Ensuring your security service performs

Residential Security Handbook 2021: SMART Estate Living Editor's Choice

When something goes wrong and the security operations in an estate fail to deliver as required or expected, someone gets the blame and all too often the blame game starts when one person blames another who blames the security service provider which then blames someone else and so on. This is obviously good for creating confusion and avoiding responsibility, but it doesn’t help improving the security posture of an estate.

Where does the buck really stop in estate security? It’s not a matter of having someone to blame, but fixing a process, improving technology utilisation or updating the training processes or guards etc. Hi-Tech Security Solutions asked Ian Downie, group executive, sales and marketing at Xone Integrated Security who needs to have the broad shoulders, but more importantly, how to avoid failures in the first place.

When something goes wrong with estate security, Downie says there should already be a clear mandate and chain of command. “As such, the HOA must have a clearly defined constitution which provides the framework for this. It will allow for a management team/person who then allocates duties and responsibilities to staff and external service providers. If this scope is clearly defined, it becomes clear who is responsible, for what, and the logical pointsman for grievances and the like.”

The right SLA and SOP

He also adds that service-level agreements (SLAs) are critical when dealing with third-party security providers. He notes that if an SLA is correctly drawn up, it is a very powerful tool for defining exactly how operations should take place. Being linked to fully detailed SOP (standard operating procedures) and even a penalty matrix will allow for exacting standards.


Ian Downie.

“In our case, it can take three months of a full set of teams working to draw up such an SLA with the right level of detail,” Downie says. “These can then be managed very specifically to track performance. In our instance, we benchmark performance against ISO standards, which are audited independently.”

If there is something that doesn’t happen in the right fashion, or goes wrong, then it is seen as a non-conformance and there is a specific set of rectifications, consequences and records that are applied to understand what went wrong, how to rectify it and avoid it occurring in the future.

“Part of this process is to clearly define who the people at fault were, and how to measure and improve their actions. This is integrally linked to Command and Control which needs to be created as part of this set of initiatives.”

Not a solo effort

For estates about to sign new contracts or which are about to embark on technology upgrades, the preparation phase is critical to ensure they can expect certain levels of service and performance – and actually get them?

Downie explains it is crucial to have significant engagement by key staff and management in all aspects of the SLA, SOP and penalty matrixes. The company to be appointed should have a team creating these. In the case of security services and manpower, he says the team will include a logistics head, recruitment head, training head, quality control head, technology head, contracting head, account management head, IMS head and procedure management/writing head.

“Expectations need to be clearly defined, agreed to and structured in a way that will allow management, continuous improvement and report tracking of activities to allow for a managed, efficient service.”

In the case of technology projects, once more he notes a clearly defined scope is crucial, against which key deliverables must be measured. Maintenance and lifespan considerations are key components here.

“Most projects are not scoped with sufficient detail and go wrong along the way,” Downie states. “Consultants, managers and board members who are not specialists often create the scope based on their own, with dire consequences. A company with the right track record, ethics and historical project experience should be appointed and help drive a specific scope.

“Additionally, or alternatively, an experienced specialist consultant should be appointed to create a definitive scope and accept liability for the project if it does not go to plan.”

For further information contact Xone Integrated Security, 0861 65 65 65, info@xone.co.za, www.xone.co.za


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The AI goldrush has a credibility problem
Refraime Editor's Choice Surveillance AI & Data Analytics
The single most important question a surveillance buyer can ask is deceptively simple: “Was this system programmed or was it trained?” That question alone will reveal more about what you are evaluating than any feature list or marketing video.

Read more...
Crime behaviour insights more important than ever
Leaderware Editor's Choice Surveillance Training & Education AI & Data Analytics
Behavioural surveillance skills are as essential now as they have ever been, especially in situations where quick evaluation of context is needed. Training operators in behavioural recognition skills is a vital part of control room success.

Read more...
Proactive estate security in Cape Town
neaMetrics OneSpace Technologies Technews Publishing SMART Security Solutions Fang Fences & Guards ATG Digital Editor's Choice News & Events Integrated Solutions Infrastructure Residential Estate (Industry)
SMART Security Solutions started the year with our annual SMART Estate Security Conference in Cape Town on 26 February 2026. Held at Anna Beulah Farm, the conference saw a number of delegates enjoying the farm’s excellent cuisine, while listening to outstanding presenters.

Read more...
How AI video is reshaping real estate security
neaMetrics TRASSIR - neaMetrics Distribution Editor's Choice
Globally, property maintenance and facility operations spending is projected to grow to over US$145 billion by 2034, reflecting rising complexity, compliance pressures, and increased exposure to operational costs. AI systems can protect properties, automate access, and optimise building management.

Read more...
Open systems support hybrid surveillance
SMART Security Solutions Axis Communications SA neaMetrics Editor's Choice
Today, end users can select the most suitable surveillance solution for their needs, whether it is on-site, at the edge, or in the cloud; a hybrid approach combining different options is most effective depending on the scenario.

Read more...
Surveillance & AI roundtable
DeepAlert Lytehouse Refraime SMART Security Solutions Technews Publishing Editor's Choice Surveillance Integrated Solutions AI & Data Analytics
SMART Security Solutions held an online roundtable with a few surveillance experts to explore the intersection of surveillance and AI, gaining insights into the market and how control rooms are evolving.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.