Unique solution for retail cash office security

July 2001 Perimeter Security, Alarms & Intruder Detection

It is a known fact that the staff – often senior employees – who manage this crucial area of the business are extremely vulnerable against attack. They are, more often than not, ‘sitting ducks’ and soft targets in the cash processing chain by nature of their custodianship and control over this highly sought-after commodity.

This is the view of Malcolm Thomas of Transaction Control Technologies who believes that the management of retail stores can rid themselves of a serious headache by talking to his company about the protection of cash offices.

Common feedback received from victims of an armed robbery in these circumstances involves the 'surprise element'. The thugs are often well dressed, and initially, well behaved operatives who bluff their way in under the guise of potential customers, service personnel, suppliers etc. The fact is that once they are in, one faces a serious problem. Notices that keys to safes are kept off premises and other conventional concealment tactics appear to be of little value as staff members become the target of attack in the process of extricating the 'goods'.

One of the biggest culprits giving rise to this relatively easy access by criminals is the actual security door leading to the area. Once a door is opened, there is no second chance for the unsuspecting host to prevent access.

The Selector door is the first line of defence that TCT offers in its holistic approach to the protection of critical areas of the business. Selector door is a unique anti-hostage, secure, single person entry door, for which patents have been filed internationally. This unique product, with its small footprint, makes it easy to retrofit into existing areas without a space penalty. Furthermore, its integral, controlled, free passage mode makes it possible to allow for wheel chairs or bulk goods to be brought through the door under controlled circumstances.

"Given the constraints that management face in the cash office scenario, there is no better solution available in the world market today than Selector door. Not only does it provide protection for the staff; it looks after the goods as well," explains Thomas.

The second unique line of defence on offer from TCT is SmokeCloak, a product designed to essentially buy time between an alarm activation and an armed response.

Figure a. 1 second after activation
Figure a. 1 second after activation

It rapidly (within 30 s) floods an area under attack with a dense, white, harmless vapour, and in so doing reduces visibility to approximately 30 cm, making it impossible for the intruder to steal or attack anything. The density of the discharge in the protected area is maintained by a patented smoke sensor which retriggers the unit to maintain optimum protection until such time as help arrives.

Figure b. 10 seconds after activation
Figure b. 10 seconds after activation

Furthermore, there is no contamination, hence no clean-up required. Even computers are perfectly safe as they are protected by SmokeCloak.

Not only does SmokeCloak protect the premises after hours, but in the South African scenario it has proved equally valuable during business hours.

Figure c. 20 seconds after activation
Figure c. 20 seconds after activation

SmokeCloak is capable of, for example, putting a stop to an almost daily occurrence of unsuspecting business people arriving at their premises somewhere in South Africa only to find that burglars had penetrated their building through the roof, disconnected all the alarm wiring in the ceiling, and spent the night cutting open their safes with angle grinders, leaving them with nothing but a gigantic mess. Because it can function autonomously, SmokeCloak will operate in these extreme conditions even if the alarm system has been compromised.

According to Malcolm Thomas, the South African crime situation has put SmokeCloak to the test in another arena, that of protection of people under attack. In one incident, 10 AK47-wielding gunmen were put to flight when they tried to rob a post office in Soweto. The SmokeCloak system was triggered when the custodian to the vault keys unlocked the vault. The system triggered automatically and flooded the office area rapidly, causing the thugs to flee.

"TCT takes pride in the fact that the solutions they bring not only address the problem of crime but also bring about operational benefits in the business which contribute to the bottom line, hence our slogan 'More than a security solution'," concludes Thomas.

For further details contact Malcolm Thomas, Transaction Control Technologies can be contacted at (011) 888 1210, e-mail: [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

How intrusion protection helps secure O&G operations
Surveillance Perimeter Security, Alarms & Intruder Detection Industrial (Industry)
For O&G operators in Africa, physical security remains one of the biggest considerations, particularly when it comes to perimeter protection and the ability to mitigate intruder-related incidents.

Read more...
New AI perimeter app package
Dallmeier Electronic Southern Africa Perimeter Security, Alarms & Intruder Detection
With the new AI Perimeter App Package, Dallmeier has extended the application range of its neural AI perimeter network. Previously only available for the Panomera S4 Perimeter camera, this technology is now also available for additional models.

Read more...
JVA 4-line LCD keypad
Perimeter Security, Alarms & Intruder Detection
The JVA 4-line LCD keypad is integral to the JVA Security Electric Fence product range and provides a centralised interface between the customer and their perimeter security solution.

Read more...
Gallagher’s Integrate 360 event in Durban
Gallagher News & Events Perimeter Security, Alarms & Intruder Detection
Gallagher Security held its Integrate 360 event in Durban, South Africa. The event attracted 65 channel partners, end users, and consultants from across KwaZulu-Natal and broader South Africa to showcase the latest in Gallagher’s technology suite.

Read more...
Nice launches DC Blue Astute garage door motor
Nice Group South Africa Technews Publishing News & Events Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Nice Systems SA has launched the Nice DC Blue Astute, a garage door motor for the South African market featuring a pre-installed lithium-ion battery instead of traditional lead-acid batteries.

Read more...
Wireless security makes its mark
Perimeter Security, Alarms & Intruder Detection
Alarms have always had a wireless component since the first monitoring control room was launched, but internally, homes and companies used to install cables to connect various sensors and devices to the control panel.

Read more...
Lock it down
OPTEX Perimeter Security, Alarms & Intruder Detection
Securing wide outdoor areas presents several challenges that differ significantly from those faced in smaller, more confined environments, and choosing the right intrusion detection technology is the key to safeguarding these spaces.

Read more...
Smart, reliable detection in any conditions
OPTEX Perimeter Security, Alarms & Intruder Detection
In its discussions with companies operating in South and Southern Africa’s detection and alerting technologies market, SMART Security Solutions spoke to OPTEX for more information on its solutions and technologies.

Read more...
The unseen barrier: AI and perimeter monitoring
Verifier Perimeter Security, Alarms & Intruder Detection Surveillance AI & Data Analytics
Perimeters have been one of the most important security aspects since antiquity, but what does perimeter monitoring look like in the age of AI, CCTV, thermal detection and modern off-site surveillance?

Read more...
Surveillance on the perimeter
Axis Communications SA Hikvision South Africa Technews Publishing Editor's Choice Perimeter Security, Alarms & Intruder Detection
Cameras have long been a feature in perimeter security, with varying reports of success and failure, often dependent on the cameras’ planning, installation and configuration, as well as their integration with other perimeter solutions and centralised management platforms.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.