Start Here
What This Page Helps You Do
Get the decision clear first, then compare providers with the right questions in mind.
Check physical barriers first
Doors, windows, burglar bars, fencing, and gates are your first line of defence.
Then verify detection systems
Alarm sensors, beams, CCTV, and electric fencing should all be working and monitored.
Confirm armed response is active
The system only works if a real response follows the alarm — test it regularly.
Security gaps develop over time — dead batteries, rusted bars, broken lights. Annual checks keep protection current.
Everyone in the home should know which doors to lock, where panic buttons are, and what to do during an emergency.
If you need a new provider, alarm upgrade, or electric fence CoC, compare options through Armed Response SA.
Quick Answers
Key Points At A Glance
The shortest version first. This is the fast read for people who want clarity before they compare providers.
Most common gap
Unlocked doors and windows
Lock everythingOver 30% of burglaries use an unlocked entry point. Check every door and window, including garage access.
Often forgotten
Garage doors are a weak point
Secure the garageCriminals can open garage doors in under 10 seconds. Make sure internal access from garage to house is locked separately.
Load shedding
Battery backup is essential
Test batteriesAlarms, electric fences, and CCTV fail without power. Backup batteries must be tested and replaced regularly.
Insurance
Security affects your cover
Check your policyMany insurers require a monitored alarm with armed response. Claims may be denied if the system was not functioning.
Process
Home Security Assessment Checklist
Work through each area systematically. Any "no" is a gap that needs attention.
-
1
Area 1
Doors
All external doors have functioning deadlocks or mortice locks. Sliding doors have reinforced locks or security bars. Door frames are solid with no gaps. Internal door from garage is locked separately.
-
2
Area 2
Windows
All windows have functioning locks. Ground-level windows have burglar bars that are rust-free and securely anchored. Windows cannot be forced open from outside.
-
3
Area 3
Perimeter and fencing
Boundary walls or fences are adequate height with no gaps. Driveway gates have anti-lift devices. Gate motors have anti-theft brackets. Pedestrian gates have proper locks.
-
4
Area 4
Lighting
Exterior areas are well-lit — driveway, entrance, garden. Motion-activated lights cover high-risk zones. Solar lights provide backup during load shedding.
-
5
Area 5
Alarm and detection
Alarm system is installed, tested monthly, and linked to armed response. CCTV covers main entry points. Electric fence is compliant with a valid CoC. All batteries are functional.
-
6
Area 6
Armed response and monitoring
Armed response is active with a tested communication link. Panic buttons work and trigger silent dispatch. Response provider has confirmed local coverage for your area.
What To Compare
What Usually Changes The Decision
These are the factors that usually matter more than one marketing promise or one price number.
Physical barriers (deter)
Walls, fences, burglar bars, security gates, and locks. These slow down or prevent entry.
Detection systems (alert)
Alarms, beams, CCTV, and electric fencing. These detect intrusion and trigger alerts.
Monitoring and response (react)
Armed response connected to your alarm. This is what turns detection into action.
Backup power (sustain)
Battery backup, UPS, solar. Without power, every electronic layer fails.
Shortlist
Build A Better Shortlist
Keep the shortlist simple: decide what you are scoring, ask sharper questions, then compare providers with intent.
Must have
All entry points locked and secured
Doors, windows, garage, and pedestrian gates with functioning locks.
Must have
Monitored alarm with armed response
An active, tested alarm linked to a provider with confirmed local coverage.
Must have
Battery backup for all electronic security
Alarm, electric fence, CCTV, and gate motor must survive load shedding.
High value
Outdoor lighting with motion activation
Well-lit exteriors deter opportunistic crime, especially during power outages with solar backup.
Questions for your armed response provider
Use these to verify your monitoring is actually working.
When was my alarm last tested with a successful signal to your control room?
A system that has not sent a test signal recently may have a communication failure.
What is your typical response time in my specific area?
National averages are meaningless. You need the local answer for your suburb.
Do my panic buttons trigger a priority dispatch?
Panic activations should be treated as highest priority — confirm this with your provider.
Common Mistakes
Myth vs Fact
Common assumptions that leave South African homes vulnerable.
Myth
My neighbourhood is safe, so I do not need security
Fact
Crime in South Africa affects all areas. Gauteng accounts for 35% of home robberies, but no province is exempt.
Myth
An alarm system alone is enough
Fact
An alarm without monitoring is just noise. The value comes from armed response dispatch — confirmed by testing regularly.
Myth
Burglar bars make my home secure
Fact
Burglar bars help, but rusted or poorly anchored bars are easily defeated. They must be maintained and combined with other layers.
Myth
Criminals only target wealthy homes
Fact
One in three South African homeowners will experience a break-in during their lifetime, across all income levels.
FAQ
Common Questions
Short answers for the questions most people ask before they start comparing.
At least annually, and after any change like moving house, renovating, or switching security providers. Also re-assess after any security incident in your area.
Unlocked doors and windows. Over 30% of burglaries exploit this simple oversight. Garage doors are another frequently neglected entry point.
Yes. Most insurers require a monitored alarm with armed response for full cover. Claims may be denied if the security system was not functioning at the time of the incident.
Locks on all doors and windows, a monitored alarm with armed response, and battery backup for load shedding. These three layers cover the most common vulnerabilities.
Sources
Sources Used In This Guide
These are the official or contextual references used where the guide relies on evidence beyond our own provider data.
Next Step
Start Comparing Providers
Now that you have context, use the area pages, provider profiles, and comparison tools to make the actual decision.