Technology or human

March 2012 Security Services & Risk Management

Hi-Tech Security Solutions asked Roy Alves, country general manager, Axis Communications, about the right mix of technology and guards.

Roy Alves
Roy Alves

Hi-Tech Security Solutions: How does the modern security or operations manager decide how best to integrate technology and human resources to achieve the best results for their companies?

Roy Alves: Operations managers have come to realise that camera security has helped resolve several major and minor incidents ranging from collisions, damage and theft, to the presence of uninvited guests. Operations/security managers can ensure that every corner of even an extremely large property is monitored with the help of camera surveillance. However, once the crime has been spotted with the help of surveillance cameras, armed guards/personnel are required in order to tackle the situation at hand. Thus, one can safely say that technology and human resources go hand-in-hand when talking about security.

Hi-Tech Security Solutions: When and where should the emphasis be placed on technology, and when are human guards the best solution?

Roy Alves: Technology comes into play when large areas need to be monitored and you cannot rely solely on human guards or patrolling vehicles. Proactive monitoring techniques allow for early detection and intervention before serious crimes are committed. Guarding would come into play when you have to act upon an intrusion/crime. Although guarding can be a deterrent to a criminal, it is most effective when integrated with a high-quality technology solution to obtain the key benefits.

Hi-Tech Security Solutions: What questions should you be asking if you want the best of both worlds?

Roy Alves: Wanting the best of both worlds is key in these scenarios. As mentioned before, for the optimal solution, guarding and technology systems such as an IP-based surveillance system work hand in hand to offer and provide the best results. There are often shortcomings of relying solely on the physical presence of patrol cars/guards in very vast and large areas. Guards and reaction vehicles require direction and can only respond to incidents that are immediately visible to security personnel. An IP surveillance solution would be the most effective method of coordinating the movements of armed response and law enforcement, thereby providing a safer environment.

Hi-Tech Security Solutions: How do you ensure humans and technology are managed properly to ensure they work together optimally?

Roy Alves: Training of guards and personnel to work with technology is key to the success of these two working optimally. With the help of technology, companies can ensure that they have quicker response time from their guards, coupled with the capability of monitoring numerous zones at once.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

From the editor's desk: AI and events
Technews Publishing News & Events
      Welcome to the 2024 edition of the SMART Surveillance Handbook. Reading through this issue will demonstrate that AI has undoubtedly made its mark on the surveillance industry. Like ‘traditional’ video ...

Read more...
The TCO of cloud surveillance
DeepAlert Verifier Technews Publishing Surveillance Infrastructure
SMART Security Solutions asked two successful, home-grown cloud surveillance operators for their take on the benefits of cloud surveillance to the local market. Does cloud do everything, or are there areas where onsite solutions are preferable?

Read more...
Surveillance on the edge
Axis Communications SA Guardian Eye Technews Publishing Surveillance
Edge processing, a practical solution that has been available for some time, has proven its utility in various scenarios, tailored to the unique requirements of each user.

Read more...
AI developments in surveillance
DeepAlert Secutel Technologies Technews Publishing Surveillance
When AI-powered video analytics first emerged in the surveillance market, it was heralded as a game-changer, promising near-magical object recognition and identification. As always, it was oversold, but times have changed and we are close to seeing the ‘magic’ at work.

Read more...
Putting cyber into surveillance
Dallmeier Electronic Southern Africa Cathexis Technologies Technews Publishing Editor's Choice
Cybersecurity has become an essential part of the physical security industry. However, unlike other IoT technologies, of which security products are a part, surveillance technologies have more to protect.

Read more...
Visualise and mitigate cyber risks
Security Services & Risk Management
SecurityHQ announced its risk and incident management capabilities for the SHQ response platform. The SHQ Response Platform acts as the emergency room, and the risk centre provides the wellness hub for all cyber security monitoring and actions.

Read more...
Eighty percent of fraud fighters expect to deploy GenAI by 2025
Security Services & Risk Management
A global survey of anti-fraud pros by the ACFE and SAS reveals incredible GenAI enthusiasm, according to the latest anti-fraud tech study by the Association of Certified Fraud Examiners (ACFE) and SAS, but past benchmarking studies suggest a more challenging reality.

Read more...
Digital transformation in mines
NEC XON Technews Publishing Mining (Industry)
Digital transformation has been hyped to death, but is a reality all companies in all industries need to address, including the mining sector. BCX and NEC XON weigh in on the challenges mines face.

Read more...
Fire safety in mining
Technews Publishing Mining (Industry)
Clinton Hodgson, Head of the Industrial Fire & Life Safety Division at FS Systems International, provides SMART Security Solutions with his insights into fire safety risks and solutions as they pertain to the mining industry.

Read more...
Cybersecurity in mining
Technews Publishing Mining (Industry)
One does not usually associate mining with cybersecurity, but as big technology users (including some legacy technology that was not designed for cyber risks), mines are at risk from cyber threats in several areas.

Read more...