classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2018


Making data work for you
August 2018, Security Services & Risk Management, Residential Estate (Industry)

Technology is playing an increasingly important role in our security solutions. These installations allow for data to be collected from systems which include access control, alarm and CCTV or any other electronic security intervention. This data is recorded over time. Electronic monitoring of security manpower also produces volumes of data; this could include guard and vehicle tracking. All this valuable information resides in the system databases and is growing as the system is used.

Glenn Allen.
Glenn Allen.

In most cases the data is ignored by those managing the security operation, until a security incident occurs. At this point, many hours will be spent retrieving information for the incident report. It is not always easy because the format in which you are able to access the data may not suit the parameters of your particular search. It may also involve matching up CCTV images and access control information.

At this point it is hoped that all systems are operating on exactly the same time value, so that manually shifting the time block for each group of data to match events, is not necessary.

This reactive approach to data use is not ideal. It begs the question: is the investment in technology giving the correct return? Is there a proactive approach to this problem?

There is and it is mostly ignored, however this is the area in which it would be much better to operate. Now the question becomes: How do I make use of data to improve the security solution?

Some examples

The access control system: If correctly set up, there should be data available which shows every transaction and includes the following information:

• Date

• Time

• Location

• Direction (in or out)

• User details

• Type of user (resident, visitor, contractor etc.)

This information can be extracted into a spreadsheet and some analysis done. This analysis can be any of the following:

• Identify booms and turnstiles which are most often used.

• The peak activity times at each access point.

• The time of day when vehicle flow is low enough for the closing of gates.

• The number of times any boom is lifted by the guard i.e. there has been an override of the system.

• The number of times access has been denied by the system and the user who has been denied access.

The electric fence: If correctly set up, there should be data available which shows every transaction and includes the following information:

• Type of alarm.

• Location (zone of alarm).

• Time of alarm.

• Operator response (not manually entered, but from a predetermined set of reasons for reporting purposes).

• Time of operator response.

• Time of operator follow-up (if applicable).

This information can be extracted into a spreadsheet format and some analysis done. This analysis can be any of the following:

• Alarms for zone per alarm type.

• Average alarm count per zone per alarm type.

• Count of contributors to alarm (weather, vegetation, etc.)

• Operator response time (per operator for appraisal purposes).

The same statistical data can be applied for all the other systems, such as thermal camera alarms, visitor entry info, etc. This information is also vital for maintenance planning, problem prediction as well as planning of future upgrades of the systems.

The problem often is that in order to analyse the data, you most often have to go and retrieve information from the relative system’s standard reports (if they even have reports available) and it is not simply automatically sent to you – you need to go and get it yourself. Even if it is sent to you via email or similar, it is not always reader friendly and most often presents large amounts of data incorporating thousands of transactional data entries which requires further analytics to determine the anomalies. Although further analytics is possible using tools like pivot tables, graphs and the like, this is often a tedious task.

Also, most often the data is not presented in a user friendly, live easy to read view, highlighting almost in real time as systems go beyond the normal parameters to predict possible problems and allow for rectification of problems prior to failure. It is also most likely that the standard reports don’t provide the summarised data you may require to make informed decisions and timeously act on equipment that is beginning to fail or problems as they arise.

Modern businesses employ business intelligence (BI) tools and modern security managers should begin to employ security intelligence (SI) tools that should have the ability to represent current and historical security system data in a user friendly manner in real time so that all security personnel and management can, with relative ease, view the current health and statistical information on a dashboard for instant checks on how their entire system is performing at the exact time. Not only should it present the current status quo, but should also present the exceptions so that they can be addressed as and when they happen.

Intelligent security solutions

Derek Lategan.
Derek Lategan.

In residential estate security, mitigating risk is top priority. “Residential estates often make the mistake of installing the latest technology and thinking that their estate is secure,” says Derek Lategan, MD of Excellerate Services. “Even the best systems available used by inadequately trained managers and staff members will not achieve the results that are required.”

Excellerate adopted a proactive approach to the management of estate security risk by developing a Risk Management Strategy (RMS), which is consistent with the principles outlined in ISO 31000 standard. With this strategy in mind, Excellerate conducts a high-level evaluation of the estate and proposes appropriate considerations for the enhancement of safety and security measures on the estate, taking into account both internal risk factors as well as the surrounding area.

