Do you know the secret to free website traffic?

Use this trick to increase the number of new potential customers.

April 2017


Security and Fire Management

Academic Endeavours

Education Sector Safety and Security

News Analysis: National Surveillance Camera Strategy

PSIM Solutions: Procurement Advice for End Users

UPS Systems: Evaluating The Balance of Power

SABRE: Security Risk Management in Built Environments




Phil Warman, Welder, 6 years with Jacksons



We combine the highest

quality perimeter security

fencing and gates with seventy

years of expertise to provide

you with the right solution for

your project, large or small.




April 2017


35 Smart About Access

Jaroslav Barton describes the shift to NFC, Bluetooth Low Energy

and advanced smart card technology

ERM and ESRM in the Spotlight (pp20-21)

5 Editorial Comment

6 News Update

Police Federation on Westminster terror attack. CREST global

certification for BSI. Skills for Security accepted to join RoATP

8 News Analysis: Surveillance Camera Strategy

Brian Sims examines the main points contained within the

National Surveillance Camera Strategy introduced by Tony Porter

11 Opinion: ‘Security as a Service’

By using ‘Security as a Service’, the customer gains access to a

maintained and supervised solution. John Davies has the detail

14 Opinion: SIA Stakeholder Conference 2017

Peter Webster spoke at the 2017 SIA Stakeholder Conference,

focusing on regulation, business licensing and the ACS

17 BSIA Briefing

James Kelly pinpoints the key considerations to be observed

around security solutions management in the education sector

20 ERM and ESRM: The Case for Convergence

If Enterprise Risk Management and Enterprise Security Risk

Management are here to stay, what does this mean for the

future of risk management? Philip Strand offers his views

22 Status Symbol: The CSyP Journey

Peter Speight on Chartered Security Professional status

24 PSIM: Only Fools Rush In...

Stephen Smith outlines why end user buyers of PSIM solutions

need to consider ongoing costs as well as the technology itself

27 The ‘Insider’ Threat

Emma Shaw plots a route forward for today’s organisations

seeking to employ technical surveillance countermeasures

30 An Education on Ransomware

Defeating the spectre of ransomware is so important in the

education sector. Wieland Age highlights Best Practice methods

32 Security By The Book

Peter Jackson documents physical security solutions for schools

38 Building Blocks of Risk Management

Several issues must be factored-in by construction sector

businesses when addressing the delicate calculation between

risk and reward. Carl Ghinn investigates

40 Intelligent Prevention is the Future

HD IP-based surveillance systems reviewed by Tristan Haage

42 Evaluating The Balance of Power

Leo Craig focuses on UPS solutions in the manufacturing sector

45 SABRE: Security in the Built Environment

Gavin Jones shines the spotlight on SABRE, a new security risk

management standard specifically for the built environment

48 The Security Institute’s View

50 In The Spotlight: ASIS International UK Chapter

52 FIA Technical Briefing

54 Security Services: Best Practice Casebook

56 Cyber: Mitigating Open Source Software Risks

58 Training and Career Development

60 Risk in Action

62 Technology in Focus

65 Appointments

The latest people moves in the security and fire business sectors

68 The Risk UK Directory

ISSN 1740-3480

Risk UK is published monthly by Pro-Activ Publications

Ltd and specifically aimed at security and risk

management, loss prevention, business continuity and

fire safety professionals operating within the UK’s largest

commercial organisations

© Pro-Activ Publications Ltd 2017

All rights reserved. No part of this publication may be

reproduced or transmitted in any form or by any means

electronic or mechanical (including photocopying, recording

or any information storage and retrieval system) without the

prior written permission of the publisher

The views expressed in Risk UK are not necessarily those of

the publisher

Risk UK is currently available for an annual subscription rate of

£78.00 (UK only)


Risk UK

PO Box 332

Dartford DA1 9FF

Editor Brian Sims BA (Hons) Hon FSyI

Tel: 0208 295 8304 Mob: 07500 606013

e-mail: brian.sims@risk-uk.com

Design and Production Matt Jarvis

Tel: 0208 295 8310 Fax: 0870 429 2015

e-mail: matt.jarvis@proactivpubs.co.uk

Advertisement Director Paul Amura

Tel: 0208 295 8307 Fax: 01322 292295

e-mail: paul.amura@proactivpubs.co.uk

Administration Tracey Beale

Tel: 0208 295 8306 Fax: 01322 292295

e-mail: tracey.beale@proactivpubs.co.uk

Managing Director Mark Quittenton

Chairman Larry O’Leary

Editorial: 0208 295 8304

Advertising: 0208 295 8307



Now you see me. Now you don’t.

Actual size

The smallest wireless contact we’ve ever made.

The Micro Contact-W is so small it fits within most uPVC window frames, providing invisible but powerful protection. And at a

diminutive 57mm x 27.5mm x 8.2mm in size, the Micro Contact-W all but disappears, even in plain sight.

Outstanding features include:

• Small size

• Cost effective

• 4 Year typical battery life

• Three colour options

• LED assisted setup procedure

• EN 50131-2-6 Grade 2

Visit us:

Stand G1200

Editorial Comment

Don’t just stop at the front door

The Micro Contact-W can be used to protect almost

anything, including doors, windows, drawers and

cupboards - the list is endless!

Internal door

Patio door

Window frame

Bedside drawer

An Eye on ID

Cifas, the UK’s leading fraud prevention service, has issued

new figures showing that identity fraud has hit the highest

levels ever recorded. A record 172,919 episodes of such

fraud were noted in 2016. Identity fraud now represents over half

of all fraud chronicled by the UK’s not-for-profit fraud data

sharing organisation, of which 88% was perpetrated online.

In recent years, Cifas has been informed of growing numbers

of young people falling victim to ID fraud. That upward trend

continued last year with almost 25,000 victims aged under 30. In

particular, there has been a 34% increase in the number of under

21s subjected to ID fraud. On that basis, Cifas is again calling for

better education around fraud and financial crime and urging

youngsters to be vigilant about protecting their personal data.

2016 also saw a rise in the number of ID fraud victims aged

over 40, with 1,869 more victims recorded by Cifas members.

Mike Haley, deputy CEO at Cifas, explained: “These new

figures show that identity fraud continues to be the foremost

fraud threat. With nine out of ten identity frauds committed

online and all age groups presently at risk, we’re urging everyone

to make it more difficult for the fraudsters to abuse individual

identities. There are three simple steps that anyone can take to

protect themselves: use strong passwords, download software

updates when prompted to do so and avoid the use of public Wi-

Fi for banking and online shopping.”

Haley continued: “We all remember to safeguard our valued

possessions through locking our house or car, but we don’t

always take the same care to protect our most important asset –

our identities. We all need to assume responsibility for securing

our mail boxes, shredding documents like bank statements and

utility bills and taking sensible precautions online. If not, we’re

simply making ourselves a target for the identity fraudsters.”

Commander Chris Greany, national co-ordinator for economic

crime, commented: “These latest Cifas figures demonstrate how

we all need to be alert to preventing identity theft now more

than ever before. We do everything we can in order to stop the

identity thieves in the fight against fraud, but it must be said

that the key to success is both prevention and protection.”

With instances of identity fraud set to rise, businesses and

consumers alike simply must take action to address this

damaging issue. Financial services companies should strengthen

the security systems they have in place and the way in which

they verify identities, and especially so for online transactions.

Businesses need to invest in biometric processes designed to

validate identities, at the same time implementing multi-layer

approaches that challenge fraudsters’ attempts to compromise

systems. “Myriad consumers are embracing biometrics in their

everyday lives, for example by using them to access their smart

phones,” observed John Marsden, head of identity and fraud at

Equifax. “Financial services companies can maximise such

technology to protect their customers and their businesses.”

Certainly, the worrying knowledge gap exhibited by too many

consumers when determining safe places in which to share their

personal information must be plugged sooner rather than later.

Brian Sims BA (Hons) Hon FSyI



Sales: +44 (0)1706 220460

December 2012



“Right resources needed in wake of London

terror attack” urges Police Federation

The horrific terrorist attack in Westminster that

claimed several innocent lives, including that of

PC Keith Palmer, has reinforced the need for a

police service with the right resources and

support in place to continue “running towards

danger”. That’s the firm belief of Steve White

(pictured), chairman of the Police Federation of

England and Wales, who took part in a BBC

Panorama Special on Monday 27 March.

Wednesday 22 March witnessed the UK

Parliament and innocent citizens coming under

attack in the most serious terror incident in the

country for over a decade. Speaking to

witnesses and the injured to compile the

programme, BBC Panorama reporters pieced

together what happened during the episode.

The programme also examined the life of 52

year-old attacker Khalid Masood, asking what

motivated him to carry out this fatal strike in

the heart of London, whereby he drove a car

into pedestrians on the pavement along the

south side of Westminster Bridge and Bridge

Street, injuring more than 50 people.

After the car crashed into the perimeter fence

of the Palace grounds, Masood abandoned it

and ran into New Palace Yard where he fatally

stabbed PC Palmer. Masood was then shot by

an armed police officer and died at the scene.

“There are bound to be questions as to

whether things would have been different if

more officers were armed and if PC Palmer had

possessed a firearm,” suggested White. “It’s

entirely likely that we’ll never have a clear

answer. What’s important is that there are many

tactical options to mitigate threats that we need

to consider.”

White continued: “We have to police the

threats that we currently face. For their part,

MPs must take the advice of professionals in

the police service on what we can do and how

we can best do it. We no longer live in a world

of traditional unarmed British bobbies walking

the streets meaning that all will be well.”

These points build on a comment piece by

White which was published in the pages of The

Sunday Express following the London attack. In

the article, White outlines his fears that such an

incident will happen again, but is clear that the

police service will continue to rise to the

challenge. White also touches on the need for

members of the public to ensure that “what

they want and what they demand from their

police service is achievable.”

Chief constable Sara Thornton, chair of the

National Police Chiefs’ Council, said: “We’re

deeply saddened by the horrific events that

took place in London. Our thoughts and

condolences are with the families and friends of

the victims and all those injured and affected.

We’re devastated by the loss of our brave

colleague PC Keith Palmer as he went about his

duties. Now and always, we stand together.”

BSI enhances international capabilities with CREST global accreditation

BSI, the business standards company, has boosted its newly-created cyber security and information

resilience business stream with global membership of CREST, the organisation that spearheads the

highest possible levels of security testing standards. In achieving this status, BSI now joins an elite

group of seven organisations* who can offer myriad clients across the EMEA, the Americas, Asia

and Australasia the heavyweight assurances synonymous with CREST.

BSI has also consolidated its CREST-accredited services with recently acquired CREST member

companies Espion and Info-Assure. Indeed, the business now offers CREST Penetration Testing,

CREST Incident Response Services, CREST START (Simulated Targeted Attack and Response Testing)

and Cyber Essentials.

CREST membership is an important validation of the BSI’s cyber security testing and incident

response capabilities. All member companies undergo stringent assessments of business

processes, data security and security testing as well as incident response methodologies.

Accreditation is very robust and a challenge to attain, in turn demonstrating complete assurances

of processes and procedures.

BSI is a strong proponent of CREST and its role in professionalising the technical security

industry, as well as its efforts to advance the wider information security community through recent

openings of international chapters in Singapore, Hong Kong and the USA. This approach has also

garnered support from international regulators.

*The seven CREST members with global accreditation are Cisco, Context Information Security,

Deloitte Touche Tomatsu, Gotham Digital Science, the NCC Group, PwC and Trustwave SpiderLabs



News Update

National Security Inspectorate

re-appointed by Regulator as ACS

assessment body

Subject to contract, from 1 April 2017 the

National Security Inspectorate (NSI) has been

re-appointed as an assessing body for the

Security Industry Authority’s (SIA) Approved

Contractor Scheme (ACS) and as a provider of

a ‘Passport’ route to ACS compliance. As of

that date, the NSI (led by CEO Richard Jenkins,

pictured) will be offering even more choice for

guarding services companies in terms of how

they can obtain and maintain ACS approval.

The NSI provides assessment services to the

widest variety of guarding services providers,

ranging from small and local specialist

operators through to many of the largest

national operators. Most have chosen to hold

NSI Guarding Gold with an integrated NSI

‘Passport’ to ACS approval.

This provides a cost-effective solution for

businesses wanting to demonstrate both

commitment to the holistic values embodied

within the Regulator’s ACS and the rigour of

comprehensive compliance with British

Standards and the ISO 9001 standard for

Quality Management Systems.

The NSI ‘Passport’ route to ACS approval

also provides cost benefits in holding multiple

approvals with the NSI.

A popular arrangement among typically

more regional providers is to appoint the NSI

to conduct assessments as part of the ACS

standard route approval. Now, the NSI is

offering these companies a new ‘middle way’:

NSI Guarding Silver with the NSI’s ‘Passport’

to ACS. This means companies can now

‘upgrade’ to an NSI Guarding Silver approval

with a ‘Passport’ to ACS approval,

demonstrating full compliance with British

Standards over and above the standard ACS

without necessarily seeking approval to ISO

9001 at the same time. This will prove a

valuable and cost-effective stepping stone for

companies wanting to differentiate themselves

from the ‘Standard’ route to ACS approval and

afford end user buyers additional confidence

in their service providers’ ‘commitment to

compliance’ with British Standards.

Margaret Durr, the NSI’s head of field

operations (services), commented: “Our team

of auditors harbours industry expertise across

a broad range of areas including security

guarding, close protection, key holding, CCTV,

door supervision, event security and

investigative services. Feedback from our

clients is testament to the added value

independent assessment can bring to an

organisation. The ultimate winners are

security buyers and their staff, visitors and,

indeed, members of the general public.”

Skills for Security earns ‘trusted

training provider’ status from

Government with RoATP acceptance

Skills for Security, the sector skills body for

the private security business sector, has been

accepted by the Skills Funding Agency’s

Register of Apprenticeship Training Providers

(RoATP), meaning that the organisation has

now qualified for Government funding to

deliver apprenticeships from May this year.

Passing all elements of the application,

including due diligence checks on compliance,

quality and financial health, Skills for Security

has fully satisfied the Skills Funding Agency

that the organisation is capable of delivering

high-quality apprenticeship training.

Under the Government’s new apprenticeship

policy, training providers must be on the

RoATP to be eligible to deliver training – either

directly or as a sub-contractor – to large,

Apprenticeship Levy-paying employers. Out of

2,327 applications, a total of 1,708 providers

(73%) have made the grade, with the full list

of providers published by the Department for

Education on Tuesday 14 March.

Speaking about this development, Peter

Sherry (pictured), interim director general at

Skills for Security, stated: “I’m absolutely

delighted that Skills for Security has been

accepted on to the RoATP, giving employers in

the security sector the confidence that we, as

the sector skills body for the industry, can

provide them with trusted support and

expertise in equipping the workforce of

tomorrow with a solid educational foundation

through a carefully considered system of

training, assessment and qualifications.”

The Government’s apprenticeship reforms

aim to support an increase in the quality and

quantity of apprenticeships, subsequently

enabling a greater number of individuals to

pursue a successful career. There will be

regular opportunities for new providers to

apply to the RoATP, with the chance for new

applications at the end of March and quarterly

thereafter encouraging diversity and

competition among providers and supporting

both quality and employer choice.

The RoATP is a crucial milestone in

delivering the Government’s wider reforms

designed to make apprenticeships more

rigorous, better structured, independently

assessed and more clearly aligned with the

needs of employers. Those reforms include the

introduction of the new Apprenticeship Levy.



Home Office Commissioner introduces

National Surveillance Camera Strategy

Following on from a

detailed consultation

process that began

last October, Tony

Porter QPM LLB – the

Surveillance Camera

Commissioner at the

Home Office – has

launched a National

Surveillance Camera

Strategy for England

and Wales with the

specific aim of helping

to keep people safe in

public places while

also respecting their

right to privacy.

Brian Sims examines

the fine detail

The 27-page strategy document aims to

provide direction and leadership within and

across the surveillance camera community,

in turn enabling system operators to

understand good and Best Practice as well as

their legal obligations (such as those contained

within the Protection of Freedoms Act, the Data

Protection Act and the Private Security Industry

Act 2001).

It’s the Surveillance Camera Commissioner’s

strategic vision to ensure members of the

public are assured that any use of surveillance

camera systems in a public place helps to

protect them and keep them safe, while at the

same time always respecting the individual’s

right to privacy. That assurance is based upon

deployment which is proportionate to a

legitimate purpose, so too transparency

demonstrating compliance with Best Practice

and relevant legal obligations.

The National Surveillance Camera Strategy

aligns closely with the Home Office’s own key

responsibilities to keep the UK safe from the

threat of terrorism, reduce and prevent crime

and criminality and ensure that people feel safe

in both their homes and communities.

The new strategy provides the Commissioner

with a robust and transparent framework to

fulfil his statutory functions as set out in the

Protection of Freedoms Act, and also

subsequently inform and underpin his Annual

Report to the Home Secretary Amber Rudd.

Speaking about the new National

Surveillance Camera Strategy, Surveillance

Camera Commissioner Tony Porter explained:

“After much hard work, I’m delighted to be able

to launch this strategy document. It’s a strategy

that’s far-reaching, touching on many areas of

surveillance camera use by the police service

and local authorities, installers and

manufacturers as well as training providers and

regulators and, of course, how the use of

surveillance cameras impacts members of the

public on a daily basis.”

Porter went on to state: “The responses to

the consultation on the draft show that this

strategy is extremely well supported, as do the

number of organisations that have written to

affirm their support. I look forward to delivering

on this strategy for the next three years,

ensuring that, where surveillance cameras are

used, they keep people safe while protecting

their right to privacy.”

Endorsement from the BSIA

Endorsing the National Surveillance Camera

Strategy, James Kelly (CEO at the British

Security Industry Association) explained: “The

strategy is a very worthy and successful

attempt to draw together multiple stakeholders

from across what is certainly a diverse and

critically important sector. The BSIA is proud to

have been a contributor to the Commissioner’s

efforts at providing direction and leadership on

the appropriate use of such systems to secure

the protection of our communities, while also

safeguarding individuals’ right to privacy. I’m

delighted to endorse the strategy and will

continue to support the Surveillance Camera

Commissioner’s work on standards and Best

Practice in what’s undoubtedly a vital part of

the UK’s economy.”

To support the achievement of the

Commissioner’s vision, eleven high-level

objectives are outlined within the strategy, each

of them to be led by an expert.

Simon Adcock, chairman of the BSIA’s CCTV

Section and lead on the industry strand of the

National Surveillance Camera Strategy for

England and Wales, commented: “The work of

the industry strand of the strategy is focused

on educating buyers around what to expect

from a knowledgeable and professional service

provider as well as providing practical guidance

to help them comply with the Surveillance

Camera Code of Practice. Ultimately, we’re

aiming to establish and promote a set of



News Analysis: National Surveillance Camera Strategy

guidelines to ensure that buyers can rely on

their service providers for good practice.”

Adcock went on to state: “Over the coming

months, the industry strand will be defining

what we mean by good practice. This will be

centred around ensuring that there’s an

Operational Requirement in place and that the

resulting system meets agreed objectives. Our

end-game is to ensure that anyone providing

professional video surveillance services will, as

a bare minimum standard, meet these good

practice guidelines.”

Adcock also commented: “The National

Surveillance Camera Strategy for England and

Wales represents an opportunity for the

industry to assure members of the public that

video surveillance systems are being used in

public spaces on a legitimate basis, responsibly

and transparently in order to keep them safe.

The strategy document is fully supported by

members of the BSIA’s CCTV Section and we

very much look forward to seeing its content

being delivered through to 2020.”

NHS Foundation Trust certification

Barnsley Hospital NHS Foundation Trust had

been considering applying for the Surveillance

Camera Commissioner’s third party certification

scheme, but it wasn’t until Mike Lees (the

Trust’s head of business security) heard Tony

Porter speaking at a conference that the

decision was taken to ‘go for it’.

Lees stated: “Although we had been

considering applying for some time, the turning

point followed an excellent presentation by the

Surveillance Camera Commissioner to NHS

security managers late last year. This

presentation clearly outlined the advantages to

NHS organisations of following a process and

how we could demonstrate the rationale of

surveillance use.”

Certification enables organisations to clearly

demonstrate that they comply with the

Surveillance Camera Code of Practice. For

relevant authorities – such as local authorities

and police forces – this is particularly important

as they must show due regard to the Code. For

other organisations, such as NHS Trusts,

following the Code is a voluntary decision.

The certification process provides assurances

to hospital users and staff alike that

surveillance cameras are deployed effectively,

efficiently and proportionately. It also ensures

that NHS Trusts are transparent about why they

use cameras and where they’re sited.

For its part, Barnsley Hospital NHS

Foundation Trust approached the Security

Systems and Alarms Inspection Board (SSAIB)

and subsequently achieved Step 1 certification.

“Responses to the consultation on the draft show that this

strategy is extremely well supported, as do the number of

organisations that have written to affirm their support”

This involves completing the Surveillance

Camera Commissioner’s self-assessment tool

and then submitting the form to one of the

certification bodies. The completed form and

documents are then audited by the certification

body who may contact the end user

organisation for more information before

recommending it to the Commissioner to award

his certification mark which can then be used

for the ensuing 12 months.

Lees added: “The certification process was

certainly challenging, but also very worthwhile.

It allowed us to critically review the reasons for

surveillance and scope these against our

existing policies and procedures.”

Accessible and affordable

Certification is simple, accessible and

affordable. There are currently three security

industry certification bodies qualified to audit

against the Code of Practice – the SSAIB, the

National Security Inspectorate and IQ Verify.

Barnsley Hospital NHS Foundation Trust is

preparing its application for Step 2 certification,

which involves a full site visit and audit. If

successfully awarded the certification mark, the

Trust can use this for a period of five years.

Lees concluded: “Our application for Step 2

certification is indeed already in motion. The

Trust will be applying well in advance of the 12-

month period that’s covered by Step 1. I would

recommend any NHS Trust using surveillance

cameras to apply for the mark.”

The surveillance camera sector is substantial

and an industry that will continue to grow. In

2015, there was a £2,120 million turnover in the

UK for video and CCTV surveillance equipment.

The most recent estimates suggest that there

are anywhere between four and six million

CCTV cameras in the UK. That figure doesn’t

include body-worn video cameras, Automatic

Number Plate Recognition cameras or

Unmanned Aerial Vehicles (ie drones).

