State of the guarding nation

March 2017 Editor's Choice, Security Services & Risk Management

A common sight throughout South Africa, whether you’re in a residential area, a mall or a business location is the sight of guards of various sorts manning their posts, patrolling transporting cash and valuables, and occupied in a host of other duties. Due to the proliferation of crime of all sorts in the country and the seeming inability or unwillingness to address the issue from national leadership, private security is big business in South Africa and arguably the largest employer in the country.

In this issue of Hi-Tech Security Solutions, we look at what companies are experiencing in the delivery of their guarding services. This, of course, is divided into two aspects: what the customer wants and what the customer can get. It’s the job of the security, facility or operations manager in businesses to juggle these two realities and come up with a solution that works.

Part of this balancing act is the decision to either outsource your guarding to a service provider or keep the function in-house, training and managing your own guards, or to opt for some form of hybrid in-and-out solution. Outsourcing always seems to be the best option given the complexities in building and managing your own guard force, but insourcing allows the business more control over what happens, who is in control and who is working on your premises. But is that reasoning too simplistic for the modern security operation?

Juan A. Badenhorst heads up security for an automotive dealership in South Africa. He says, “Our automotive dealership one of the largest independently owned in the world and we take security as seriously as selling vehicles, services and automotive parts. That was why we outsourced our guarding services completely. The reason is simple; it’s more advantageous for us.”

Juan A. Badenhorst.
Juan A. Badenhorst.

The advantage is that the company now only needs two in-house security staff-members to manage and maintain its security. All the risk, insurance, personnel administration and security logistics is the burden of the security service provider.

“Taking all the PSiRA regulations on compliance alone into account is enough reason to outsource completely,” he adds. “Our speciality lies in automobile sales and services. To ensure we can stay ahead of the pack, we outsource the rest to the best in their respective fields, including security services, to establish a secure sales environment for our customers.”

Mpho Kewakae, head of security at diamond mining company, Debswana, located in Botswana, also outsources, but notes that a major component of the company’s security is kept in-house.

“To have a meaningful decision and understand the business risk profile, an in-house risk assessment was conducted,” Kewakae explains. “As part of the risk assessment, assets were identified, analysed and priorities were formed based on their criticality (risk rating) from low, to medium and high risk.

Mpho Kewakae.
Mpho Kewakae.

“We are a diamond mining company and our processes are regulated by legislation (such as the Precious and Semi-Precious Stones Act), including having government gazetted and approved practitioners doing critical duties. Based on this assessment, only the low risk areas were outsourced at guarding level; the supervisory level remains in-house.”

Kewakae also notes that whether the job is outsourced or not, the accountability can’t be handed over to someone else. “Accountability remains with the in-house management. Even in instances where non-compliance is recorded against the outsourced guarding company, the owner is still accountable.”

Risk assessments are done annually as part of the security management processes at the automotive dealer, but security is seen as an open and working document that is updated as perceived security threat/s evolve. Badenhorst says assessments are done by himself and the service provider, and then compared to provide a better perspective on the current security threat analysis.

Replace humans with technology?

The question of technology replacing humans is always raised by some people, usually those selling technology. When using cameras and video analytics, for example, you are not restricted by shifts or differences in performance, or even someone having a bad day. Your technology should perform at optimal efficiency at all times (in theory). Is this realistic? What do the people ‘in the trenches’ think about technology as something that can replace the human guarding component?

Kewakae sees guarding as essential, but he says technology remains an invaluable aid and enabler. “Our regulations talk to ‘searches’, which can only be achieved by guards, and where appropriate, with the aid or technology either using baggage X-ray or through the use of CCTV to indicate targeted areas of search,” he states. “Being largely safety and security driven, what remains unseen by personnel in either real time or through analytics is uncovered by CCTV.

“Non-conformances are followed up for remedial action and fed into our very effective ‘near hit’ programme using CURA. Combining technology yields the results we need as a large part of our operation and we use a combination of data sources for effective analytics.

“Our feeling is that guards cannot be replaced, they remain an essential part of the layered security solution.”

Badenhorst agrees. “Both manned guarding and CCTV technology are necessary to make up the whole state of security. Each plays an essential and important role to establish and maintain a secure environment for our clients and customers to conduct business without fear or loss.”

He additionally believes guarding is not only an essential part of any security posture, but has many added benefits. “Technology, well applied, is a credible addition to enhance the function, performance and effectiveness of security officers. Combining guards with a CCTV monitoring component is like having two cameras facing each other with an added alarm function. They have ‘got each other’s back.’

Supporting this, Kewakae adds: “In order to implement our risk management regime, we have a lot of no-go and restricted high-risk areas that are covered by access management, intrusion alarms and CCTV. That said, they are only as good as the time it takes for us to assess and send a response to investigate and close any matters arising. Therein is the balance.”

