Back to the future

Residential Estate Security Handbook 2017 Editor's Choice, Information Security, Integrated Solutions, Residential Estate (Industry)

The last 10 years has seen substantial change in the security technology world. So, what will the next 10 years bring? It is worth considering the possibilities because if you don’t, in 10 years you may not be offering the most viable solution. That would not be good for your business, or if you are a user, it could be difficult to survive the changes necessary to stay secure.

We hear so much about the ‘disrupters‘ in the environment around us. For instance, the electric car could ‘disrupt‘ the fuel industry. If so, the fuel industry needs to make plans to make the necessary changes for survival.

There are a few potential disruptors in the security sector, or we may just see it as technology advances. Let’s list a few (technical or otherwise):

1. The guarding industry is becoming too expensive for the average client. Not only must there be annual increases, but removing the E-grade, and at the end of this year, the D-grade, has a knock-on effect and big cost increases. So, something must happen to reduce the total cost of manpower.

2. The ever-increasing application of technical solutions, require that better ‘pilots‘ or operators be employed. They need to be more skilled, trained and better paid. If we don’t, the technology spend is not a good choice and the results will be far less than required.

3. The increased computing power of electronics in the security devices has opened big opportunities. Much of the analysis is being achieved in the camera for instance.

4. Improved analytics is providing more consistent results. Some solutions even have a level of learning to improve the efficiency of the system.

5. We are starting to have a greater number of open systems, that allow for system integration to take place at low cost with high returns. The open systems allow for the interconnection of different brands and products. The days are gone when the product chosen locked you in to the brand for life.

Without listing any more ‘disruptors ‘, we can see a trend:

• Less people employed.

• These employed, being much higher skilled than the current deployment.

• Technology supports greater level of automated reaction to events.

If a machine (an ATM) can be good enough to hand out cash, why can’t the entrance gate have an automated guard machine (AGM) to decide if you can enter? This is possible already. The use of drones in all aspects of life is already happening. So, the drone will become the first response to an alarm.

We have many on-line methods of paying for goods. It relies on making sure there is positive identification. Visitors to an estate may have to use ‘Pay System‘ to register as a visitor to get access through the AGM. Of course, the AGM will be a wonderful solution to those people that shout at the guards and abuse them.

The world of robotics and artificial intelligence (AI) is making these sorts of suggestions well within our capabilities. With this scenario in front of us there are a few challenges. And they are not technical, they are people challenges:

(a) Lots of people will be out of work, a big social problem.

(b) Training and upskilling of the few left to pilot the system will become vital. This training does not exist yet.

(c) The quality of communication systems, including the Internet, needs to be top class with fail-over solutions.

(d) The installer/integrator will need to be top quality. All the outcomes and results will be based on the build quality and maintenance of the system.

(e) But be careful, the AI systems monitor your actions and try to think for you. That may be the next risk we have to be aware of.

So, in the new world of less people, more technology and systems in the residential estate security space, what else can be expected? As a start:

(a) A new breed of criminal who is a technical expert. They exist already.

(b) A security manager who is a technical manager.

(c) An investigator who is skilled in the technology sector and equipment operation.

(d) Training facilities that need to have improved training courses for the new demand.

(e) Companies that offer technical audit and technical risk management services to continually evaluate the health of your system.

(f) A legal system and court procedures that will have to be able to perform in the new environment. Much of the crime may be based on technology manipulation, to the advantage of the techno-crook.

As much as we may feel this is not for us, the increasing labour costs and reducing technology costs are going to win the day. The clients will be demanding that we rise to the occasion.

It’s not the badly trained guard that is going to fail. It’s going to be the badly designed/installed/maintained technology that is going to fail. How are we going to manage that risk?

As I have been told many times, “The future is not what it used to be”.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
World-first safe K9 training for drug detection
Technews Publishing SMART Security Solutions Editor's Choice News & Events Security Services & Risk Management Government and Parastatal (Industry)
The Braveheart Bio-Dog Academy recently announced the results of its scientific research into training dogs to accurately detect drugs and explosives without harming either the dogs or their handlers.

Read more...
The need for integrated control room displays
Leaderware Editor's Choice Surveillance Training & Education
Display walls provide a coordinated perspective that facilitates the ongoing feel for situations, assists in the coordination of resources to deal with the situation, and facilitates follow up by response personnel.

Read more...
Cyber top business risk as climate change hits record high
Editor's Choice
Globally, companies identify cyberattacks, particularly data breaches, as their primary business concern for the coming year, with business interruption ranked second. In Africa and the Middle East, cyber incidents, shifts in legislation and regulation, and macroeconomic developments are the three foremost business risks.

Read more...
As technology converges, so does cybercrime
Editor's Choice
Cybercrime is no longer siloed: it involves complex collaborations and coordination between different malicious entities, including state actors, organised crime and even drug and human trafficking networks.

Read more...
The need for integrated control room displays
Editor's Choice Surveillance Training & Education
Display walls provide a coordinated perspective that facilitates the ongoing feel for situations, assists in the coordination of resources to deal with the situation, and facilitates follow up by response personnel.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
Identity is a cyber issue
Access Control & Identity Management Information Security
Identity and access management telemetry has emerged as the most common source of early threat detection, responsible for seven of the top 10 indicators of compromise leading to security investigations.

Read more...
Smart access for a safer community
neaMetrics Suprema Access Control & Identity Management Residential Estate (Industry) Products & Solutions Commercial (Industry)
Suprema has released its BioEntry W3 facial authentication access control device with multiple authentication options, including RFID cards as well as mobile credentials, designed for durability and resilience.

Read more...
The power of knowing your client
Ideco Biometrics Access Control & Identity Management Integrated Solutions
One of the most effective ways to combat the threat of fraud, identity theft, and financial crime threats is through a robust Know Your Client (KYC) process, which safeguards both businesses and clients.

Read more...