Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      Gautrain to takes on Uber and Bolt: report

      Gautrain to take on Uber and Bolt: report

      22 May 2026
      Three years in, PayShap pivots to merchants

      Three years in, PayShap pivots to merchants

      21 May 2026
      Two telcos, $1-trillion and two very different fintech bets - Vodacom and MTN

      Two telcos, $1-trillion and two very different fintech bets

      21 May 2026
      There's an oddity hiding in South Africa's EV market

      There’s an oddity hiding in South Africa’s EV market

      21 May 2026
      Rica blindspot exposed

      Rica blindspot exposed

      21 May 2026
    • World
      SpaceX's record-setting IPO is here

      SpaceX’s record-setting IPO is here

      21 May 2026
      Vatican confronts the age of artificial intelligence. Edgar Beltrán/The Pillar 

      Vatican confronts the age of artificial intelligence

      19 May 2026
      The walkout that could hit every laptop and AI server - Samsung

      The walkout that could hit every laptop and AI server

      18 May 2026
      Pop star sues Samsung for $15-million - Dua Lipa

      Pop star sues Samsung for $15-million

      11 May 2026
      OpenAI's new audio APIs aim for conversational voice agents

      OpenAI’s new audio APIs aim for conversational voice agents

      8 May 2026
    • In-depth
      Alfa's electric rebel - Alfa Romeo Junior Elettrica Veloce

      Alfa’s electric rebel

      29 April 2026
      Africa switches on as Europe dims the lights

      Africa switches on as Europe dims the lights

      9 April 2026
      The biggest untapped EV market on Earth is hiding in plain sight

      The biggest untapped EV market on Earth is hiding in plain sight

      1 April 2026
      Datatec is firing on all cylinders - Jens Montanana

      The R16-billion tech giant hiding in plain sight

      26 March 2026
      The last generation of coders

      The last generation of coders

      18 February 2026
    • TCS
      TCS+ | The Up&Up Group on the hidden cost of AI - Jason Harrison

      TCS+ | The Up&Up Group on the hidden cost of AI

      13 May 2026
      Michael Rossouw

      TCS+ | The retirement decision most South Africans get wrong

      6 May 2026
      TCS | The Cape Town start-up listening for TB with AI - Braden van Breda

      TCS | The Cape Town start-up listening for TB with AI

      4 May 2026

      TCS+ | ‘The ISP for ISPs’: Vox’s shift to wholesale aggregator

      20 April 2026
      TCS | Werner Lindemann on how AI is rewriting the infosec rulebook

      TCS | Werner Lindemann on how AI is rewriting the infosec rulebook

      15 April 2026
    • Opinion
      AI won't fix your culture - it will expose it - Jackie Kennedy

      AI won’t fix your culture – it will expose it

      19 May 2026
      Free calls, dead voice and Shameel Joosub's Spanish ghost - Duncan McLeod

      Free calls, dead voice and Shameel Joosub’s Spanish ghost

      22 April 2026
      The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

      The conflict of interest at the heart of PayShap’s slow adoption

      26 March 2026
      South Africa's energy future hinges on getting wheeling right - Aishah Gire

      South Africa’s energy future hinges on getting wheeling right

      10 March 2026
      Free calls, dead voice and Shameel Joosub's Spanish ghost - Duncan McLeod

      Apple just dropped a bomb on the Windows world

      5 March 2026
    • Company Hubs
      • 1Stream
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • Ascent Technology
      • AvertITD
      • BBD
      • Braintree
      • CallMiner
      • CambriLearn
      • CM Telecom
      • Contactable
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • HOSTAFRICA
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • Kaspersky
      • LSD Open
      • Mitel
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Telviva
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • HealthTech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Policy and regulation
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Sections » Internet of Things » Why your tracking system fails the moment it matters most

    Why your tracking system fails the moment it matters most

    Promoted | Signal jamming has turned connectivity itself into the target, exposing a critical design flaw, says Sigfox South Africa.
    By Sigfox South Africa22 May 2026
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    Why your tracking system fails the moment it matters most - Sigfox South Africa

    Most tracking systems are designed to operate in stable environments, where connectivity is assumed and visibility is continuous. That assumption no longer holds.

    In South Africa, the communication layer that underpins asset tracking is increasingly being targeted as part of the attack itself. What was designed as an enabler of visibility has become a point of vulnerability.

    Connectivity loss is often not incidental. In many high-risk scenarios, it is engineered.  – Gregory Rood, CEO, Sigfox South Africa

    This fundamentally shifts the role of the system. It is no longer positioned outside the risk environment. It is embedded within it.

    In a traditional model, theft or tampering occurs in the physical world and the system reports on it. Once signal jamming is introduced, that model breaks down. The attacker is no longer just targeting the asset, but the mechanism that makes the asset visible.

    When that mechanism is disrupted, the system does not degrade. It simply stops.

    The real design flaw

    Most tracking systems have been optimised for performance. Accuracy has improved, update frequency has increased and data has become more accessible. However, these improvements are built on a critical assumption: that connectivity remains available.

    In environments where connectivity is deliberately disrupted, that assumption becomes a liability.

