Integrator skills and contracts

June 2013 News & Events

So how exactly do system integration companies retain the necessary skills within their organisation? Why would anyone invest in training employees if they know that another company will likely poach them? Hi-Tech Security Solutions spoke to the industry about these thorny issues.

Kevin Monk, technical director for Bidvest Magnum Technology said that skills for systems integration are readily available, but you need to follow a systematic process to put them to work. “Some of the skills available are not registered with PSIRA and this can be problematic. In particular, IT-skilled people are not necessarily registered with PSIRA. The registration process is unfortunately taking a while, so this adds an extra obstacle to ensuring that the people who claim to be qualified, can start with our company timeously.”

“Most suppliers and distributors offer good quality training courses on their products and systems. So acquiring the basic skills on products is readily achieved, although the cost of training can be a limiting factor. Training in a classroom is one thing, but it is a different matter applying this knowledge out in the field, where experience counts. This is only gained by working in the field with various types of systems and equipment, as well as facing and resolving typical problems. Fortunately, almost all the major suppliers offer excellent technical backup and support, both at their premises and on site when required,” said Douglas Evans from ESSG Technologies.

“Retaining skilled people will always be a problem because there are many opportunities out there. By providing a stable and reasonable working environment, with interesting challenges and room to improve oneself, can help companies to retain skilled people.”

“In addition, the skills need to match the statutory requirements of the individual companies, in order to be worthwhile in the industry. IP skills are good in terms of the infrastructure of a security system, while traditional security skills will indicate practical issues such as what is the best positioning for a camera in terms of the holistic design. Somebody with both skill sets will obviously be at an advantage,” Monk said.

“You need to implement a two-pronged approach in order to acquire skills. You first have to upskill your own workforce via in-house training, in line with the SSETA guidelines. Then you can utilise IP-based product training via the OEMs to obtain accreditation for installations,” he continued.

Dealing with poachers

“While acquiring the skills may be relatively painless, retaining these skills is a different kettle of fish. The smaller companies typically wait for the large companies to train their employees, then they headhunt these valuable employees. In order to mitigate against this, you need to put a value on the training by ensuring your employees sign a loyalty contract,” Monk pointed out.

“You have no choice but to train and re-train if you want to be able to offer a continued high level of service. Training can be seen as an incentive, as it gives employees additional skills, which will make them more marketable in the future. When training is costly, one could insist that employees sign a contract to remain with the company for a certain period after training is completed. If they leave before that time has elapsed, they are then liable for paying a pro rata portion of the training fees,” said Evans.

Marius Maré, divisional MD of Jasco Security, said that his company uses recruitment agencies that specialise in the security industry to acquire skilled people. “You must get references from recent employers and you need to target scarce skills and source them. We have the philosophy of encouraging employees to study, then we reimburse them once they pass and, at the same time, reward them with a bonus.

“You need to create an environment where employees are facilitated to take the initiative. We have a low turnover of staff because of this philosophy. Key individuals are offered a three-year retainer as an incentive,” he explained.

Keeping customers sweet

“It is difficult in the face of the bakkie brigade to retain clients. However, we are a reputation-based company and we are able to ensure high quality levels,” Steve Alberts, MD at Firetech Projects affirmed.

“We have a very specific target market. Clients are more likely to choose reliable vendors and installers and we regularly communicate with clients to determine their specific needs. The biggest challenge currently is the huge shortage of skills in the security market, especially in biometrics and access control. We are currently looking at founding a training academy but we need participation from other players in the industry to make this a reality,” said Maré.

“There will always be companies who can offer cheaper products and services. The key is to create a mutually beneficial relationship with the client and ensure that you give them good value for money. The service provider provides an excellent service to the client so that their systems are always working and the service provider benefits by acquiring repeat business. Continuity and reliability of service is what will keep your customers loyal,” added Evans.

Monk said that customer loyalty is difficult when most client companies are cost conscious. “However, the blue chip corporates require more in terms of service and quality. They want suppliers to have a national footprint, dedicated staff, PSIRA accreditation and registration. The liabilities in large projects are very high so they will seek out the reputable systems integrators. From the service provider’s perspective, you need to provide the service you promise. A Service Level Agreement (SLA) is very important and outlines what your deliverables are.”

“On an SLA we ensure that a normal technician can maintain the system, but we also allow for a commissioning engineer to overlook the systems twice a year to determine that everything complies with specs,” Alberts said.

“We have various SLAs that we utilise, tailor-made to suit the client’s requirements. There are negotiations between the two legal entities to ensure things like bonus and penalty clauses are clearly outlined and documented,” Monk added.

“We only accept those SLAs where we are certain that the contract will be monitored, as per specific measurements we have in place. The contract needs to be signed off by the client’s security manager in accordance with the roster within the SLA. We will then be paid as per the electronically- or manually-generated report at the end of each month,” Monk asserted.

