Creating synergistic guarding support

November 2014 Security Services & Risk Management

The private security sector in South Africa employs more than 445 000 people in more than 9300 registered security businesses. With such large numbers of both certified and non-certified security officers, armed with varying skill levels, it is imperative that companies employ some form of support and management to ensure that the security officers are physically protected and that they are effectively protecting the assets they are employed to safeguard.

Hi-Tech Security Solutions spoke to three industry champions about the technology currently available to streamline guarding operations whilst providing support for the function, and efficiently managing personnel.

Keith Lawrence, CEO of BetaTrac Telematic Solutions.
Keith Lawrence, CEO of BetaTrac Telematic Solutions.

Keith Lawrence, CEO of BetaTrac Telematic Solutions, says that guarding management solutions should allow and offer the asset owner the option to assess and evaluate the performance of the guarding company. At the same time it should give the guarding company better tools to monitor the performance and effectiveness of its guards. All of these should be in real time, including autonomously generated daily reporting to assess the individual performance of each guard. Additionally, these reports can be used for disciplinary hearing, dismissals, CCMA and court appearances.

Richard Frost, CEO of Astute Electronics, says the type of management system depends on the function that the security officer is performing. If the guard function is a static one, then they require a product that keeps them awake and alert. A patrolling guard requires a product that will not only keep them alert but which also provides them with a checklist for various checkpoints in a facility. He references his company’s OnGuard products for use in the field.

Bernard Slabbert, CEO of Bloodhound Technologies.
Bernard Slabbert, CEO of Bloodhound Technologies.

Bernard Slabbert, CEO of Bloodhound Technologies, says that it is important to understand the value of data derived from guard management solutions. Criteria for best practice in guarding support and management solutions vary, depending on the environment in which they operate. He adds that in the past, systems were in place to merely track the movements of the guards, whereas now they have evolved into solutions that monitor specific activities against predetermined tasks and checklists. This value added element allows the client to ensure that the service they are paying for is being delivered.

Measurable criteria

He continues that clients need to receive measurable criteria on the performance of their service providers. Bloodhound’s flagship product Observer, produces the industry productivity indexes from all the information received from more than 2500 sites throughout South Africa. The information contained in these indexes are analysed and used as a litmus test for the company’s clients to check their site performance against that of other service providers.

Not only can these indexes be used as benchmarks to effectively measure guarding service providers amongst themselves, but it also puts pressure on service providers to up their game and perform at optimum levels. He says that this is particularly relevant where larger national companies pay for the services of more than one service provider.

While information derived from guard patrol monitoring systems was used as a method of enforcement in the past, he believes that it is now used to promote and incentivise better performance by bringing increased efficiencies to site.

Bloodhound’s mobile Rover device is carried by guarding personnel and contains a specific set of instructions for the individual guard and site. Based on GSM and active RFID technology, this device can be used indoors and outdoors and relays data in real time. The device is linked to the company’s Observer software to provide accurate and unobtrusive micro-location visibility.

Because tracking is often related to assets rather than locations, the system allows users to program in the necessary checks and audits associated with that asset. These parameters could include whether the item is in an operational or non-operational state and whether parts of the item are missing.

Each asset has an RFID tag or beacon associated with it. When the security officer is within range of this beacon or tag, the Rover will display a list of actions to be followed by him/her. A specific time period will be allocated to each task and if the time period is exceeded, an exception report will be sent to management or the control room. If the security officer enters a negative response to a query, the exception will be escalated to a specific department, for example if the asset is not functioning, the maintenance department will be alerted.

Accurate useful intelligence

Lawrence says the fact that crime has escalated in South Africa, with an increased footprint of security companies, proves that more efficient and effective technologies are needed in support of the industry’s endeavours to tackle and reduce crime. Added values include managing the guarding activities with accurate, useful intelligence and higher levels of guard visibility.

As a powerful management tool, his company’s AIMSS solution offers 30-second data transmissions, effectively managing the guards in real time, including a protective mechanism for the guards themselves. The system is linked to GPS and no infrastructure is necessary. The benefits are exclusion of tampering and elimination of unnecessary failures.

He explains that most systems are in place simply to ensure that the guard is visiting certain checkpoints within a facility as part of their patrol. The security guards are generally in a vulnerable position whilst guarding assets and thus provides the guard with a higher level of safety through the incorporation of panic buttons and built-in real-time geo-visual images.

He says that the intelligence being derived on the ground from many of the existing systems was very poor or non-existent. This prompted the company to include a miniature real-time camera in the jacket worn by the patrolling guard. The company has developed a transmission solution based on GPRS that allows them to transmit images at a fraction of the cost, thus making this an affordable value-add for companies.

