An integrated approach to entertainment security

July 2014 Entertainment and Hospitality (Industry)

So how does one reduce the inconvenience to visitors and patrons of hotels, gaming facilities and stadia while concurrently ensuring maximised security for both the patrons and the facility’s assets? Is there a silver bullet approach to providing balance or should each case be approached individually? Hi-Tech Security Solutions takes a realistic look at security in the entertainment and hospitality sector.

Cobus Horn
Cobus Horn

Cobus Horn, regional manager for 24/7 Security Services in KZN and the Western Cape, believes that there is no single intervention that will provide protection for a venue. However, all successful solutions will contain a combination of physical, technological and procedural functions. The first step is to identify the pertinent risks and threats then implement adequate planning, which will include emergency planning.

He points out that one needs to consider the client base, for example, whether the event is a family one or a soccer match, as well as the venue itself. These two factors will dictate the level and extent of security needed and will require that a degree of flexibility is necessary in terms of finding the correct solutions.

Mike Francisco, head of safety and security at MVD Services, agrees and adds that one requires long-term planning for casinos and the hospitality industry, while events planning for stadia is characterised by a number of separate planning incidents, depending on the individual events.

He explains that as part of the successful planning of the 2010 Soccer World Cup, the Safety at Sports & Recreational Events Act Part 2 of 2010 was implemented to protect large numbers of people and large sums of money. Obviously though, the security for events such as a large football game between Kaizer Chiefs and Orlando Pirates is very different to the security required for an Angus Buchan Mighty Men Conference. Section 6.3 of the Act clearly lays out what needs to be in place in terms of the security portfolio when planning events.

Horn adds that training of security employees is essential to ensure that they are able to balance the dual role of security and public relations needed in their interface with the public. There needs to be an emphasis on ensuring that they uphold strict security measures, but are able to employ flexibility and sensitivity when required. The solutions that work best are the ones where management adopts a hands-on approach to security.

Procedures are the crux of a successful security system according to Johann Botha, head of security at the Wild Coast Sun. Security employees need to understand these procedures and should be a visible, but not blatant presence with patrons.

Ian Dennis
Ian Dennis

Ian Dennis, safety and security manager at Cape Grace, emphasises the importance of screening employees and external security providers, as well as providing appropriate training to ensure the correct calibre of person is in a position of responsibility.

Greg Harker
Greg Harker

Greg Harker, group surveillance and security manager for Peermont, says that it is important to establish secure external and internal perimeters. These are achieved by installing physical external barriers and ensuring complex access control coupled with CCTV, physical guarding and response teams.

Putting the plan together

Francisco says that before any decisions are made on the correct security solutions, a comprehensive site visit is essential. For event management, there are normally a number of stakeholders involved, including the property owner, the event organiser and the client. In addition, external security and safety agencies such as the SAPS and emergency services (paramedics and fire brigade), as well as third-party security providers, are normally included as part of the planning process and typically form a joint operations control (JOC) to implement and monitor the security plan.

For events one needs to ensure that pre-verification of tickets, using a dedicated scanner, takes place to eliminate bottlenecks further down the line. The ticket verification system can be combined with a turnstile to ensure that only validated ticket holders will be able to enter the stadium. At smaller venues, this role can be performed by a manual ticket checker. In addition, mobile security officers need to be able to spot and apprehend ticket scalpers on the perimeter. Essentially, he says, one needs to make it difficult for people to get in but easy for them to safely exit the premises.

Other elements that need to be in place include CCTV surveillance for monitoring entrance and exit points and cash points as well as any suspicious activity within the venue. This will provide management with early warning for deployment of security personnel.

Harker continues that in the gaming environment, one needs to ensure the physical identification of all vehicles is achievable at vehicle access points, with all patrons being physically identifiable through all building access points. Secondly, one should ensure that patrons are checked for firearms before entering higher risk or cash handling areas. Walk-through detectors and X-ray machines are normally used at these points to ensure access control with the least amount of delay.

Thirdly, proper physical barriers should be placed before direct access to bulk cash handling areas such as cashiering, counting and vault areas. The physical barriers need to include elements such as concrete walls with steel lining, and bullet-proof and anti-bandit doors and windows, all coupled with secure access control functionality. The access control must always have dual control access. This means that no member of staff or management should be able to directly access cash without undergoing member screening and identification by another member situated in a secure location.

He says that the perimeter is not there to stop access, but more importantly needs to slow down egress. Robbery suspects are not concerned about getting in as they will enter as normal guests. They are more concerned about how to escape quickly after engaging in a robbery. It is therefore important to continuously check your external perimeter for holes and gaps. It is also advisable to have your fence line alarmed for any breaches, since armed robbers may try to create an escape route prior to commencing with a robbery.

Dennis says that the perimeter should be well lit and secured with sufficient surveillance coverage supplied by CCTV cameras, including infrared and thermal alternatives. Access control should combine both technology as well as physical pat-down search procedures. However, it is important that security employees are appropriately trained to ensure that they can easily identify something out of the ordinary.

