification. Historically, most suppliers were tackling only the consequences of the issue. The advance of new technologies, with better detection and built-in verification, is very welcome.

Tinus Jansen van Rensburg
Tinus Jansen van Rensburg

Jansen van Vuuren believes that there is an increasing focus on wireless detection and App-related technology. “CCTV surveillance, previously predominantly in the domain of the commercial sector, is gaining popularity and acceptance in the domestic market. Likewise, we are seeing more domestic installations utilising mobile DVRs and anti-vandal domes for intruder detection.”

“With the introduction of a wider range of perimeter security products, the market has become very competitive and the benefits of choice and cost-effectiveness are passed on to the consumer. We have seen the advent of mobile App solutions that provide the consumer with pre-warning and allow them to interact with other solutions.”

Not too long ago, an invisible boundary wall existed only in story books, but today it is a reality. Used with great effect to prevent criminals from gaining access to private premises, its photo beam sensors create an invisible fence and will trigger an alarm in the event of a breach, thereby ensuring the heightened protection of people, products and vehicles.

The tough economic environment and the huge increase in fuel costs have had a direct impact on the cost of response. Add to this the upcoming increase in the wages of the registered security officers and it is obvious that many players in the market would wish to investigate new solutions. These new solutions are bi-directional wireless, spread spectrum radio and voice-video integration. Products that do not rely on Eskom-generated power, such as the new military-grade battery-powered products with an energy supply of up to four years, are also gaining market share.

What about CCTV?

Neither Beneke nor Jansen van Vuuren believes that CCTV surveillance is a good solution for intruder detection. “There are definitely plenty of great high-end cameras providing some very impressive quality videos, but from a monitoring perspective, CCTV is very limited. The big players of our alarm industry can monitor hundreds of thousands of alarm systems. You can only monitor a very limited number of CCTV with the same infrastructure,” Beneke clarifies.

Integrated systems

People do explore the possibility of integrated security systems, but the mere cost of such systems makes them affordable only for the wealthy. Some service providers do provide full system integrations, but the target client base is limited.

“IP integration is definitely happening. Most new transmitters are now IP, either via Ethernet or GPRS. There is still no broadly accepted protocol for alarm IP transmission and providers bring their own protocol/software to the table. However, most of the newer IP systems are integrated with local monitoring software such as Oryx-Listener, Watch Manager, QTWatch and Patriot. Likewise, video verification is becoming a necessity,” said Beneke.

Jansen van Vuuren believes that IP integration is still isolated to the industrial/commercial or high-income private consumer markets.

Peanuts and monkeys

Are security companies promoting the right technology or is it still a matter of palming off the cheapest system?

“After years of suffering the consequences of cheap solutions, our local end users have become very educated when it comes to the issue of low-cost intruder alarm systems. Problems faced include false alarms, lightning damage and poor response. Promoting the right technology is the best way to differentiate your company in the market, especially because the right technology is now affordable to a broader audience,” says Beneke.

“Unfortunately, security is still considered by the consumer to be a grudge purchase and as such, they are not prepared to spend any more money on it than they need to. Affordability and simplicity are the predominant factors for the average domestic consumer. However, a reputable security service provider can offer customised solutions that will provide excellent results without exceeding the budget. Service providers need to sell the benefits of new, more reliable technology to their clients. By strategically subsidising this new technology, they are able to pass the money saved on false alarm reductions on to their clients in the form of more reliable systems,” Jansen van Vuuren concludes.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

From the editor's desk: Interesting times
Technews Publishing News & Events
We certainly live in interesting times. From delaying the budget speech because the ANC doesn’t see any reason why VAT shouldn’t be increased by 2%, to crime fighters being set up and prosecuted in ...

Read more...
World-first safe K9 training for drug detection
Technews Publishing SMART Security Solutions Editor's Choice News & Events Security Services & Risk Management Government and Parastatal (Industry)
The Braveheart Bio-Dog Academy recently announced the results of its scientific research into training dogs to accurately detect drugs and explosives without harming either the dogs or their handlers.

Read more...
Nice launches DC Blue Astute garage door motor
Nice Group South Africa Technews Publishing News & Events Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Nice Systems SA has launched the Nice DC Blue Astute, a garage door motor for the South African market featuring a pre-installed lithium-ion battery instead of traditional lead-acid batteries.

Read more...
On the ball or unaware
Technews Publishing Information Security Security Services & Risk Management
Whether an organisation is operating at a high level of information security maturity or has dangerous vulnerabilities that could put an entire business at risk, advanced, strategic penetration testing can uncover its true state of IT security.

Read more...
From the Editor's desk: Apathy is a cybercriminal
Technews Publishing News & Events
      Welcome to SMART Security Solutions’ first print publication of the year, the SMART Access & Identity Handbook 2025. This year’s print issue is smaller than usual, so we include some articles in the ...

Read more...
Federated identity orchestration
Technews Publishing SMART Security Solutions Editor's Choice Access Control & Identity Management Security Services & Risk Management AI & Data Analytics
Understanding exactly who resides at the end of a digital device is key, and simple identity number verification by the Department of Home Affairs is no longer a viable solution on its own.

Read more...
Managing identities for 20 years
Ideco Biometrics Technews Publishing SMART Security Solutions Access Control & Identity Management Integrated Solutions IoT & Automation
Many companies are now more aware of the risks associated with unauthorised access to locations and sensitive data and are investing in advanced identity authentication technologies to mitigate these threats.

Read more...
Balancing security and ease-of-use
Technews Publishing SMART Security Solutions Access Control & Identity Management Security Services & Risk Management
Fraud incidents have financial repercussions and erode consumer trust, leading businesses to become more aware, though this awareness does not necessarily translate into confidence in their identity authentication processes.

Read more...
Identity and authentication
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security Security Services & Risk Management
Identity authentication is a crucial aspect of both physical security and cybersecurity. SMART Security Solutions obtained insights into the topic and the latest developments from three companies.

Read more...
Integration and IoT made easy
Technews Publishing SMART Security Solutions Access Control & Identity Management
The security industry is built on silos, be it surveillance, access control, alarms and others, but integration has become a critical issue in recent years. SMART Security Solutions speaks to Integr8 Systems about its local hardware and software.

Read more...