Who watches the watchers?

October 2015 Surveillance, Perimeter Security, Alarms & Intruder Detection, Integrated Solutions

For many businesses, security is a grudge purchase. Money gets thrown at solving a security issue, only to later discover holes that can only be plugged with more money. What’s more, the bolt-on services are generally very specific, meaning a bolt-on solution needs to be purchased for each and every hole in the system.

Gareth Cowan, OmniVision Security.
Gareth Cowan, OmniVision Security.

Before committing to any security solution, therefore, companies need to carefully consider, from the outset, what the strengths and weaknesses are of the available solutions, and choose those solutions that are most complementary. A very good example of complementary security solutions is onsite guarding paired with offsite, independent monitoring.

Many companies employ guards to watch over their assets. A guard can be an excellent deterrent, but being human, a guard is subject to issues such as self-preservation, self-interest, boredom and tiredness, with the result that most guards will generally do as little as is required to keep their job. For this reason, most guards cannot be left unsupervised for long periods.

But placing a second guard on-site to supervise the first doesn’t solve the problem, as the supervisor will be subjected to exactly the same temptations as the first. In an attempt to plug this security hole, tagging systems are installed, which act as an independent supervisor that ensures the guards perform the patrol they are contracted to perform. However, a tagging system does nothing to inform on what happens between patrols. The guards might be attentive and alert, or they might be having a 20 minute power-nap.

To solve this issue, many guarding companies now offer supervisory visits to their guarded sites. But this is generally limited to one visit per site, which often occurs around the same time each day or night and therefore becomes relatively predictable. Just like the criminal that waits for the guard to pass by before entering a premises, the guards themselves time their activities around the times they know a supervisor is due to visit. What’s more, these supervisory visits require the guarding company to employ an additional high-grade guard, purchase an additional car, and burn the petrol required to get the supervisor from site to site. At the end of the day, it’s the guarding companies’ clients who pay for all this.

Remote monitoring solution

A far more effective, and cost-effective, method of supervising guards is to do it via remotely monitored CCTV. Most companies using on-site guards also utilise a CCTV system for managerial purposes, which opens the opportunity up for monitoring of guards without any significant additional hardware spend on the part of the company. So there’s no upfront cost.

Also, the guarding company will no longer need to send a supervisor to all their sites each night. So there’s a potential reduction in the guarding fee.

An off-site monitoring station can schedule video check-ups on the guarding station at a frequency desired by the client at a very low incremental cost. So suddenly, hourly supervisory visits are possible, but more importantly, they are done stealthily: the guards do not know when they are being monitored. This raises the bar of ‘minimum effort’ from being attentive when the supervisor arrives to being attentive at all times.

However, just as guards require supervisors, the off-site monitoring company also requires systems in place to ensure its duties are carried out effectively. For the symbiotic relationship between guarding and monitoring to really produce results, the monitoring service needs to include a few key features.

Virtual guarding checks

Firstly, the site checks cannot be left to the discretion of the operator in the control room. Each and every supervisory visit must be scheduled in the monitoring station’s software to automatically present the required actions to the operator.

Secondly, the system must force that operator to carry out those actions without fail. Once an operator has begun processing a site check, they must be prevented from closing out the event before the correct cameras have been viewed for the correct amount of time – which has been predetermined and agreed to by the client.

Thirdly, to prove that the correct actions have been undertaken at the correct times, the monitoring station must also be able to produce a comprehensive audit trail that details each and every action the operator has taken, along with a time stamp for each action. All video viewed by the operator must be recorded off-site and must be viewable by the client on request. Ideally, the operator must also have the ability to broadcast audible announcements on-site, and these announcements must also be recorded and be made available to the client on request. In other words, the monitoring station must make itself fully accountable to the client.

An optimal security package is therefore one that combines the two complementary services of on-site guarding and professional, independent off-site monitoring. By ensuring that technology forms the final backstop of enforcement, where it is used to guide and ensure that the actions of operators are in compliance with the system as designed, the never-ending question of ‘who watches the watchers’ is put to rest and the security system as a whole delivers the expected results.

For more information contact Gareth Cowan, OmniVision Security, +27 (0)21 761 5336, gc@omnivisionsecurity.co.za, www.omnivisionsecurity.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The security debt hidden in residential estates
Security Services & Risk Management Integrated Solutions Residential Estate (Industry)
Many residential estates undermine their own security not through a lack of technology, but through hidden weaknesses in gate design, fragmented systems, recurring software dependence, weak operational ownership, and insufficient estate management input.

Read more...
When your security starts thinking with you
Secutel Technologies Surveillance Perimeter Security, Alarms & Intruder Detection AI & Data Analytics
If you manage a warehouse or logistics environment, you already understand how quickly risk can escalate during the day and after hours. The question is: how quickly can you respond?

Read more...
SWEAR integrates with Milestone
Milestone Systems Surveillance Products & Solutions
Security footage, legal evidence, and other critical surveillance assets face increasing risks of tampering, raising chain-of-custody questions, jeopardising admissibility, and undermining the timely operational decisions that depend on credible video.

Read more...
Genetec launches Cloudlink 2210
Genetec Infrastructure Surveillance
New cloud-managed appliance addresses the practical challenges when adopting a cloud-managed model at scale, including storage costs, support for devices that do not enable direct-to-cloud connectivity, and the need to maintain local operation during connectivity disruptions

Read more...
Smarter surveillance in a connected world
Securex South Africa Surveillance IoT & Automation
The security sector is moving rapidly towards integrated, intelligence-led environments. Organisations want systems that communicate with each other, deliver meaningful insight, and support operational efficiency without compromising cybersecurity or privacy.

Read more...
Enhancing control room operations
iFacts Security Services & Risk Management Surveillance
As South Africa faces complex and more advanced security challenges, the demand for advanced surveillance solutions, including CCTV and security control rooms, continues to surge, but what about the people in front of the screens?

Read more...
The AI goldrush has a credibility problem
Refraime Editor's Choice Surveillance AI & Data Analytics
The single most important question a surveillance buyer can ask is deceptively simple: “Was this system programmed or was it trained?” That question alone will reveal more about what you are evaluating than any feature list or marketing video.

Read more...
From surveillance to strategic business infrastructure
Axis Communications SA Surveillance
The Axis Perspectives Report 2026 describes how intelligent IP cameras are evolving beyond traditional surveillance to become an increasingly embedded component of operational infrastructure, supporting security, safety and broader business performance.

Read more...
Crime behaviour insights more important than ever
Leaderware Editor's Choice Surveillance Training & Education AI & Data Analytics
Behavioural surveillance skills are as essential now as they have ever been, especially in situations where quick evaluation of context is needed. Training operators in behavioural recognition skills is a vital part of control room success.

Read more...
Security’s three defining forces for 2026
Milestone Systems AI & Data Analytics Surveillance IoT & Automation
As we move into 2026, several technology trends that were once mostly confined to research labs and conference keynotes are now becoming part of the daily reality of the security industry.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.