Approximately 85% of local authorities have

shown due regard for the Code of Practice by

completing the Commissioner’s selfassessment

tool in respect of their main CCTV

scheme (typically their town centre scheme).

54% of local authorities in the UK have

equipped some staff or contractors with bodyworn

video cameras. Transport for London and

Marks and Spencer have already adopted the

Code of Practice on a voluntary basis.

Tony Porter QPM LLB:

Surveillance Camera

Commissioner at the Home


Simon Adcock: Chairman of the

BSIA’s CCTV Section




ON… protecting


premises and profits.

Our security solutions do much more than protect

your manufacturing premises. With AXIS Camera Station

software, you can manage your system remotely and even

add smart features such as audio communication, access

control and analytics. And that’s just a start. It’s all designed

for simple set-up to make your job easier, so you can focus

on productivity.

Choose an Axis recorder pre-installed with

AXIS Camera Station. Discover more at


Opinion: Physical Security as a Service

The ongoing shift in consumer focus may

feel a little surprising at first as the security

industry – much like any other technology

sector – has concentrated on ‘shifting boxes’ for

quite a long time now. This was especially the

case when proprietary systems were the norm.

If an end user wanted more services, they

bought a new product. From a basic sales point

of view, this was both simple and economic for

manufacturers and installers alike.

However, a determined move towards

integrated and open technology has

transformed the way in which security

consumers now view their purchase. It’s no

surprise as this has proven to be the case with

any form of consumer technology. When the

option to source from different providers

increases, so too does customer choice and

interest in the physical product becomes

eclipsed by the overall solution realised.

This is certainly evident with smart devices

and IT. Cloud services have put the onus on

what the result looks like, with the device the

user chooses losing much of its significance.

We’re also starting to see this in areas that

nobody would have predicted in the past, such

as the automotive industry, for example.

People in big cities don’t want the expense

and hassle of owning – and parking – their own

cars anymore. Unless you use your car every

day, it makes more sense to rent one by the day

or week specifically for those moments when

you need to venture beyond the confines of

public transport. For some, at least, the

automobile has become a service item with the

end result – ie a specific journey – assuming a

greater importance than the type and

specification of the vehicle being used.

Service without stress

At the crux of all this is the demand from

consumers to identify the service need and for

suppliers to provide the easiest and most costeffective


Equally, when it comes to specifying a

security solution, the operator doesn’t

necessarily want to know the full details of

what’s going on ‘under the bonnet’. Rather,

they’re more concerned that it ‘does the job’.

Any sensible security buyer – ie the

practising security or risk management

professional – will be focused on their specific

security requirements and the business drivers

that need to be addressed (such as the

protection of buildings, assets, data and

employee safety) and that the chosen solution

suits their budget. This is actually where

service becomes key. For their part, customers

need an expert on hand capable of addressing

All Part of the (Physical

Security) Service

There are signs that the way in which we all buy our products

and services is changing. The concept of buying and owning

a service product is increasingly looking antiquated, as

consumers focus more and more on the outcomes rather than

the tools needed to achieve them. As the physical security

industry becomes more integrated and offers true open

systems, John Davies suggests there’s every reason to

assume our sector will follow this trend

their requirements with all of these parameters

firmly in mind, and with a view to removing the

stress of finding ‘the right product(s)’.

In the past, specifying and using an

unsuitable solution could be difficult at best,

and potentially disastrous at worst. From an

economic point of view, it’s also a challenge to

finance a big install then try to accumulate

resources again for the upgrade when the

incumbent solution has reached its ‘end-of-life’.

It’s far more sensible to moderate the costs

of security investments by paying a monthly or

annual fee that’s predictable and for which a

budgeted sum may be readily set aside. This is

where buying ‘Security Assurance as a Service’

makes complete sense.

Benefits for customers

While the idea of procuring and servicing

physical security on a subscription basis may

seem groundbreaking and will undoubtedly

involve a change of mindset for many

traditional security buyers, there are some very

John Davies:

Managing Director of TDSi



Opinion: Physical Security as a Service

persuasive and practical benefits to be realised

for the customer in doing so.

As the solution isn’t purchased outright,

there’s no need to find a large capital outlay in

one lump sum. At the same time, this capital

can either be invested in a subscription for a

more comprehensive security system or

otherwise accumulated as a saving on the

overall security budget.

With a service-style approach, the

installation and servicing costs are built into

the overall fee, so there will be no unexpected

bills for the business in the event of any issues

or repairs. This is very similar to the benefits of

renting a building or a fleet car, for example,

whereby any maintenance costs become the

concern of the lease company.

Equally, by leasing the security solution, the

end user customer gains instant access to

greater technical expertise and support (for no

extra cost), compared to maintaining these

systems for themselves. This is particularly

appealing when it comes to security systems,

where the integrity – and, therefore, the level of

protection – is of paramount importance. It’s

also very helpful when it comes to integrating

new security components or expanding the

capabilities of the overall security network.

End-of-life stage

The benefits for the customer continue when

the system reaches its end-of-life stage. The

security service provider deals with the

upgrade needs, along with the removal of the

old equipment and installation of any new

systems where required. This also affords a

natural break in the lease, such that the

customer can reassess the host business’

security needs and make upgrades or continue

with the same service levels as before, but with

the attendant benefits of the latest solutions.

Ultimately, by using ‘Security as a Service’,

the customer gains access to a constantly

maintained and supervised solution. This is a

great way in which to ensure that a stable and

reliable security service is realised on a

24/7/365 basis, as well as throughout the

lifespan of the system(s) being used.

When an organisation purchases its own

systems (and, as a consequence, often ends up

using older systems, perhaps due to budgetary

constraints) it can be a real challenge to ensure

safety levels are maintained. It’s a pressure

which most of today’s businesses would be

only too happy to avoid.

Opportunities for solution providers

There are considerable benefits for security

providers, too, both for manufacturers and

installers. Rather than ‘shifting boxes’ (which

any salesperson will tell you is an approach

that can have considerable peaks and troughs),

a move towards complete service solutions

offers a far more stable business model. Rather

than having to win new business with every

product, it becomes possible to sell ongoing

services for a set period.

It’s my own fervent belief that the whole

business model for the security industry will

change and adapt itself to reflect this approach

over the next five-to-ten years. Manufacturers

are already cognisant of the change in

customer expectations and are gearing up to

meet this demand.

The service or leasing approach has become

entrenched in other industries and represents a

firm indication of what’s to come in the

professional security spectrum.

If you look at the airline industry, it has

embraced this model of supply because it

makes sound economic sense for both the

customer and the supplier. Whole aircraft and

even individual key components – such as

engines or seating – can be leased by the

airlines. This yields much greater flexibility, but

also means that the airlines (as consumerfacing

businesses) can have the peace of mind

needed to concentrate fully on providing the

services their customers demand.

The manufacturer and partners provide

assurances and guarantees of service time for

aircraft engines, then deal with servicing and

the technical maintenance to ensure this is

delivered. This model works just as well for the

provision of security systems.

We’ve now reached a point in time where

there are major opportunities on the horizon for

the security business sector, but this inevitably

means that manufacturers and installers will

need to shift their focus and perhaps realign

their business model.

Ultimately, we can begin to concentrate on

developing the right systems for the market

and be assured that our end user customers

will be looking for the kind of support we’re

ideally placed to deliver.

“Ultimately, by using ‘Security as a Service’, the customer gains access

to a constantly maintained and supervised solution. This is a great way in

which to ensure that a stable and reliable security service is realised”



Always a suitable solution

with the DIVAR hybrid

and network recorders

At Bosch, we believe that video surveillance solutions should be as easy to

install as they are to use. It’s the thinking behind our completely new portfolio

of DIVAR hybrid and network recording solutions. Specifically designed for

24/7 operation, they offer the ability to create video surveillance solutions

with professional security features. Solutions that can be tailored to fit the

growing needs of small and medium businesses.


SIA Regulation, Business Licensing and

the ACS: A Personal Perspective

Tuesday 14 March

witnessed the 2017

edition of the Security

Industry Authority’s

(SIA) annual


Conference, which ran

at the Hallam

Conference Centre in

central London. A

reflection of the

partnership working

theme for the day, the

confirmed speakers

emanated from

academia, the police

service and the NHS.

Representing the

private security

industry, Peter

Webster aired his

views and now shares

them with the readers

of Risk UK

The SIA’s Stakeholder Conference allowed

me to share my perspectives on licensing

and regulation with members of the

audience. As regular readers of the Security’s

VERTEX Voice section in Risk UK will know, this

is a subject close to my heart. On that basis, I

thought it would be useful to share with you

the crux of my presentation as well as some of

the reactions to it.

First of all, let me begin by stating that I fully

support regulation. As an industry trusted to

keep people and property safe, we want to be

regulated and, indeed, I’ve never met anyone

who has advocated deregulation.

I’m also particularly supportive of the current

system of individual licensing, as administered

by the SIA. An SIA licence gives an individual a

passport to employment, meaning that he or

she can work anywhere in our industry. This is

undoubtedly a good thing for both employees

and employers. While it gives individuals

freedom to work across our industry, when

someone comes to us with a licence we know

they’ve been vetted and trained to a basic

standard and checked by the SIA.

If I’m to be critical of the current system,

however, it is that it isn’t publicised enough.

The wider public needs to understand that the

SIA exists and affords a licensing framework for

the industry. When I say ‘the public’, I include

those who purchase and use security services

in this realm, as well as the wider public.

Indeed, I fear that the wider public has a

stereotypical image of a security officer, fed by

portrayals in the national media and fictional

drama, as an unhelpful ‘jobsworth’ or a lazy

and disinterested individual. This does a great

disservice to the more than 300,000 people

who work in our industry, who are licensed and

serious about the job that they do. As it is, the

negative perception of security in society

reflects on our people and creates a downward

spiral of low self-worth, which invites lower

standards and impacts on professionalism.

We need to flip this spiral around and build

pride in our industry and the work that security

officers do. Awareness of individual licensing is

key to this. With the police service facing

financial pressures, the security industry is

beginning to play an increasingly important role

in safeguarding critical infrastructure. If the

public understood the process of licensing and

regulation, I’m certain there would be more

respect for the industry and its crucial role.

Spectre of business licensing

I’m strongly against business licensing, the

spectre of which continues to loom large over

the industry. While some regulation is good,

there’s no justification for increased and

unnecessary regulation. The last 30 years have

seen business and Government trying to

deregulate wherever practical and possible.

Business licensing goes against that trend.

Fundamentally, business licensing will create

a greater burden on business, and at additional

cost, for what is an already financially

challenged industry. Preparing for my

presentation last month, I discovered once

again a chart from 2015 in which the SIA

showed the administrative burden moving

towards businesses and away from the

Regulator. Furthermore, that chart highlights a

decline in overall regulatory responsibility for

the SIA as it transfers responsibilities to

industry. Is this really what we want?

I find it hard to believe that business

licensing will even stop the behaviour it seeks

to prevent. I’ve heard claims from the SIA that

business licensing will drive out organised

criminality, yet in all my time in the industry, I

have never come across an operator working

within the commercial environment whom I’ve

suspected of being linked to organised crime.

On a practical level, company law already

exists to address illegal activity and, bearing in



Opinion: Security’s VERTEX Voice

mind that even non-executive directors must at

present hold ‘non-front line’ individual SIA

licences, how can business licensing improve

on that level of vetting? Do we not think that

the criminal fraternity is clever enough to

circumvent this? If criminals can successfully

launder billions of pounds’ worth of drugs

money, do we really believe a determined

criminal organisation will not be able to

override a self-administered vetting process?

Of course, while business licensing would

increase the burden on law abiding business,

any unscrupulous organisation wouldn’t apply

to the legal requirements anyway, so in fact the

only companies really affected would be the

honest and legitimate ones.

Finally, it strikes me that business licensing is

simply unworkable. How will it address the

complexity of brass plaque organisations or

companies with overseas shareholders? How

can one insist on regulatory checks on

shareholders in a Belgian-owned business or a

holding company domiciled in Luxembourg?

Approved Contractor Scheme

There is, of course, a form of business licensing

already in existence in the shape of the

Approved Contractor Scheme (ACS). It’s

voluntary. I know it has many detractors, but it’s

a great deal better than not having any scheme

at all. The introduction of mandatory business

licensing would kill off the ACS. This would be a

terrible mistake.

From my perspective, I could easily live with

any plans to drop the proposed business

licensing and adopt a mandatory ACS. All of the

reliable and trustworthy security companies are

on the ACS Register anyway, meaning that

application and approval would only be a

burden to the fringes of the industry that the

Regulator is seeking to eradicate.

Indeed, in many respects ACS status provides

a level of rigour that I, for one, welcome. For

example, ACS requires vetting to BS 7858

which, to my mind, is far more robust than SIA

licence requirements as it looks at five-year

employment histories. In particular, we should

consider how it might be used to forge

improvement across the industry and drive out

those on the fringes that the proposed business

licensing is meant to address.

On that subject, the ACS should remain under

the control of the Regulator and not be handed

over to industry. This will leave the industry free

to drive the important improvements needed.

Introducing bands of attainment within the

ACS would have the effect of encouraging

organisations to strive to improve their score.

While we don’t need to publicly compare

actual ACS audit scores, the opportunity to

‘band’ providers – whether Bronze, Silver or

Gold, for example – would allow these same

firms to demonstrate their expertise and use

such a banding to differentiate their services in

the quality end of the market.

Reactions and responses

At the Stakeholder Conference, it was very

interesting to hear Ronnie Megaughin (chief

inspector at Police Scotland) talk about his

experiences of making ACS status mandatory

for public sector tenders in Scotland. By all

accounts, this has helped improve the quality of

the security services provided north of the

border and made tendering more transparent.

This tells me that a mandatory ACS would work

in England as well.

That said, I was questioned from the floor

about whether a mandatory ACS would add

excessive cost and burden to smaller security

providers. Naturally, the ACS requires a

business to make a commitment in terms of

people and time, but if it plays a central part in

the continual improvement of that business,

then I would view any associated cost as an

investment in the company.

For me, two points came across loud and

clear at the SIA’s Stakeholder Conference. One

was the need for partnership, whether between

the regulatory body and private security

providers or the industry and the police service.

The second point I noticed was the welcome

recognition of the crucial role that the security

industry plays in keeping people, property and

assets safe across the UK. As Elizabeth France

(chair of the SIA) remarked, there are more

security staff than police officers in the UK.

That’s 300,000 pairs of ‘eyes and ears’ trained

to support the police’s sterling work. At a time

when policing budgets are under considerable

pressure, our industry’s importance to the UK’s

security infrastructure is crystal clear.

However, the good work of the SIA, the

existence of the ACS and the importance of the

security business sector as a whole is poorly

understood and unappreciated. As an industry

we must act and take better control of our

image. Indeed, it’s crucial that the private

security industry buys into this key message.

From my own point of view, the reputation of

the industry depends on it, while its future

growth relies on positive action being taken.

Peter Webster: Chief Executive

of Corps Security

*The author of Risk UK’s regular

column Security’s VERTEX Voice is

Peter Webster, CEO of Corps

Security. This is the space where

Peter examines current and often

key-critical issues directly

affecting the security industry. The

thoughts and opinions expressed

here are intended to generate

debate among practitioners within

the professional security and risk

management sectors. Whether you

agree or disagree with the views

outlined, or would like to make

comment, do let us know (e-mail:

pwebster@corpssecurity.co.uk or


“The last 30 years have seen business and Government

trying to deregulate wherever practical and possible.

Business licensing goes against that trend”






With approaches, systems and

devices constantly changing,

etailers need to be aware of the

latest trends and innovations to

gain significant competitive

advantage from their eCommerce

and mCommerce efforts.

The eTailing Summit offers a day

of a day of meetings and

networking with industry suppliers

and peers for idea gathering,

inspirations, tools and tactics to

help transform strategies in line

with the latest technologies.

11th July 2017

Hilton London Canary Wharf

For further information contact Katie Bullot on:

01992 374049








BSIA Briefing

Last year, the National Counter-Terrorism

Security Office produced some guidelines

containing advice for leaders of schools and

other educational establishments on reviewing

protective security, in tandem pressing school

officials to take the subject of risk management

seriously. This advice followed a series of hoax

telephone calls being made to educational

sites across the UK, which forced at least 27

schools to be evacuated after bomb and gun

threats were made.

It seems history may now be repeating itself.

Last month, across no less than 11 counties in

Britain, nearly 5,000 schoolchildren were

evacuated after their schools received bomb

threats. While these threats were treated as

hoaxes, they do further solidify the fact that

school leaders absolutely must take the time to

review their security plans and ensure the

measures they currently have in place are both

effective and of good quality.

Alongside potential bomb and gun attacks,

educational establishments face a wide number

of threats right across the year, including walkin

thefts, the potential for personal data

breaches, threats against students and staff

and the possibility of arson. Bearing all of this

in mind, school officials have a Duty of Care to

both their fellow members of staff and pupils,

as well as a legal responsibility to provide a

safe environment in which people can learn.

A lack of effective security can not only result

in potentially life-threatening situations, but

also the prospect of reputational damage. Back

in March, two separate schools in Cumbria were

placed under ‘special measures’ by Ofsted for

security reasons. A small secondary school,

Kirkby Stephen Grammar School failed its

Ofsted inspection due to a perceived lack of

perimeter security, with the school reportedly

being criticised for its failure to put in place

appropriate measures that would “minimise

identified potential risks” to pupils.

In short, Ofsted’s inspectors deemed the

premises as being too readily accessible to

members of the general public.

According to a report in The Westmorland

Gazette, the ‘special measures’ decision came

after The Queen Katherine School in Kendal

was also placed into this category due to

safeguarding and security issues. Following the

decision, the school is now moving forward

with £30,000 plans that will include a perimeter

fence designed to improve security in an effort

to satisfy the Ofsted inspectors.

Ofsted’s decision has angered school

officials, with Kirkby Stephen Grammar School’s

head teacher Ruth Houston and Simon Bennett

(chairman of the governing body) sending a

Learning By Inspection: The

Importance of School Security

Security and safety in UK schools is a highly emotive subject.

Indeed, it’s one which is never far from the mindset of the

presiding head teacher, the facilities team responsible for a

given establishment, the governing body and/or members of

the Local Education Authority, all of whom have key roles to

play in the implementation of an effective strategy. Here,

James Kelly examines the main considerations to be observed

around security in the education sector

letter to parents stating that they believed the

decision was “a failing of the inspection

system, not the school, if an overall judgement

is defined by the lack of a fence or not enough

locks on doors, rather than the excellent

teaching, leadership, behaviour and outcomes

of the school.”

Students from Kirkby Stephen Grammar

School have contacted Ofsted to express their

own concerns. The Westmorland Gazette report

stated that students told Ofsted they felt

“valued, inspired and appreciated. Unsafe is

something we never feel. A member of our Sixth

Form remarked that ‘everybody knows

everybody in Kirkby Stephen’. This same

community ethos is reflected in our school, an

ethos which would be changed for the worse by

the severe security measures Ofsted would like

us to put in place.”

An integrated approach

School security solutions extend well beyond

perimeter fences and physical locks, with an

James Kelly: CEO of the British

Security Industry Association



BSIA Briefing

integrated approach being the most effective

way of protecting staff, students and assets

alike. It’s also important to choose measures

that integrate seamlessly with the design of a

given school building so as not to intimidate

pupils or their parents.

Access control systems can be a great place

to start, with electronic access control

becoming increasingly more commonplace in

schools. A combination of electronic access

control and physical security measures will be

vital in helping to manage known or anticipated

threats by dint of controlling, monitoring and

restricting movement around a given site.

Schools can be quite complex in terms of

their access control, with specific areas – such

as a science laboratory or an IT room – needing

to be restricted to certain people at specific

times of the day. Outside of school hours,

access control measures can be used to restrict

entry to the entire building and may be

integrated with gates or fences at the perimeter

to grant access only to authorised personnel.

Alongside electronic access control, as

mentioned, high quality physical security

measures should also be employed. In a school

environment, particular doors – such as that

allowing access to a caretaker’s storage room –

can be fitted with a mechanical patented

cylinder lock under a master key system.

Escape doors may be fitted with crash bars or

push pads for emergency exit only.

On the subject of doors, it’s essential to

consider the types of doors used that will

provide the most streamlined access to and

within a school, taking into account the

demands made by the Equality Act 2010.

Here, it’s vital measures are chosen that are

both non-discriminatory and convenient in their

nature. For example, if selecting revolving

doors for a school entrance – which can act as a

beneficial airlock to keep out draughts, noise,

dust and dirt – then an automatic pass door

should also be installed next to it in order to

grant access to those less able to enter through

a revolving door.

Identification devices

Once the physical barrier – such as a door,

turnstile or speedgate – has been chosen, then

officials must decide on which type of

identification device will be most suited to the

school. This can largely depend on which areas

“Dynamic lockdown procedures have the ability to restrict

access and egress at a site or building through physical

measures, among them access-controlled doors”

of the school require authorisation for access

and by whom. For example, some schools may

only have certain restricted areas and need to

give permissions to authorised staff only,

whereas at other schools there may be a

requirement for all students to carry an

identification device.

Proximity cards – such as contactless keys, ID

cards or fobs – can be very useful in achieving

streamlined access throughout a school.

However, it might also be beneficial to consider

biometric access control measures, such as

fingerprint readers, as they can eliminate the

potential issues of children misplacing or

forgetting their access devices.

A good quality system can generally handle a

large amount of users and will be able to

identify individuals quickly and efficiently. As

user information is very often linked to a

dedicated database, it’s also wise to choose a

system that doesn’t need to be online in order

to make access decisions. This way, if the

Internet connection is lost for any length of

time, students and staff will still be able to

access specific areas/zones of the school.

Identification devices can also carry various

added value benefits. They don’t simply have to

contain access information. Rather, they can

store important student and staff data, too,

such as any notes on medical issues or dietary

requirements, and are a useful way of logging

time and attendance. They can also act as

cashless vending devices, meaning children

don’t have to carry cash with them to school,

potentially reducing the risk of bullying.

Dynamic lockdowns

Another security measure that’s gradually

becoming a part of school security strategies is

that of dynamic lockdowns. A dynamic

lockdown would generally occur in response to

a fast-moving incident, such as a firearmsbased

attack occurring either directly at the site

or somewhere close by.