“We will not sign a contract that has no limit on liabilities, as this is then open to abuse. This does not, however mean we will not provide a service, but rather that the finite details of the service need to be established from our perspective as a supplier. In both our SLAs and our Master Service Agreements, we stipulate the warranty periods and the coverage of equipment in terms of a percentage,” he continued.

Maré added: “Clients want to know that you are responsible after a project if something fails. Depending on the client, we will not just walk away if something fails outside the warranty period. We will do a free assessment and provide them with quotations. Differentiating between normal maintenance/warranty work and work you charge for is a very grey area. You will always find that in a service call, someone wants you to move a camera. We will move it free of charge if this is not a regular request from that specific client. If the client does this often, we will charge for it at normal rates. We do try to educate our clients in this respect.”

“In general, maintenance is done either: (1) On a callout basis, where the customer pays for time and materials used; (2) a limited contract, where the customer pays a monthly fee that covers labour costs for callouts and pays for materials as required to do the repairs needed; or (3) a fully-comprehensive maintenance package, which covers all labour and materials. For all options, services are provided within normal office hours. Any work required outside normal working hours will be charged at overtime rates,” explained Evans.

“Most SLA or maintenance contracts will not cover damage to equipment or systems due to negligence, malicious damage, vandalism, acts of God, civil unrest etc, and both time and materials to effect repairs will be chargeable,” he continued.

“As long as the products are under warranty, nobody else can work on the systems. If they do, the warranty lapses and we will not supply the administrator password to them until the end of the contract,” notes Alberts.

Health and safety

All participants said that they implement very strict occupational health and safety (OHS) processes and maintain a comprehensive OHS file. While this is very costly, it is critical and ensures supplier compliance with the client’s OHS regulations. The needs vary depending on the client and can include the possession of a fire-fighting certificate by all on-site employees, as well as full medical certification.

“It is important that adequate resources are assigned at the beginning of a contract to ensure the job is properly done. Once you start cutting corners to reduce costs, service levels will drop and you will ultimately lose that client,” Evans cautioned.

“It is a constant battle to get the right skills set on site to execute projects. Due to the shortage of certain skills, individuals have to be at different sites daily, which often results in us not completing the project on time,” Maré pointed out.

“Unfortunately, clients do not necessarily want to pay for the skills we deploy as SIs. The IT guys can command much higher hourly rates than those provided to security specialists. While smaller companies can survive on lower margins, it cripples the larger companies who are continually investing in their employees,” Monk concluded.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Local innovation driving excellence in FM
Securex South Africa News & Events
As organisations seek cost-effective, sustainable, and high-quality solutions, home-grown facilities management innovation is proving to be a critical driver of operational efficiency and long-term success.

Read more...
Local is a lekker challenge
Secutel Technologies Technews Publishing AI & Data Analytics
There are a number of companies focused on producing solutions locally, primarily in the software arena, but we still have hardware producers churning out products, many doing business locally and internationally.

Read more...
A passport to offline backups
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure Smart Home Automation
SMART Security Solutions tested a 6 TB WD My Passport and found it is much more than simply another portable hard drive when considering the free security software the company includes with the device.

Read more...
PIV-ready High Sec Controller 7000
News & Events
Gallagher Security announced the release of the latest addition to its controller product range; the High Sec Controller 7000, which incorporates all the core functions of the C7000 Standard variant released less than 18 months ago.

Read more...
The impact of GenAI on cybersecurity
Sophos News & Events Information Security
Sophos survey finds that 89% of IT leaders worry GenAI flaws could negatively impact their organisation’s cybersecurity strategies, with 87% of respondents stating they were concerned about a resulting lack of cybersecurity accountability.

Read more...
Lack of optimism for African economy
News & Events
African Leadership University publishes the 2025 Africa Workforce Readiness Survey, which shows that only 21% of South African employers are optimistic about the future of the country’s economy, the lowest of any country polled.

Read more...
Rewriting the rules of reputation
Technews Publishing Editor's Choice Security Services & Risk Management
Public Relations is more crucial than ever in the generative AI and LLMs age. AI-driven search engines no longer just scan social media or reviews, they prioritise authoritative, editorial content.

Read more...
Efficient, future-proof estate security and management
Technews Publishing ElementC Solutions Duxbury Networking Fang Fences & Guards Secutel Technologies OneSpace Technologies DeepAlert SMART Security Solutions Editor's Choice Information Security Security Services & Risk Management Residential Estate (Industry) AI & Data Analytics IoT & Automation
In February this year, SMART Security Solutions travelled to Cape Town to experience the unbelievable experience of a city where potholes are fixed, and traffic lights work; and to host the Cape Town SMART Estate Security Conference 2025.

Read more...
From the editor's desk: What’s a trillion between friends?
Technews Publishing News & Events
Back in the bad old days of 2015, some (who didn’t want to take the blame for coming up with that number) estimated the amount of money lost to corruption by the South African government to be around ...

Read more...