Who watches the watchers?

October 2015 Surveillance, Perimeter Security, Alarms & Intruder Detection, Integrated Solutions

For many businesses, security is a grudge purchase. Money gets thrown at solving a security issue, only to later discover holes that can only be plugged with more money. What’s more, the bolt-on services are generally very specific, meaning a bolt-on solution needs to be purchased for each and every hole in the system.

Gareth Cowan, OmniVision Security.
Gareth Cowan, OmniVision Security.

Before committing to any security solution, therefore, companies need to carefully consider, from the outset, what the strengths and weaknesses are of the available solutions, and choose those solutions that are most complementary. A very good example of complementary security solutions is onsite guarding paired with offsite, independent monitoring.

Many companies employ guards to watch over their assets. A guard can be an excellent deterrent, but being human, a guard is subject to issues such as self-preservation, self-interest, boredom and tiredness, with the result that most guards will generally do as little as is required to keep their job. For this reason, most guards cannot be left unsupervised for long periods.

But placing a second guard on-site to supervise the first doesn’t solve the problem, as the supervisor will be subjected to exactly the same temptations as the first. In an attempt to plug this security hole, tagging systems are installed, which act as an independent supervisor that ensures the guards perform the patrol they are contracted to perform. However, a tagging system does nothing to inform on what happens between patrols. The guards might be attentive and alert, or they might be having a 20 minute power-nap.

To solve this issue, many guarding companies now offer supervisory visits to their guarded sites. But this is generally limited to one visit per site, which often occurs around the same time each day or night and therefore becomes relatively predictable. Just like the criminal that waits for the guard to pass by before entering a premises, the guards themselves time their activities around the times they know a supervisor is due to visit. What’s more, these supervisory visits require the guarding company to employ an additional high-grade guard, purchase an additional car, and burn the petrol required to get the supervisor from site to site. At the end of the day, it’s the guarding companies’ clients who pay for all this.

Remote monitoring solution

A far more effective, and cost-effective, method of supervising guards is to do it via remotely monitored CCTV. Most companies using on-site guards also utilise a CCTV system for managerial purposes, which opens the opportunity up for monitoring of guards without any significant additional hardware spend on the part of the company. So there’s no upfront cost.

Also, the guarding company will no longer need to send a supervisor to all their sites each night. So there’s a potential reduction in the guarding fee.

An off-site monitoring station can schedule video check-ups on the guarding station at a frequency desired by the client at a very low incremental cost. So suddenly, hourly supervisory visits are possible, but more importantly, they are done stealthily: the guards do not know when they are being monitored. This raises the bar of ‘minimum effort’ from being attentive when the supervisor arrives to being attentive at all times.

However, just as guards require supervisors, the off-site monitoring company also requires systems in place to ensure its duties are carried out effectively. For the symbiotic relationship between guarding and monitoring to really produce results, the monitoring service needs to include a few key features.

Virtual guarding checks

Firstly, the site checks cannot be left to the discretion of the operator in the control room. Each and every supervisory visit must be scheduled in the monitoring station’s software to automatically present the required actions to the operator.

Secondly, the system must force that operator to carry out those actions without fail. Once an operator has begun processing a site check, they must be prevented from closing out the event before the correct cameras have been viewed for the correct amount of time – which has been predetermined and agreed to by the client.

Thirdly, to prove that the correct actions have been undertaken at the correct times, the monitoring station must also be able to produce a comprehensive audit trail that details each and every action the operator has taken, along with a time stamp for each action. All video viewed by the operator must be recorded off-site and must be viewable by the client on request. Ideally, the operator must also have the ability to broadcast audible announcements on-site, and these announcements must also be recorded and be made available to the client on request. In other words, the monitoring station must make itself fully accountable to the client.

An optimal security package is therefore one that combines the two complementary services of on-site guarding and professional, independent off-site monitoring. By ensuring that technology forms the final backstop of enforcement, where it is used to guide and ensure that the actions of operators are in compliance with the system as designed, the never-ending question of ‘who watches the watchers’ is put to rest and the security system as a whole delivers the expected results.

For more information contact Gareth Cowan, OmniVision Security, +27 (0)21 761 5336, gc@omnivisionsecurity.co.za, www.omnivisionsecurity.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Inaugural Command the Future event in Cape Town
Gallagher News & Events Perimeter Security, Alarms & Intruder Detection
Gallagher Security Africa’s inaugural Command the Future 2025 event was a resounding success, reinforcing Gallagher’s commitment to innovation, collaboration, and long-term growth in Africa’s rapidly evolving security industry.

Read more...
Smarter investigations in Security Center SaaS
Genetec Surveillance
Genetec has announced new intelligent automation (IA)-powered investigation capabilities in Security Center SaaS to help operators quickly locate video evidence, understand the context surrounding an event, and close cases in minutes.

Read more...
ONVIF to end support for Profile S
News & Events Surveillance
ONVIF has announced that it will end support for ONVIF Profile S and recommends using its successor, Profile T. Profile S is the first-ever profile introduced by ONVIF in 2011.

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
VM2 vibration detection monitor
Stafix Security Centres Products & Solutions Perimeter Security, Alarms & Intruder Detection
The JVA VM2 is a perimeter intrusion detection system designed to monitor one or two zones of microphonic (acoustic) cable to detect a perimeter breach through the noise and vibrations created by unauthorised access or vandalism.

Read more...
Recording 40 high-resolution channels
Dallmeier Electronic Southern Africa Surveillance Products & Solutions
With the new MK4 revision of the DMS 2400, Dallmeier introduces a more powerful version of its video appliance, enabling the recording of up to 40 high-resolution video streams, and offering significantly increased capacity.

Read more...
New Edge AI Plus PTZ cameras with analytics
Products & Solutions Surveillance
IDIS has unveiled two new PTZ cameras that are NDAA-compliant, delivering AI auto-tracking, rapid 40x zoom, EIS image stabilisation, and advanced automated AI functionality.

Read more...
Direct-to-cloud surveillance platform
Surveillance Infrastructure
Oncam has announced a forthcoming end-to-end, direct-to-cloud video platform that combines AI-enabled cameras, intelligent IoT devices, and cloud-integrated video management software to deliver smarter performance with reduced complexity.

Read more...
Smarter security for real-world challenges
Secutel Technologies Surveillance
SecuVue connects existing CCTV cameras directly to the cloud, delivering exception-based alerts instead of endless footage. Visual Messenger ensures every alert and event reaches the control room securely and instantly.

Read more...
Continuum launches centralised access and identity management
Editor's Choice Access Control & Identity Management Integrated Solutions Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.