Dynamic lockdown procedures have the

ability to restrict access and egress at a site or

building – or parts of it depending on its

configuration – through physical measures,

among them access-controlled doors. As well

as verbally alerting staff to physically lock

down the school, panic hardware can be fitted

to doors and windows – and especially ‘final

exit doors’ like playground doors – so that they

automatically lock when the alarm is activated.

The panic hardware must be capable of selflocking.

Pullman-type latches integrated with

door closers would be a good way to achieve

this. A school’s access control system may also

be integrated with a panic alarm system.



ERM and ESRM: Can They Continue

to Exist Independently?

If Enterprise Risk

Management and

Enterprise Security

Risk Management are

here to stay, what

does this mean for the

future of risk

management? What

models should we

look forward to in the

future, and what

future should risk


practitioners prepare

themselves for as time

moves on? Philip

Strand searches for

some answers to

these key questions

Dr Philip Strand PhD MBA:

Senior Risk Consultant at




Thought leaders in the risk management

industry continue to evolve practitioners’

views of the world they protect. In many

ways, the recognition that the industry merited

and required professional organisations such

as ASIS International (1955), IAPSC (1984) and

The Security Institute (1999) was an evolution

in thought, both in and of itself.

From this evolution, the industry gained

platforms upon which leaders could develop

their ideas more quickly and communicate with

global reach. Significant paradigm shifts have

included distinctions between security

management and risk management and the

convergence of IT and physical security

operations in the 1990s.

Joining the ranks of these industry-changing

movements is the latest major shift in risk

management thinking, namely Enterprise Risk

Management (ERM) and its security-focused

spin-off, Enterprise Security Risk Management

(ESRM). Enough time has gone by to suggest

that these strategic-level frameworks for risk

management are more than just passing fads.

Indeed, they’ve now firmly taken root.

Risk management was originally developed

as a concept in the mid-1950s to help the

insurance industry conceptualise its role in

society and achieve its commercial goals. By

the early 1960s, two professors – namely

Robert Mehr and Bob Hedges – had developed

risk management for business enterprises into

a more robust system of thought,

encompassing not only risks related to readily

insurable incidents (ie hazard risks), but also

four distinct categories of business risk.

Come the mid-1990s, these four categories

became the foundation of ERM and

encompassed hazard risk (ie employee illness

and injury, theft, third party liabilities, natural

disasters and property losses), operational risk

(information transfers, bidding processes,

construction management and accounting

processes, etc), financial risk (ie costs of

capital, market risks, bank and surety support

and growth capitalisation) and strategic risk (ie

changes in customers and industries, growth

strategies, risks to brands and reputations and

competition risks).

Although Mehr and Hedges succeeded in

bringing risk management out of a single

industry and into the mainstream business

world, their model left significant room for

development. For one thing, their ERM

framework didn’t make it clear how physical

risks can cross-cut all four categories.

At first glance, physical risks – which stem

from threat actors ranging from criminals to

incompetent employees through to natural

disasters – most obviously relate to the ‘hazard

risk’ category, but there are more subtle

relationships to the other three categories that

shouldn’t be understated.

For example, strategic risks could be

compounded by malicious damage caused to

assets or processes that are vital to a

company’s growth strategy. Likewise, robust

physical risk mitigation measures might be

marketed as a comparative advantage over

competitors, thus giving a company an

advantage in a specific market. Additionally,

information transfers could be affected by the

sudden and unfortunate loss of employees.

In each of these examples, an understanding

of physical security risk is an essential

prerequisite to understanding operational,

financial or strategic risk.

While it’s wholly possible for risk managers

to relate different security risks to each of the

categories in the ERM framework, the

development of ESRM in 2009 seems to have

eliminated some practitioners’ desire to do so.

ESRM is a risk management ‘philosophy’ that

encourages practitioners to assess all forms of

physical risk (ie information, cyber, physical

security, asset management and business

continuity risks) in an holistic manner similar to

how ERM advocates assessing many business

risks together.

According to ESRM, risks should be assessed

not only in terms of their immediate impact, but

also according to their second and third order

effects on other assets and processes within a

given organisation.

Clear evolution in thought

ESRM represents a clear evolution of traditional

security thinking in as much as it requires

practitioners to examine the total impact that

security incidents might exert on an

organisation. From an ESRM perspective, a

stolen laptop doesn’t only cost a company the

replacement value of the laptop. ESRM enables

us to see the loss at a higher level by factoring-

Enterprise Risk Management and Enterprise Security Risk Management

in the value of the information on the laptop

and the value of all of the business processes

that the laptop facilitated.

ESRM also encourages security managers to

ensure that risk decisions are made by true risk

owners. It brings security managers who’ve

traditionally operated separately (eg physical

security and IT security managers) together

under the same umbrella whereby they can

more easily determine how some risks might

affect multiple stakeholders.

Despite ESRM’s contributions to risk

management thinking, there are still several

ways in which ESRM must be further

developed. While the ERM framework fails to

recognise how security risks can impact

business risks, ESRM also fails to adequately

emphasise this point.

Many models depicting ESRM as a process –

among them ASIS International’s own widely

accepted model – are narrowly focused on

identifying and quantifying organisations’

assets and the risks facing those assets. ESRM

encourages CSOs to liaise with finance,

executive and other C-Level officers to

understand how security risks can affect

multiple assets within their organisations

(including intangible assets like reputation),

but ESRM models stop short of emphasising

the importance of understanding how assets

facilitate the operational, financial and strategic

goals of the organisation.

While ESRM goes beyond ERM in several

important ways, this lack of emphasis makes it

possible for ESRM-minded security managers

to miss out on the important elements of

business risk upon which ERM focuses heavily.

Embracing the philosophy

In their 2016 book entitled ‘The Manager’s

Guide to Enterprise Security Risk Management’,

Allen and Loyear state that: “ESRM is not the

same as ERM, and it certainly doesn’t replace

it.” This appears to be quite true and, at

present, large organisations are likely to need

competent and experienced risk managers at

the head of their ERM Departments as well as a

series of similar risk managers embracing the

ESRM philosophy throughout their

organisational structures.

Currently, there’s no single risk management

framework that embraces all of the elements of

both ESRM and ERM. This allows for a gap in

risk management thinking because, by default,

it means that there’s no single model plainly

relating security risks and business risks in a

single process.

In order for risk managers to correctly

prioritise assets and risks, they must fully

understand the roles that assets play in helping

organisations to achieve their missions and

strategic objectives. ESRM aspires to do this,

but the next evolution in risk management

thinking must be to converge ERM and ESRM.

The four business risk categories of ERM

must be viewed in concert with the security risk

categories of ESRM. The ‘holistic’ approach of

both types of risk management merits

applause, but neither type of risk management

can claim to be truly holistic if they’re not

assessing business and security risks together.

If the convergence of ERM and ESRM looms

in the future, then it’s natural to ask the

question: ‘What would this convergence look

like?’ It seems that it might be appropriate to

add ESRM’s ‘security risks’ as a fifth category in

the ERM model. This is indeed tempting for

simplicity’s sake, but it’s noteworthy that, in

most organisations, the impacts of the two risk

models flow mostly in one direction.

While security risks can – and often do –

compound business risks, the latter tend to

exacerbate security risks only under rare and

extreme circumstances.

Looking ahead, future models of converged

ERM-ESRM frameworks must consider in depth

the fact that assets and processes (which are

directly affected by security risks) exist to

support organisational objectives (which are

directly affected by business risks and only

affected by security risks when assets and

processes are compromised).

“ESRM represents a clear evolution of traditional security

thinking in as much as it requires practitioners to examine

the total impact that security incidents might exert”



Status Symbol: The Chartered Security

Professional and Standards of Excellence

The concept of


professionalism traces

its roots back many

centuries, in fact to

the years following

the Norman invasion

of 1066. Now,

in the 21st Century,

being ‘Chartered’ is

more relevant than

ever in terms of both

winning and securing

public trust. Peter

Speight examines the

importance of

Chartered Security

Professional status for

today’s practitioners

Recently, a security manager whom I’ve

known and worked with for some years

now, namely Mike Topham, was keen to

discuss pursuing the journey towards Chartered

Security Professional (CSyP) status. Mike – who

has held a number of security management

positions – contacted me as he wished to know

more about the whole subject of CSyP.

For my part, I fully expected a relaxing cup of

coffee or two and a general conversation with a

couple of questions about CSyP thrown in, but

Mike’s keen determination to learn as much as

possible was obvious from the outset. Indeed,

Mike asked several questions, all of them

pertinent and very much to the point.

Why would anyone want to attain this

standard? What will it achieve for the practising

security professional? How will customers

benefit? Who should apply and why? What does

the individual have to do if they pass muster?

We had a great meeting and jointly agreed

that Mike should carry out some detailed

research of his own into CSyP in order to gain a

feel for the ‘What?’, ‘Why?’ and ‘How?’

Mike is right in his assessment that, as we

head into the next few years, every aspect of

the security environment in which we all now

live whether in a local, national or global

business context or as an individual has

become more complex, technically challenging

and generally more unstable than ever before.

The sheer magnitude and range of threat

types, from the technical vulnerability of

information and systems through to fraud and

terrorist activity and on to the local protection

of people, premises and business assets

demands the exponential development of the

security sector. The emergence of fully riskbased

methodologies along with this general

growth has been accompanied by the

development of many intelligent tools, both

technical and academic. The security landscape

refuses to stand still, then, even for a moment.

In this maelstrom of activity, the burning

question for customers has been where to turn

in order to ensure that those engaged to advise

on these matters are somehow up to the job

and the best available. If there was a bridge to

be built or the legal defence of a corporation to

be conducted there would be a need for a

proven group of professionals (ie engineers or

lawyers) to transact such work. Their industries

or commercial business sectors are chartered,

with a Register of Chartered Professionals

available as guidance.

Until relatively recently, the security business

sector had no such listing despite the growth of

complex security threats. Thankfully, matters

have changed much for the better.

Strategic competencies

CSyP is a professional certification in security

established to show the attainment of strategic

and higher operational level competencies in

the discipline. The Security Institute operates

the Register of Chartered Security Professionals

on behalf of The Worshipful Company of

Security Professionals and it’s expertly

managed by the Chartered Security

Professionals Registration Authority.

The criteria for joining the Register of CSyPs

is founded to a large degree on the UK

Standard for Professional Engineering

Competence. Advice was also sought from the

Foundation for Science and Technology and The

Engineering Council. The final version of the

criteria for becoming a CSyP is, to an extent,

based on the criteria for Chartered Engineers.



Chartered Security Professionals: ‘The Gold Standard’

To be admitted to the Register, applicants

must have a strong understanding of general

security principles (although they may be a

specialist in one field) and be operating at a

strategic or senior operational level of security

practice while demonstrating a high level of

competence in five key areas: Security

Knowledge, Practical Application,

Communications, Leadership and Personal

Commitment. Applications are also welcome

from professionals working in the security

business sector who are engaged primarily in

teaching or in public or private sector

organisations involved with security activity.

To remain a CSyP, Continuing Professional

Development (CPD) is mandatory, as is

adherence to a professional Code of Ethics.

The Security Institute and ASIS

International’s UK Chapter are both eligible to

receive applications from potential CSyPs,

although applicants don’t have to be a member

of either organisation. It’s testament to the

vigorous protection of CSyP organisational

standards that it took ASIS UK a year of hard

work to demonstrate compliance with relevant

standards in order to be awarded a licence to

manage CSyP registration applications.

Both ASIS UK and The Security Institute are

fully committed to CSyP on several levels,

including mentoring and promotional activities.

Standards of excellence

The five core competencies required for CSyP

registration are weighted in favour of security

knowledge and application skills. The

weighting also requires CSyPs to be better than

average. Achieving a mark of ‘Good’ across the

board isn’t enough. Applicants must be better

than ‘Good’ to be admitted as a CSyP. Those

applying must be of undisputed integrity and

have a sound level of expertise, operating at a

strategic level or the senior end of the

operational level of security practice.

To date, the Register of Chartered Security

Professionals has attracted successful

applicants not only from the UK, but also

Australia, the USA, Canada, the UAE, Spain,

France, Albania, the Netherlands, the Czech

Republic, Switzerland and Hong Kong.

As substantial as the foundations are, and as

undeniable as the commitment of the industry

is to adapting to modern customer needs, in

order to fully understand why an individual

should submit themselves to the rigours of

registration we must understand – as Mike

asked of me – what the advantages of achieving

CSyP status are for the individual in order for

this ‘Gold Standard’ to become attractive to the

next generation of security professionals.

“For some time now, customers have been unhappy with

the ‘single dimension’ security service delivery. Several

fairly weighty voices have called for better informed and

bespoke risk profiling of their businesses”

‘Single dimension’ security

For some time now, customers have been

unhappy with the ‘single dimension’ security

service delivery. Several fairly weighty voices

have called for better informed and bespoke

risk profiling of their businesses and a move

towards Enterprise Risk Management on a

service partnership level.

Traditionally, ‘security’ has been viewed as a

grudge purchase by some clients for a variety of

reasons, which inevitably leads to price-driven

procurement decisions based on hourly charge

rates. The end result has often been poor

service delivery by poorly-motivated security

officers operating in a poorly-resourced

environment. That’s the fact of the matter.

The traditional corporate mindset is slowly

changing, but still pervades among many of the

current customer base. In essence, the key

must be to manage expectation at the outset by

demonstrating the professionalism, flexibility

and tailored offering which our industry is now

able and geared to deliver. A potential customer

needs to be encouraged to found procurement

decisions on the value added by the security

services package based on a risk management

methodology, and not simply on the charge rate

for the officers delivering those services.

Security professionals must drive to become

actively involved in the full range of enterprise

risk mitigation (including crisis first response)

along with their customers, while also pressing

to become integrated service partners.

Returning to one of Mike’s key questions,

why register for CSyP? The answer is to

demonstrate that we understand and stand by

the concept of ‘professionalising’ the security

world around a single, transparent and

continually relevant standard, and at the same

time send a message into the marketplace that

we’ve adapted to changing customer needs.

Choosing a professional or a service provider

from within our sector is now possible in a way

that mirrors the seriousness of current threats.

Registration as a CSyP also requires a

demonstrable personal commitment to the

development of security in its wider sense,

through supporting colleagues, members of the

public and immediate neighbourhoods.

Applicants shouldn’t attempt to attain CSyP

status without fully appreciating that ongoing

commitment. This isn’t just a ‘tick-box’ exercise.

Dr Peter Speight CSyP DBA


Managing Director of Future

Risk Management



Physical Security


Management is a

category of software

that provides a

platform and

applications created

by middleware

developers specifically

to integrate multiple

unconnected security

applications and

devices and control

them through one

comprehensive user

interface. Stephen

Smith outlines why

the end user buyers of

such solutions need to

consider not only the

technology itself, but

also the ongoing costs


PSIM: Only Fools Rush In...

Of late, there has been a fair degree of

focus on how Physical Security

Information Management (PSIM) solution

developers are planning to offer integrated

security systems aimed at the growing needs of

large-scale enterprises. They would be doing so

while also offering advanced functionality for

more stakeholders and providing greater

control from one central location.

Within the world of PSIM, certain matters are

crucial for the future development of our

industry. One such is about understanding and

resolving problems associated with the

increasing geographical scope of clients, while

adhering to a multi-tiered hierarchy – a socalled

‘federated’ system – wherein total

control is centralised, but allows individual

sites to maintain local control.

Providing more powerful systems is

undoubtedly important. Perhaps more

important, however, is the scalability of the

solution, from a single PC through to those

‘federated’ solutions that afford end users the

power to match risk with budgets. It is indeed

the case that big is beautiful up to a point, but

what’s considerably more attractive, I would

strongly argue, is the ability to scale a solution

according to need. This will allow more

businesses to realise the considerable

advantages PSIM solutions can deliver.

Also important is the issue of connectivity

and, to be more specific, the subject of

connectivity failure. It would seem obvious that,

in locations where there are known connectivity

challenges, and where connectivity failure is

therefore a distinct possibility, the ability for a

system to work in a standalone mode is

essential. It would seem similarly obvious that

managing an enterprise-wide PSIM-based

solution doesn’t create huge volumes of data.

Distributed architecture

The distributed nature of the architecture

within certain PSIM solutions means that each

Control Room is autonomous. This in turn

means that, if a connection is lost to the others,

it will continue to run without interruption and

monitor the systems assigned to it. To that end,

it’s a genuine ‘hot reserve’, as opposed to being

a ‘fail-over’ Control Room that has to be

switched on and booted up.

In my opinion, data bottlenecks should never

be used as an excuse for a system going down,

nor for creating a lack of ‘control’. It’s

disingenuous to suggest otherwise. PSIM

technology should have an efficient alarm

escalation functionality, which means that if

there’s a problem, the operator still knows

exactly what to do should a critical event occur.

For their part, operators must have access to

all of the data, information and systems at their

fingertips. None of that information should be

‘lost’ in the event of a connectivity failure, or

while waiting for the back-up to warm up.

While some are seeking to develop more

powerful solutions for ‘federated’-level security

across larger organisations and smart cities,

others are already being deployed throughout

the world, from the UK to the United Arab

Emirates. While some manufacturers appear to

focus on the past, the more forward-thinking

among us are already operating in the future.

PSIM technology is of course capable of

managing large numbers of systems – and not

just video – from a single platform across

multiple sites. This allows end users to manage

incidents according to standard operating

policies set by the customer or based upon

best business practice, mitigating risks to life,

security and assets accordingly.

Importance of reputation

Reputation is important in any industry and for

any technology. Frustratingly, PSIM is already

one of those technologies that has a poor

reputation. It has come a long way in a

comparatively short space of time, but such

rapid evolution has been an element of the

problem. This is partially because PSIM can be

misunderstood and grouped erroneously with

security management systems, but also partly

because, in my opinion, some PSIM solution

developers are misleading the market.



PSIM Solutions: Procurement Advice for End Users

They seem to be doing this in two ways: first,

in regard to what their technology is capable of

achieving and, second, in relation to how much

their clients should pay for the pleasure of

having a PSIM solution installed. Indeed, this

is the other great challenge and the other

great myth: lifecycle costs.

I have a genuine fear that these hidden costs,

with particular regard to software licenses,

combined with the lack of an adequate support

service – or one that’s ludicrously expensive –

are problems that continue to be unexplained

and do our industry a tremendous disservice.

This was certainly evidenced in the survey we

ran in conjunction with Risk UK last year.

Depending on the specific PSIM system and

its manufacturer, these costs can be highly

fragmented and split into many different ‘parts’

or stages. This may be confusing to the end

user buyer, since they can include the physical

equipment cost, installation, initial software

licenses, training packages and project

management services, etc.

What’s most alarming, however, is that these

are only the ‘initial’ costs and don’t take into

account factors such as annual licence fees,

future upgrades and renewals which, when you

think of the initial capital expenditure for

implementing a system and the number of

years you expect it to be functioning, could run

into the many thousands – if not hundreds of

thousands – of pounds.

Specification: key points

In specifying a PSIM solution, and identifying a

reputable manufacturer with whom to work,

what should the end user be looking for?

Ensure the companies that are pitching to

you state, in writing, their annual fees for the

renewal of your licence and, if technical support

is provided, what it entails and what it costs

over a five-year period.

Find out whether you will be expected to pay

for system updates, too, and if so, how

frequently these updates will occur. What are

the fees? Is the cost a percentage of the initial

capital outlay?

Given the level of investment you’re making,

insist that the software will be supported for a

minimum of ten years or longer if possible.

Sweat the small print pre-contract so you

don’t expose yourself to risk that could well

end up having a catastrophic impact on your

organisation somewhere down the line. A small

number of software providers are still known to

build a ‘timer’ into their software. Worth

bearing in mind, as this automatically shuts the

software down if, for any reason, your annual

renewal payments haven’t cleared.

“Ensure the companies that are pitching to you state, in

writing, their annual fees for the renewal of your licence

and, if technical support is provided, what it entails and

what it costs over a five-year period”

Don’t evaluate a project based solely on the

initial capital cost. What might appear to be a

competitive initial cost could actually be the tip

of a very big iceberg when you rack up the

other additional costs for updates, licence

renewal and technical support. Work out the

lifetime cost. Don’t discover when you’re too far

down the line that the cost of installing the

system is lower than the ongoing annual costs.

A decision was taken early on in our

commercial history that we would never place

clients in the unenviable position of budgeting

for a capital expenditure only to find a raft of

renewal and licensing costs emerging. Cost, of

course, cannot be the only driver, but the

danger is that the cost a client is quoted isn’t

the ‘true’ cost that they end up paying when

ongoing outlays are then taken into account.

Transparency is paramount

Over the years, I’ve lost count of the number of

red-faced security managers berating a PSIM

solution provider for metaphorically holding a

gun to their head and, in effect, telling them to

‘pay the ongoing fees or we will not support

your system’. We certainly know of cases where

public bodies are now having their PSIM

systems ripped out because they cannot afford

to maintain them from revenue budgets.

PSIM solution providers must be 100%

transparent and fair or otherwise risk going out

of business on the back of an army of

disgruntled customers. Short-term opportunism

and narrow-mindedness could seriously impact

the industry’s long-term credibility.

PSIM is very much the system of tomorrow

that’s already being used to great effect in the

‘here and now’ today, but not always to the

extent that it should, or indeed by the

businesses that could benefit from it the most.

Buying a PSIM solution can be fraught with

difficulties, many of which are of our industry’s

own making. It must be said that buying on

initial capital cost alone is certainly a

dangerous way of doing things.

My best advice would be to conduct your due

diligence very thoroughly indeed. Consider the

technical implications of the risks to be

overcome and the lifetime cost of a system

rather than rushing unexpectedly into a brick

wall of hidden fees or false promises. After all,

only fools rush in where angels fear to tread.

Stephen Smith:

Managing Director of

Intergrated Security

Manufacturing (ISM)



The Insider Threat: Technical Surveillance Countermeasures

Many cyber attacks come from halfway

around the world, but the network

openings that allow cyber attackers to

infect databases and potentially take down an

organisation’s file servers are mostly initiated

by trusted employees.

Insider threats are much harder to detect and

potentially far more damaging financially and

reputationally than an external attack. Whether

malicious or simply negligent, workers need

access to sensitive information and systems to

do their jobs. As a result, if they accidentally or

choose to steal, their actions can do an

enormous amount of damage to a business.

