classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2018


Integrated layers of security
September 2017, Integrated Solutions, Security Services & Risk Management, Residential Estate (Industry)

As criminal operations become increasingly sophisticated, so too do the counter measures. In the past, securing a residential estate with a security officer at the gate and a paper-based book for visitors to sign in was sufficient, but now the need to integrate manned guarding and technology is not seen as a nice-to-have, but rather a necessity in protecting ourselves.

G4S understands the ‘secure village’ concept of lifestyle estate protection and has the knowledge and expertise to offer a range of integrated secure solutions based on a comprehensive risk assessment. We also believe that security is the responsibility of everyone within an estate and that it is imperative to have the support of residents who need to actively participate in securing their environment and making security related decisions. You can install technology and provide all the manpower in the world, but if the back door is left open, so to speak, nothing will prevent criminals from taking advantage.

Once everyone is on board, we believe that the safety of an estate relies on multiple layers of security.

Perimeter: Starting from the outside and moving inwards, perimeter protection needs to be addressed first. Ideally, this decision needs to be made in conjunction with the developer and a balance reached between a secure perimeter and development economics. In most cases, electric fencing is chosen as a solution and is very effective. A critical area to plan for is the maintenance of the perimeter fencing and must not be overlooked.

Access control: This is the next area to address and there are many new and innovative systems available. Biometric systems are an effective way to record access and egress details and to ensure that identity is not transferred – as can be the case with card or tag-based systems. Where your gatehouse is situated is also something to consider in an estate. Your security personnel are also at risk of attack and should be protected within the layers we are recommending.

Within the estate itself, there are a number of other security measures that can be implemented, including video surveillance in high risk areas; fire detection systems and public-address systems in communal areas, and vehicle and manned guarding patrols. A detailed risk assessment will help to identify areas of risk specific to your estate and these can be addressed in consultation with developers and residents.

Residents should also accept responsibility for the protection of their own assets and immediate surroundings by installing alarm systems and barriers. Many people are lulled into a false sense of security when purchasing property in a secure estate, and forget basic security measures like locking doors and gates, and not leaving valuables lying around. Work with your security provider to ensure that all areas of security are addressed.

There is still one area of concern and that is what we term the ‘threat from within’. Increasingly crime syndicates do not access estates from the outside, but go as far as to purchase property and operate from within the estate. To resolve this type of threat we believe the solution is the integration of systems and the analysis of resultant data.

This type of service needs to be conducted by security personnel trained to do so. You can proactively secure your environment by monitoring trends and unusual activity and issuing alerts before criminals have time to act. The monitoring of such systems can be done on- or off-site in a number of different ways, using technology and/or personnel.

We must not neglect the importance of people and positive human interaction. By deploying well-trained security officers who understand the intricacies of estate security, you provide the human touch one would expect in a residential environment. Ensure that the staff deployed at your estate have undergone training specific to the residential estate environment and do not overlook the importance of skills such as providing life support or fire-fighting and soft skills such as public relations and conflict resolution.

Tim Timmins, technical director for G4S Electronic Security Solutions, says: “We believe that securing those dearest to you must take on a multiple faceted approach and that integrated solutions benefit our customers through direct cost savings, improved efficiencies and better operational and informational processes.”

For more information contact G4S Electronic Security Solutions, +27 (0)10 001 4500, tim.timmins@za.g4s.com, www.g4s.co.za


  Share via Twitter   Share via LinkedIn      

Further reading:

  • Significant differences in ­perceptions on state of digital trust
    November 2018, CA Southern Africa, Access Control & Identity Management, Security Services & Risk Management
    Nearly half of businesses admit to selling customer data, despite claiming data ­protection as paramount; consumer behaviour shows strong correlation between loss of business and lack of digital trust.
  • Trust but continually verify
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Hi-Tech Security Solutions looks at access and identity management and asks some industry players what ‘zero trust’ and ‘least privilege’ access means.
  • Physical/logical convergence
    November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Integrated Solutions, IT infrastructure
    The convergence between physical and logical (or cyber) security will be a game-changer because it will change the way we do everything, from planning to design and all the way to installation and maintenance.
  • Physical and logical convergence is a fact
    November 2018, This Week's Editor's Pick, Integrated Solutions, IT infrastructure
    Convergence, the next buzzword? A dated buzzword? Is convergence ­merely ­integration on steroids? What is convergence?
  • Taking augmented identity to the world
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    Hi-Tech Security Solutions spoke to Gary Jones, VP Global Channel and Marketing biometric access and time solutions) at IDEMIA (formerly Morpho) about his career with the company and its new vision of Augmented Identity.
  • BIMS set to change identity ­management
    November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Local biometrics integrator, Ideco Biometric Security Solutions, has announced that its Biometric Identity Management System (BIMS) has been launched to market.
  • Tracking biometrics into a brave new digital world
    November 2018, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    The industry is increasingly transitioning from unimodal to more integrated multimodal biometric solutions for more accurate identity verification and faster real-time results.
  • Key components of access control
    November 2018, Paxton Access, Access Control & Identity Management, Integrated Solutions
    Dan Drayton speaks to Hi-Tech Security Solutions about what the key components in modern access control systems are.
  • IP is no stranger to access control
    November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Just as the surveillance market made the move to IP-based communications, the access control market is also moving to IP (or some say it already has).
  • Applying the SaaS model to access control
    November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions
    The software-as-a-service model has proven transformative to many organisations, and even entire industries. The benefits it can offer are undeniable, but in the security sector which is risk-averse by necessity, we wanted to hear the views of some local experts in access control as a service (ACaaS) to find out what some of the pros and cons are.
  • Cloud-based access control
    November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions
    Running your access control through a cloud service has made people nervous in the past, but today’s solutions are hard to beat.
  • Controlling access in the cloud
    November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions
    In the access control arena, hosted or managed services have been around for a few years, and the adoption of cloud-based access control only continues to grow as companies become more and more open to the idea of relying on it to perform such a vital function within their business.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.