Keep your guard up

March 2018 Editor's Choice, Security Services & Risk Management, Training & Education

It has been said before and it is worth saying it again: securing businesses, organisations and estates requires a strategic combination of people and technology. The crux of a successful human guarding element is careful selection of the ‘right’ personnel and competence through appropriate and adequate training.

Dave Casey.
Dave Casey.

Dave Casey, MD of Beagle Watch, says that his company’s guarding service is aimed at niche markets where clients are willing to pay more so that security officers may earn more. “We have a transparent model where the client determines the salary of the officer. This is generally well above statutory requirements. Our cost then includes additional training, which is aimed at a customised service delivery with quality control and management support.”

The guarding industry is very price sensitive and in most cases, cost is the only consideration, Casey points out. However, in order to deliver quality service it is necessary to invest in training, retraining and, most importantly, site-specific training.

“Too many guarding contracts lack site-specific requirements, which means that the security officer does what he thinks he should do. The client, on the other hand, has expectations and requirements which the security officer knows nothing about. The situation is complex; service can only be improved if clients are prepared to pay more for better service. We are of the opinion that the perception of security officers is a reflection on the management of the company deploying them. Hence, if you do not train them you cannot blame them. Unfortunately the cut- throat nature of the market makes it difficult, if not impossible, to improve the perception unless clients are prepared to pay for the training,” says Casey.

Capability and supervision

Ockie Fourie, MD of Omega Risk Solutions, says that in the past many clients used security officers simply because their insurance required this and therefore some security companies deployed a security officer who lacked a proper job description, supervision or any tools to execute his duties. “Since our security officers play such an integral part in our customers’ business processes as well as in the safeguarding of the client’s property and employees, we have a different approach. Detailed job descriptions are given to each security officer on each post, with a clear standard operating procedure of how these duties need to be executed.”

He adds that daily supervision, on-the-job training and job observations are performed to ensure that officers are well acquainted with their tasks and these tasks are constantly carried out as expected by all stakeholders. Tasks vary from using mobile scanning devices to confirm and record access and egress to and from premises, searching of vehicles and persons, recoding of equipment and stock entering or leaving the premises, and verification on seals and locks.

Fourie says that during the shifts, officers also play an integral part in the health and safety aspects on site, such as inspection of emergency equipment and reporting of unsafe acts or conditions. Officers are also trained in first aid and firefighting and are therefore able to assist in emergency situations. Officers on patrols are monitored via live tracking devices which are placed at high-risk areas. On residential estate sites, officers assist in the inspection of buildings sites to ensure the compliance of contractors with the estate’s rules and regulations.

Andre Eckard.
Andre Eckard.

Fourie’s colleague, Andre Eckard – GM of the company’s training academy – says that security officers typically play a vital role in terms of access control, which, in many cases, is the most vulnerable point in a business or residential area. The main focus is to give access to visitors, contractors and residents, using recognised access control systems, scanning devices and communication systems between the security checkpoint, the host and the visitor.

He acknowledges that dayshifts are normally rather busy but that security officers often sleep during night shifts due to low volumes of activities at the access points. Omega decided to capitalise on these lower activity times to provide refresher training or on-the-job training on site procedures or instructions. These are also accompanied by brain stimulation exercises to keep security officers awake. He adds that the rotation of security officers to different posts and shifts also plays a vital role in their successful achievement of goals.

Training is the differentiator

Training is indeed the largest differentiator in services offered by guarding companies. Casey says that the company’s security officers receive a month’s induction training and ongoing refresher training. Most importantly, specialised on-site training is undertaken on an ongoing basis and each site has detailed instructions of the site and client requirements.

Omega’s security officers undergo a PSiRA evaluation at the company’s training academy to verify competence in the specific PSiRA grade. Officers then undergo Omega-specific induction training at the academy to ensure understanding of the company and processes within the company. Specific site induction training is then provided to officers before deployment to the customer’s site.

On-the-job training is conducted on a daily basis with officers at the different posts by management, supervisory staff and training instructors. Officers are formally assessed and training needs are then identified and scheduled. The company’s supervisory personnel also undergo formal Omega Shift Leader and Supervisor courses to develop and assist them in executing their supervisory roles.

Eckard says that residential or corporate park security officer training includes skills transfer in customer care, risk identification, conflict management, estate rules and enforcement thereof, site inspections and monitoring, as well as emergency procedures including basic firefighting and first aid.