Statistics show the extent of the risk posed

by insider threats. Accenture and HfS Research

state that 69% of enterprise security executives

have reported experiencing an attempted theft

or corruption of data by insiders during the last

12 months. According to The Ponemon Institute,

62% of business users report that they have

access to company data they probably

shouldn’t see, while the SANS Institute

observes that nearly a third of all organisations

still have no capability in place to either

prevent or deter an insider incident or attack.

In one study conducted by Gartner that

examined malicious insider incidents, 62%

involved employees looking to establish a

second stream of income by way of their

employers’ sensitive data, 29% stole

information on the way out of the door to help

future endeavours and 9% were saboteurs.

Defining insider attacks

Understanding what an insider attack is and

how it can happen will assist in reducing

exposure. Typically, an insider is usually a

trusted employee, student or contractor. It’s

someone who’s given a higher level of trust

than an outsider. This trust is usually

established through various formal and

informal processes, including references at the

employment stage and ‘earned’ trust as rapport

with the employee is built upon.

Recognising an ‘insider’ is the first step

towards classifying internal attacks.

Understanding what constitutes an insider

attack is the next one. Common attacks include

making an unintentional mistake, ignoring due

process and using ‘work arounds’ to access

information, trying to make a system do

something for which it wasn’t designed,

checking the system for weaknesses,

vulnerabilities or errors and acting with the

intention of causing harm.

To successfully protect a company’s

confidential information, its assets and current

controls need to be identified and assessed. For

The ‘Insider’ Threat

Colossal data breaches are fast becoming the ‘new normal’.

With each new incident invariably comes a feeble apology

‘for any inconvenience caused’. At best it’s embarrassing for

the company concerned, at worst the damage can be

catastrophic, often resulting in loss of reputation and profits

as well as law suits. Emma Shaw plots a path to safety for

today’s organisations

example, if a company stocks high value

equipment, thought will need to be given to its

location, accessibility, how it’s protected and so

on. Once the process of identification has been

completed, consideration then needs to be

given to who can access this information and

who’s responsible for controlling and updating

control measures in the future.

Key questions for consideration here are:

• Who genuinely needs access to sensitive

information and who can obtain this

information from another source?

• What controls are in place to limit access to

those who need it to carry out their job roles?

• How can you identify unauthorised access?

Traditionally, the security market has focused

more on preventing threats from entering the

network than on detecting and stopping data

from being exfiltrated. While preventing

infections undoubtedly remains important,

more resources are now being made available

to search for ‘Indicators of Compromise’ and

protect valuable data from exfiltration.

According to a recent survey by Vormetric,

89% of respondents (globally) felt that their

organisation was now more at risk from an

Emma Shaw MBA CSyP FSyI

FCMI: Managing Director of

Esoteric Ltd



The Insider Threat: Technical Surveillance Countermeasures

insider attack, while 34% felt very or extremely

vulnerable to one occurring. When asked about

who posed the biggest internal threat to

corporate data, 55% of respondents said

privileged users. Nine percentage points behind

on 46% were contractors and service providers,

with business partners rated at 43%.

The report goes on to say that databases, file

servers and the cloud hold the vast bulk of

sensitive data assets, but for many (38% of

respondents, in fact) mobile is perceived as a

high-risk area of concern.

Vormetric’s analysis states: ‘Senior

management concerns over privileged user

access have reached the top of their security

agendas. They now understand the damage

that a rogue user with admin rights can do and

they recognise that, if this type of user isn’t

properly monitored and controlled, the damage

to the business can be far-reaching. Also, if a

privileged user’s credentials are acquired by an

external attacker – as US investigators say was

the case when a hacker stole the credentials of

a system administrator at Sony and

orchestrated the recent high-profile data

breach – the opportunity to gain free access to

key information repositories or deploy malware

is likely to be extensive’.

How a company handles its information and

communications clearly becomes a contributor

to the risk exposure. A risk analysis covering all

forms of communication and information

storage should be conducted to analyse the

assets which the company possesses and

understand the scenario of possible threats in

order to ultimately produce an appropriate and

proportionate programme of countermeasures.

Emerging threats to organisations

Social engineering attacks, which rely on

human interaction and fraudulent behaviour,

have been growing significantly since 2011.

Preventative methods include limiting the areas

or meeting rooms where sensitive

conversations take place, and then

implementing sufficiently appropriate and

proportionate measures to protect these areas

as reasonably and cost-efficiently as possible,

based upon the threat and risk of espionage.

The appropriate solution may be derived

through a programme of technical surveillance

countermeasures (TSCM) surveys, the

installation of permanent countermeasure

“The potential loss and reputational damage that an

information breach might incur can far outweigh the cost of

implementing a proactive TSCM strategy”

solutions, the training of in-house security

personnel and awareness education for key

members of staff.

It’s also important to note that a TSCM survey

involves more than just an electronic ‘sweep’.

As well as locating and identifying hostile

electronic surveillance devices, an effective

TSCM programme is designed to detect

technical security hazards, physical security

weaknesses or security policy and procedural

inadequacies that would allow your premises to

be technically or physically penetrated.

Benefits of TSCM

• Prevention: The potential loss and

reputational damage that an information

breach might incur can far outweigh the cost of

implementing a proactive TSCM strategy.

Prevention is far better than cure

• Best Practice: Having a proactive TSCM

programme in place demonstrates a Best

Practice approach which will reassure Board

members, clients and stakeholders alike

• Corporate Compliance and Corporate Social

Responsibility: The duty to identify and manage

regulatory risk is a key requirement of today’s

Boards of Directors and a proactive TSCM

programme will assist organisations in

achieving compliance around the protection of

their information

• Enhancements to security: A TSCM

programme will detect and report on physical

security weaknesses or inadequacies that

would allow a given premises to be technically

or physically penetrated, thus enhancing the

overall security of the organisation

• Deterrent effect: Having overt countersurveillance

policies in place can act as a

deterrent to thieves and errant employees

• Peace of mind: A proactive TSCM programme

provides peace of mind that strategic

conversations and information will remain

confidential and allow the host organisation to

concentrate on ‘business as usual’

Overall business strategy

The risk of insider attack and its effects should

be an integral part of risk management and the

business strategy. Most insider attacks happen

due to a company’s focus on more obvious

forms of security breaches, without any

consideration around what’s required to protect

the company from internal threats.

To be productive, companies need to give

their employees freedom to work efficiently and

largely unhindered. However, within this the

operation and effective management of simple

security systems helps in protecting the overall

security of company assets.



Institute of Risk Management

Are your staff risk ready?

It is essential that your staff have a knowledge of the

principles and practices of effective risk management.

Enterprise Risk Management is designed to do just that.

What’s in it for employers?

> Managing risks effectively will

lower your costs.

> Turn threats to your business into


> Enhance business performance

and improve risk taking


> Develop a motivated, skilled and

knowledgeable team.

> Attract high-calibre professionals

by investing in personal


What’s in it for students?

> Enhance your ability to design

and implement effective risk

management strategies.

> Develop a critical understanding

of the relationship between

risk management, governance,

internal control and compliance.

> Gain an internationally


> Join our global network of risk

management practitioners.





Relevant for

All Sectors

Email: studentqueries@theirm.org

Phone: +44 (0)20 7709 4125

or visit www.theirm.org/risk-uk

Ransomware is a

constantly growing

threat and a highly

effective one.

Osterman research

from 2016 found that

ransomware was used

to target 54% of UK

organisations, with

more than half paying

the ransom. Of those

who didn’t pay, nearly

a third ended up

losing their data.

Wieland Age looks at

why defeating

ransomware is so

important in today’s

education sector

An Education on Ransomware

Last year, Locky spawned a file-encrypting

epidemic. Since then, it has become the

most prevalent ransomware on the planet.

Targeting universities among many other large

institutions, its continuous, pitch-perfect

campaigns demonstrate how organised crime is

digitising faster and more successfully than

many ‘legitimate’ enterprises.

This emergence of Locky, which represents a

new strain of ransomware, demonstrates just

how successful cyber criminals are becoming at

mastering the digital transformation agenda.

Locky’s creators invested significant time and

resources in product development, identifying

the best user interface, performance and

encryption security protocols. So much so, in

fact, that the FBI actually recommended victims

pay any demanded ransom in order to gain the

correct decryption code.

To support their programme, the criminals

even created a ‘Customer Help Centre’ to

handle sales and support. If victims have

problems decrypting their data, online ‘staff’

are on-hand via chat rooms to walk ‘customers’

through the process. This ensures that there

are no negative social media reports from

victims who, having paid up, are then unable to

regain access to their data files.

When it comes to propagating Locky, the

online criminals have done their homework. In

December, their latest phishing campaign

reached millions of victims in over 100

countries within days. Most start-ups would be

overwhelmed by such success, but the

distributors of Locky have created a highly

mature online infrastructure designed to

manage high volumes of payments and

enquiries – in multiple languages – from the

victims whom they target.

Education: an unlikely target?

IT professionals operating in educational

institutions have been slow to adopt

ransomware defences, perhaps because there

has been an unfounded misconception that

they’re unlikely to be targeted. If that used to

be the case, it’s certainly not true any more.

Bournemouth University was hit by no less than

21 ransomware attacks last year, while Los

Angeles College was recently forced to pay a

$28,000 ransom to unlock critical data and

systems following a ransomware attack. It’s

shocking, but not altogether uncommon. In

many ways, educational establishments are a

logical target for malicious attackers.

With whole campuses full of independent,

computer-based study being carried out by

students, these younger users could be

perceived to be less wary of suspicious e-mails,

attachments and websites. Compound this with

the fact that each one of these thousands of

pupils likely has multiple devices, all connected

to the institution’s network, and it’s easy to see

how hackers might view schools, colleges and

universities as low hanging fruit. Millions of

highly sensitive records, treasured works and

confidential details, combined with a very real

need to aintain their reputations as trusted

organisations, mean that educational

institutions are seen by many as easy pickings.

Education sector IT budgets don’t normally

include blank cheques for combating cyber

criminals, so investing in anti-ransomware

measures should be a priority for any

educational organisation wanting to avoid a

nasty and expensive surprise.

Fortunately, it’s possible to halt digital

attacks with a combination of the right security

measures and user awareness.

Raising awareness

Most ransomware attacks begin with an e-mail

containing malicious links or attachments.

Consequently, to reduce the likelihood of a

successful attack, it’s imperative to ensure staff

and students know all about the dangers of

ransomware, understand how to practise safe

computing and can recognise the indicators of

malicious e-mails. It’s also important to

maintain awareness by implementing a

programme of regular reminders.



Education Sector Safety and Security: Mitigating The Ransomware Threat

The three key messages that users should

take away from training are:

• Don’t open suspicious e-mails. Treat anything

‘out of the ordinary’ as a potential attack, even

when coming from a trusted source. If

possible, contact known senders separately to

confirm an e-mail is authentic before opening it

• learn to spot ‘red flags’ including poor

spelling/grammar in supposedly professional

e-mails, e-mails received at strange hours,

misspelled domains that look convincing

(A.Anderson@gmoil.com) and buttons and links

in the e-mail connecting to suspicious URLs. To

check this, hover the cursor over the link or

button and the URL will appear at the bottom

left of the window

• when in doubt, delete the communication

Secure your network

Effective user training can help to prevent many

attacks, but keeping the network free of

malware also requires a combination of

effective perimeter filtering, specially-designed

network architecture and the ability to detect

and eliminate resident malware that may

already be inside the host network.

Attackers can be prevented from entering the

network by a next generation firewall or e-mail

gateway solution that filters out most threats.

The best solutions will scan incoming traffic

using signature matching, advanced heuristics,

behavioural analysis and sandboxing and have

the ability to correlate findings with real-time

global threat intelligence.

When looking at the IT estate, make sure you

can control and segment network access to

minimise the spread of any threats that may

enter. Ensure that students can only spread

malware within their own limited domain, while

also segmenting. You might need to allow

admin staff, teachers and guests to each have

limited or specific access to online resources.

Start off with a clean slate. The existing

infrastructure likely contains a number of latent

threats. For their part, e-mail inboxes are full of

malicious attachments and links just waiting to

be clicked on. All applications – whether locally

hosted or cloud-based – must be regularly

scanned and patched for vulnerabilities.

Serious back-up plan

When a ransomware attack succeeds, critical

files – HR, payroll, grades, health records,

confidential student files, e-mail records and so

on – will be encrypted. The only way to obtain

the decryption key is to pay the ransom.

However, if you’ve been diligent enough

about implementing and correctly running a

back-up system, you can simply ignore the

“Some organisations may be committed to a legacy ‘onpremises’

back-up solution. If so, it’s worth starting the

planning phase to transition towards a cloud-based system”

ransom demand and restore your files from

your most recent back-up. Your attackers will

then have to find someone else to rob.

Automated, cloud-based back-up services

will provide the greatest security for data. For

budgetary or other reasons, some educational

organisations may be committed to a legacy,

‘on-premises’ back-up solution. If so, it’s worth

starting the planning phase to transition

towards a cloud-based system. In the

meantime, on-premises systems can be

configured to back-up files regularly

throughout the day. Admins should also be

extremely diligent about moving current backups

to a secure, off-site location every evening.

Many digital security experts believe that

ransomware is set to evolve and make up the

majority of cyber attacks in 2017. Given that the

pursuit of profit is the primary motivation for

most criminals, it’s perhaps not surprising that

ransomware’s popularity has continued to grow.

Simply put, ransomware is the easiest and

most effective way in which to extort money

from businesses of all sizes. Educational

institutions face this threat, as do banks,

hospitals, retailers and even Governments.

Future UK workforce

While the tips and tricks outlined here are

easily actionable as part of educational

organisations’ battles against ransomware, only

recently has there been a particular spotlight

on the digital skills of the nation’s children who

are growing to become young people within a

world dominated by IT and the Internet.

In March, the Communications Committee for

the House of Lords reported that learning

Internet safety should be a top educational

priority, alongside literacy and mathematics.

For his part, Lord Best issued recommendations

building on findings from the Children’s

Commissioner that “digital literacy should be

the fourth pillar of a child’s education alongside

reading, writing and mathematics and be

resourced and taught accordingly”.

Half of all law-breaking in the UK now

happens online and, while there’s little doubt

that children are indeed becoming increasingly

digitally literate, this House of Lords report

rightly points to the fact that the education

system isn’t yet equipping them with decent

enough levels of digital knowledge before they

leave school and form our next workforce.

Wieland Age:

General Manager (EMEA) at

Barracuda Networks



Educational facilities

should be safe, secure

and healthy

environments that

encourage learning

and development.

However, criminal

activity can

compromise these

principles and, in turn,

undermine the hard

work of both teachers

and students. Peter

Jackson examines the

security solutions that

can be put in place to

prevent harm from

being perpetrated

Security By The Book

Only recently, an ITV News story revealed

that pupils at a primary school in

Leicestershire missed the first day of the

new term after vandals broke in and caused

thousands of pounds worth of damage. The

wreckage ranged from broken windows to the

destruction of furniture and play equipment.

The latest reported statistics show that there

were 13,003 incidents of theft, burglary and

robbery reported in schools in England, Wales

and Northern Ireland in 2014, alongside 4,106

investigations into damage or acts of arson.

The price of repairing physical damage and

replacing stolen equipment can have a

significant bearing on a school’s budget.

Indeed, financial restraints in UK schools are a

big factor to consider when assessing the

importance of adequate physical perimeter

security. Recent announcements by Government

ministers suggest that 5% of council schools

and 4% of Academy Trusts have budget deficits,

with the general secretary of the National Union

of Teachers estimating that 92% of schools in

England could face real terms budget cuts over

the next four years.

In spite of these tight constraints, vandalism

in Scottish schools, for example, cost the

taxpayer over £1 million in repairs in 2015 and

at least £4.5 million over the past five years.

These unplanned costs will generally mean

that less money is available for important

considerations such as recruiting personnel or

improving building facilities and equipment.

There are also the non-financial impacts

associated with these crimes that must be

considered. The reputation of a given

establishment, a fear of safety among members

of staff, parents and students as well as the

disruption caused to learning can all have longterm

effects that may be hard to shake off.

Physical security

A large number of people flow through

educational sites on a daily basis making it a

difficult task to keep track of crowds at

particular locations. The lack of a formal

security strategy for schools, coupled with the

fact that we don’t employ security personnel at

school sites, means that the use of physical

security solutions including gates, fences and

turnstiles is recommended.

For maximum effectiveness, physical security

solutions should be supported by some means

of electronic security equipment such as access

control to effectively manage and limit

movement within a site.

Initiatives such as Secured by Design provide

several guidance documents that aim to reduce

crime in the built environment. The latest

advice to schools incorporates several new and

improved security standards that have been

developed to address emerging methods of

criminal attack. The guide advocates a clear

management and maintenance programme to

ensure the permanency of any measures

undertaken. Periodically assessing for risks and

implementing solutions where necessary is a

good way of making sure that a site is always

meeting its Health and Safety obligations.

Developing a detailed school security policy

that identifies the risks and puts controls in

place to minimise harm to staff, pupils and

visitors is vital. Procedures should also be in

place to prevent security and safety breaches

as well as to educate members of staff around

them always being ‘security aware’.

Having visible physical measures and

processes in place will help to protect against a

range of threats and vulnerabilities. Public

safety must remain at the top of the agenda to

ensure the health and well-being of all

individuals in and around the school site.

To this end, Building Regulations, Local

Authority permits, Health and Safety and fire

prevention requirements must be strictly

adhered to and observed at all times.

Planning the perimeter

To safely and effectively secure a school,

college or university site, careful planning of

the perimeter security is paramount.



Education Sector Safety and Security: Physical Security System Design

Educational facilities are often complex sites to

secure, playing host to multiple buildings (each

with their own access points), open spaces

between those buildings, play areas and sports

facilities as well as fields. Perimeter security

solutions therefore need to integrate with the

overall site architecture and, ultimately, aim to

control the movement of people and vehicles

through the use of solutions such as fences,

gates, bollards and barriers.

It may be worth thinking about creating

separate traffic routes for pedestrians and cars

to make sure members of the public are safe

during peak periods. A plan should also be put

in place during quieter times in order to

maintain a ‘security conscious’ approach.

Having an understanding of the land layout

surrounding the site perimeter and its uses is

also crucial as certain aspects may contribute

to or otherwise assist in the perimeter being

breached. By way of example, if the school or

college is the neighbour of a pallet production

company then the latter’s stock of pallets next

to any school fence makes it easy for would-be

intruders to use those pallets as a means of

gaining illegal entry to the premises.

Alongside the various regulations to follow,

consultation with local residents and

neighbouring businesses is a vital aspect to

think about as these parties can provide

additional support that may well assist in

preventing a perimeter breach.

When considering access points into and

around an educational facility, it’s particularly

important to understand and manage

permissions for staff and students entering the

site and prevent or control access for other

individuals wishing to enter. Having clear

signposting and designated areas for visitors

including parents, local authority employees

and suppliers, etc is key alongside

supplementary measures such as a reception

area or a sign-in procedure orchestrated to help

establish the authenticity of a particular visit.

If for any reason an entrance is used to

provide unrestricted access, it must be

monitored in person by a member of staff so as

to provide an initial deterrence.

Locking down entry points

With safety being the first priority, it may be

worth considering locking down all entry points

on the perimeter of a site during the day with

access managed via a staffed reception. When

combined with durable high security fencing,

such a policy can not only help in denying

potential criminals entry, but it can also prevent

pupils in primary and secondary school-level

education from leaving without permission.

Nowadays, most new schools are built in

urban areas whereas existing ones are being

bordered by new residential developments. In

these cases, it’s important to consider the

surrounding neighbours in regard to the noise

created during the school day.

Acoustic fencing is suitable for ameliorating

noise as it can be used to deflect external

sound away from a school site as well as

contain and absorb internal noises from high

impact areas such as playgrounds. These

solutions can work together to provide school

users and neighbours alike with the optimum

combination of privacy and security.

Sports fields and courts are another area

within the school site that may require some

defences in place to safeguard pupils and staff

from harm and protect buildings from damage.

Stray footballs, for example, can cause pain

and injury to unsuspecting members of the

public passing by and realise destruction in the

form of smashed windows. Installing suitable

fences and gates around these areas can help

when it comes to preventing such occurrences

from taking place.

Importance of aesthetics

Aesthetics is one more important factor.

Creating a pleasant and welcoming appearance

is a key element that helps with staff

recruitment and retention, and also increases

student productivity. Security solutions in

secondary schools that feature bespoke

elements such as incorporating the school’s

logo and colours are also ideal as they can help

develop a strong identity as well as a shared

sense of loyalty among students and staff.

Primary schools, on the other hand, rely

highly on bright colours and soft features in the

playground to engage and aid pupil interaction.

In this scenario, using timber fencing around

the perimeter may be much more beneficial as

it can be styled and decorated accordingly.

Ultimately, having the most appropriate

solutions in the right places will help in

creating a safe and secure teaching and

learning environment which also benefits the

local community. A good school security policy

can undoubtedly assist in reducing incidences

of anti-social behaviour, increase collaboration

and cohesion in neighbourhoods and make an

establishment more attractive to prospective

staff and students alike.

Peter Jackson:

CEO of Jacksons Fencing

“For maximum effectiveness, physical security solutions

should be supported by some means of electronic security

such as access control to manage and limit on-site movement”



What plans do you have for

emergency evacuation?

As detailed in the Equality Act (2010) places of employment,

So in the event of an emergency

can you evacuate the mobility

impaired safely?

The Evac+Chair is the World’s No.1

Emergency Stairway Evacuation Chair

0121 796 1427 FREE evacuation

assessment www.evacchair.co.uk

Are false fire alarms

disrupting your day?

We’ve got you covered!

Advanced models


with sounder

and weatherproofing

Minimise disruption and downtime caused by unwanted false fire alarms.

Protective covers prolong the life and reliability of vulnerable call points.

www.sti-emea.com info@sti-emea.com 01527 520 999

Access Control: Integrated Business Solutions for End Users

When’s the best time to upgrade your

access control solution? Many

businesses choose to follow the policy:

‘If it isn’t broken, don’t fix it’ but this can be a

risky approach in a world where technology and

the threats posed to today’s organisations are

changing so rapidly.

The use of older, legacy access control

systems exposes an organisation, a building, a

server room and/or computers to the

possibility of unauthorised access and the

myriad consequences that follow.

Access control technology is widely present

across many aspects of an organisation and

benefits both physical security and IT security.

With the advancements in smart phone, smart

card and biometric technologies, it’s now time

for organisations to start using these devices to

not only save on costs, but also to improve

upon the end user experience and simplify the

integration process of new biometric

technologies when they’re introduced.

