classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2018


Take estate security seriously
August 2018, Integrated Solutions, CCTV, Surveillance & Remote Monitoring, Perimeter Security, Alarms & Intruder Detection

“Although lifestyle estates and complexes offer greater security, crime is still a factor,” says Marcel Pienaar, estate and risk security specialist at Fidelity ADT.

Technology has, however, become a much more affordable option to use as part of the security solution for residential estates and security complexes. “Finding the technology that meets the security needs of the estate and is within budget is key,” says Pienaar.

Thermal cameras, for example, are proven to greatly enhance the security of estates. “These camera systems can warn security officers before an intrusion occurs. By using analytics on these cameras, the system can warn the control room when someone comes within a few metres of the perimeter and give the security officer time to react even before a breach occurs,” explains Pienaar.

He adds that a combination of thermal cameras and CCTV cameras is worth considering. Where the thermal cameras read heat signatures only, the CCTV cameras can assist in terms of identification, be it people or number plates. “Electric fences can and should be incorporated and integrated with the cameras. When there is a disturbance at the electric fence, the camera focusing on that specific zone will kick into operation.” An alarm will be triggered and the officer monitoring the cameras can watch that zone to see whether it is a legitimate breach and a response team can be dispatched.

“One of the cornerstones of a successful camera surveillance system,” says Pienaar, “is professional monitoring and responses to incidents. If this component is not guaranteed, the system is basically ineffective.”

While perimeter security is a non-negotiable, he points out that very often crimes within estates are carried out with the assistance of a domestic staff member. “Make sure you have properly checked your domestic worker’s and gardener’s references and educate them on keeping your home secure when you are not there.”

He adds that while security companies are constantly on the look-out for ways to improve their service to residents in estates, residents have to do their part too. “You can’t rely on perimeter security alone,” he says. While perimeter security measures have been successful in driving down crime in estates, once criminals gain access to properties within estates they often have free reign. This is because residents become complacent about their personal home security.

“Be sure to lock doors and windows and ensure vehicles are locked, even if parked in a garage. Don’t leave valuables lying around, particularly where they may be visible to a passer-by.”

He adds that it’s important to always be alert when entering and exiting the estate. “Criminals have targeted residents leaving from or returning to estates and hijacked them a few metres from the gates, if not right in front of the gates. The reality is that people relax and become less alert the closer they get to home. Don’t think that just because there is a security guard at the gate that you can become complacent. If you notice anything suspicious at the gate rather don’t pull in right away but watch from a safe distance.”

“Watch out if there is construction on the go. Having construction workers on site within estates has historically resulted in elevated crime levels. And report suspicious behaviour. A growing trend in estates is for a crime syndicate to move into a home for a period of time. During this time they monitor the behaviour of residents and initiate house break-ins in the estate before moving out. If you notice any suspicious behaviour i.e. blinds or curtains permanently drawn, report it immediately to your security company,” says Pienaar.

He adds that appointing the right security company is also paramount. “The first step in appointing a security service provider is the undertaking of a comprehensive risk assessment. This will enable the estate manager and the team to devise a long- and short-term security plan, usually with assistance from a qualified consultant. The estate will then be able to determine who to employ, how many security officers are needed, and what the command and control structure will look like.”

For more information, contact Fidelity Security Group, +27 11 763 9000, danielmo@fidelitysecurity.co.za, www.fidelitysecurity.co.za


Credit(s)
  Share via Twitter   Share via LinkedIn      

Further reading:

  • Trust but continually verify
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Hi-Tech Security Solutions looks at access and identity management and asks some industry players what ‘zero trust’ and ‘least privilege’ access means.
  • Physical/logical convergence
    November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Integrated Solutions, IT infrastructure
    The convergence between physical and logical (or cyber) security will be a game-changer because it will change the way we do everything, from planning to design and all the way to installation and maintenance.
  • Physical and logical convergence is a fact
    November 2018, This Week's Editor's Pick, Integrated Solutions, IT infrastructure
    Convergence, the next buzzword? A dated buzzword? Is convergence ­merely ­integration on steroids? What is convergence?
  • Taking augmented identity to the world
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    Hi-Tech Security Solutions spoke to Gary Jones, VP Global Channel and Marketing biometric access and time solutions) at IDEMIA (formerly Morpho) about his career with the company and its new vision of Augmented Identity.
  • BIMS set to change identity ­management
    November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Local biometrics integrator, Ideco Biometric Security Solutions, has announced that its Biometric Identity Management System (BIMS) has been launched to market.
  • Tracking biometrics into a brave new digital world
    November 2018, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    The industry is increasingly transitioning from unimodal to more integrated multimodal biometric solutions for more accurate identity verification and faster real-time results.
  • Panasonic’s Face Recognition Server
    November 2018, Panasonic South Africa, Access Control & Identity Management, CCTV, Surveillance & Remote Monitoring, Products
    Panasonic has adopted deep learning technology in its face recognition products that overcomes the difficulties of conventional technologies.
  • Your face tells a story
    November 2018, Technews Publishing, Access Control & Identity Management, CCTV, Surveillance & Remote Monitoring, Government and Parastatal (Industry)
    Facial recognition has advanced to the point where it can be rolled out over large areas and accuracy is no longer a hit-and-miss affair.
  • Key components of access control
    November 2018, Paxton Access, Access Control & Identity Management, Integrated Solutions
    Dan Drayton speaks to Hi-Tech Security Solutions about what the key components in modern access control systems are.
  • IP is no stranger to access control
    November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Just as the surveillance market made the move to IP-based communications, the access control market is also moving to IP (or some say it already has).
  • Applying the SaaS model to access control
    November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions
    The software-as-a-service model has proven transformative to many organisations, and even entire industries. The benefits it can offer are undeniable, but in the security sector which is risk-averse by necessity, we wanted to hear the views of some local experts in access control as a service (ACaaS) to find out what some of the pros and cons are.
  • Cloud-based access control
    November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions
    Running your access control through a cloud service has made people nervous in the past, but today’s solutions are hard to beat.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.