Integrated guarding services

Issue 4 2023 Integrated Solutions, Access Control & Identity Management, Industrial (Industry)

These days estates and facilities no longer simply require a guard at the gate or walking around the perimeter. Every day the security personnel put their lives at risk with the ever-increasing amount of violent criminal attacks we face.

XtraVision, a global distributor of numerous brands in the security and fire industry, has found itself assisting in specifying solutions and helping integration partners with design to assist in dealing with the problem. Many of our clients approach the solution as follows.

Step 1: Understanding the risk onsite to personnel and property; understanding will help the security company to do their job more efficiently.

• Weak points on perimeter or buildings.

• Access and egress control into the estate or facility.

• Challenges related to attending to events.

• Understanding issues encountered by onsite personnel.

• Understanding client budget and funds available to address shortcomings.

• Creating a realistic plan to address the concerns, prioritising concerns from highest to lowest.

Step 2: Selecting a suitable video management solution allowing for control of the site from a central point, while integrating other products in use.

• Does the VMS create a stable building platform that is expandable, thus allowing for third-party integrations?

o Intrusion integration and detection systems, video analytics, and other alarm devices.

o VOIP through and over the system.

o Access control integration.

o Input and output support.

• Can the product support video wall functionality if required?

• Can the product offer failover capabilities for the database and recording features?

• Ease of use of the product.

• Are the annual licencing fees acceptable and in line with client’s budget?

• Can the system allow IP and thermal camera feeds with video analytics alerts to the operators, and does it allow for configuration of a robust and reliable solution?

• Can this product be monitored offsite if required?

• Can the client remotely access footage and evets from mobile devices?

Step 3: Applying relevant technologies that integrate to the above video management platform while assisting operators.

• Visual verification.

o IP Infrared cameras and thermal long-range cameras around the perimeter of the facility to allow detection with associated video analytics; these devices will detect and alert operators who can visually verify the number of perpetrators and whether they are armed or not.

• Detection over a vast area

o Products such as thermal radar covering distances of 1,2 km with detection in a 360-degree radius.

o Long range fibre detection both above and below ground with products such and SAMM Fotos, allowing of drones to verify the alarm while providing accurate GPS locations.

o Radar and similar solutions also provide localised detection along vulnerable areas.

• Access control

o Good access control system with visitor and contractor management, ensuring that all persons on the estate belong on the estate and have left the estate when they should have.

• Communication

o VoIP communication to the field to deter intruders and allow response teams time to get to the location.

XtraVision, has found that although many of the solutions suggested above are expensive, they greatly assist the security companies to effectively conduct their duties and produce a high level of service. Many estates and facilities take the cheaper route, but end up replacing or spending money again on the proposed systems as the cheaper version does not last and is nowhere near as effective as the originally proposed technology solutions.

When costing such systems, the security company, supplier and the client need to look at the actual cost and return on investment.

• Return on investment – cost versus time.

• How long will this product last and what is the mean time between failure?

• How effective is the solution?

• What are the benefits of this solution over other cheaper solutions?

• How will this technology assists the guarding company onsite? Will it benefit the client in their goal of ensuring the site is secure and safe?

Where the right technology has been deployed, the feedback from security companies has been outstanding and they state that it has greatly aided them in their work to secure the site and keep the residents and or property safe and secure.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Access & identity expectations for 2024
Technews Publishing IDEMIA ZKTeco Gallagher Salto Systems Africa Regal Distributors SA Reditron Editor's Choice Access Control & Identity Management Information Security AI & Data Analytics
What does 2024 have in store for the access and identity industry? SMART Security Solutions asked several industry players for their brief thoughts on what they expect this year.

Read more...
Access and identity in 2024
Technews Publishing Gallagher HID Global IDEMIA Ideco Biometrics Enkulu Technologies neaMetrics Editor's Choice Access Control & Identity Management Integrated Solutions
SMART Security Solutions hosted a round table discussion with various players in the access and identity market, to find out what they experienced in the last year, as well as their expectations for 2024.

Read more...
The promise of mobile credentials
Technews Publishing Suprema neaMetrics HID Global Editor's Choice Access Control & Identity Management IoT & Automation
SMART Security Solutions examines the advantages and disadvantages of mobile credentials in a market dominated by cards and fobs, in which biometrics is viewed as a secure alternative.

Read more...
Prepare for cyber-physical attacks
Gallagher Information Security Access Control & Identity Management
As the security landscape continues to evolve, organisations must fortify their security solutions to embrace the changing needs of the security and technology industries. Nowhere is this more present than with regard to cybersecurity.

Read more...
Unleash the full potential of AI at the edge
Suprema AI & Data Analytics Access Control & Identity Management
Efficient AI algorithms, when embedded in edge access control devices, enable companies to optimise their use of AI and edge processing to deliver reliable and fast authentication.

Read more...
Integrated transportation security
Guardian Eye AI & Data Analytics Integrated Solutions Logistics (Industry)
HG Travel installs an AI-powered camera system integrated across 115 vehicles throughout a fleet comprising 160 vehicles of different sizes, along with predictive and self-monitoring tools to track tyre condition, fuel consumption and theft, and overall vehicle maintenance.

Read more...
Embracing next-generation surveillance for safer cities
Surveillance Integrated Solutions AI & Data Analytics
With the South African government highlighting the importance of building smart cities by integrating advanced technologies to make them more resilient and liveable, the role of next-generation network video and surveillance technologies cannot be ignored.

Read more...
Gallagher Security releases Command Centre v9
Gallagher News & Events Access Control & Identity Management Integrated Solutions
Richer features, greater integrations, with the release of Gallagher Security’s Command Centre v9 security site management software designed to integrate seamlessly with various systems and hardware.

Read more...
Lock down your access control with Alcatraz AI
C3 Shared Services Healthcare (Industry) Access Control & Identity Management AI & Data Analytics
Alcatraz AI, represented in South Africa by C3 Shared Services, changes access control by harnessing the power of artificial intelligence and analytics at the edge, where facial recognition becomes the essential credential autonomously.

Read more...
Zero Trust in 2024
Mantis Security Integrated Solutions IoT & Automation
The rapid development of artificial intelligence (AI) applications and uses in 2024 will profoundly impact security operations and AI-driven analytics, which can enhance threat detection, anomaly identification and predictive maintenance.

Read more...