Why, though, is now the best time for end

users to upgrade their systems?

Data privacy issues

One of the biggest drivers for updating legacy

access control systems is the need for

enhanced levels of data privacy. This could

come about through the on-boarding of a client

that requires high levels of security, new

legislation being brought in for specific

industries or even new building tenants.

The driver remains the same: data or the

building itself is in some way exposed to or at

risk and needs added protection. Put simply,

yesterday’s technology is no longer sufficient

for confronting today’s access control and

identity management challenges.

With data breaches dominating the

technology, security and indeed national

headlines, end users are fully aware that the

risk posed to organisations is evolving, while

the need to protect their physical assets – and

consequently data assets – is of vital

importance. The ‘IFSEC International Access

Control Report 2016: Legacy Infrastructure and

Motivations for Upgrading’ report highlights the

fact it would take a security breach that

exposed a flaw in the current system for 92% of

respondents to consider changing their current

access control system, but not beforehand.

On any site at any one time, in addition to

regular employees, there are also individuals

and groups on the premises (contractors, for

instance) who have access to various parts of

the location for short periods of time. In the

IFSEC report, 75% of respondents have third

party members on site on a regular basis.

Smart About Access

Technology advancements in trusted identities will create a

mixed technology environment with smart cards, mobile

devices, ‘wearables’, embedded chips and other ‘smart’

objects driving the transformation from legacy access control

systems. As Jaroslav Barton outlines, the shift to NFC,

Bluetooth Low Energy and advanced smart card technology

will be necessary to meet evolving business requirements

Integrated visitor management solutions in

modern access control systems significantly

improve the distribution and use of temporary

credentials, but also safeguard various parts of

the site when it comes to any unwarranted

access. Access control solutions, such as

mobile access or modern smart card

technology, make it that much easier for

facilities and security managers to track who’s

accessing what parts of the site to ensure

nobody’s in an area that they shouldn’t be.

End user convenience

The continual development in consumer

technology has spilled over into the business

world with devices now being used for work as

well as our personal lives. Bring Your Own

Device, mobiles and ‘wearables’ are all

common features of today’s office environment.

Organisations can use the growing level of

secure technologies that employees are

carrying around with them on a daily basis. In

place of several key cards or fobs that could be

lost, end users can instead employ smart

phones or smart devices – their closest pieces

of technology – for secure access control.

Jaroslav Barton: Product

Marketing Director for Physical

Access Control Solutions

(EMEA) at HID Global



Access Control: Integrated Business Solutions for End Users

In addition, advanced smart card technology

allows for a single smart card to provide

multiple access requirements on a secure

footing. Mobile access control is increasingly

pervading the market and, it must be said, the

benefits this brings are numerous.

Understanding the requirements from

building occupants is an important step before

undertaking an access control update. The

IFSEC International report notes that 48% of

respondents would like an easy-to-use access

control system, with 32% requesting multiple

levels of access depending on the degree of

authority required. This added security element

is clearly an important function, and one that

can be easily designated with more modern

technologies to hand.

Having mobile credentials that allow for

multiple access levels, for instance, saves end

users from the prospect of multiple access

control devices that could lead to confusion or

possibly misplacement. The IFSEC survey also

notes that 29% of respondents would like

future-proof technology. This can easily be

provided through mobile access solutions

which grant end users modern techniques for

access control, but also a single credential for

multiple access devices. Using smart phones is

a very straightforward solution that solves

three of the top concerns of employees looking

for updated access control.

One of the largest stumbling blocks to

updating an enterprise’s access control system

is the perceived disruption that the upgrade

itself will cause. 69% of respondents in the

IFSEC report believe that upgrading to a new

access control system would be disruptive to

their daily business, while 55% cite cost as the

biggest misgiving when it comes to upgrades.

Despite the perceived disruption, many sites

can be retrofitted using existing access control

hardware behind the scenes, with minimal

replacements needed to upgrade technologies.

Not having to start from scratch also helps to

significantly lower the costs of the operation,

making it a more cost-efficient venture with

minimal disruption to the host business.

Secure communication

A new access control solution must be flexible

such that end users don’t just see it as an

‘expensive way of opening doors’. Open

Supervised Device Protocol (OSDP) for secure

“Despite the perceived disruption, many sites can be retrofitted

using existing access control hardware behind the scenes, with

minimal replacements needed to upgrade technologies”

communication between field devices in a

physical access control system has gained in

importance, allowing for standardisation, more

flexibility and freedom of choice for security

and risk managers.

Flexibility also supports multiple applications

for managing not only physical access, but also

logical access applications, such as those

related to computers and software logins.

Additional access control systems – among

them secure print management – require an

associated card issued to users. This represents

a prime opportunity for organisations to

consolidate around a single access control

device, such as a contactless ‘wearable’ or

smart phone that combines access control with

other key functions.

By exploiting modern technology, such as

mobile devices, smart cards and ‘wearables’,

end users are afforded the opportunity to

simplify their access control devices: one

device with one credential providing access to

multiple areas and requirements.

It was found that nearly a quarter of

respondents to the IFSEC International survey

wish to manage multiple credentials across a

single device. With mobile access solutions,

multiple credentials are rolled into one and

stored on a lone device. The facilities or

security/risk manager is capable of controlling

access and distributing credentials to those

with the right security clearance.

Technology such as the latest high-frequency

access control systems ensure that security is

independent of hardware and media. This

makes it far easier for organisations to support

functionality and higher levels of data privacy.

Infrastructure security

Although there are clearly several perceived

barriers to the adoption of more sophisticated

access control systems, organisations are

placing an increased importance on

safeguarding their physical assets as this also

supports the protection of IT infrastructure.

This is mainly due to the belief that current

systems in place are adequate enough until

they’re proven to have failed, coupled with the

fact that a replacement system is perceived to

be an unnecessary expense.

Despite technological advancements, end

users are still content with cards and key fobs,

regardless of the lack of sophisticated security

and encryption contained in them when

compared with mobile access control solutions.

That said, the change to a more sophisticated

solution is likely to come from the employees

themselves, rather than the decision-makers at

the top of a given organisation.



4 July 2017

Hilton London Canary Wharf

Start your planning for 2018 at the Security IT Summit.

Meet with the most trusted solution providers, learn from industry thought leaders and connect with

peers over the course of the Summit, which is entirely FREE to attend for security professionals.

Topics covered include: Access Control • Anti-Virus Browser • Security Data • Theft/Loss • Malware

• Mobile Security • Network Security Management • Trojan Detection • UK Cyber Strategy

For more information and to register, please contact Liz Cowell on:

01992 374072 or l.cowell@forumevents.co.uk.





Fashioning The Building Blocks of

Construction Risk Management

agenda specifically designed to combat poor

payment practice and help SMEs continue to

operate. From my own point of view, it’s simply

unacceptable that large businesses are

withholding payment owed to smaller

companies. This initiative should help prevent

some of the 50,000 construction business

closures that occur every year.

Every business in

every sector that

tenders for work has

to weigh up the

potential risks versus

the potential rewards.

However, in the

construction industry,

it’s increasingly the

case that subcontractors,


known as Tier 2 and

Tier 3 contractors, are

being expected to take

a larger chunk of the

risk for a lower slice of

the reward. This is due

to the significant

challenges they’re

facing, as Carl Ghinn

observes in detail

As a business, we work closely with

contractors of all shapes and sizes, both in

the construction and M&E sectors. There

are several issues that they must factor-in when

addressing the delicate calculation between

risk and reward, among them the payment risk,

the pricing risk, the product availability risk and

the skills shortage risk.

One of the biggest risks facing Tier 2 and Tier

3 sub-contractors is cashflow. In a survey run

by the Specialist Engineering Contractors’

Group, it was revealed that the country’s top

contractors were owed over £1 billion in unpaid

bills from organisations within the public

sector, with sub-contractors bearing the brunt

of this, being owed at least £800 million.

Commenting on this matter, Rob Driscoll (an

advisor to the Cabinet Office) explained: “In

businesses of any size, late payment stifles

both investment and innovation. Our latest

survey of the market shows that far too many

public sector bodies are still ignoring the legal

requirement to enable prompt payment along

the supply chain.”

As of this month, large companies will have

to publicly report twice a year on their payment

practices and performance. The move is part of

the Conservative Government’s transparency

‘The Pricing Risk’

Price fluctuation is one of the major risks in the

construction world. During the tender process,

contractors are understandably expected to

cost every element. However, this is often for

projects that sometimes may not start for at

least another six months.

If their tender is accepted they will be held to

this price regardless of any marketplace

changes. Yes, in some cases prices do go down,

but in many instances they go up, leaving the

contractor with a much-reduced margin or even

a loss. As highlighted previously, these

payments are not always received quickly,

resulting in a considerably stunted cashflow.

Other industries have different and arguably

better approaches, among them the operation

of a cost-plus model, which effectively protects

the contractor while at the same time

promoting transparency.

Rising costs are a great concern for many of

our customers. According to the Construction

Products Association’s (CPA) latest Construction

Trade Survey, there has been an 88% increase

in raw materials costs for civil engineering

contractors in recent times. Rebecca Larkin,

senior economist at the CPA, stated: “While

Government has a role to play in providing

certainty for projects, the industry will need to

find ways in which to navigate rising costs.”

Sadly, this is having an effect on morale in

the sector. Brian Berry, CEO of the Federation of

Master Builders, commented: “The optimism

that we saw emanating from many firms in the

construction sector during most of 2016 has

now diminished because of growing concerns

about rising costs.”

Last October, the price of steel increased by

8%. This was a huge problem for some of our

customers but, as we follow the markets

closely, we had decided to bulk-buy a large

number of products before this increase. With

the additional benefit of our 60-day credit



Risk Management in the Construction Sector

terms, we were able to soften the blow for our

clients who may need those products within the

next six months, reducing the risk involved.

Product availability risk

When we visit our clients on site, the subject of

product availability often arises. It’s a constant

concern for many that products are not going to

be available when they’re needed, whether

that’s due to last-minute orders or changes in

legislation causing an increase in demand.

One example which affected our customers

was Amendment 3 to the 17th Edition of the

IET’s Wiring Regulations. The revision changed

how professional electricians and contractors

should install wiring in escape routes so as to

prevent them from becoming blocked by the

premature collapse of cabling installations.

As a result, the sole use of plastic fixings and

cable ties no longer complies with the Wiring

Regulations, so our customers are starting to

use stainless steel cable ties and concrete

screws instead. In the event of a fire, they’re

capable of withstanding temperatures of over

500°C, significantly reducing the risk of cable

installations collapsing and causing unwanted

blockages in escape routes.

Initially, we found that the changes brought

about by Amendment 3 took their time to filter

through to contractors on site. However, we’re

now seeing a change in approach. While we’ve

stocked these items for a number of years,

we’ve recently witnessed a 124% year-on-year

increase in stainless steel cable tie sales and a

198% year-on-year increase in concrete screw

sales. This is just one example of how a change

in legislation can dramatically increase the

demand for particular product types.

Another issue our customers face is the fact

that many manufacturers are based in the

Midlands, making it difficult for contractors in

London and the South East to procure large

quantities of stock on a swift basis.

Furthermore, companies working within the

capital often don’t have the capacity to store

stock on site and don’t want to tie up valuable

cashflow in large stockholdings.

In addition, our customers are often affected

by changes in construction schedules driven by

other contractors and may need products

quickly and unexpectedly. Solution suppliers

need to guarantee that 100% of core lines are

always in stock in order to help customers

avoid additional cost and penalties.

In all honesty, it’s also a good policy to let

customers cancel any order up to two hours

before without any charge by way of

acknowledgement that these changes are often

out of their hands.

“The optimism that we saw emanating from many firms in

the construction sector during most of 2016 has now

diminished because of growing concerns about rising costs”

Skills shortage risk

It’s no secret that there’s a skills shortage in the

construction industry which is causing untold

difficulties for many. According to Arcadis, in

order for the Government to meet its housing

targets, the UK needs to recruit up to 400,000

construction workers each year until 2021, with

London and the South East needing to recruit

110,000 individuals alone. That equates to

approximately one worker every 77 seconds.

As a weaker pound has already resulted in

large numbers of Eastern European workers

returning home, contractors are having to pay

their staff more money in order to keep them,

thereby risking further reductions in margins.

The Royal Institute of Chartered Surveyors

(RICS) estimates that, should a hard Brexit take

place, the UK could miss out on an additional

215,000 migrant workers by 2020. On that

basis, the RICS has called on the Government

to prioritise building workers for visas in order

to go some way towards mitigating this risk.

Jeremy Blackburn, head of UK policy at the

RICS, explained: “A simple first step would be

to ensure that construction professions feature

on the Shortage Occupations List. Ballet

dancers will not improve our infrastructure or

solve the housing crisis, yet their skills are

currently viewed as being essential.”

Mitigating risk

There’s no doubt that mitigating risk has played

a big part in shaping the way in which

construction sector companies and their

suppliers operate in this day and age. Many of

our clients consistently have to weigh up the

very real possibility of losing money for every

job upon which they embark. They face onerous

changes in legislation, not to mention

difficulties in procuring last-minute orders and

a looming skills shortage.

All of this is combined with increasingly tight

margins and a tendency by first tier players to

push all of the risk on to sub-contractors by

implementing severe penalties for failures –

such as failed deliveries or supply of the wrong

product – that may be outside of their control.

By working closely with a specialist supplier

who understands the challenges faced by the

business, organisations in the construction

sector can at least mitigate some of those risks,

thereby allowing them more time to focus on

the core business of the day.

Carl Ghinn:

Managing Director of Fixmart



Intelligent Prevention is the Future

Camera models

developed in the new

generation of HD IPbased



technologies are

offering end users

something more than

just better quality

images. Tristan Haage

examines the wider

impact of innovation

within this specialist

field and how it’s

actively helping to

solve more real world

problems in many

intelligent and

productive new ways



According to the latest statistics released by

the German Insurance Association, every

five minutes a fire starts at a company

facility somewhere in Germany. The resulting

financial damage amounts to several billion

Euros on an annual basis. The number of

burglaries within Germany has also

dramatically increased over the past five years

(by a figure of 30%, in fact).

Meanwhile, the crime-solving rate for

burglaries at commercial buildings and

factories is less than 20%. All of this clearly

illustrates how important burglary and fire

prevention really are in the real world. In terms

of that last point, for Germany read the UK.

Intelligent security solutions with video and

thermal technology not only help solve crimes

in the event that they do occur, but also help

prevent criminality from occurring in the first

place. Given the rise in property theft, costefficient

and effective security solutions have

become ubiquitous with more and more

companies deciding to use video technology to

monitor their buildings, systems and premises.

That’s not surprising, as the financial damage

caused by theft, vandalism or fire can be quite

significant for an organisation. Not only do such

events incur direct material damage, but they

can also negatively impact productivity and,

consequently, cause insurance premiums to

increase. This has led to a greater focus on

crime prevention in which developing video

technology can play a crucial role.

Conventional video cameras realise video

material that makes it easier to solve crimes,

provided that the image quality is good enough

and the recording process is fail-safe. However,

many of the video systems currently available

on the market and installed don’t actually meet

these minimum requirements for end users.

The end results they realise are often

insufficient for capturing the evidential quality

images needed by investigators. According to a

study last year by market analyst IHS Research,

the majority of cameras sold today still have a

maximum resolution of three megapixels. Many

models are limited due to the low-light

sensitivity of their image sensors, which results

in motion blurring under poor lighting.

Moreover, the quality of a camera system

isn’t only determined by the clarity of the

moving images it records during day and night,

but also by whether or not it’s fail-safe. A

number of factors play a role in this: the

robustness and reliability of the camera as well

as the option to record on the camera itself in

the event of a network failure such that vital

image data crucial to solving a crime isn’t lost.

As a result, this has energised newer video

surveillance systems that use a decentralised

model placing as much intelligence as possible

in each camera. In this way, image processing

and analysis can still be carried out without the

need for a central server or Control Room.

Intelligent video analysis

New decentralised cameras not only serve to

provide images, but are also equipped with

high-performance computing and intelligent

software applications that make the video

system more efficient, and notably so when it

comes to preventing crimes and subsequent

damage. This is because an intelligent camera

will only spring into action when truly

necessary by dint of smart motion detection

software and analytics that enable reliable

alarm management.

For example, if somebody enters the

company premises within a specified time

frame, a given camera automatically plays an

announcement over the loudspeaker and

switches on additional lighting to scare off

undesired visitors. The camera can also notify

selected employees or the presiding security

company via VoIP telephony or e-mail.

Particularly advanced systems use intelligent

camera software that allows moving objects to

be differentiated from one another by their size,

CCTV and Surveillance: HD Technology and IP Solutions

depending on their position in the image. Using

this kind of 3D motion detection reduces false

alarms caused by the movement of birds or

small animals, for example, as well as sources

of interference such as trees or camera poles

swaying in the wind.

This trend towards camera systems

possessing a higher degree of intelligence,

intelligent motion detection software and active

alarm management is essential for highperformance,

preventative security solutions

that can promptly communicate to help prevent

break-ins and other hazardous situations.

When it comes to crime, theft from

commercial sites happens more often at night

and over the course of a weekend. The hours of

darkness are perceived as offering some

protection against detection, and it’s here that

older video surveillance technologies are often

hampered by lower night-time light levels.

In response, the newer generation of

intelligent video security solutions are now

adding thermal imaging technology which

provides many additional advantages. Dual

cameras featuring an image sensor and a

thermal sensor can be used to securely detect

moving objects across long distances based on

their thermal radiation, even in total darkness.

While the thermal sensor reliably records

movements, the high megapixel image sensor

simultaneously provides crisp video footage in

which people and actions can be precisely

identified in each individual frame – an

important factor in investigating a crime. To aid

this process at night, an intelligent camera

system can switch on a light source during

motion detection to boost its ‘thermal eye’.

A dual camera with both an image and a

thermal sensor not only enables effective

building and perimeter protection, but also

helps to protect privacy, which is particularly

important in public areas such as swimming

pools, sporting facilities and hospitals. The

thermal image shows a temperature profile that

doesn’t allow individuals to be recognised in

detail. When configured to do so, the dual

camera system automatically switches from the

thermal image to the image sensor and records

a high-resolution video sequence as soon as an

individual moves in the surveilled area.

Process monitoring

The advantages extend beyond pure security as

video and thermal technology is increasingly

being used as a method of identifying

hazardous situations during production

processes. For example, in the food industry,

video cameras monitor processes for quality

control purposes and, within manufacturing,

“Robust, high-quality cameras that can withstand

temperature fluctuations and moisture are absolutely vital

for today’s busy production facilities”

detect the correct operation of machinery. The

cameras used for this are often high-resolution

hemispheric models with a 360-degree view in

addition to a digital zoom option.

Robust, high-quality cameras that can

withstand temperature fluctuations and

moisture, and which are designed without

moving parts to be practically maintenancefree,

are vital for busy production facilities.

Dual cameras that feature a specially

calibrated thermal radiometry sensor alongside

an image sensor can also monitor temperaturecritical

processes. The intelligence in these

systems is also necessary for preventing

damage through overheating or fire. In the

event that temperatures exceed or fall below

defined limits, as well as in the event of a rapid

increase in temperature, the system

automatically triggers an alarm.

When these systems are integrated within a

SCADA system for monitoring and controlling

production in a given environment, the process

can be stopped and a cooling procedure started

before damage occurs.

Return on investment

Considering the high cost of both security

issues and production losses, an investment in

high-quality video security solutions featuring

robust, fail-safe cameras with intelligent

software offers a significant long-term return.

This is because the intelligence in these

cameras, along with higher quality imagery, is

necessary for analysing the collected data,

recognising hazards and triggering actions

designed to protect against risks and prevent

financial loss through theft, vandalism or fire.

Intelligent camera systems incur fewer total

costs than a conventional video solution,

allowing pay-back within a short period of time.

One of the reasons why is because, as stated,

image processing and analysis take place on

the camera itself while recording on a network

storage device is carried out only in response to

events instead of permanently requiring data to

move to a centralised location for processing.

Additionally, the cameras can save data

internally in the event of a network failure.

For many organisations, prevention is the

future. When it comes to purchasing a video

security system, the benefits offered by

intelligent solutions are now becoming the

deciding factor rather than the retail cost.

Dr Tristan Haage:

Chief Sales Officer at MOBOTIX



Evaluating The Balance of Power

While space in a Data

Centre is key, so too is

ensuring business

continuity, efficiency

and productivity. This

is precisely why

Uninterruptible Power

Supply solutions will

become even more

vital in the

manufacturing sector,

and particularly so

given the advent of

Industry 4.0. Leo Craig

has the fine detail



According to a recent report compiled by

Tech Nation, the UK’s tech sector is

growing faster than the UK’s economy. In

fact, the UK leads in Europe, attracting £28

billion in tech investment since 2011 compared

to £11 billion in France and £9.3 billion in

Germany. The impact of this growth in tech is

being felt across many sectors, but none more

so than in the industrial sphere, where digital

manufacturing is becoming more commonplace.

Also referenced as the Fourth Industrial

Revolution, Industry 4.0 is set to transform the

manufacturing and production world through

new digital innovations which will improve

productivity. Industry 4.0 is all about the

current trend of automation and data exchange

in manufacturing technologies, encompassing

cyber-physical systems, the Internet of Things

and cloud computing.

At its core, Industry 4.0 creates what has

been called a ‘smart factory’. Within the

modular structured smart factories, cyberphysical

systems monitor physical processes,

create a virtual copy of the physical world and

make decentralised decisions. Across the

Internet of Things, cyber-physical systems

communicate and co-operate with each other

and with humans in real-time. Via the Internet

of Services, both internal and crossorganisational

services are offered and used by

participants of the value chain.

There are four design principles in Industry

4.0 that support companies in identifying and

implementing Industry 4.0 scenarios:

• Interoperability: The ability of machines,

devices, sensors and people to connect and

communicate with each other via the Internet of

Things or the Internet of People

• Information transparency: The ability of

information systems to create a virtual copy of

the physical world by enriching digital plant

models with sensor data. This requires the

aggregation of raw sensor data to higher-value

context information

• Technical assistance: First, the ability of

assistance systems to support humans by

aggregating and visualising information

comprehensibly for making informed decisions

and solving urgent problems on short notice.

