Back to the future

Residential Estate Security Handbook 2017 Editor's Choice, Information Security, Integrated Solutions, Residential Estate (Industry)

The last 10 years has seen substantial change in the security technology world. So, what will the next 10 years bring? It is worth considering the possibilities because if you don’t, in 10 years you may not be offering the most viable solution. That would not be good for your business, or if you are a user, it could be difficult to survive the changes necessary to stay secure.

We hear so much about the ‘disrupters‘ in the environment around us. For instance, the electric car could ‘disrupt‘ the fuel industry. If so, the fuel industry needs to make plans to make the necessary changes for survival.

There are a few potential disruptors in the security sector, or we may just see it as technology advances. Let’s list a few (technical or otherwise):

1. The guarding industry is becoming too expensive for the average client. Not only must there be annual increases, but removing the E-grade, and at the end of this year, the D-grade, has a knock-on effect and big cost increases. So, something must happen to reduce the total cost of manpower.

2. The ever-increasing application of technical solutions, require that better ‘pilots‘ or operators be employed. They need to be more skilled, trained and better paid. If we don’t, the technology spend is not a good choice and the results will be far less than required.

3. The increased computing power of electronics in the security devices has opened big opportunities. Much of the analysis is being achieved in the camera for instance.

4. Improved analytics is providing more consistent results. Some solutions even have a level of learning to improve the efficiency of the system.

5. We are starting to have a greater number of open systems, that allow for system integration to take place at low cost with high returns. The open systems allow for the interconnection of different brands and products. The days are gone when the product chosen locked you in to the brand for life.

Without listing any more ‘disruptors ‘, we can see a trend:

• Less people employed.

• These employed, being much higher skilled than the current deployment.

• Technology supports greater level of automated reaction to events.

If a machine (an ATM) can be good enough to hand out cash, why can’t the entrance gate have an automated guard machine (AGM) to decide if you can enter? This is possible already. The use of drones in all aspects of life is already happening. So, the drone will become the first response to an alarm.

We have many on-line methods of paying for goods. It relies on making sure there is positive identification. Visitors to an estate may have to use ‘Pay System‘ to register as a visitor to get access through the AGM. Of course, the AGM will be a wonderful solution to those people that shout at the guards and abuse them.

The world of robotics and artificial intelligence (AI) is making these sorts of suggestions well within our capabilities. With this scenario in front of us there are a few challenges. And they are not technical, they are people challenges:

(a) Lots of people will be out of work, a big social problem.

(b) Training and upskilling of the few left to pilot the system will become vital. This training does not exist yet.

(c) The quality of communication systems, including the Internet, needs to be top class with fail-over solutions.

(d) The installer/integrator will need to be top quality. All the outcomes and results will be based on the build quality and maintenance of the system.

(e) But be careful, the AI systems monitor your actions and try to think for you. That may be the next risk we have to be aware of.

So, in the new world of less people, more technology and systems in the residential estate security space, what else can be expected? As a start:

(a) A new breed of criminal who is a technical expert. They exist already.

(b) A security manager who is a technical manager.

(c) An investigator who is skilled in the technology sector and equipment operation.

(d) Training facilities that need to have improved training courses for the new demand.

(e) Companies that offer technical audit and technical risk management services to continually evaluate the health of your system.

(f) A legal system and court procedures that will have to be able to perform in the new environment. Much of the crime may be based on technology manipulation, to the advantage of the techno-crook.

As much as we may feel this is not for us, the increasing labour costs and reducing technology costs are going to win the day. The clients will be demanding that we rise to the occasion.

It’s not the badly trained guard that is going to fail. It’s going to be the badly designed/installed/maintained technology that is going to fail. How are we going to manage that risk?

As I have been told many times, “The future is not what it used to be”.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

AI-enabled tools reducing time to value and enhancing application security
Editor's Choice
Next-generation AI tools are adding new layers of intelligent testing, audit, security, and assurance to the application development lifecycle, reducing risk, and improving time to value while augmenting the overall security posture.

Read more...
2024 State of Security Report
Editor's Choice
Mobile IDs, MFA and sustainability emerge as top trends in HID Global’s 2024 State of Security Report, with artificial intelligence appearing in the conversation for the first time.

Read more...
Cyberthreats facing SMBs
Editor's Choice
Data and credential theft malware were the top two threats against SMBs in 2023, accounting for nearly 50% of all malware targeting this market segment. Ransomware is still the biggest threat.

Read more...
Are we our own worst enemy?
Editor's Choice
Sonja de Klerk believes the day-to-day issues we face can serve as opportunities for personal growth and empowerment, enabling us to contribute to creating a better and safer environment for ourselves and South Africa.

Read more...
How to spot a cyberattack if you are not a security pro
Editor's Choice
Cybersecurity awareness is straightforward if you know what to look for; vigilance and knowledge are our most potent weapons and the good news is that anyone can grasp the basics and spot suspicious activities.

Read more...
Protecting IP and secret data in the age of AI
Editor's Choice
The promise of artificial intelligence (AI) is a source of near-continuous hype for South Africans. However, for enterprises implementing AI solutions, there are some important considerations regarding their intellectual property (IP) and secret data.

Read more...
Super election year increases risks of political violence
Editor's Choice
Widening polarisation is expected in many elections, with terrorism, civil unrest, and environmental activism risks intensifying in a volatile geopolitical environment. Multinational businesses show an increasing interest in political violence insurance coverage in mitigation.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
Enhance control rooms with surveillance and intelligence
Leaderware Editor's Choice Surveillance Mining (Industry)
Dr Craig Donald advocates the use of intelligence and smart surveillance to assist control rooms in dealing with the challenges of the size and dispersed nature common in all mining environments.

Read more...