What happens if an intruder is detected entering our premises?
The moment video analytics configured on the camera detect an intruder, a security alarm is sent to the off-site SOC where the event video analysed within 1 min and special instructions (predefined with client) is followed e.g. calling armed response/on-site security/facilities management.
Does ISSaaS replace security guards?
Yes within reason, ISSaaS offers greater security value with Al-driven monitoring from multiple devices and real-time response reducing human error.
What are the different service tiers offered with ISSaaS, and how do they cater to different business needs?
Our Standard, Advanced and Premium Tier ISSaaS offerings target a range of business from SMEs to larger nationally distributed businesses. Specifically, those who don’t own their office/premises and thus don’t want to invest capex into security systems. The Standard tier appeals most to customers with internal offices (e.g. within office park) and no external perimeter. They would need basic access control and video surveillance for post incident evidence collection. Advanced and Premium Tiers best suit business with premises with a perimeter boundary to be monitored for security events, or those looking to utilise their security systems for more than just people management and loss prevention, but business insights as well.
What makes ABEC AI ISSaaS different from traditional security solutions offered in the market today?
The key difference lies in ISSaaS’s integration and intelligence. While traditional systems are often fragmented and reactive, ISSaaS combines video surveillance, access control, and smart sensors into a single platform accessed and managed via the internet. It reduces the dependence on physical security guards, reducing the risk of human error. AI analytics provide real-time threat detection to shift reliance on manual video wall monitoring. This not only enhances security but also cuts costs by automating tasks that would otherwise require human intervention. The result is a smarter, more reliable, and proactive security solution that offers round-the-clock protection. Analysis and reporting on data from the smart devices data for business insights.
How does the AI-powered element of ISSaaS enhance security monitoring and response?
AI is core to ISSaaS’s proactive approach by classifying objects in video view as human or vehicle with many sub classification categories such as gender, clothing colour and abnormal behaviour, including sound analytics. Data from video feeds and sensors is processed on edge in real time, identifying potential threats such as unauthorized access or suspicious behaviour. AI can detect anomalies or patterns and trigger alerts before an issue escalates, reducing reliance on manual monitoring and ensuring faster, more accurate responses. Post incident forensic analysis is also greatly improved by smart searching based on AI classifications.
How is real-time monitoring and response management handled in ISSaaS, and what role does cloud technology play?
ISS edge devices will have rules configured in the VMS that when triggered, sends notifications instantly to our Security Operations Centre (SOC). A trained operator then verifies the alarm with associated video of the event and live video feeds and other device data such as door controller status. The operator then follows a Special Operating Procedure (SOP) specific to that security event that was predefined with the client. That SOP may include notification to armed response and facility managers through phone calls, texts and email.
What are the technical requirements or prerequisites for a business to implement ISSaaS?
A stable internet connection with sufficient bandwidth is crucial for cloud-based video storage and real-time monitoring. Depending on the size of the deployment, businesses may need additional infrastructure, such as PoE switches and uninterruptible power supplies (UPS). However, ISSaaS is designed to integrate with standard IT infrastructure minimizing the need for major upgrades.
Can you explain the scalability of ISSaaS and how it adapts to growing business needs?
ISSaaS is inherently scalable. Businesses can easily add more cameras, sensors, or access control points as they grow. The cloud-based platform allows for seamless scaling without expensive hardware upgrades. As business needs evolve, new features and functionalities can be activated, ensuring continuous protection that grows with the business. The service also scales easily and consistently to additional client office locations throughout South Africa.
What measures are in place to ensure data security and privacy with the cloud-based ISSaaS platform?
Our end-to-end security solutions are compliant with global government regulations and built on a trusted, cybersecure platform — all designed to help you focus on what matters most. Federal Information Processing Standard (FIPS) 140 – 2 is a U.S. government standard that specifies the minimum-security requirements for cryptographic modules in information technology products.
FIPS 201 – 2 is a U.S. government standard that outlines the minimum-security requirements for federal personal identity verification (PIV) systems. These systems meet the control and security objectives of Homeland Security Presidential Directive-12 (HSPD-12).
NDAA Compliant
The National Defence Authorization Act (NDAA) restricts the use, procurement, or sale of certain brands of surveillance equipment for federal agencies.
GDPR
The European Union’s General Data Protection Regulation (GDPR) protects European Union (EU) individuals’ fundamental right to privacy and the protection of personal data. Avigilon is dedicated to ensuring compliance with data processing and privacy regulations in the provision of its products and services to customers. This commitment extends to adhering to applicable laws, including the EU GDPR.
ISO 27001+ Certified
Avigilon is ISO 27001 certified, including the extensions 27017, 27018 and 27701 for information security and protection of PII in the cloud and privacy management. This helps ensure that the development operations we employ to build the platform on which our cloud solutions are deployed adhere to ISO best practices for information security and privacy. Customers who use our cloud solutions can be confident that we have the necessary policies and protocols in place to safeguard their data.
ONVIF Conformant
Open Network Video Interface Forum (ONVIF) provides and promotes standardized interfaces for effective interoperability of IP-based physical security products.
What kind of ongoing support and maintenance is provided to clients who subscribe to ISSaaS?
Clients benefit from 24/7 support, with both remote and on-site assistance depending on the service tier chosen. We also offer proactive maintenance, including continuous system health checks, firmware updates, and preventive measures to minimize downtime. Our Service Desk is always available to troubleshoot issues and ensure high service uptime.
How does ISSaaS reduce costs for businesses compared to traditional security solutions?
ISSaaS operates on a subscription model, which eliminates the need for large upfront capital investments. Its cloud-based infrastructure reduces the cost of on premises hardware, while AI-driven monitoring decreases the need for manual oversight, reducing labour costs and potential property damage or losses. Repairs and maintenance are included in ISSaaS, except for malicious damage to the ISS equipment, which will be repaired/replaced at the client’s cost.
What are the key business insights that companies can gain from ISSaaS’s analytics and AI-driven features?
ISSaaS can provide valuable business insights, such as traffic patterns, occupancy rates, and security trends. These insights enable businesses to optimize their operations, whether by adjusting staffing levels or refining facility layouts. The AI analytics can also predict potential security risks, allowing companies to take preventive measures before incidents occur.
Who owns the security data (footage & audio)?
The client retains ownership of all video and sound data stored on edge and in the cloud. The client give permission to ABEC AI to access and view the footage to provide proactive security as a service.