Second, the ability of cyber-physical systems to

physically support humans by conducting a

range of tasks deemed to be unpleasant, too

exhausting or simply unsafe in nature

• Decentralised decisions: The ability of cyberphysical

systems to make decisions on their

own and perform their tasks as autonomously

as possible. Only in the case of exceptions,

interferences or conflicting goals are tasks then

delegated to a higher level

From the Industrial Internet of Things and

robotics through to 3D printing and Artificial

Intelligence, the digitisation of manufacturing

will inevitably increase the demand for Data

Centre storage. While space in a Data Centre is

key, so too is ensuring business continuity,

efficiency and productivity.

Disastrous consequences

Power fluctuations and disturbances can have a

major impact in the industrial sector. At a largescale

manufacturing plant, for example, a

power shutdown or breakdown in the supply of

monitoring/control information may engender a

disastrous effect on productivity which,

ultimately, could adversely impact the

business’ bottom line. Statistics show that even

one unplanned downtime event can cost a

manufacturer somewhere around £1.6 million,

but in truth the real cost could be even higher.

Having a back-up power supply in place in

the form of a UPS solution is absolutely key for

a facility to be able to operate safely until such

time that full power is restored.

Machinery is vulnerable to numerous

electrical anomalies, from voltage sags and

spikes through to harmonic distortion and

other interruptions. When you consider that

45% of equipment failures occur due to voltage

disturbances, the importance of keeping

Power Supply Continuity and Management

voltage stable and minimising instances of

downtime becomes abundantly clear.

In this situation, a UPS can really come into

its own to not only protect against power

outages, but also in terms of operating as an

effective power conditioning unit. It works by

smoothing out sags, surges and brownouts to

provide a clean and stable power supply.

Ultimately, this prevents damage to sensitive

and more often than not expensive electronic

equipment. A UPS needs to be in online mode

to give full protection against the ‘dirty’ power

that causes disruptions to Data Centre services.

It’s also possible to use a UPS solution solely

as a power conditioner without batteries.

Batteries can only be kept in environments up

to 40 degrees Celsius so this method allows a

UPS to operate in higher temperatures. For

example, offices next to heavy industry, such as

cranes moving cargo at docks, can be affected

by flickering lights. In this situation, a UPS may

be used as a power conditioner on the power

supply to prevent this from happening.

Maintenance considerations

Manufacturing equipment should be subject to

regular maintenance to help reduce instances

of downtime caused by malfunction. While

most manufacturers have a maintenance plan in

place for standard equipment, it’s also

important to consider the UPS equipment. In an

industrial scenario, you simply cannot afford for

your equipment to fail. In turn, the UPS

supporting this must be maintained as well.

Given that it’s an electrical device, a UPS can

and will go wrong at some point in its lifetime.

A maintenance plan not only affords the

business the peace of mind of having access to

technical expertise, but essentially saves the

host organisation money by ensuring that the

lifespan of technology is maximised.

UPS maintenance plans are designed to

provide more comprehensive cover than a

warranty as well as a guaranteed emergency

response time defined in working or clock

hours. For example, with certain plans the end

user can choose between Silver (12 working

hours), Gold (eight working hours) or Platinum

(same day, four clock hours) maintenance.

These are guaranteed response times.

Having a maintenance agreement in place

with a trusted technical expert also affords the

end user 24/7 service availability and access to

spares. Foremost suppliers will stock all spare

parts/components in strategically placed

warehouses combined with a stock holding at

headquarters where UPS solutions of up to 500

kVA can be ready for immediate dispatch

within 24 hours.

Maintenance agreements can also cover

regular preventative engineer visits, firmware

updates and fully comprehensive cover as well

as remote monitoring and diagnosis.

Agreements are available either in or out of

warranty, although be aware that the ‘out of

warranty’ costs can rise. Best Practice would be

to request a price from your UPS supplier for a

fixed price maintenance plan.

Manufacturing’s future

With such a high cost placed on downtime,

manufacturers cannot afford to ignore power

protection like UPS and the importance of a

good maintenance plan. Complex industrial

installations are critical and require an

exceptional level of resilience and reliability

under all operating and environmental

conditions. Having the right UPS in place will

not only afford the host business peace of mind

if machinery does fail, but will also realise the

added reassurance that instances of downtime

will be reduced.

In manufacturing, the UPS can also be

deployed as a frequency converter allowing

conversion between 50 Hz and 60 Hz. The input

of the UPS will accept anything from 48 Hz-52

Hz, while the output can be selected to either

50 Hz or 60 Hz. Combining an output of the UPS

with a step-down transformer simulates

American electrical supply conditions, which is

ideal for testing equipment that may be used in

export applications.

On the output side, the transformer must be

matched to the rating of the UPS. On the input

side, the transformer needs to be oversized in

order to cater for input power factors, battery

charging and operating losses. When using the

UPS as a frequency converter, the static bypass

facility will be inhibited.

The UPS is a clever device which also works

to constantly regulate the electricity supply and

gain precisely the voltage required. It works to

reduce the mains power supply of incoming

voltage such that it matches the electrical

voltage level required by equipment on site.

The output tolerance is normally 230 V, but

using the UPS it’s possible to set the voltage to

a specified amount, for example 215 V, 218 V.

Optimising the voltage for a given Data Centre

means that the host organisation will also be

maximising operational efficiencies.

Leo Craig:

General Manager of Riello UPS

“It’s very much the case that, at any large-scale

manufacturing plant, a power shutdown or breakdown in

the supply of monitoring or control information may

engender a disastrous effect on productivity”




Smart Solutions


Innovative and smart solutions can add value and benefits to

modern systems for customers. With the technological landscape

rapidly evolving, the Benchmark Smart Solutions project assesses

the potential on offer from system integration, advanced

connectivity and intelligent technology. Bringing together field trials

and assessments, proof of concept and real-world experience of

implementing smart solutions, it represents an essential resource

for all involved in innovative system design.

Launching in 2017, Benchmark Smart Solutions will be the industry’s only real-world resource for

security professionals who are intent on offering added value through the delivery of smarter solutions.


Partner Companies


Insurance Rewards for Managing Security Risks

There’s no doubt that insurance can be a

wise investment, and particularly so if a

business potentially faces threats from

episodes of terrorism or activism that could

result in substantial losses and disruption, even

in those instances where the business and its

assets may not have been the principal target

of an attack.

How, though, does an insurer determine an

appropriate premium for covering malevolent

acts and, importantly, how does the insured

party determine whether a premium offers

them good value for money?

In answering these questions it’s perhaps

important to recognise that the insurance

industry itself is highly competitive. This has

the effect of driving down margins across the

sector. Thanks to the Government-backed Pool

Re reinsurance scheme, affordable cover is

available even for acts of terrorism.

With most perils, a premium will be

established based on historic data and claims

trends. Such data provides insurers with

sufficient insight to be able to predict the likely

frequency and magnitude of claims for different

types of buildings and infrastructure. In the

case of terrorism, acts remain few and far

between, but can be catastrophic when they do

occur. In combination with a constantly

evolving modus operandi and changing target

preferences, this can make it difficult for an

insurer to accurately predict the likely value of

claims or to offer a different rate for cover of

one type of building over and above others.

That tends to lead to premiums driven mainly

by the desired level of cover – typically the

building value – and the building’s location.

Such a pricing approach doesn’t recognise or

reward an insured party’s investment in

protective security. From the perspective of the

insured, the insurer might be seen to be

benefiting from their investment, with the

insured paying twice to mitigate the same risk:

once for risk transfer (insurance) and again for

risk treatment (protective security).

However, from the insurer’s perspective, the

complexity of securing built assets against an

array of constantly changing threats means that

no security system could ever be 100%

effective. On that basis, if rewards are to be

offered, then those rewards need to be

determined based on the effectiveness of the

insured in terms of managing security risks.

Security capability

How does an insurer determine an insured

party’s security capability? First, it’s important

to recognise that they must look beyond the

physical and technical security and risk

SABRE: Incentivising

Good Security in the

Built Environment

Property protection insurance isn’t a legal necessity, but

without it a building owner is liable to pay for any damage

their property may suffer as the direct result of a security

incident. In addition, a business may lose income and might

even face legal action related to property damage or injury

through negligence if such negligence is proven in a Court of

Law. With this in mind, Gavin Jones outlines a new security

risk management standard for the built environment

management measures that have been

deployed at the premises. These components of

a security system tend to receive most

attention in any given survey of a facility simply

because they’re the most visible manifestations

of security investment. However, if these

systems were procured without due regard to

the facility’s security requirements, they may

well be ineffective and, it must be said, even

give a false sense of security.

Equally true is the fact that, if there’s no

ongoing review of performance and a

commitment to continual improvement, security

that’s effective one day may not be so the next.

When reviewing current industry

performance, it quickly transpires that those

organisations with effective security share a set

of common attributes. These organisations

have defined objectives, adopt a systematic

and risk-based approach towards safety and

Gavin Jones: Associate

Director (Security and

Resilience) at BRE Global



Insurance Rewards for Managing Security Risks

*For far too long, security has

been seen as a grudge

purchase, in the main due to

a lack of transparency in the

industry and an inability to

communicate to C-Level

decision-makers what they’re

receiving in return for their

monetary investment in

security measures. With

SABRE, we’re seeking to

shine a light on security.

We’re providing a robust and

consistent means by which

organisations can measure

performance and, in doing so,

facilitating improvement and

better value for money

We’re at the start of a long

journey, but we have a great

opportunity to deliver better

outcomes and reduced costs

and stimulate innovation

Insurers, insurance brokers

and building owners

interested in finding out more

about SABRE should access

the SABRE website

(www.bre.co.uk/sabre) or

contact BRE Global via e-mail

at: SABRE@bre.co.uk

security, employ competent persons at critical

intervals, monitor and evaluate ongoing

performance and actively seek to continually

improve their performance levels.

These are the attributes seen in management

systems which, for many years now, have been

used to deliver quality, sustainability and

Health and Safety. Furthermore, organisations

are increasingly seeking third party certification

to such systems in order to communicate their

performance in these areas.

Using these observations, the BRE Trust

funded a research project designed to assess

the feasibility of developing a security risk

management standard for the built

environment. More specifically, a standard that

can be used to improve security performance,

communicate security credentials to interested

parties, reduce procurement risk and,

ultimately, award an independent certification

of an organisation’s approach towards security.

The standard would need to respond to the

requirements of different stakeholders at the

various stages of a built asset’s procurement

and use, while at the same time recognising

that the familiarity of organisations with risk

management and management systems can

vary quite substantially.

Development of SABRE

That research resulted in the development of

SABRE which is assessor-led and can be readily

applied to either new or existing facilities.

Successful assessments result in third party

certification that’s recognised around the world.

The SABRE assessment process is led by an

independent SABRE assessor whose role is

essentially two-fold. First, they’ll verify

evidence against each of the 70 technical

issues covered by the scheme. Second, they

will undertake a scenario-based assessment of

current security risks based on the specific

attributes of a facility and its security.

The SABRE assessor will determine the

assessment score and the corresponding star

rating, with one star indicating an ‘Acceptable’

rating and five stars highlighting an

‘Outstanding’ score. If a given facility doesn’t

achieve the SABRE scheme’s minimum

standards, it will receive an ‘Unclassified’ rating

and not be eligible for certification.

In essence, these ratings provide insurers

with the ability to compare their customers’

“Following in the footsteps of BREEAM, the BRE’s highly

successful standard for sustainability, SABRE is assessorled

and can be applied to either new or existing facilities”

capabilities and commitments around security

and risk management. In addition to insurance

considerations, it can also be used within an

organisation to better understand priorities for

investment and identify improvement

opportunities across a portfolio of built assets.

The assessment of security risks will

highlight areas of vulnerability that should be

prioritised for investment and, equally so, those

areas where resources are potentially being

wasted and where existing or planned security

control offers poor cost benefit ratios.

By adopting a security-minded approach

towards planning and design, security risks can

be removed or reduced at lower cost using

integrated solutions. SABRE also recognises

and rewards the implementation of information

security controls that protect information

relating to a project and its security. This is an

increasingly important issue given the rapid

adoption of Building Information Modelling and

the increasing cyber threat.

Once a facility is occupied there are

significant opportunities to mitigate security

risks, even without further capital expenditure

on physical security. SABRE provides those

responsible for building and facility security

with a robust security risk management system

template, allowing measurement and

benchmarking of current performance and the

ability to demonstrate continual improvement.

Successful piloting

SABRE completed successful piloting and was

launched last December. Early adopters have

already welcomed SABRE, recognising the

benefits that a structured, risk-based approach

brings to security, in turn supporting design

quality and facilitating innovation.

Kevin Gausden, senior consultant at Arup,

explained: “We pride ourselves on providing

our clients with an holistic, whole-life security

and resilience consulting service. This new

SABRE certification means that we can offer our

clients greater transparency on spending and

reinforces the need for a structured, risk-based

approach to security. It affords our clients

further confidence, allows us to continually

adapt and provide innovative technologies and

solutions and absolutely reinforces the need for

early consideration of security issues.”

The BRE has initiated discussions with

property insurers to explain how SABRE

certification can be used as a robust and

consistent indicator for informing risk-based

pricing. With a view towards increasing the

overall uptake of SABRE and allowing for its

global delivery, the scheme will be delivered by

registered assessors.



Because one size

The most comprehensive

range of UPS yet.

Provides power protection to data

centres and telecommunications

systems, IT networks and other

critical systems.

• Multiple sizes

• Advanced communications

• Maximum reliability

and availability


0800 269 394


Examining The Myriad Security

Challenges Surrounding ‘Fake News’

The ‘fake news’

phenomenon presents

serious security

challenges for



communities and

individuals alike.

These challenges are

often complex

problems and, as

Alison Wakefield

rightly observes,

addressing them

requires sophisticated

solutions as well as

significant knowledge

and capability building

across both the

security community

and, indeed, the wider


The media has always carried a certain

amount of disinformation, some of which

may be seen simply as careless reporting

or gossip. However, in today’s technologydriven

media landscape, the problem is

magnified many times over. Propaganda and

disinformation need to be seen alongside forms

of cyber crime as representing another growing

‘cyber-enabled’ threat: activities that have been

so transformed by network technology that

they present Governments and organisations

alike with substantial security challenges.

Having played a significant role in the First

and Second World Wars, they’re now

recognised as a significant element of

contemporary ‘hybrid warfare’, as

demonstrated in Russia’s actions in the

Ukraine, being duly employed to undermine

confidence in national Governments and

manipulate democratic processes.

My interest in writing about this topic was

prompted by the welcome announcement at the

end of January of a House of Commons Select

Committee Inquiry on ‘fake news’ by the

Culture, Media and Sport Committee and a call

for written submissions. Respondents to the

inquiry are asked to consider fundamental

questions such as ‘What is ‘fake news’?’, ‘What

impact has ‘fake news’ on public understanding

of the world?’, ‘What responsibilities rest with

search engines and social media platforms?’

and ‘How might we educate people in how to

assess and use different sources of news?’

The Committee refers to growing public

mistrust in traditional news sources and a shift

towards the Internet and social media for

information, presenting a heightened risk that

the public are being fed untruths, particularly

so in light of concerns that the extent of ‘fake

news’ may have had a significant effect on the

democratic processes involved with the 2016

US Presidential Election.

The term ‘fake news’ is actually unhelpful as

it places a wide range of activities and story

types under a single heading. Misleading or

inaccurate journalism is a very different

challenge to a rumour about a publicly-listed

company spread by cyber criminals seeking to

make stock market gains, or a disinformation or

propaganda campaign perpetrated by a foreign

power or political grouping that fosters

political, religious or other unrest. Stories that

potentially fall under the ‘fake news’ umbrella

will, in practice, rest somewhere on a spectrum

of fakery, or perhaps a matrix in which the other

axis captures the level of intent to mislead or

the extent to which stories are true or untrue.

Notably, stories that are 100% false may

actually be easier to refute as being false, as

those that are only partially false may be more

effective in building on the truthful elements to

weave a more convincing lie.

Deliberate propaganda

Much of what’s currently being framed as ‘fake

news’ is in fact deliberate propaganda and

disinformation that needs to be recognised and

labelled as such. In the US, as stated ‘fake

news’ is said to have played a part in Donald

Trump’s election, and to have led to a shooting

at a Washington pizza restaurant.

With the French and German elections

approaching, Western European countries are

starting to respond to the challenge of anti-

Western disinformation from Russia, which has

long been an issue in Eastern and Central

Europe. The European Union’s East StratCom

Task Force was set up in 2015 to counter

Russian propaganda and disinformation,

recently reporting that it has found evidence of

a massive ‘fake news’ campaign targeting

European countries. In January. the Task Force

worked to correct a widely-shared false story



The Security Institute’s View

claiming that Germany’s oldest church had

been burned down by a mob of 1,000 Muslims.

In a report on Russian information warfare

published last year, Lucas and Pomerantsev

observe how the nature of online media, and

especially social media, allows propagandists

to play to audiences who are already

mistrustful of their own systems and seeking

information that confirms their biases,

identifying and exploiting ‘echo chambers’

where facts and fact-checkers have little effect.

Here in the UK, concern is building among

privacy campaigners and watchdogs about the

use of Big Data analytics for profiling citizens,

including for political purposes. Reports on the

strategy used by US data mining company

Cambridge Analytica as part of the presidential

campaign of Donald Trump and the referendum

campaign of Leave.eu give an insight into how

political messages can be tailored to individual

social media users through the data analytics

of online activity. This is likely to become a

common feature of political campaigning in the

future. As a society, we need to do more to

ensure that appropriate data protection

principles and safeguards are in place to keep

up with such technological advances.

Governments also need to take account of

the related problem that the credibility of

established media outlets such as the BBC is

increasingly being questioned and perhaps

actively compromised by wider political forces.

If this situation intensifies, where are we to turn

for trustworthy reports of incidents or events

that impact on our security?

Much of the responsibility for this rests with

politicians, as has been seen in the US, with the

risk of such behaviour spreading across our

own political system. We’re increasingly seeing

the label ‘fake news’ being misapplied to the

mainstream press in order to suit political

agendas. In the US, such efforts to undermine

the media recently extended to the exclusion of

news organisations like CNN and the BBC from

a White House press conference.

While it may be tempting for politicians to

exclaim ‘fake news’ in response to criticism,

this sets a dangerous precedent. Journalists

and editors need to protect their interests – as

well as the national interest – by proactively

challenging such misuses of the phrase.

Dealing with a crisis

In a recent article in Politico Magazine, the

point was made that President Trump’s alleged

attempts to discredit the press and scientific

community could later serve to undermine his

administration’s capability to deal with a major

crisis. Events such as the Ebola crisis require

evidence-based understandings of the

problems at hand, trust between partners

involved in responding to the crisis and

effective public information campaigns

orchestrated to communicate risk information

and advice to the public. If such elements are

lacking then the crisis response will inevitably

be seriously impaired.

Propaganda and disinformation themselves

belong on the registers of major risks to

national Governments and corporations as

threats to their strategic objectives, reputation

and continuity of operations. These activities

may undermine democratic systems or stir up

community sentiment on an issue to such a

degree that it boils over into civil disorder, and

so need to be included in emergency

preparedness strategies of scenario planning

and exercising. One of the underpinning

features of a crisis is the erosion of the

infrastructure (ie power, telecommunications

and transportation systems) on which a

response strategy is dependent. If trust in

public information is undermined, the capacity

to make judgements is equally impaired.

In the corporate world, the brand is often an

organisation’s biggest asset. Misinformation

presents significant reputational risks and may

be employed by competitors or cyber criminals

seeking to gain stock market advantages. Back

in 2013, a hacker posted a bogus tweet by the

Associated Press about an explosion at the

White House which led to over £90 billion being

temporarily erased from the US stock market.

Companies are typically alerted after the fact

when share prices are already moving. A recent

report produced by BrandProtect and The

Ponemon Institute concludes that the threats

posed to companies by online incidents and

cyber attacks falling outside of the traditional

corporate security perimeter are high, yet the

capabilities to mitigate them are low.

‘Fake news’ presents a further threat to

companies and individuals as a tool for social

engineering, itself a significant dimension of

cyber crime as discussed by James Scott in a

report for the Institute of Critical Infrastructure

Technology. This type of threat sees both ‘fake

news’ and real news being ‘weaponised’, with

trending stories and sensational headlines

being used to draw people’s attention. Lures

range from the very basic to the highly tailored,

based on individuals’ social media activity.

Dr Alison Wakefield FSyI:

Vice-Chairman of The Security

Institute and Senior Lecturer in

Security Risk Management at

the University of Portsmouth

“Much of what’s currently being framed as ‘fake news’ is

in fact deliberate propaganda and disinformation that

needs to be recognised and labelled as such”



Female Business Travel Risk:

A Need for Special Treatment?

Business travellers will

always face a degree

of risk, and

particularly so when

venturing into an


environment where

most individuals

speak another

language and have

different customs. An

increasing number of

today’s organisations

realise they can lessen

or avoid prohibitive

legal and/or financial

consequences by

proactively working

ahead of time to

reduce employee risks

during trips overseas.

Darren Carter delves

into the fine detail

Darren Carter: Head of Group

Security at Edwardian Hotels

London and Hotel Sector

Security Lead for ASIS UK

Despite the ever-present – and seemingly

increased – risk posed to business

travellers in today’s world, we continue to

see a vast amount of business travel taking

place right across the globe. Recent research

suggests that the proportion of those business

travellers who are female is now as high as

45%-50%: a direct correlation with the

increasing numbers of female executives

appointed into senior management roles.

On that note, I was recently invited to take

part in a panel discussion about this very

subject. The discussion was observed by a

varied audience of experts and interested

parties, among them travel managers, safety

and security managers and hotel and travel

agency staff. The premise for the discussion

was ‘Safeguarding Female Business Travellers’

and whether enough is being done to meet the

safety and security needs of that cohort.

Is there really a strong case to be made for

any ‘special treatment’ of females when, in

2017, most large companies will have gender

equality placed very highly among the key

‘must achieve’ tasks?

Two decades ago, when I first entered the

world of hotel security operations, we were

talking about female business traveller security

at that very juncture, so this isn’t by any means

an emerging subject. The discussion we held

during this latest gathering was in fact very

insightful and clearly demonstrated – at least in

my own mind – that there may well be a case

for special arrangements to be made that meet

both specific and defined needs.

More generally, travel risk for any category of

traveller has shifted significantly in the past

ten-to-15 years in particular. The completely

unpredictable nature of terrorism and rapidly

changing environmental conditions affecting

the travel and transport industry alone are two

areas where an impact can be felt.

