Effective integrated security solutions

March 2013 Integrated Solutions, Government and Parastatal (Industry)

Having dealt with government organisations including local government, provincial government and national government for more than 30 years, it is blatantly clear that many of these organisations need assistance in managing their varied disciplines through the use of technology, software solutions, measurable management of service providers and staff, and proper beneficial integration of the three pillars, namely 'people, process and technology'.

Government and semi-government in South Africa are, without a doubt, the biggest users and spend in security, including technology, systems and personnel. When engaging with service providers and suppliers, in many instances the client is misinformed of the best solutions to meet their requirement, and is very often at the mercy of the salesperson who is trying to promote his product/s, which is not always the best fit for the client.

Manpower

From a manpower point of view, whether it be guarding, cleaning, maintenance, landscaping or any other form of manpower being provided by service providers, government and semi-government organisation invariably have many buildings or sites that fall under their responsibility. They are responsible for hundreds, if not thousands of buildings within a province or nationally, and utilise the services of multiple service providers supplying contract staff in many disciplines. Effective management of these thousands of contract staff is almost impossible to achieve, and the client in many cases (not in all cases) is being short changed by sub-standard or non-delivery of services. Integrated solutions encompassing GSM-enabled biometrics, roster and payroll software, traditionally utilised by the service provider, can provide the client with a solution to effectively measure, manage and review performance of services rendered, and provide an immediate ROI to the client which in many cases equates to millions of rands in savings. This is just one case where integration assists in overcoming challenges faced by organisations, not just in government.

Integrated security solutions

Government departments and companies spend many millions of rands on acquiring technology (not only security related) and sub-systems to manage everything from CCTV, access control, alarm/fire panels, X-ray machines and the like. Each of these technologies or systems performs its specific function well under ideal circumstances, provided they are maintained and kept functional. This is exactly the problem when it comes to (many, not all) government institutions; equipment is procured, implemented and utilised until they malfunction, and then invariably stay in a dysfunctional state for extended periods of time, if not permanently. SLAs, if they exist, are not measured or enforced, and a state of decay of equipment ensues. When last did you enter a government building and walk straight through an X-ray machine or metal detector that was not functional?

From an integration point of view, very little integration exists in most government departments, barring perhaps the basic CCTV and access control at best. From experience with our most successful clients who apply and share our vision, integration can be achieved on a database level to address specific challenges faced by the client; in order to do this an operations/information management system (OMS) is required to glue the various components together; the integration should be based upon the client’s policy and procedures, existing technologies and sub-systems, and the various stakeholder requirements. The key word in this is information management system; all systems provide a source of specific and bespoke data or information, but the power to the client is in applying this information to overcome operational challenges.

For example, by integrating the OMS to the access control system via the databases, in the event of a bomb threat, procedures should exist and be followed. By automatically interrogating the access control system from the OMS at the moment of the bomb threat being logged, we can determine exactly who is in the building at the time, disseminate this information to the relevant floor marshals onto any mobile device, which enables the marshal to immediately account for staff/visitors under his/her responsibility at the mustering points, without worrying about staff that were not in the building at the time. This operational efficiency just had a massive benefit to the client in many different aspects.

Integration should not only be about coupling different hardware together, but rather tie into an OMS where the rules are applied and actioned according to the requirement of the client, relating to the specific event taking place.

Ownership of technology and sub-systems

Questions that the end-user clients should be asking are “Who should take ownership of security and risk technologies and management software, as well as who should maintain the relationship with the technology or software vendor?” Should it be the security provider or the client? Traditionally many of these systems have been sold into the service providing companies, who utilise them to monitor and manage their own contract personal on the end client’s sites.

The first problem with this is that companies tend to change their service providers on a fairly regular basis, either due to tender process, company policy or just bad performance in some cases. And when this occurs, the service provider leaves your site with the systems it is renting you the client, as well as your valuable data. The next service provider to be appointed either comes on site with a different system, or in many cases, no system at all.

The second problem is that, although the service provider may be utilising these systems to manage their own personnel, it is highly unlikely that the client ever gets to hear about poor or non-service delivery in relation to SLAs. This means:

* The end client does not have access to all the information or reports on exceptions that the systems provide; if this is controlled by the service provider company they may provide only the information which they want their client to see.

* If the client chooses to terminate the services of the service provider, the software with all its data tends to go with; in some cases this is because the client does not even know that such a solution is in use or does not know that valuable management reports were available from it.

* If there is a training or user issue, these often do not get resolved efficiently or effectively as the software provider can lose touch with the user due to the middle role player.

* The client unknowingly pays for the solution anyway, as it forms part of operational costs to service that client.

* In some cases the cost of the system is doubled without the software provider or the client knowing.