As one moves closer to the core, high-risk areas, it is important to install early detection systems and technology such as biometric access control and time delay locks.

Best practice

There are varying attitudes towards what is considered best practice, depending on whether it is for a gaming environment, a stadium or the hospitality industry. One thing that all agree with is the multi-layered approach, with a combination of internal and external security providers.

Harker says that any venue where large numbers of people cross the portals requires a secure external fence that is well maintained and is combined with an alarm. It is recommended to further install a strong vehicle barrier, such as Armco, to stop vehicles breaking through your fence line.

He continues that one could install tollgate type vehicle access points where all patrons, staff, contractors and deliveries are stopped and can be checked, with all their vehicle particulars recorded on CCTV. This ensures control presence before any person enters the property.

Furthermore, one could install a sally port for cash delivery or banking and lock down your cash handling areas completely while moving cash out of the vault or counting areas to other areas.

The installation of an early warning system in high-risk areas will allow for full lockdown in the event of a robbery. This system would typically include sirens and lights externally and at the vehicle access points, as well as flashing lights and sound bombs at the high-risk areas, with panic buttons for activation by security and surveillance personnel.

Mobile JOCs combined with electronic cash drop boxes, 4G technology and mobile cameras and access control system are the wave of the future, according to Francisco.

Harker believes that some physical security functionality can potentially be replaced by trigger-based monitoring systems. He says that Microsoft uses trigger-based monitoring for faster and more efficient reaction. One example is their motion detection on their stairwells, whereby if the system detects accelerated movement, it will identify a person falling, quickly scan for active users in the vicinity and place an instruction on the PC monitors of two people close to the area. This will allow them to quickly inspect the stairwell for an injured person requiring assistance.

While he acknowledges that CCTV has a role to play in the security portfolio, one needs the presence of physical security officers to provide patrons with a feeling that they are safe. In addition, data must always be analysed by a person as opposed to a piece of equipment or software. He recommends analysing your statistics to red flag repeat offenders and modus operandi for detection of scams and to enable the appropriate deployment of human resources.

“When it comes to your business competitors, as much as you are competing for market share, you need to work together to fight crime. Secondly, you need to work closely with your local government law enforcement agencies,” says Harker.

Ultimately, best practice will be dictated by the available budget and the interaction and involvement of management.

Conclusion

There is definitely no one solution that will be applicable to the security needs of gaming environments, stadia and the tourist/hospitality sector. It is important to undertake a comprehensive risk assessment and ensure that assets are protected. A multi-layered approach is the ideal and will allow patrons to access less sensitive areas, while high-risk areas will require enhanced security investment.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Digital transformation in mines
NEC XON Technews Publishing Mining (Industry)
Digital transformation has been hyped to death, but is a reality all companies in all industries need to address, including the mining sector. BCX and NEC XON weigh in on the challenges mines face.

Read more...
Fire safety in mining
Technews Publishing Mining (Industry)
Clinton Hodgson, Head of the Industrial Fire & Life Safety Division at FS Systems International, provides SMART Security Solutions with his insights into fire safety risks and solutions as they pertain to the mining industry.

Read more...
Cybersecurity in mining
Technews Publishing Mining (Industry)
One does not usually associate mining with cybersecurity, but as big technology users (including some legacy technology that was not designed for cyber risks), mines are at risk from cyber threats in several areas.

Read more...
Mines require proof of performance
Technews Publishing Mining (Industry)
The relatively hostile environment and remote locations of mining establishments mean that any electronic/technical implementations have to be easily installed, require little or no maintenance and, once commissioned, require no adjustment.

Read more...
From the Editor's Desk: Something old and something new
Technews Publishing News & Events
      Welcome to the 2024 edition of SMART Security Solutions’ Mining Handbook. Mining is a challenging industry for security professionals, although security is a challenge on this continent, no matter your ...

Read more...
A long career in mining security
Technews Publishing Editor's Choice Security Services & Risk Management Mining (Industry)
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.

Read more...
A constant armed struggle
Technews Publishing XtraVision Editor's Choice Integrated Solutions Mining (Industry) IoT & Automation
SMART Security Solutions asked a few people involved in servicing mines to join us for a virtual round table and give us their insights into mine security today. A podcast of the discussion will be released shortly-stay tuned.

Read more...
Entries to southern Africa OSPA Awards now open
Technews Publishing Securex South Africa Editor's Choice News & Events
The southern Africa OSPAs are part of a global awards scheme that recognises and rewards teams, individuals and organisations for their commitment and outstanding performance within the security sector.

Read more...
Securex has moved to June
Technews Publishing Editor's Choice News & Events
Following the formal announcement of the date for South Africa’s national election, 29 May 2024 , which happened to be in the middle of the planned dates for Securex South Africa, Securex will now take place from 11 – 13 June 2024 at Gallagher Estate in Midrand.

Read more...
From the editor's desk: Securing your secure access
Technews Publishing News & Events
      Welcome to SMART Security Solutions’ first print publication of the year, the SMART Access & Identity Handbook 2024. In this issue, we cover various issues relevant to this industry, from digital to ...

Read more...