Years of experience in the design and installation of security systems has taught us that the success of any security system essentially depends on the underlining philosophy behind the system. In other words, it is what the system needs to accomplish and how it is incorporated into the business.
We would like to highlight what we believe the essential components of a sound security system are.
Compatibility
- All the components of information and security (network, databases, computer specifications, access control systems, surveillance systems, alarm systems, business management systems (BMS), guarding services and security procedures) must be compatible with one another.
- All of the above components must therefore interconnect seamlessly.




Quality
- Information technology and security systems must be robust enough to withstand the rigours of continuous 24/7 use.
- Information technology equipment and security systems must only be purchased from reputable suppliers with a well-established reputation and track record within the industry.
- No compromises must be made to offset prices of information technology equipment and security systems which through experience normally results in systems that fail to deliver, do not last, and must eventually be replaced.
- Information technology and security systems are only as good as the quality of the design and their installation.
- Information technology and security systems must only be installed by reputable service providers with a pedigree of efficient and prompt service.
Control Room Monitoring
- Well-designed and effective information technology and security systems have the capability of monitoring operators.
- Levels of access to networks and security systems by operators are essential to manage monitoring successfully.
- Standard of operators is essential for the effectiveness of the monitoring of the systems.
- Operators should be familiar with company policies and procedures to identify deviations and to report them to management.
- Security systems and network infrastructure are highly effective management tools when operated and monitored effectively.
[ More on control room monitoring... ]





Training
- Proper and continuous training of system operators are essential to the success of information technology and security systems.
Support
- Regular meetings are held during and after installation between contractor and company to ensure the effectiveness of the information technology and security systems and ensure that the required results are achieved.
- At least a 12-month guarantee is offered from suppliers, and at least six months on installations done by ITS Systems.
- At least 36 months routine maintenance are offered by ITS Systems.
Next: [ Information Technology Expertise ]