A best practice solution should also consider the overall reduction of costs and this can be achieved by reducing the number of site visits required by supervisors through the provision of implementing tools for more thorough daily reporting and monitoring via the incoming data and images collected. In this way petrol, valued time and labour costs decrease, without any loss in effectiveness.

BetaTrac’s AIMSS (analytic intelligent mobile security system) software incorporates four critical key elements; Safety shield for the guard, intelligence by picture, powerful management tool and finally robust failsafe tools in the field. The system reports to the control room every 30 seconds and provides an autonomous daily automatic report. Because the report is automatically generated, the human intervention element is removed from the equation, thus eliminating errors and any possible fraud. The detailed reports provide a percentage of efficiency of the patrolling guard and any result of 85% and higher is deemed acceptable.

The AIMSS tools can further assist in reducing the amount of time a supervisor needs to be on site, they can use the extra time to analyse reports, highlight problem areas and find ways of resolving them. Technology therefore becomes a valuable tool in picking up any shortfalls apparent in manpower and empowering the guards to increase the effectiveness of their patrols.

Interactive communication

The OnGuard stay awake function can be remotely programmed to turn on and off at the end of a shift and provides interactive communication with the guard during his shift. For patrolling guards, the system will send an alert to the control room if the guard has skipped certain checkpoints or has conducted his patrol too quickly.

The OnGuard system incorporates a T&A function that simplifies manpower solutions on site by ensuring that the correct type and number of guards are patrolling the premises in any given shift. In addition to a panic button, the guards are also equipped with ibuttons or RFID technology for data collection at the various checkpoints. The OnGuard system uses its own proprietary mobile app to relay data to the control room, thus eliminating SMS costs.

Frost points out that the system links the software to mini IP cameras placed on the guard. This allows users to easily see what is visually happening on site. It can manage several guards simultaneously, providing further cost savings. In addition, OnGuard does the laborious work of verifying staff information via the PSIRA database once staff details have been captured on the Astute server.

There are a number of excellent systems on the market that allow companies to monitor and manage their security guards, while simultaneously offering the guards a certain level of personal security. Choices should be driven by the reason for patrolling, for example general facility security and monitoring, or specific asset management. The choice of communication is likewise determined by whether the patrolled area is predominantly outdoors or indoors. While budget will ultimately affect the technology choice, it should be weighed against the cost savings derived from the resultant improved efficiencies.

For more information contact, www.onguard.co.za, www.betatrac.com, www.bloodhoundsa.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Visualise and mitigate cyber risks
Security Services & Risk Management
SecurityHQ announced its risk and incident management capabilities for the SHQ response platform. The SHQ Response Platform acts as the emergency room, and the risk centre provides the wellness hub for all cyber security monitoring and actions.

Read more...
Eighty percent of fraud fighters expect to deploy GenAI by 2025
Security Services & Risk Management
A global survey of anti-fraud pros by the ACFE and SAS reveals incredible GenAI enthusiasm, according to the latest anti-fraud tech study by the Association of Certified Fraud Examiners (ACFE) and SAS, but past benchmarking studies suggest a more challenging reality.

Read more...
Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Proactive strategies against payment fraud
Financial (Industry) Security Services & Risk Management
Amid a spate of high-profile payment fraud cases in South Africa, the need for robust fraud payment prevention measures has never been more apparent, says Ryan Mer, CEO of eftsure Africa.

Read more...
How to prevent and survive fires
Fire & Safety Security Services & Risk Management
Since its launch in August 2023, Fidelity SecureFire, a division of the Fidelity Services Group, has been making significant strides in revolutionising fire response services in South Africa.

Read more...
A long career in mining security
Technews Publishing Editor's Choice Security Services & Risk Management Mining (Industry)
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.

Read more...
Risk management: There's an app for that
Editor's Choice News & Events Security Services & Risk Management
Zulu Consulting has streamlined the corporate risk management process with the launch of Risk-IO, a web-based app designed to consolidate and guide risk managers through the process, monitoring progress as one proceeds.

Read more...
Integrated information platform for risk management
Editor's Choice News & Events Security Services & Risk Management
Online Intelligence recently launched version 7 of its CiiMS risk and security platform. Speaking to SMART Security Solutions after the launch event, the company’s Arnold van den Bout described the enhancements in version 7.

Read more...
Global Identity Fraud Report revealing eight-month ‘mega-attack’
Editor's Choice Security Services & Risk Management
AU10TIX recently released its Q4 Global Identity Fraud Report, with the research identifying two never-before-seen attack patterns, with the worst case involving 22 000+ AI-generated variations of a single U.S. passport.

Read more...