The Foundation Factor
When I joined Refraime, I was immediately drawn in by the intersection of AI and real-world
infrastructure. Not the theoretical kind. I was intrigued by the infrastructure that matters in a
South African context, where security is not a luxury and the consequences of a system failure
are felt immediately, on the ground, by real people.
My focus is on the sharp end of deployment. I work directly with clients daily, to ensure that
when Refraime is deployed into their environment, it doesn’t just go live – it performs. That
means handling technical queries, resolving logged issues, and guiding teams through the
onboarding process when they first enter a POC with us.
And what I’ve learned, consistently, is this: the technology is rarely the problem.
The foundation is.
Before The Software, There’s The Infrastructure
Before we integrate any solution, the first thing I evaluate is the environment it’s going into,
specifically, the devices it will run on or connect to. Cameras, NVRs, edge compute nodes. This
matters because Refraime is software-first and integration-led. We’re not here to sell hardware.
We’re here to make your existing infrastructure smarter, more responsive, and more secure so
that you don’t have to re-invest astronomical amounts in new “edgy” systems that promise the
world but don’t understand that Africa isn’t “like” the rest of the world.
And if the foundation isn’t sound, the problems only compound.
Firmware is a good place to start. It sounds like a small detail and clients often treat it that way,
but outdated firmware is one of the most common entry points for compromise. Updates don’t
just improve device performance; they close known security vulnerabilities that are actively
catalogued and exploited in the wild.
In South Africa, where sites often run a patchwork of legacy infrastructure and newer hardware
from different vendors, this matters more than most people realise. Refraime is built to integrate
across that complexity. But integration doesn’t mean inheriting risk.
The Three Things That Make A Camera Easy To Hack
From a cybersecurity standpoint, IP cameras and network video recorders are among the most
targeted devices in any environment, not because they’re inherently insecure, but because
they’re often the most neglected.
Three things make them vulnerable:
- Weak or default credentials
Devices shipped from factory with unchanged passwords remain one of the most exploited vectors globally. - Outdated firmware
Known exploits don’t disappear. They get packaged into automated tools and used at scale. - Misconfigurations
Ports left open, unnecessary services running, no network segmentation. Each one is a quiet risk.
Individually, these are oversights. Together, they’re an open door.
Where I Come In
My job when we deploy our platform for our Clients, isn’t just to make sure the software runs. It’s
to make sure the whole system is set up correctly. This means making sure that every device is
properly configured, that credentials are hardened, that the network posture makes sense, and
that what we’re building on is actually solid.
Just as importantly, my job is to transfer that knowledge.
South African businesses – from retail and commercial property to mining and logistics – are
increasingly sophisticated targets. Threat actors know that operational technology is often less
protected than IT infrastructure. They know that cameras are usually on the same network as
everything else and that no one checked the firmware.
Refraime’s value isn’t just in its real AI. It’s the intelligence layer that tells you something
meaningful is happening, acted on by a system that hasn’t already been quietly compromised.
That’s only possible when the foundation is right.
Built Here, For Here
One of the things I value most about working at Refraime is that it was built from the ground up
in South Africa, not adapted from a foreign product and retrofitted for our context. The team
understands unreliable power supply. They understand the realities of sites that have been
running the same cameras for eight years. They understand that a client in Limpopo and a client
in Sandton have very different infrastructure challenges, and that the software needs to meet
them where they are.
That shapes how I approach every deployment. Not as a one-size-fits-all rollout, but as a
foundation-first process. Understand the environment. Secure it properly. Then deploy
something that genuinely performs.
The Principle Holds
A system is only as good as its foundation.
Refraime gives clients powerful, locally built intelligence that closes the gap between functional
detection and real AI-led event detection. But the most advanced AI systems in the world won’t
compensate for a poorly secured device sitting on the same network.
Get the foundation right, and everything built on top of it will hold.
That’s what I come to work to do.
Author: Joshua Chipeta
Refraime Support Engineer