Regular audits of the RMS are conducted to ensure effective performance against desired outcomes. Each audit seeks to identify smarter processes and better use of current resources, resulting in efficient and productive operations that are flexible and responsive which in turn allow estates to enjoy significant cost savings.

The scope of the audit consists of the following activities:

• Surveying the physical facilities;

• Surveying areas of interest surrounding the estate;

• Reviewing security organisational structure, management and staffing levels including job descriptions for each post;

• Reviewing existing security plans, policies and procedures;

• Reviewing physical security technologies as well as their level of integration with one another.

A growing trend in residential estate crimes is for a crime syndicate to move into a house in the estate for a certain period. During this time, the suspects monitor the behaviour of the other residents, workers and security. The suspects then initiate crimes before moving out. A common way to combat this trend is by placing informants within the environment to gather intelligence.

“In the final analysis,” says Lategan, “intelligent criminals can only be thwarted by intelligent security solutions.”


Credit(s)
  Share via Twitter   Share via LinkedIn      

Further reading:

  • Significant differences in ­perceptions on state of digital trust
    November 2018, CA Southern Africa, Access Control & Identity Management, Security Services & Risk Management
    Nearly half of businesses admit to selling customer data, despite claiming data ­protection as paramount; consumer behaviour shows strong correlation between loss of business and lack of digital trust.
  • Reliability a fundamental in visitor management
    November 2018, Powell Tronics, Access Control & Identity Management, Integrated Solutions, Security Services & Risk Management
    With the rapid evolution of biometric technology, there are many options available in the marketplace that promise varying levels of performance.
  • Optimal selection of CCTV operators
    November 2018, Leaderware, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Security Services & Risk Management
    Technology is often seen as the primary factor in the success of CCTV surveillance control rooms, yet Dr Craig Donald has seen new control rooms with the most up-to-date technology fail.
  • The latest X-ray scanning solutions
    November 2018, Technews Publishing, Asset Management, EAS, RFID, Security Services & Risk Management
    Hi-Tech Security Solutions asked three suppliers of X-ray scanning equipment for some insights into the latest products and their safety.
  • Managing business continuity and disaster recovery
    November 2018, Technews Publishing, IT infrastructure, Security Services & Risk Management
    Organisations are increasingly reliant on their IT systems and data, but they are faced with risks in the form of anything from accidental data loss, to deliberate acts of sabotage.
  • Velocity Audit
    November 2018, Excellerate Services , Security Services & Risk Management
    Excellerate Services has adopted an outcome-based service model which is underpinned by a Customer Experience (CXM) and SLA Management platform called Velocity Audit.
  • Smart cities spend less
    November 2018, Axis Communications SA, Government and Parastatal (Industry), CCTV, Surveillance & Remote Monitoring, Security Services & Risk Management
    A proactive management model allows cities to work smarter and save money while offering better services and results to their citizens.
  • What about the service level agreement?
    November 2018, Vision Catcher, This Week's Editor's Pick, Security Services & Risk Management
    Niall Beazley discusses the importance of a reliable service level agreement (SLA) if you want to rest assured in the long-term efficacy of your security installation.
  • The need for resilience in national infrastructure
    November 2018, Government and Parastatal (Industry), Cyber Security, Security Services & Risk Management
    The industries and infrastructure on which so much of our daily lives depend are deep in the midst of mass digitisation.
  • Smart home security services
    November 2018, Fidelity Security Group, Security Services & Risk Management, Products
    SecureHome enables you to view the status of your home security, quickly arm or disarm your alarm system, and receive alerts using your smartphone.
  • Smart city spending to soar
    November 2018, Integrated Solutions, Security Services & Risk Management
    IDC forecasts annual technology spending by Middle East and Africa smart cities to total $2.7 billion by 2022, with Dubai and Riyadh leading the way.
  • Powering the Internet of Everything
    November 2018, Pinnacle Instruments SA, Integrated Solutions, Security Services & Risk Management
    Cities around the world have set their digital transformation sights on uplifting healthcare, education and delivering quality utility and transport services while also prioritising public safety.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.