Client property access integrity

Issue 1 2020 Editor's Choice

Blind or unquestioned trust is something that we all seem to willingly and unconditionally give our security service providers and their reaction officers. It’s just not something that ordinary individuals even think to question, because personal security in their private space is absolutely paramount.

Despite the outward facing bravado and even pseudo aggression that many people display when talking about their property protection, all they really want is for a bunch of big protectors with guns to arrive when their alarm goes off or when they press a panic button.

The trouble is (and has been for a long time), that some of the big protectors with guns don’t always have the best intentions at heart. There are many documented incidents where corruption and intimidation have taken place within the ranks of security company staff. Most commonly, this happens at the reaction officer level, but it has also sometimes involved collusion between control room operators and their reaction staff.

Generally, these incidents are investigated and sometimes resolved through harsh legal action, but 99% of the time, Joe Public is blissfully unaware of these issues.

The fact is that they still happen and will continue to do so until the security service providers put infallible (is there such a thing?) technological systems in place to curb as much of it as is possible. Typically, the service providers will say that they conduct regular voice stress tests and polygraph tests with randomly chosen staff, and they do, but this in itself is just not enough.

Strictly managing access

Control room systems must be robustly auditable. Action sets for alarm events must be thorough, and they must be carried out to the tee. Access to the client’s property must always be strictly controlled and managed. The truth however, is that this isn’t always the case.

The days of reaction officers scaling walls and climbing over gates and fences are long gone. Bags of keys and remotes in reaction officer’s vehicles are almost also a thing of the past. Keys and remotes are changed by the clients and not given to their security company – it’s just a nightmare to manage and that battle is about to be lost.

So what options are available to resolve the problem? Good quality control room software with robust operational procedures and action sets, and control room automated property access equipment.

Let the control room control access

When an alarm is triggered and a reaction officer has to gain access to a property, the control room software must create a single use access code which is transferred to the appropriate vehicle and officer only when they reach the property. The gates or doors are opened and closed under tight control for each event. This way, no codes, keys or remotes can be given to anyone else, and the bad apple doesn’t get to come back later with the intention of perpetrating some kind of evil.

Are these systems available today? Yes they are, however, most property access equipment systems are not integrated with the security company’s control room software, so the loop is not closed and the system remains open to misuse. There is only one fully integrated system in this part of the world at the moment, offering the best solution possible.

This way, the big protectors with guns can be trusted that they are there legally, and more importantly, under scrutiny of a fully auditable control room. Furthermore, the security service provider is honestly able to say that they protect and respect the integrity of access to the client’s property, whilst providing them with the best service that they can.

Rob Gillespie is a director of WatchManager, a company providing the leading control room software on the African continent. Rob has more than 30 years’ experience in the industry.

For more information, contact Rob Gillespie, WatchManager, +27 82 880 5820, [email protected], www.watchmanager.net




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

AI-enabled tools reducing time to value and enhancing application security
Editor's Choice
Next-generation AI tools are adding new layers of intelligent testing, audit, security, and assurance to the application development lifecycle, reducing risk, and improving time to value while augmenting the overall security posture.

Read more...
2024 State of Security Report
Editor's Choice
Mobile IDs, MFA and sustainability emerge as top trends in HID Global’s 2024 State of Security Report, with artificial intelligence appearing in the conversation for the first time.

Read more...
Cyberthreats facing SMBs
Editor's Choice
Data and credential theft malware were the top two threats against SMBs in 2023, accounting for nearly 50% of all malware targeting this market segment. Ransomware is still the biggest threat.

Read more...
Are we our own worst enemy?
Editor's Choice
Sonja de Klerk believes the day-to-day issues we face can serve as opportunities for personal growth and empowerment, enabling us to contribute to creating a better and safer environment for ourselves and South Africa.

Read more...
How to spot a cyberattack if you are not a security pro
Editor's Choice
Cybersecurity awareness is straightforward if you know what to look for; vigilance and knowledge are our most potent weapons and the good news is that anyone can grasp the basics and spot suspicious activities.

Read more...
Protecting IP and secret data in the age of AI
Editor's Choice
The promise of artificial intelligence (AI) is a source of near-continuous hype for South Africans. However, for enterprises implementing AI solutions, there are some important considerations regarding their intellectual property (IP) and secret data.

Read more...
Super election year increases risks of political violence
Editor's Choice
Widening polarisation is expected in many elections, with terrorism, civil unrest, and environmental activism risks intensifying in a volatile geopolitical environment. Multinational businesses show an increasing interest in political violence insurance coverage in mitigation.

Read more...
Enhance control rooms with surveillance and intelligence
Leaderware Editor's Choice Surveillance Mining (Industry)
Dr Craig Donald advocates the use of intelligence and smart surveillance to assist control rooms in dealing with the challenges of the size and dispersed nature common in all mining environments.

Read more...
A long career in mining security
Technews Publishing Editor's Choice Security Services & Risk Management Mining (Industry)
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.

Read more...
A constant armed struggle
Technews Publishing XtraVision Editor's Choice Integrated Solutions Mining (Industry) IoT & Automation
SMART Security Solutions asked a few people involved in servicing mines to join us for a virtual round table and give us their insights into mine security today. A podcast of the discussion will be released shortly-stay tuned.

Read more...