Management via technology

Another use of technology is to keep an eye on what your human resources are doing. Regular readers of Hi-Tech Security Solutions will have seen a number of products and solutions designed to manage guards, from assigning shifts, making sure they are where they are supposed to be, and even keeping them safe from attacks.

There is no specific technology used to monitor guards at Debswana. Kewakae says the relationship between the employer and the guards is based on the understanding of post objectives and trust, plus regular meetings to effect short control intervals.

“There is an on-boarding induction and a rigorous awareness programme that customises the guards’ thinking to the requirements of the organisation,” he says. “As part of the deliverables, there are regular reports at the end of every shift and handing over to the oncoming shift. Random inspection is performed by the supervisory team.”

Additionally he notes that the guards subscribe to the requirements of the regulatory body in the country of operation. Certificates of affiliation are provided and minimum qualifications are enforced.

Similarly, human checks are part of Badenhorst’s security process. He says his company makes use of CCTV and Sentinel to monitor security officer performance and they also do regular spot checks to evaluate the performance thereof. “We use CCTV to ensure the system is used properly for full effect.”

Photo by Ethan Prater, Flickr Creative Commons (https://www.flickr.com/photos/eprater/).
Photo by Ethan Prater, Flickr Creative Commons (https://www.flickr.com/photos/eprater/).

Customising services and problem resolution

In any outsourced service provisioning scenario, the customer will always require more than the basic services offered. The requirement is then the ability to work with the service provider in creating the desired solution, which will include problem resolution processes.

And problems are a given in most situations and need to be dealt with and challenges need to be met with positive attitude in order to resolve them as soon and effectively as possible, says Badenhorst.

“Guards pose unique challenges and are almost always the greater of the two weaknesses in your security chain. Guards are susceptible to an array of distractions, including tiredness, sickness, cellphone communication, laziness, rebelliousness, destruction of property and negativity, to name a few. All of these issues can be dealt with if approached in a professional manner. They will respect what you inspect – so do it regularly.”

With guarding it is not always true that ‘you get what you pay for’. Badenhorst is of the view that how you manage your security detail will determine your outcomes. “Make sure you choose a company that complies with security standards and national regulation, and more than half your problems are solved.”

“Relevant skills deficit, absenteeism and rotation of deployed guards continues to be a challenge,” according to Kewakae. However, he notes that as a premium company, Debswana is happy with what it pays for guarding services and this is carefully negotiated on a win-win basis.

Improved services possible

As noted above, no service provider will be able to deliver exactly what every customer wants. To be able to offer a better service, Kewakae advises that the service provider can improve their offering by understanding the business and understanding the security strategy, culture and what the deliverables are. “There should be an agreed target, understood by all parties and signed off. The review dates should be agreed upon by the two parties. More importantly, partnering in some workshops and training is essential to keeping both parties relevant to the times.”

Badenhorst’s advice is firstly to be PSiRA compliant, and secondly to engage in and encourage feedback to constantly keep on top of the service and where it may need improvement.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

“This Is Theft!” SASA slams Mafoko Security
News & Events Security Services & Risk Management Associations
The Security Association of South Africa (SASA) has issued a stark warning that the long-running Mafoko Security Patrols scandal is no longer an isolated case of employer misconduct, but evidence of a systemic failure in South Africa’s regulatory and governance structures.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...
Security ready to move out of the basement
AI & Data Analytics Security Services & Risk Management
Panaseer believes that in 2026, a board member at a major corporation will lose their job amid rising breaches and legal scrutiny, as organisations recognise that cyber risk is a business risk that CISOs cannot shoulder alone.

Read more...
Cyber remains top business risk, but AI fastest riser at #2
News & Events Security Services & Risk Management
The Allianz Risk Barometer 2026 ranks cybersecurity, especially ransomware attacks, as the #1 risk, while AI is the biggest riser and jumps from #10 to #2, highlighting the emerging risks for companies in almost all industry sectors.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
OT calculator to align cyber investments with business goals
Industrial (Industry) Information Security Security Services & Risk Management
The OT Calculator has been developed specifically for industrial organisations to assess the potential costs of insufficient operational technology (OT) security. By offering detailed financial forecasts, the calculator empowers senior management to make well-informed decisions.

Read more...
SA availability of immutable backup storage appliance
CASA Software Infrastructure Security Services & Risk Management
CASA Software has launched the newly released Nexsan VHR-Series, a fully integrated, enterprise-class, immutable backup storage appliance purpose-built for Veeam software environments, with usable capacity ranging from 64 TB to 3,3 PB.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.