As companies examine areas in which they

could potentially trim their costs, travel can

often suffer with significant reductions in

budgets. In some cases, this may considerably

alter the risk profile of a given business trip.

Is travel necessary?

In many respects, the question should be asked

as to whether the need for travel is absolutely

necessary. Indeed, even where there’s no

pressure being placed on budgets, this should

be the first question to be posed when

considering any business excursions.

Placing a rate cap on hotel accommodation

can often introduce further elements of

increased risk whereby there may be inferior

safety and security facilities at the chosen

property, in addition to less ably-equipped

staff. The area in which the hotel resides could

make it more susceptible to crime.

Where can hotels begin to customise their

business? How about tailor-made services for

female business travellers? Should the

arrangements made here be any different than

those chosen for other female or male guests?

Not for the first time, it was suggested that

hotels consider offering a ‘female only’ floor: an

area of a hotel completely off limits to male

guests, exclusively booked for ‘women only’

business travellers. I’m not entirely comfortable

with this concept. It feels a little odd to

completely isolate a group of people from the

rest of the hotel population. If it were the case

that guests occupying this class of room found

themselves in trouble, there would be no male

guests nearby who may come to their aid.

Commercially, such a scenario would be

almost impossible to deliver, both in terms of

honouring a brand promise or maximising

revenue returns. If a hotel had completely sold

out of its inventory with the exception of this

standard of room then it would most definitely

be sold to the first applicant who could well be

a male guest. Back in 2014, a Danish hotel was

found by a Court of Law to have discriminated

when it opened with a ‘female only’ floor offer.

CCTV and access control

From a safety and security perspective, such a

concept wouldn’t offer anything more than a

standard hotel bedroom. Most hotels will now

provide guests with key card access control to

lifts and bedroom corridors, alongside an

almost blanket coverage of CCTV throughout all

guest areas. If there were enhanced levels of

safety and security realised as part of this

‘upgraded’ room type, it would ask some fairly

challenging questions in times where guests in

other rooms become aware – or, worse still, are

an actual victim – of an act of criminality.

Most upscale hotel businesses will have a

constant product development programme in



In the Spotlight: ASIS International UK Chapter

place which reaches for competitive advantages

over peer groups in what’s an extremely

dynamic and ever-changing market. Safety and

security are featured prominently in the design

process, building environments which are

appealing and functional, but also as safe and

secure as possible. Procedures are then

constructed around them to further support

that environment.

The mere mention of a hotel room number at

the check-in desk could compromise the safety

of a lone female business traveller. Procedures

are in place to ensure no room numbers are

mentioned at all to any guest when checking in

to a hotel. This is common practice, although

not 100% observed in my experience.

In addition, there are a number of other areas

within a hotel operation where we constantly

strive to minimise risk and promote safer and

more secure businesses.

There are many people involved in the endto-end

process of planning for business travel.

Each individual will have made decisions which

may either provide for a problem-free safe

journey or lead to serious – and potentially lifethreatening

– situations arising.

The victims of crime – which may involve a

phone snatch or a bag theft – will often say that

the episode “came out of the blue” or

“happened so quickly”. Invariably, if we can

analyse such incidents a little further, we often

see a series of events or clear indicators that

the crime could – or was about to – happen. In

truth, it’s often lack of awareness which leads

to someone being targeted by a criminal.

Unprepared for travel

Often, it’s the case that individuals are

completely unprepared when they travel. Only

when they run into problems is this ever

identified. It’s a little like travelling without

insurance: it’s unthinkable in today’s world that

anyone would even consider this. As hoteliers,

we provide help and support to our guests,

even more so when they’re experiencing a time

of crisis, when they’re the victim of a crime, a

serious injury or a bereavement or even if

they’re just simply having a bad day.

A common and often surprising fact is how

little capacity a business traveller will have to

manage the situation in which they find

themselves. Often, we can and do resolve a

multitude of issues. What this does say is that

the individual’s employer may not be

adequately preparing them for travel, the

employee may not be listening or the advice

being given is wrong or not extensive enough.

Continuing this theme, I would strongly

encourage all visitors to a hotel to make use of

the in-room safe. It’s there to provide added

security. At the very least it may delay access to

a ‘would be’ burglar or even prevent the theft of

valuable property and travel documents.

Preparing employees to be able to deal with

a range of predictable situations in the

workplace is, of course, the responsibility of

their employer, whether for travel purposes or

otherwise. Business travel introduces a

dramatic uplift in risk, whereupon an employee

is exposed to a much greater selection of

scenarios. Without doubt, it’s the responsibility

of the individual to ensure that he or she is

ready for travel, fully-briefed and absolutely

comfortable with the information provided. If

not, they should challenge it or otherwise seek

alternative advice or guidance, only travelling

when totally satisfied.

What was abundantly clear at the recent

panel discussion is that there’s a detailed

debate to be had about the future of travel

security in general, and not just for female

business travellers. It’s always right and proper

to question whether the advanced planning in

place is as good as it can possibly be.

“There are many people involved in the end-to-end process

of planning business travel. Each individual will have made

decisions which may either provide for a problem-free safe

journey or potentially lead to serious situations arising”



Right now, there’s a

lack of skilled fire

alarm technicians,

with very few young

people entering the

industry. Companies

left, right and centre

are struggling to hire

and keep hold of more


technicians, with

others simply jostling

for that one extra

cherry on the top of

the cake that might tip

the balance in their

favour and pull in

more customers.

Martin Duggan

considers the shape of

a formal qualification

in fire detection and

alarm systems



Fire Detection and Alarm Systems:

Envisioning a Formal Qualification

There’s so much talk about the need for a

formal qualification in fire detection and

alarm systems, but to date no-one has

actually considered in any great depth what

such a qualification might look like. Certainly,

with so many different job roles, there are many

areas that need to be covered.

Think about it for a moment. What does a fire

alarm maintenance technician need to know

when compared to a system designer? What

about an installer or a commissioning

technician? These are all different areas of

expertise with a significant amount of overlap,

yet also with a different knowledge requirement

for each job function. Is it feasible to have a

‘one-size-fits-all’ approach to fire detection and

alarm systems? What would each person in

each job role need to know?

I’m glad to say that, after receiving the

results from a survey we sent out to our

members, we now have a much clearer insight

in terms of the answers to these questions.

We also held a ‘Voice of the Customer’ Day,

where Fire Industry Association (FIA) members

were invited to tell us what areas would need

to be covered for each job role. In addition,

members also considered the lack of a defined

career path for those joining the fire industry.

The results of the survey state what the top

areas of learning would need to be for each job

role, while the ‘Voice of the Customer’ Day

allowed FIA members to air their opinions and

suggest paths of study for times ahead.

The Maintenance Technician

No less than 15 topic areas were revealed to be

important in this job role. A basic grounding in

electronics may be needed. Unfortunately, this

isn’t a required subject at school so those

joining the industry don’t always have firsthand

knowledge. 98% of those surveyed stated

that understanding BS 5839 is necessary.

No surprise there, but a qualification would

have to afford a solid foundation in the whole

standard, as well as cover the maintenance

standards in greater detail. Other areas such as

waste management, communication and sales

skills, simple design principles and knowledge

of BS 6266 Fire Protection for Electronic

Equipment were also duly highlighted.

Additionally, other areas that are not covered

by current training were pointed out by

members at the ‘Voice of the Customer’ Day,

with 87% stating that the Health & Safety at

Work Act is particularly important.

The survey also revealed some other topics

of note: documentation/certification (91% of

respondents said this would be required),

testing methodology (90%), fire detection and

alarm technology (75%) and a strong grounding

in current fire legislation such as the Fire

(Scotland) Act and the Regulatory Reform (Fire

Safety Order) 2005 (67%).

The Installation Technician

The ‘Voice of the Customer’ Day revealed some

useful insight, namely that it shouldn’t be a

requirement to be a maintenance technician

prior to being an installation technician. In fact,

it was revealed that installers often moved into

maintenance at a later stage. As such, the level

of knowledge should still be high, but with less

topic areas required.

For the system installer, eight topic areas

were compiled compared to the 15 topic areas

for the maintenance technician. Again, no

surprises here. The survey revealed that 96%

voted for a broader understanding of BS 5839

to be required, as well as a focus upon the

installation and testing standards, which many

feel ought to be covered in greater detail.

No less than 88% of respondents felt that the

Health & Safety at Work Act is important.

Members attending the ‘Voice of the Customer’

Day confirmed this belief, stating that an

awareness of asbestos and working at height

would be necessary. As is the case for the

maintenance technician, a need to cover system

documentation and certification is also going to

be necessary in any qualification for this role.

Other areas included electrical competency

(77% of survey participants said this was

important), understanding BS 76761 17th

Edition (67%), understanding current

legislation (58%) and a comprehension of the

Building Regulations (56%).

In order to be completely up-to-date with

present technology, electrical competency

should also cover in some depth subjects such

as electronic principles and data

communications, possibly as separate areas.

“Communications are changing,” was the

opinion of one survey respondent. “Installation

engineers in our sector need to have an idea of

IT infrastructure and data connections such as

Ethernet/fibre optics.”

FIA Technical Briefing: Fire Detection and Alarm Systems

The System Designer

The role of the system designer was assumed

to be a much more advanced position by the

group of professionals present at the ‘Voice of

the Customer’ Day – not just in terms of

standards relating to fire safety systems, but

also in view of current legislation, present fire

guidance and the Building Regulations.

A system designer needs to know a lot more

than an installer or maintainer and, as such, the

amount of study required would be

considerably more. 90% of respondents to the

survey suggested that understanding building

design was essential to the role, alongside 83%

stating that understanding the Building

Regulations is important.

Clearly, a working knowledge of the built

environment is vital to the role and, as such,

would need to be studied.

There were also many other additional skills

mentioned, such as an ability to use and

understand Computer-Aided Design, an

understanding of the Equality Act and a need

for ‘soft skills’ around the subjects of

communications, sales and Health and Safety.

A formal qualification for this career path

would need to cover a wide range of areas and

be robust enough to afford the designer a

starting point for his or her future projects.

The Commissioning Engineer

There were a number of different opinions

expressed about whether a commissioning

engineer would have been an installer or a

maintainer prior to becoming a commissioning

engineer. Those at the ‘Voice of the Customer’

Day felt that this would not be a job role taken

upon entering the industry. Most individuals

would have been a maintenance technician or a

systems installer at some point beforehand.

Skills for this role are likely to be similar to

the maintenance technician or installer, but

with a few slight differences. The results of the

survey were very clear: 100% of respondents

said the BS 5839 commissioning standards

would be required, 95% felt that there was a

need to have a foundation level understanding

of the whole of BS 5839, 94% thought faultfinding

was a necessary skill and 87% felt that

false alarm management and simple design

principles respectively were important. Another

80% wanted their commissioning technician to

have instructional techniques.

At 62%, electronic knowledge here wasn’t

seen as being quite so vital, but is still deemed

more important to the commissioning

technician than the maintenance technician.

Looking to the future

The future of the fire safety industry certainly

does seem to hinge on the need for those

working in the realm of fire detection and alarm

systems to be more comprehensively educated.

There also needs to be a pathway for new

people to join the industry.

While the new ‘Trailblazer’ apprenticeship

scheme represents a great start for those

joining straight from school, there’s still a huge

need for those already of working age to find a

way in which to join the industry – and the only

real way is through a qualification.

A formal qualification is something that the

industry both desires and needs. A blanket

‘one-size-fits-all’ qualification isn’t going to be

sufficient for the fire industry – we need one for

each of the different disciplines within the fire

alarm and detection sector, since being a

designer is so different from the role of a

maintainer or installer (and so on).

A formal qualification might be just the thing

to open the door to a bright new future, but it’s

up to the industry itself to walk through it.

Martin Duggan:

General Manager of the Fire

Industry Association

“The results of the survey state what the top areas of learning would need

to be for each job role, while the ‘Voice of the Customer’ Day allowed FIA

members to air their opinions on paths of study for the immediate future”



Examining The Changing Face of The

Private Security Industry in 2017

The security landscape

is still in transition,

but there are clear

trends developing, the

origins of which date

back to two significant

incidents in 2001 and

2008. Paul Harvey

recounts those events

and what has

happened since,


outlining today’s

security model and

where it could – and

should – be heading in

2017 and beyond



The terrorist attacks in New York on

September 11 2001 and the resulting

responses had a significant impact across

the globe. That’s still true today. The world has

also recently witnessed a concerning increase

in global terrorism with horrific episodes in

Nice, Paris, Brussels and Germany.

Second, the Lehman Brothers bankruptcy in

2008, predominantly due to its involvement in

the subprime mortgage crisis, is considered to

have played a major role in the unfolding of the

global financial crisis during the late-2000s.

The UK security market wasn’t (and isn’t)

immune from the effects of global financial

instability. As a predominantly labour-based

business, the guarding sector in particular

requires large amounts of working capital. As

payments to the supply chain slowed, with – in

the more extreme cases – clients becoming

insolvent and leaving significant debt, the

financial pressure increased for many

companies. Banks were unable or sometimes

unwilling to support businesses of varying sizes

and some security companies failed. This

wasn’t necessarily related to profitability. It was

often purely as a result of cashflow.

Clients experienced downturns and,

inevitably, expenditure was reviewed. Often an

expensive purchase with no clear way of

demonstrating its value, security was analysed

with the intention of reducing or eliminating

cost. With pay rates largely set and the TUPE

Regulations protecting employees’ Terms and

Conditions, indirect overheads and margin

became the battleground for reducing charges.

Companies fighting for survival didn’t have the

luxury of considering the longer term. The need

to retain or secure new business became

critical. If you cannot differentiate on service,

then service-buying clients predominantly

select on price.

Thus the environment was created that

impacts us today. We hear of complaints about

low margins, but many businesses continue to

compete on price, often with unsustainably low

margins. The industry must hold itself to

account. The sector – and individual companies

within it – hasn’t been bold enough to stand up

and say ‘enough is enough’ and follow this

through with determined courses of action.

Legislative framework

The legislative framework for operation hasn’t

changed. There appears little appetite from the

Government to push forward with the proposed

agenda of compulsory business licensing. Nor

does there seem to be significant progression

in the Security Industry Authority’s Approved

Contractor Scheme. To be frank, then, it’s

incumbent upon service providers themselves

to be the agents of change.

Aside from the ongoing increase in statutory

areas such as pensions, the big agenda item for

2017 is the incoming Apprenticeship Levy.

Although companies will be required to

contribute to the scheme, at present there’s no

security guarding-specific apprenticeship.

Furthermore, there’s currently no provision for a

replacement to the City and Guilds scheme that

has been in place previously. There are

discussions around which organisation will be

the provider moving forwards, but as yet there

have been no takers. This means that there’s no

course – or training – in place for the money to

be spent which, given the amount of funding

this relates to, is quite simply staggering.

Apprenticeships have existed for a long time

in other sectors such as CCTV engineering.

Another case of a reactive sector, then?

According to the Infologue.com listings, the

Top 20 security companies (based on turnover)

control 71% of the UK market. Forward-thinking

companies are taking the opportunity to be

disruptive or find a niche that offers greater

success and, potentially, profitability. As a

result, 2017 will be a year in which the UK

Security Services: Best Practice Casebook

security market begins to benefit from the

platform created as it moves into the next

logical phase of the industry’s future.

The demand for change is being fuelled by

increasing levels of expectation and a

requirement for flexibility in service provision

called for by today’s discerning clients. Key

transformations are beginning to emerge,

namely specialism and expertise.

Specialism and expertise

First, there are the large-scale, national and/or

multinational businesses. They offer a wide

range of security and facility services, and are

predominantly (although not exclusively)

focused on high value and potentially multiservice

contracts. There’s a clear demand for

this capability. Competitors simply don’t have

the capability or scalability to compete, and nor

should they attempt to do so.

Second, there are organisations that will

continue to focus on specialist services, skills,

clients, contract sizes and geographies, etc.

These businesses truly understand their core

role and continue to be selective in how they

target growth and assess their value

proposition. Our own organisation falls into this

category. We’re focused on the central London

market. We know full well that our model

doesn’t fit everyone and we fully understand

our capability. We’re aware, for example, that

we don’t have the infrastructure to deliver

national accounts with multiple low value

contracts, so we don’t try to do so.

Third, the area where it’s possible to see

accelerated development in 2017, and which to

some degree is the most interesting, is that of

collaborative business partnerships

incorporating convergence and the alignment of

operational and security strategies.

Security suppliers with specific expertise will

be working collaboratively to deliver highperforming,

flexible and complimentary

solutions. The convergence of physical and

cyber security delivers improved information

sharing on risks and can result in synergies and

more effective leveraging of resources.

Convergence can provide the benefit of

comprehensive capability, but with no dilution

in expertise. Individual solution providers will

heighten their knowledge and competencies. In

most cases, there’s a clear lead on provision.

To position this, security is – and should only

ever be – a supporting functionality that’s there

to enable a client’s core business. Many

business operations typically work in separate

silos and use different information and tools.

This can lead to overlapping processes and

higher costs. To alleviate inefficiencies, there

will be a move towards integrating operational

and security risk management.

Integrating disciplines

Often, organisations manage operational risk

and security risk separately. This incorporates

areas such as threat and vulnerability

management and continuous monitoring as

well as incident management.

Security risk management isn’t just about

security operations, but rather a bottom-up

approach that drives ‘actionability’ against

threats, vulnerabilities and incidents in order to

provide assurances for businesses.

While separating both operational and

security risk management has been a common

practice, dynamic changes in the threat

landscape are forcing organisations to integrate

the two disciplines and therefore gain a more

holistic view of risk. The unfortunate truth is

that one can schedule an audit, but one cannot

schedule an attack, in any of its various forms.

In light of this, an integrated approach to risk

that takes compliance, threats and

vulnerabilities as well as business impact into

account will become Best Practice. Without a

clear understanding of the business criticality

that an asset represents, an organisation is

unable to prioritise its efforts. A risk-driven

approach addresses both security and business

impact to increase operational efficiencies,

improve assessment accuracy, reduce attacks

and enhance investment decision-making.

The transition from the traditional

client/contractor relationship into genuine

partner and trusted advisor, and a compliancedriven

approach to a risk-based model, enables

businesses to evaluate the ongoing definition,

remediation and analysis of their risk.

Remote access is an increasing risk, and

indeed for many organisations has become

their key security focus. Furthermore, the

insider threat remains a concern given the

deluge of interconnected devices available.

Looking ahead, the industry will continue to

be subject to evolution rather than revolution in

the short term, but the pace and appetite for

change is increasing. If you look closely

enough, business models are becoming more

specific, technically competent and

sophisticated. This is a critical factor for

success when it comes to corporate stability.

Paul Harvey:

Commercial Director of

Ultimate Security Services

“There appears little appetite from the Government to push

forward with the proposed agenda of compulsory business

licensing. Nor does there seem to be significant

progression in the SIA’s Approved Contractor Scheme”



Open Source Software: Risk Management

Designed to Combat the Vulnerabilities

Software has

transformed the way

in which we work and

live and is missioncritical

to an everincreasing

number of

organisations. Open

source is the

foundation of modern

applications, often

comprising as much as

90% of application

code. Gartner reports

that over 80% of

cyber attacks are

directed at

applications. With

open source

vulnerabilities often

exposing software to

security breaches,

Chris Fearon asserts

why open source risk

management is now a

‘must’ for businesses



Open source software is a vital component

in application development worldwide,

with open source components comprising

50% or more of many applications. Indeed, a

recent Forrester report takes those numbers

one step further, claiming that to address the

demand for more and better applications and

accelerate application development, developers

now regularly “use open source components as

their foundation, creating applications using

only 10%-20% new code.”

Obviously, the benefits of open source

software are hard to ignore. Businesses are

geared towards driving revenues with pressures

increasing on development teams to deliver.

With quicker lead times for development and

the competitive nature of applications, the use

of open source is an absolute requirement.

Even if they know that open source is a key

part of their firm’s success, some executives –

even those resident inside the IT Department –

might be surprised to find how much their

business’ solutions depend on open source and

how much open source they use to deliver

within a continuous integration environment

and on a continuous release schedule.

We regularly undertake code audits of

proprietary applications, often as part of

merger and acquisition activities. As part of

their due diligence, buyers need to ensure that

any software they’re acquiring as part of a

merger doesn’t also bring with it an

unacceptable level of risk or create Intellectual

Property issues. Firms may undertake static

and dynamic testing of code, but those tests

rarely identify potential open source issues.

Last year, we reviewed 200 business

applications for a report later issued under the

title ‘The State of Open Source Security in

Commercial Applications’. No less than 95% of

the applications we examined contained open

source components of some kind. The average

number of open source components we found

in each application was 105. Nearly 70% of the

applications had vulnerabilities in those open

source components, while 40% of the noted

vulnerabilities were rated as ‘Severe’.

More surprising was the fact that the average

age of the vulnerabilities was 1,894 days. In

other words, there’s a high likelihood of

vulnerabilities in many applications for which

potential attackers have had plenty of time to

develop exploits. Indeed, 10% of the

applications we reviewed in 2016 were still

vulnerable to the infamous Heartbleed bug in

the OpenSSL cryptographic library some two

years after this vulnerability was first disclosed.

Unique security risks

If this is making open source sound insecure,

that’s not my point. Open source is neither less

nor more secure than proprietary software.

However, open source vulnerabilities can pose

unique security risks. Due to its ubiquity,

attackers see popular open source as a targetrich

environment. In the same report cited

earlier, Forrester also notes that: “One out of

every 16 open source download requests is for

a component with a known vulnerability.”

Information is publicly available on known

open source vulnerabilities as well as detailed

instructions on how to exploit them. As soon as

a vulnerability is reported, a means to exploit

that vulnerability is almost always

simultaneously published. Of course, patches

for these vulnerabilities are often issued just as

quickly, but unless a business is aware that a

vulnerable open source component’s included

in its application(s), it’s highly probable that

component will remain unpatched. Therein lies

the very heart of the problem.

When a new open source vulnerability is

reported, a race is then on between the host

business and potential attackers. For the host

business to win that race, it needs to be able to

Cyber Security: Mitigating Risks Posed by Open Source Software

answer the following important questions:

• will you know if you’re using an open source

component with a known vulnerability?

• will you know if that vulnerability exposes

your software to attack?

• will you know how prevalent that open

source component is in your firm’s internal and

public-facing applications?