“Certain estates require by-law enforcement, which includes the issuing of fines and peace officer training. Specialised training in firefighting, first aid, hot work standby, dog handling, driver competence and self-defence are presented at Omega’s training centres.”

Beagle Watch’s sites use enabling technologies that include remote CCTV surveillance, live security officer monitoring systems, remote panic buttons (which operate anywhere on the client site) and two-way radio communications. In addition, security officers are supported by the company’s armed response teams and management teams, which are on duty 24/7.

Similarly, Omega makes use of active patrol devices – linked to 24/7 manned control centres – such as panic button devices, body cameras, supervisory cameras in the guard houses, RF point tracking and tracker systems for small movable assets, smart mobile devices to conduct inspections and specified tasks, thermal handheld cameras, as well as scanning devices for access and egress control.

Vetting and pre-employment screening is critical when employing security officers for the guarding function. Previous employer checks, together with criminal and credit checks, are undertaken. These checks continue after employment to provide peace of mind to clients. Criminal checks, conducted by an in-house team, include arrest warrants for which there are currently no convictions. “The credit checks performed through credit bureaus provide us with some insight into the current financial status of potential security officers. This is important given the fact that those who are struggling financially may be more susceptible to approaches by criminals to enter into collusion,” says Casey.

Fourie says that all candidates undergo scientific and psychometric evaluations. These include integrity assessments that may identify potential detrimental behaviour, and a profiling process to determine compatibility with the requirements of a specific position. “We believe that incompetent personnel create opportunities for dishonest personnel. This is sobering, considering that enterprises across the world annually lose huge sums of money because of white collar crimes such as theft and fraud, substance abuse, truancy and resultant disciplinary investigations.”

Omega integrity assessment and profiling services introduce a proactive approach towards selecting personnel who are not only competent and effective, but who also have the integrity and dedication required to help in building a successful company. All screening processes are designed to predict a candidate’s future behaviour and Omega typically achieves this through psychological assessments and by evaluating the candidate’s past behaviour.

Pre-employment criminal record verification and post-employment verification, on an annual basis, is done via fingerprint scanning at Omega, with accurate results produced within 24 hours. Candidates are also tested for language proficiency, computer literacy, communication skills as well as cognitive ability.

Beagle Watch customises its services to suit client requirements, with additional services including warehouse security, on-site CCTV monitoring, incident investigation, and access control. Turnkey security solutions are offered to complexes.

Omega Risk Solutions offers a full portfolio of services that include CCTV operators and offsite monitoring services; technology evaluations, designs, provision and maintenance of systems; fire officers and management; risk surveys; security consultants on specific projects; industry and other related accredited training; armed response; investigations; special event security; armed escort duties; VIP protection and VIP drivers; screening and vetting of personnel; undercover operations; warehouse and depot management; crowd control; stock control and verification; health and safety related training and drafting of emergency plans.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

“This Is Theft!” SASA slams Mafoko Security
News & Events Security Services & Risk Management Associations
The Security Association of South Africa (SASA) has issued a stark warning that the long-running Mafoko Security Patrols scandal is no longer an isolated case of employer misconduct, but evidence of a systemic failure in South Africa’s regulatory and governance structures.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...
Security ready to move out of the basement
AI & Data Analytics Security Services & Risk Management
Panaseer believes that in 2026, a board member at a major corporation will lose their job amid rising breaches and legal scrutiny, as organisations recognise that cyber risk is a business risk that CISOs cannot shoulder alone.

Read more...
Cyber remains top business risk, but AI fastest riser at #2
News & Events Security Services & Risk Management
The Allianz Risk Barometer 2026 ranks cybersecurity, especially ransomware attacks, as the #1 risk, while AI is the biggest riser and jumps from #10 to #2, highlighting the emerging risks for companies in almost all industry sectors.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
OT calculator to align cyber investments with business goals
Industrial (Industry) Information Security Security Services & Risk Management
The OT Calculator has been developed specifically for industrial organisations to assess the potential costs of insufficient operational technology (OT) security. By offering detailed financial forecasts, the calculator empowers senior management to make well-informed decisions.

Read more...
SA availability of immutable backup storage appliance
CASA Software Infrastructure Security Services & Risk Management
CASA Software has launched the newly released Nexsan VHR-Series, a fully integrated, enterprise-class, immutable backup storage appliance purpose-built for Veeam software environments, with usable capacity ranging from 64 TB to 3,3 PB.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.