The more things change, the more they stay the same

Residential Security Handbook 2022: SMART Estate Living Editor's Choice, Security Services & Risk Management, Residential Estate (Industry)

It was French writer Jean-Baptiste Alphonse Karr who wrote “The more things change, the more they stay the same”. And so, before we peek into the future trends which will be outlined in this issue, I wonder if we might take one step back in order to consider this caution.

That no matter how new the technology, if it does not springboard off a solid foundation of security industry best practice principles, then it may as well be built on quicksand.

The Home Owners’ Association of yet another prestigious estate has been left reeling, having discovered that the expensive security solution in place has not been delivering. Not even close. For my client, the news has had far-reaching implications.

Of real concern is that this is a scenario that I come across repeatedly.

Naturally, what soon follows, is the growing realisation by residents that what the estate website promises, is not what is in place. So, what can and should be done?

I have always recommended that residential estates journey through three phases and I stand by all three. However, it has also become more apparent that the all-important first phase, in fact, consists of two very important foci. Let’s call them Phase 1(a) and Phase 1(b).

Understand exactly what you have

Any business analysis must necessarily begin with a mutually exclusive, collectively exhaustive understanding of what is currently in place. Of the here and now. Physical security is no exception, meaning that the all-important Phase 1(a) should be an audit. There are two primary reasons for this. An analysis reveals the hidden shortcomings which could potentially result in reputational, financial or physical harm and it saves significant cost in the medium- to long-term.

Therefore, before a single cent is spent on any recommended security upgrade given to any residential estate by any provider, an estate manager needs to stop and tackle this independently.

It is critical to define the specific client environment and understand the external factors, over which there is little control, that may influence it, delve diligently into the matters over which the client has control, determine a baseline risk profile, examine the health and efficacy of all of the current technology resources by conducting field tests, explore the manpower resources, organise the security service into a high-functioning whole and ensure the effective management of the solution.

To do this, an audit will examine physical barriers, test and document the network infrastructure, study the outer perimeter, the inner perimeter, access and egress, examine the maintenance processes in place and finally, understand the degree to which there is cohesive command and control of the property (which includes monitoring).

Sounds simple enough. Yet the process is complex. Scrutinising an estate’s security pertains to manpower and to technology and to the processes which integrate the two. Good security is, was and always will, stand on that three-legged pot. Therefore, the analysis will be of a complex set of systems and subsystems, meant to integrate proactively and cohesively into something that should deliver more than any one aspect could on its own.

As a rule of thumb and this also applies to small estates, if an audit report is not in place yet – and I am referring to a good 250 pages as an absolute minimum – then the estate is not yet ready to proceed in any direction.

Professionalism and not your cousin’s opinion

Every estate should have on file the results of a thorough, time-consuming analysis of the current security solution’s core and distinctive characteristics and the exercise is serious enough that the responsibility to ensure that it does happen must remain in the hands of the estate manager/HOA directly.

To my mind, steps two and three have always been to undertake a formal risk determination, followed by the facilitation of long-term security strategy development with the client. However, more and more, Phase 1(a) audits undertaken on residential estates are quite coincidently revealing a more immediate need.

I will christen this Phase 1(b): the need to assist the estate to understand the roles of the various players within the security industry value chain which might be involved with the current or future solution (or not).

Why is this so very important? Because in my personal experience I cannot think of one single client property in the past three years which has not been engaging with the value chain incorrectly – to the detriment of its security solution.

In the VUCA (volatile, uncertain, complex and ambiguous) world that we function in today, the industry itself can no longer get by on a deep-seated malaise in which ‘everyone is THE expert’ (including even the consultant). Good security solutions require the active input of a team of experts in their respective fields. Again, the responsibility to ensure that this does happen, has shifted to the estate manager and/or HOA.

This is not to advocate taking business away from any of the hard-working security services providers to be found all over the country. But it is very easy to spot which of these providers are leaning on the wealth of expertise available to them within the industry and which are not, to the ultimate detriment of the estate.

It’s about the safety of people

The time of territorialism within the industry is over. There is no longer room for unofficial alliances, clients deserve the most suitable provider for the specific estate. Now more than ever, the safety of the residents at the end of this chain deserves better than that. Every estate is unique. Every estate will require a unique team of experts. And there is more than enough work for everyone.

Hence, show me the client boardroom with a great coffee machine and a table around which are seated the accountability partners of: estate manager, independent consultant, manufacturer, distributor, local guarding provider, fencing guru and experienced system integrator (one with real expertise and an embedded understanding of manpower and technology through process), with a 300-page independent analysis of the current condition in the middle of that table and I will show you a security solution that is actually going to add value.



Lesley-Anne Kleyn.

Kleyn Change Management is in the business of business improvement. Lesley-Anne partners with clients throughout the country to solve complex internal challenges relating to people, processes and technology. She has a particular interest in the South African physical security services sector. Contact her on +27 64 410 8563.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Risks of fire safety in residential environments
Fire & Safety Residential Estate (Industry)
ASP Fire is highlighting the significant fire risks in residential environments and stressing the importance of proactive fire-safety management at the household level.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Toxic combinations
Editor's Choice
According to Panaseer’s latest research, 70% of major breaches are caused by toxic combinations: overlapping risks that compound and amplify each other, forming a critical vulnerability to be exploited.

Read more...
Syndicates exploit insider vulnerabilities in SA
Information Security Security Services & Risk Management
Today’s cyber criminals do not just exploit vulnerabilities in your systems; they exploit your people, turning trusted team members into unwitting accomplices or deliberate collaborators in their schemes.

Read more...
Continuum launches centralised access and identity management
Editor's Choice Access Control & Identity Management Integrated Solutions Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...
Fire Ops SA Partners with Matrix
News & Events Fire & Safety Residential Estate (Industry)
Fire Ops SA, a South African private fire and rescue service, has announced its partnership with Matrix Vehicle Tracking to launch FireStop, providing Matrix and Beame clients with direct access to a dedicated professional private fire service.

Read more...
Who has access to your face?
Access Control & Identity Management Residential Estate (Industry) AI & Data Analytics
While you may be adjusting your privacy settings on social media or thinking twice about who is recording you at public events, the reality is that your facial features may be used in other contexts,

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.