* Most importantly, it is the data mining opportunity, business intelligence (BI) and reporting that the end client has no or limited access to.

A shift in thinking needs to take place in the market place and end clients need to start realising that these management tools have a far greater value to their companies than merely being in the hands of the service provider. So, if we agree that the client should hold the relationship, what are the benefits to the end client and the service provider?

* Major savings by ensuring that service providers comply.

* Monitoring the SLA and meeting expectations both ways.

* Reporting – time saving in cutting down the time it takes management to compile reports in often critical times of the month.

* These management systems can provide value in areas other than just security; maintenance, cleansing, logistics and operations are all areas that can benefit.

* Improves efficiency and effectiveness of service delivery.

* The data built up over years can be used to build complex trends to counter criminal activity and importantly remains with the right people.

* Improves security, risk and asset management.

* Holds the right people accountable for delivering service excellence.

Kevin Buret, MD, Sukema Integrated Solutions
Kevin Buret, MD, Sukema Integrated Solutions

It is all about compliance/non-compliance, accountability and business intelligence in order to make informed decisions. And in today’s economic climate, we should all be trying to get the very best value for our rand. If you are paying for a service and are not managing it correctly, you will not have any idea of how much money you are wasting every month. And you cannot manage it effectively without taking ownership of the management tools.

To summarise, there is an over abundance of technology and systems on the market (look at CCTV brands as a simple example), but they are not all/always suitable to be implemented in different environments. The difficult part is deciding on what technologies and systems fit the environment the best, and how to apply these in an integrated way, where the data obtained from all/some of these technologies is fed into a management system and presented to the stakeholder in a usable, operational efficient manner.

For more information contact Sukema Integrated Solutions, 021 914 5507, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Future trends for electronic safety and security in mining
Fang Fences & Guards Mining (Industry) Integrated Solutions AI & Data Analytics
The mining industry is ever evolving, driven by technological advancements and the growing need for enhanced safety and security measures, with significant innovation seen in turnkey electronic security for mining operations.

Read more...
Unlocking enhanced security for mining
Mining (Industry) Integrated Solutions
In the dynamic landscape of African mining, security remains of paramount concern as threats evolve and challenges persist, and mining companies seek innovative solutions to safeguard their operations, assets, and personnel.

Read more...
A constant armed struggle
Technews Publishing XtraVision Editor's Choice Integrated Solutions Mining (Industry) IoT & Automation
SMART Security Solutions asked a few people involved in servicing mines to join us for a virtual round table and give us their insights into mine security today. A podcast of the discussion will be released shortly-stay tuned.

Read more...
Access and identity in 2024
Technews Publishing Gallagher HID Global IDEMIA Ideco Biometrics Enkulu Technologies neaMetrics Editor's Choice Access Control & Identity Management Integrated Solutions
SMART Security Solutions hosted a round table discussion with various players in the access and identity market, to find out what they experienced in the last year, as well as their expectations for 2024.

Read more...
Advanced security solution for high-risk areas
Secutel Technologies Surveillance Integrated Solutions
The need for a sophisticated intrusion detection system is paramount when faced with persistent security challenges, particularly in isolated battery rooms or high-risk areas prone to vandalism, cable theft, and battery theft.

Read more...
Vumacam and NAVIC enhance SafeCity initiative
Integrated Solutions Security Services & Risk Management
Vumacam and NAVIC, two of South Africa's most respected surveillance technology and vehicle intelligence providers, are proud to announce an alliance that will greatly expand the coverage and impact of the SafeCity initiative across the country.

Read more...
Gallagher Security’s achieves SOC2 Type 2 recertification
Gallagher News & Events Integrated Solutions Infrastructure
Gallagher has achieved System and Organization Controls (SOC2 Type 2) recertification after a fresh audit of the cloud-hosted services of its integrated security solution, Command Centre. The recertification was achieved on 21 December 2023.

Read more...
Integrated transportation security
Guardian Eye AI & Data Analytics Integrated Solutions Logistics (Industry)
HG Travel installs an AI-powered camera system integrated across 115 vehicles throughout a fleet comprising 160 vehicles of different sizes, along with predictive and self-monitoring tools to track tyre condition, fuel consumption and theft, and overall vehicle maintenance.

Read more...
Embracing next-generation surveillance for safer cities
Surveillance Integrated Solutions AI & Data Analytics
With the South African government highlighting the importance of building smart cities by integrating advanced technologies to make them more resilient and liveable, the role of next-generation network video and surveillance technologies cannot be ignored.

Read more...
Gallagher Security releases Command Centre v9
Gallagher News & Events Access Control & Identity Management Integrated Solutions
Richer features, greater integrations, with the release of Gallagher Security’s Command Centre v9 security site management software designed to integrate seamlessly with various systems and hardware.

Read more...