    The system is no longer measured by how much data it produces, but by whether it can continue to communicate at all.

    What engineers are doing differently

    This is where the shift is happening, particularly at an engineering level.

    Traditional tracking solutions are often built around a single, high-capability device responsible for positioning, communication and data transmission. While efficient under normal conditions, this approach creates a single point of failure.

    Resilient systems are designed differently.

    Instead of relying on one device or one network, engineers are building layered architectures that combine multiple communication paths and device types, each with a defined role.

    In a typical logistics deployment, this may include:

    • A primary GPS tracker for real-time visibility;
    • A secondary low-bandwidth device that continues transmitting independently of GSM; and
    • Event-driven sensors that trigger alerts based on tampering or route deviation.

    This ensures that when one layer is disrupted, the system continues to function.

    You don’t design these systems to avoid failure. You design them so they keep communicating when failure happens.

    The same principle applies to infrastructure. Instead of relying on periodic checks or high-bandwidth monitoring, deployments are shifting towards distributed, low-power devices that can operate independently and transmit signals under constrained conditions.

    The result is not a perfect system. It is a persistent one.

    Why your tracking system fails the moment it matters most - Sigfox South Africa

    The role of a resilience layer

    This is where Sigfox’s 0G network plays a distinct role.

    Unlike traditional networks, it is not designed for high throughput or continuous data transmission. It is designed for predictable, low-energy communication that continues when other networks do not.

    Because it operates independently of cellular infrastructure, it provides a separate communication path. When primary networks are disrupted, devices can still transmit critical signals.

    This changes how systems behave under pressure.

    Resilient systems are not defined by how much data they produce, but by whether they can still communicate when it matters.

    Resilience first, intelligence second

    There is often strong focus on advanced capabilities such as real-time analytics and high-precision tracking. These features are valuable, but they depend entirely on the presence of a signal. Without that, even the most sophisticated system becomes ineffective.

    This is where Sigfox Bloodhound adds value.

    Sigfox Bloodhound introduces network-based location estimation, allowing position to be inferred from signal behaviour rather than relying solely on GPS. This enhances visibility in environments where traditional tracking methods are compromised.

    However, its effectiveness depends on the system’s ability to continue transmitting signals in the first place.

    Resilience is the foundation. Intelligence builds on top of it.

    A different way to evaluate systems

    The shift required is not purely technological. It is conceptual.

    Tracking systems can no longer be evaluated solely on performance metrics such as accuracy or data frequency. These describe how a system behaves under ideal conditions.

    What matters in practice is how the system behaves when conditions deteriorate:

    • Can it still communicate?
    • Can it still provide useful signals?
    • Can it still support decision-making?

    In South Africa, those are not edge cases. They are the operating environment.

    Because the defining moment for any tracking system is not when everything is working, it is when something is trying to make sure it does not.

    If your system depends on a single communication path, it is already exposed.

    Explore how resilient IoT systems are being designed.

    • Read more articles by Sigfox South Africa on TechCentral
    • This promoted content was paid for by the party concerned
    Follow TechCentral on Google News Add TechCentral as your preferred source on Google


    CEO Gregory Rood Sigfox Sigfox 0G Sigfox South Africa
    WhatsApp YouTube
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleGautrain to take on Uber and Bolt: report
    Next Article Inside the BBD Grad Programme: real work from day one

    Related Posts

    South Africa's IoT growth will stall without infrastructure discipline - Sigfox

    South Africa’s IoT growth will stall without infrastructure discipline

    25 March 2026
    The quiet infrastructure powering AI: why long-life IOT networks matter more than ever - Sigfox South Africa

    The quiet infrastructure powering AI: why long-life IoT networks matter more than ever

    18 February 2026
    Why South Africa must transition from GSM to purpose-built IoT networks - Sigfox

    Why South Africa must transition from GSM to purpose-built IoT networks

    16 October 2025
    Company News
    Inside the BBD Grad Programme: real work from day one

    Inside the BBD Grad Programme: real work from day one

    22 May 2026
    Why your tracking system fails the moment it matters most - Sigfox South Africa

    Why your tracking system fails the moment it matters most

    22 May 2026
    South Africa's operators can fix Rica - and win big doing it - Contactable

    South Africa’s operators can fix Rica – and win big doing it

    21 May 2026
    Opinion
    AI won't fix your culture - it will expose it - Jackie Kennedy

    AI won’t fix your culture – it will expose it

    19 May 2026
    Free calls, dead voice and Shameel Joosub's Spanish ghost - Duncan McLeod

    Free calls, dead voice and Shameel Joosub’s Spanish ghost

    22 April 2026
    The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

    The conflict of interest at the heart of PayShap’s slow adoption

    26 March 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    Inside the BBD Grad Programme: real work from day one

    Inside the BBD Grad Programme: real work from day one

    22 May 2026
    Why your tracking system fails the moment it matters most - Sigfox South Africa

    Why your tracking system fails the moment it matters most

    22 May 2026
    Gautrain to takes on Uber and Bolt: report

    Gautrain to take on Uber and Bolt: report

    22 May 2026
    Three years in, PayShap pivots to merchants

    Three years in, PayShap pivots to merchants

    21 May 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}