Holistic approach to commercial security

April 2013 Integrated Solutions

Crime is not homogenous by nature. Like all unwholesome things, it has the uncanny and unnerving ability to threaten on multiple levels and in multiple ways; from internal crime – such as fraud and theft perpetrated by a company’s own employees, the kind of crime that corrodes from the inside – to external threats such as armed robbery, commercial security practitioners are faced with the task of implementing measures that literally cover all bases.

And crime is a shape-shifter. Criminals are forever changing their approach and challenging the systems put in place to keep them at bay. For example, one modus operandi that seems to be on the rise among criminals targeting commercial establishments, is to enter company premises under the guise of visiting an employee on some official business, and then making off with whatever they can get their hands on – laptops, phones and the like.

It is up to the security practitioner to tackle these threats holistically, identifying and implementing systems that are able to combat security breaches at both internal and external level, and do so intelligently.

Commercial solutions

In this modern day and age it goes without saying that technology is our greatest ally in the fight against crime. Naturally, in a business park milieu, the entrance to the premises should be the main focus of security efforts and where in previous years simply having a guard stationed there might have been sufficient, the evolving nature of criminality necessitates a truly hi-tech solution.

To this end, Centurion’s high-volume industrial traffic barrier delivers a vehicular access control solution. A custom-built DC gearbox and native battery backup allows this traffic barrier to perform upwards of 3000 operations per day and makes it the logical choice for business parks that see high daily traffic volumes. The accompanying LCD controller is packed with useful features that it virtually constitutes a security system by itself. With the SECTOR’ built-in time-barring feature, authorised personnel can actually configure when staff will have access to the premises, increasing the security factor by a considerable margin.

But what about securing the actual building? After all, this is the vessel that contains the livelihood of the organisation – both in terms of material goods and in terms of human capital.

Rolling security

A little over a year ago, Centurion released its RSO range of industrial roller-shutter operators. And it could not have come at a better time; the most recent crime statistics released by the SAPS have revealed that the incidence of business robbery has in fact gone up in the past year.

One contributing factor might well be the fact that so many warehouses are left vulnerable and without adequate security due to the industrial-sized doors generally found in these settings being so difficult to operate, and thus left open and unattended. This threat can very effectively be neutralised by fitting one of Centurion’s industrial automation titans, one of which boasts full battery backup and the same intelligent LCD controller found on the Sector traffic barrier and benchmark sliding gate motor, the D5-Evo. Proper security is something that has hitherto been sadly amiss in industrial settings such as factories, but automation does seem to firmly hold the key to eradicating the myriad threats present in this arena.

Now that we have looked at securing the exterior of a commercial facility, it certainly warrants investigating what solutions are available for securing the internal parameter.

Access control should be more than a buzz phrase; it should be something that is so much part of the staff’s daily motions that it is very nearly automatic. Along with biometric access control, GSM technology has enjoyed great popularity both in domestic and corporate settings. GSM modules can for instance be connected to a building’s alarm system and configured to send a text message to all users learned into its memory whenever the alarm is triggered. This would effectively mean that the building is permanently under surveillance since most of us always carry our mobile phones with us.

GSM devices can also be used for access control purposes by connecting it to a gate or magnetic lock which is released whenever a missed call from a valid number is initiated. This has been found to be more effective and reliable than carrying tags or remotes which are easily loaned out, stolen and misplaced. The use of GSM products also facilitates easy site monitoring since, in the case of Centurion’s range, transaction logs can be accessed online and used to view which access numbers were used, who they belong to, the inputs triggered (ie, gate fully open, pedestrian gate, etc.).

Centurion’s recent acquisition of MyGSM has resulted in two new products being added to its GSM range, one offering dual inputs and dual outputs and the other offering eight of each. The MyGSM.co.za online portal also provides for the ability to set up automatic activations and time-barring functionality of the MyGSM units.

For more information contact Centurion Systems, +27 (0)11 699 2467, [email protected], www.centsys.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Digitising security solutions with AI and smart integration
Regal Security Distributors SA Technews Publishing Integrated Solutions
The Regal Projects Team’s decades of experience and commitment to integration have brought the digital security guard to life as a trusted force for safer, smarter living.

Read more...
Smart cities and the role of video security
Surveillance Integrated Solutions
As cities around the world continue to embrace smart technology, including IoT that not only connects to people, but also the surrounding activity, the integration of advanced video security systems is crucial to ensure safety and efficiency in environments.

Read more...
Surveillance to unjam the traffic
Integrated Solutions Transport (Industry)
Traffic is a challenge that affects urban areas across Africa. The city of Johannesburg, South Africa’s most populous city, experiences severe traffic resulting from a confluence of issues, including power outages, faulty traffic lights, and infrastructure theft.

Read more...
The benefits of offsite control rooms
Astrosec Surveillance Integrated Solutions
As the security landscape grows more intricate, control rooms – the crucial hub of security operations – need to adapt. With escalating costs, mounting threats, and a heightened demand for immediate responses, many organisations are reassessing the operations of their control rooms.

Read more...
edgE:Tower video analytics integrated with SEON
Surveillance Integrated Solutions AI & Data Analytics
Sentronics has announced a new integration between its edgE:Tower advanced AI-driven video analytics solution and SEON, a Central Monitoring Software (CMS) platform. This integration enhances real-time situational awareness and automated threat detection for control rooms.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
The power of knowing your client
Ideco Biometrics Access Control & Identity Management Integrated Solutions
One of the most effective ways to combat the threat of fraud, identity theft, and financial crime threats is through a robust Know Your Client (KYC) process, which safeguards both businesses and clients.

Read more...
Managing identities for 20 years
Ideco Biometrics Technews Publishing SMART Security Solutions Access Control & Identity Management Integrated Solutions IoT & Automation
Many companies are now more aware of the risks associated with unauthorised access to locations and sensitive data and are investing in advanced identity authentication technologies to mitigate these threats.

Read more...
Cost-effective and reliable remote connectivity
Agriculture (Industry) Integrated Solutions Infrastructure
Companies that operate in hard-to-connect areas now have access to reliable connectivity due to a collaboration between MTN South Africa, Vox and Tarana technology.

Read more...