Integrated guarding services

Issue 4 2023 Integrated Solutions, Access Control & Identity Management, Industrial (Industry)

These days estates and facilities no longer simply require a guard at the gate or walking around the perimeter. Every day the security personnel put their lives at risk with the ever-increasing amount of violent criminal attacks we face.

XtraVision, a global distributor of numerous brands in the security and fire industry, has found itself assisting in specifying solutions and helping integration partners with design to assist in dealing with the problem. Many of our clients approach the solution as follows.

Step 1: Understanding the risk onsite to personnel and property; understanding will help the security company to do their job more efficiently.

• Weak points on perimeter or buildings.

• Access and egress control into the estate or facility.

• Challenges related to attending to events.

• Understanding issues encountered by onsite personnel.

• Understanding client budget and funds available to address shortcomings.

• Creating a realistic plan to address the concerns, prioritising concerns from highest to lowest.

Step 2: Selecting a suitable video management solution allowing for control of the site from a central point, while integrating other products in use.

• Does the VMS create a stable building platform that is expandable, thus allowing for third-party integrations?

o Intrusion integration and detection systems, video analytics, and other alarm devices.

o VOIP through and over the system.

o Access control integration.

o Input and output support.

• Can the product support video wall functionality if required?

• Can the product offer failover capabilities for the database and recording features?

• Ease of use of the product.

• Are the annual licencing fees acceptable and in line with client’s budget?

• Can the system allow IP and thermal camera feeds with video analytics alerts to the operators, and does it allow for configuration of a robust and reliable solution?

• Can this product be monitored offsite if required?

• Can the client remotely access footage and evets from mobile devices?

Step 3: Applying relevant technologies that integrate to the above video management platform while assisting operators.

• Visual verification.

o IP Infrared cameras and thermal long-range cameras around the perimeter of the facility to allow detection with associated video analytics; these devices will detect and alert operators who can visually verify the number of perpetrators and whether they are armed or not.

• Detection over a vast area

o Products such as thermal radar covering distances of 1,2 km with detection in a 360-degree radius.

o Long range fibre detection both above and below ground with products such and SAMM Fotos, allowing of drones to verify the alarm while providing accurate GPS locations.

o Radar and similar solutions also provide localised detection along vulnerable areas.

• Access control

o Good access control system with visitor and contractor management, ensuring that all persons on the estate belong on the estate and have left the estate when they should have.

• Communication

o VoIP communication to the field to deter intruders and allow response teams time to get to the location.

XtraVision, has found that although many of the solutions suggested above are expensive, they greatly assist the security companies to effectively conduct their duties and produce a high level of service. Many estates and facilities take the cheaper route, but end up replacing or spending money again on the proposed systems as the cheaper version does not last and is nowhere near as effective as the originally proposed technology solutions.

When costing such systems, the security company, supplier and the client need to look at the actual cost and return on investment.

• Return on investment – cost versus time.

• How long will this product last and what is the mean time between failure?

• How effective is the solution?

• What are the benefits of this solution over other cheaper solutions?

• How will this technology assists the guarding company onsite? Will it benefit the client in their goal of ensuring the site is secure and safe?

Where the right technology has been deployed, the feedback from security companies has been outstanding and they state that it has greatly aided them in their work to secure the site and keep the residents and or property safe and secure.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
Nice launches DC Blue Astute garage door motor
Nice Group South Africa Technews Publishing News & Events Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Nice Systems SA has launched the Nice DC Blue Astute, a garage door motor for the South African market featuring a pre-installed lithium-ion battery instead of traditional lead-acid batteries.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
New AI advisor for robot selection
News & Events Industrial (Industry) AI & Data Analytics
Igus’ new AI chatbot has been added to its online platform to enable companies with little previous experience and technological expertise to quickly and reliably put together Low-Cost Automation (LCA) solutions to become more competitive.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
The power of knowing your client
Ideco Biometrics Access Control & Identity Management Integrated Solutions
One of the most effective ways to combat the threat of fraud, identity theft, and financial crime threats is through a robust Know Your Client (KYC) process, which safeguards both businesses and clients.

Read more...
Federated identity orchestration
Technews Publishing SMART Security Solutions Editor's Choice Access Control & Identity Management Security Services & Risk Management AI & Data Analytics
Understanding exactly who resides at the end of a digital device is key, and simple identity number verification by the Department of Home Affairs is no longer a viable solution on its own.

Read more...
Managing identities for 20 years
Ideco Biometrics Technews Publishing SMART Security Solutions Access Control & Identity Management Integrated Solutions IoT & Automation
Many companies are now more aware of the risks associated with unauthorised access to locations and sensitive data and are investing in advanced identity authentication technologies to mitigate these threats.

Read more...
Gallagher Security obtains SOC2 Type 2 recertification
Gallagher News & Events Access Control & Identity Management
Global security leader Gallagher has achieved renewal of attestation status for System and Organisation Controls (SOC2 Type 2) as related to the cloud-hosted services of its integrated security solution, Command Centre.

Read more...