• will you know how to effectively manage and

mitigate any risk exposed by that vulnerability?

How can you know if your open source is

secure? You cannot secure what you’re not

tracking, so a first step – if your business hasn’t

already done so – needs to be the compilation

of an inventory of all open source components

your development teams are using. Some

organisations initiate a manual process to

manage their open source usage, but quickly

discover that manual processes seldom

maintain either a complete or a completely

accurate inventory of open source.

A complete open source inventory must

include all open source components, the

version(s) in use and download locations for

each project in usage or in development. You’ll

also need to include all dependencies – the

libraries your code is calling to and/or the

libraries to which your dependencies are linked

– within your inventory.

Fixing a vulnerability

As with tracking open source components, to fix

an open source vulnerability you first have to

know it exists. There are some vulnerability

databases – such as the US Government

vulnerability disclosure database, the National

Vulnerability Database (https://nvd.nist.gov/) –

that can help to identify issues.

However, not all vulnerabilities are reported

to the NVD, while the format of NVD records

often makes it difficult to determine which

versions of a given open source component are

affected by a vulnerability.

Other useful sources of information include

project distribution sites such as those

maintained by the Debian

(https://www.debian.org/security/) and Python

(http://bugs.python.org/) projects.

Security blogs and message boards like the

US-CERT alerts page (https://www.uscert.gov/ncas/alerts)

and Google’s security

blog (https://security.googleblog.com/) can

also be helpful.

If your firm builds packaged, embedded or

commercial SaaS software, open source license

compliance should be of concern. Using your

inventory of open source components, you’ll

want to compile detailed license texts

associated with those components such that

“Security and licensing concerns aside, how do you know

you’re using high quality open source components? Are

you employing a current version of the software? Is the

component actively maintained by a robust community?”

you can flag any components not compatible

with your software’s distribution and license

requirements and generate a license notices

report to include with your shipped software.

Security and licensing concerns aside, how

do you know you’re using high quality open

source components? Are you employing a

current version of the software? Is it the most

stable? Is the component actively maintained

by a robust community?

Determining all of this can be both timeconsuming

and impact developer productivity,

which is a reason why many organisations

struggle with effective open source governance

and turn towards an automated solution to

simplify open source risk management.

Continuous risk management

After identifying any vulnerability, licensing or

component quality risks in your open source,

you’ll need to determine what remediation

tasks – if any – need to be conducted and track

the subsequent remediation process to ensure

it’s actually being carried out correctly.

As with inventorying and identifying risks,

challenges you can expect to face include time

and cost issues. Manual review tends to result

in remediation late in the development cycle,

when the cost to fix is high and release

deadlines must be met. Manual review is also

incompatible with the rapid pace and

automation at the core of modern agile build

and continuous integration environments.

The job of open source vulnerability

management doesn’t stop when the application

ships. You’ll need to continue to monitor for

vulnerabilities as long as the application’s in

use. An average of ten new open source

vulnerabilities are discovered daily, while many

vulnerabilities are not reported for months – or,

on occasion, even years – after they’re

introduced to a component.

With open source usage and creation rapidly

growing, there’s a tendency towards continuing

to re-use components which are well known to

architects/developers due to familiarity and

historical use. Continuously monitoring open

source should include regular evaluation of

components. In truth, rigorously checking

directories of open source software may

disclose alternative components that offer the

same functionality with less risk.

Chris Fearon:

Research Director at Black

Duck Software



Security Qualifications: Observing The

View from the Wrong End of the Telescope

needs to be conducted on the scale and nature

of the problem across the qualifications system

from which specific sector issues might feed.

A review of the problem based upon the

selection of half a dozen of the Conditions for

Recognition, which define the requirements for

awarding organisations, is too narrow a focus.

Picking up one of the criticisms in the report,

the absence of enforceable agreements would

have had little or no impact on the Ashley

Commerce College or the Get Licensed cases.

The Ofqual report

issued following the


consideration of

license to practice

qualifications in the

security industry was

finally published at

the end of January. For

some, the report

added little to what’s

widely known in the

sector and very little

by way of solutions.

Despite this, there’s

the genesis of some

interesting thinking

which, in Raymond

Clarke’s view, could

provide the necessary

foundations for

ongoing improvement

Before considering the positives contained

within the 28-page Ofqual report, entitled

‘Licence-Linked Qualifications Used in

Private Security’, it’s perhaps prudent to ponder

on the limitations. Having perhaps spent more

time considering the issues around malpractice

and fraud over the last couple of years than

most, the two key concerns for me relate to the

lack of context for the report and the

presumption that the actions required to be

taken rest with those other than Ofqual itself.

A key criticism of the Ofqual report, and

indeed its response to malpractice, is the

preoccupation with micro issues. Fraud and

malpractice are not contained or constrained

within particular sectors, but are fluid and can

migrate across sector boundaries. Those

involved in wrongdoing can move readily in and

out of sectors: security today, construction

tomorrow, health and social care this time next

year. There’s no doubt those sectors that are

licensed, and where there are labour shortages

or funding is readily available, are placed at a

higher risk. The security industry ticks at least

some of these boxes.

A positive aspect of the report is the

indication that Ofqual will be broadening its

review to consider the extent to which

malpractice is evident in other sectors. While

this is to be welcomed, Industry Qualifications

(IQ) takes the view that independent research

Commentator or Participant?

The second concern relates to the role of

Ofqual itself. The Regulator has a statutory

duty to ensure confidence in the UK system of

regulated qualifications. The question is

whether this is exercised solely through

investigating and commentating on the efforts

of others, or whether the Regulator has a more

active role to play.

My view is that Ofqual has a responsibility to

ensure the overarching system and framework

is fit for purpose. It’s then the role of Awarding

Organisations and others to operate within that

framework. A system which allows those

involved in wrongdoing to continually re-enter

the education market, those involved in fraud

to avoid prosecution and one which singularly

fails to consider the risks associated with

safety-critical qualifications any differently than

it does those for a GCSE in ‘Art’ needs to be

reviewed at both a macro and a strategic level.

IQ has therefore called publicly for the

establishment of an independent expert panel

to review qualifications fraud. Disappointingly,

the response from Ofqual was that it’s the

responsibility of Awarding Organisations to

have robust procedures in place.

Positives in the report

The most promising aspects of the report relate

to three statements of future activity.

First, there’s due recognition that fraud and

malpractice may need to be considered in other

sectors. While welcome, we would encourage

the start point to be the development of a

macro understanding of fraud before

considering the implications at a sector level.

Second, there’s the proposal that Awarding

Organisations should work together to

establish and apply a robust set of industry

standards or a Code of Conduct as a means to



Training and Career Development

strengthen their approach towards risk

management and quality assurance. This is a

positive suggestion. It’s one that builds upon

the co-operation that has developed across the

awarding bodies concerned in recent years.

Third is the desire of Ofqual to be advised

when the Security Industry Authority (SIA)

provides intelligence to Awarding Organisations

about malpractice or wrongdoing by individuals

of centres. Ofqual has indicated that it might

then require Awarding Organisations to

demonstrate how this information has been

used. However, there’s also a requirement for

Ofqual to consider how it manages and uses

intelligence in support of wider objectives.

Code of Practice

I’m broadly attracted by the concept of a Code

of Practice and welcome the encouragement for

Awarding Organisations to take the lead on this

matter. I would, however, go one step further

and make it a requirement of the SIA

recognition for an Awarding Organisation

working in the security industry that it complies

with any such document.

Common standards for centre approval and

centre monitoring would go a long way. More

work on standardising approaches to

assessment would be another step forward.

Competition based on the price, quality of

service and breadth of an individual Awarding

Organisation’s offer is to be encouraged.

Competition driven by cost reduction through

squeezing quality assurance costs or dumbing

down assessment standards to increase pass

rates should be outlawed. While there may be

differences of opinion on the precise detail, the

overall objective is easily supported.

The report also encourages the improved

sharing of intelligence. While IQ supports the

intent, it’s here that our opinions begin to

diverge from that of the Regulator, largely in

terms of where responsibilities lie.

IQ first raised its concern with Ofqual in 2015

that intelligence wasn’t available to Awarding

Organisations when making decisions about

centre approval or the approval of

trainers/assessors. The current system relies

on Awarding Organisations operating in the

same sector (or offering similar qualifications to

other Awarding Organisations) to notify others

of malpractice or maladministration. Ofqual is

also advised each time a notification is made

and is the only organisation that’s in receipt of

all such notifications for all sectors.

The current system is, in my view, clearly

flawed. Awarding Organisations new to a sector

are disproportionately exposed to risk as they

don’t have access to any historic records. For its

“Competition driven by cost reduction through squeezing

quality assurance costs or dumbing down assessment

standards to increase pass rates should be outlawed”

part, in my opinion Ofqual doesn’t appear to

maintain reliable records and what’s available

isn’t accessible to Awarding Organisations.

Investment in capability

IQ was exposed as a result of this failing in

relation to Ashley Commerce College and we

know of others that have been affected in a

similar way. Fortunately for them, they were not

included in a BBC broadcast. Due to the

weakness in the system, it’s an unfortunate but

pretty obvious fact of life that a new Awarding

Organisation in the sector can be a strong

magnet for those involved in wrongdoing.

The system also assumes that the same and

consistent standards of analysis and reporting

across all Awarding Organisations is common.

In truth, investigating fraud, malpractice and

maladministration to a point where information

is at an evidential level requires an investment

in investigative capability that many Awarding

Organisations would prefer to avoid.

It’s cheaper and quicker to move the problem

on. It’s the training sector’s own ‘traveller’

problem: ‘While they’re on the land of someone

else, they’re not on mine’.

The analysis conducted by Ofqual highlights

the need for sharing intelligence across the

sector. What’s missing, though, is any

recognition of the pivotal role that Ofqual itself

should be playing, ensuring the validity of that

intelligence and sharing this knowledge across

the wider education sector.

A system in denial

Our experience over the last two years is of a

regulatory system unable to separate

malpractice from fraud and one that appears to

be largely in denial of fraud.

When the issue at Ashley Commerce College

was exposed by the BBC, you couldn’t see

Ofqual for dust. Instead of using the situation

to expose wider networks of fraud, the

apparent approach taken by the Regulator was

to distance itself from the issue and cast blame.

The end result remains that no action has been

taken against those who committed the fraud.

Until the Regulator acknowledges the

problem is systemic, requires a collective and

intelligence-led response and then develops an

appetite for tackling the issue, those involved

in wrongdoing will continue to thrive no matter

the number of reports Ofqual might produce.

Raymond Clarke:

Chief Executive of Industry




Risk in Action

Evolution assists Uxbridge College to pass its security

management examinations with flying colours

A sophisticated integrated access control and CCTV solution is playing a key

role in managing the safety and security of students, staff and visitors at

Uxbridge College across both of its campuses in Uxbridge and Hayes.

The challenge presented to Evolution was in servicing, maintaining and

upgrading a system that protects no less than 4,000 students and 600

members of staff, while also taking into account the College’s ongoing growth

ambitions and constantly changing infrastructure.

Evolution is now fully supporting an IP-based system with card access,

turnstiles and proximity readers to control the movement of card holders across

the two sites, as well as a network of CCTV cameras designed to monitor those

seeking unauthorised access and provide a further layer of security.

Michael McDonagh, head of security at Uxbridge College, stated: “Should a

student forget their pass, we can immediately issue a replacement. However, in

maintaining full control, the student’s ‘forgotten’ or ‘lost’ pass is automatically

de-activated. Each card also has the shelf life of a student’s course length, so

will automatically expire when they finish for the year. Should an end user

attempt to gain access with a de-activated card, we’re immediately notified.”

Each of the passes provided is specifically tailored to take into account a

student’s studies and lifestyle. They control which ‘zones’ that student can

enter, identify whether or not

a student has a pre-paid car

parking permit and even

enable access to extracurricular

activities such as

sport or drama.

There are more than 120

controlled-entry doors and

80 CCTV cameras, which

Control Room operators can

use to pinpoint and track

unauthorised access. Both

campuses are integrated

under the single system.

SharpView solution courtesy of Zaun

Group company EyeLynx secures

vital London water supply

The integrity of the fresh water supply delivered

to London’s residents has been notably stepped

up thanks to the recent installation of an array

of cameras, high-security fencing, vibration

sensors and lengths of razor wire.

The risk posed to the water supply forced the

UK’s largest water and waste water company to

further enhance the security along one side of

the perimeter of reservoirs in South London,

where a public footpath has provided easier

access for trespassers and committed graffiti

‘vandals’ to gain entry.

The Zaun Group had already installed

ArmaWeave and razor topping around the

whole site. Thames Water then asked software

security expert EyeLynx to design a solution

based on its SharpView CCTV system and

protect the Critical National Infrastructure site.

Zaun Group companies EyeLynx and Binns

Fencing installed two huge temporary CCTV

masts complete with high-performance PTZ

cameras, thermal cameras with video analytics,

horn speakers and high-powered WiFi to link

the two with a SharpView NVR.

Selection of UK’s oldest and most

important artefacts safeguarded by

Chubb at Rochester Cathedral

Chubb Fire and Security has installed a

security intruder alarm system designed for

sensitive environments at Rochester Cathedral

with a view to securing some of the UK’s

oldest and most important artefacts.

First built in 604 AD, the Rochester

Cathedral in Kent is the second oldest in

England. It’s home to the Textus Roffensis, the

oldest example of English written law, which

dates right back to the 10th Century and the

creation of the English State.

The security tender followed a Heritage

Lottery Fund grant as part of the Cathedral’s

‘Hidden Treasures Fresh Expressions’ project.

In addition to the restoration of the

Cathedral’s library and strong room, the

project saw the creation of a secure exhibition

space within the medieval crypt.

Morgan Flynn, senior security

installer/commissioning engineer at Chubb,

said: “The present Cathedral dates back to

1080, necessitating an entirely bespoke

approach. No drilling of the stonework was

permitted. Sensors and switches needed to be

hidden from visitors, while the quarter-tonne

steel doors and ornate leadlight windows

required sensitive design and installation.”

Following a risk assessment, Chubb has now

installed a sophisticated Grade 3 intruder

alarm system, typically found in the most

high-risk environments such as banks, art

galleries and museums.



Risk in Action

Porthcawl’s RNLI: Improving

education and saving lives with

network camera technology

Porthcawl’s RNLI station is aiming to

improve education and safety around the

water with the implementation of innovative

surveillance technology from Swanseabased

PC1 and Axis Communications.

With high tourism levels and fast-shifting

tides, the installation at Porthcawl Pier

provides an online live-stream. This ensures

visitors are prepared for the conditions they

will face, minimising the necessity of lifeboat

launches and reducing overall costs.

RNLI statistics show that 44% of lifeboat

launches in 2015 were due to persons in

distress, either ashore, offshore or using

manual craft such as surfboards or kayaks.

The camera points directly at Porthcawl

Pier, one of the highest risk areas. During

storms and rough weather conditions,

visitors are in danger of being swept out to

sea by tides that can reach up to 7 knots (8

mph). The installation of the Axis Q1775-E

fixed network camera, combined with a hightech

weather installation, ensures Porthcawl

RNLI can access weather metrics, tide

activity, conditions monitoring and more.

With 10x optical zoom and autofocus

capabilities, the RNLI decided the camera

was the stand-out choice due to its weather

resilience, providing 24/7 surveillance

capabilities and excellent image quality.

Ian Stroud, retired member of the Deputy

Launch Authority at Porthcawl RNLI, said:

“One of the most significant tasks a lifeboat

station must undertake is observing sea

conditions to make judgements on the

equipment lifeboat operators will need.”

Speaking about the installation itself,

Graham Thomas (IT and online projects

manager at PC1) observed: “We installed a

weather station and connected the

installation to YouTube, allowing the public

and lifeboat staff alike to view real-time

images and accurate weather reports.”

Notifier by Honeywell’s the King of the Castle in the eyes of


money.co.uk has

recently completed a

£3 million renovation

project in order to

transform a Grade IIlisted

Victorian castle

on the Bathurst Estate

in Cirencester into the

ultimate high-tech


Life safety is rightly

considered paramount

on site. With this in mind, Bristol-based APE Fire & Security asked Interaction

(the main contractor for the project) to design, specify, install and commission

a fire detection system that could offer staff and visitors alike the very highest

levels of protection.

To keep employees and visitors safe, fire detection technology from Notifier

by Honeywell has been installed throughout and is based around the

company’s Pearl intelligent addressable control panels. The networkable fire

detection control panel has been specifically created to be immune from the

threat of unwanted alarms.

Linked to the Pearl control panels are Notifier’s Opal photoelectric smoke

detectors. In the kitchen areas, SMART3 detectors use optical smoke sensing in

conjunction with heat sensors, infrared flame sensing technology and

sophisticated alarm algorithms to offer a fast response to flaming fires, while

at the same time providing superior unwanted alarm immunity.

Thanks to some very clever ‘cause and effect’ programming, APE Fire &

Security has been able to integrate the Pearl control panel with the existing

intruder and access control system.

ACT’s in store with Asda in wake of

IP access control solution roll-out

CBES has installed IP access control systems

from ACT at Asda stores and distribution

centres across the UK. The roll-out has already

covered 500 sites, all of which are networked

to Asda’s corporate headquarters in Leeds.

Asda is benefiting from ACTpro 4000 twodoor

controllers which can extend to 16 doors

via ACTpro door stations. In turn, up to 250 of the controllers may be

networked via a PC interface. The ACT hardware offers low bandwidth and autodiscovery

for easy installation and maintenance, alongside features such as

timed anti-passback and counting areas.

The Asda sites are using ACT’s specialist software platform, designated

ACTpro Enterprise, which distinguishes between different user types such as

installer, security officer or system administrator so as to factor out accidental

system changes and minimise maintenance. ACTpro Enterprise affords end

users a familiar web-browser experience using hyperlinks, ‘backwards’ and

‘forwards’ buttons and powerful search functionality.

An Asda staff member might present their MIFARE contactless smart card to

a reader in order to access a secure area of a site. The ACT software then grants

or denies access according to the user’s privileges which can be defined in

relation to seniority, job profile, time of day and day of the week. Asda’s

managers are benefiting from the integration of access control with CCTV and

intercoms through the Sky-Walker Integration Platform from Entelec.



Technology in Focus

Vanderbilt integrates ACTEnterprise and Eventys for a ‘plug

and protect’ security management solution

The latest product offering from Vanderbilt blends access control with video

management, as ACTEnterprise now supports integration with Eventys EX NVRs.

Simple to set up and operate, Eventys NVRs offer powerful, seamless and

reliable, yet inexpensive video recording of up to 16 IP cameras. Now,

ACTEnterprise allows cameras connected to an Eventys EX NVR to be associated

with access control doors.

Any events recorded in the access control log such as ‘access denied’ or ‘door

forced’ can be linked with the associated footage stored on the NVR. Events on

a door with a camera associated will

display a camera icon which allows

clicking on the camera icon to replay

the footage.

The main features associated with

this integration platform are Live

Video Display and Playback

Recordings. The Live Video Display

allows switching between the

different video camera sources.


360 Vision Technology brings to

market the all-new Predator

Overview camera system

360 Vision Technology continues to expand

its camera range with the release of Predator

Overview, a dual camera head, high-speed

and ‘ruggedised’ PTZ HD colour/mono

camera system for end users.

Borne out of customer feedback, the new

Predator Overview features a Full-HD 1080p

wide angle Overview camera combined with

a separate 30x optical, ultra-low light Sony

STARVIS Full-HD ‘Zoom’ camera.

Overview is ideal for those live monitored

applications such as town centres, container

ports and transportation hubs where an

overview (of up to a 90° field of view) of the

incident or target area is desirable.


CEM Systems introduces latest version of popular AC2000

Security Management System for end users

Tyco Security Products has released AC2000 v8, which offers new features that

increase the performance, simplicity and scope of the AC2000 access control

system suite from CEM Systems. These include AC2000 data partitioning and

enhancements to the AC2000 Security Hub Command and Control application.

In addition, CEM Systems has also released enhancements to the emerald

Intelligent Access Terminal range in the shape of the emerald TS100f and

TS200f fingerprint terminals.

“The latest release of AC2000, which includes data partitioning, offers

enhancements for both multi-site and multi-tenanted customers,” said Richard

Fletcher, product manager at CEM Systems. “AC2000 Database Partitioning is a

powerful feature for scenarios where multiple companies use a single security

management system. It empowers each company by giving them control over

their own private access areas, while still allowing them access to common

areas within the building or campus.”

Enhancements within the AC2000 Security Hub centralised Command and

Control application include Map Zones, reports and a “seamless” video

integration interface which enables live video footage for specific configured

alarms to be displayed. This release also offers enhanced functionality of

emerald, CEM Systems’ award-winning intelligent access terminal. Designed

for use with AC2000, emerald terminals not only control access to restricted

areas, but also “open up a

world of possibilities” by

bringing AC2000 intelligence

directly to the edge.

emerald now supports a

‘Boarding and Deplaning Route

Management’ (BDRM) mode

which provides a sophisticated

touch screen-based passenger

routing system for airports.


Norbain turns its attentions towards

Bosch Security Systems’ DIVAR

hybrid network recorders

Norbain is now offering the new DIVAR hybrid

and network recording solutions from Bosch

Security Systems. Designed for 24/7 operation,

they afford the ability to create surveillance

solutions with professional security features.

These solutions can be tailored to fit the

growing needs of many businesses.

With DIVAR recorders, it’s easy to watch live

footage, play recorded content or reconfigure

local unit settings anytime from anywhere. This

can be carried out via the DIVAR Mobile Viewer

app, available on smart phones (iOS and

Android) and via the web browser.

The direct monitor output is ideal for desktop

models often positioned on a counter. The

monitor can be placed on or beside the device,

giving the business owner an overview of live

images from all connected cameras.




Technology in Focus

Disruptive technology harnesses

power of Big Data to give guarding

end users

“real insight”

into security

Cardinal Security

is looking to


security guarding with the release of a new

operations platform. Designed to provide end

users with a level of insight unavailable to date,

the intelligence-led approach provided by

Guarded 365 affords users “full transparency

and real control” over their security spend.

Jason Trigg, CEO of Cardinal Security, believes

that every end user of guarding services should

demand this data and have proper visibility on

where their investment is being made.

“What people worry about in this business is

what they’re receiving for their money, and

rightly so. Most providers don’t deliver

sufficient insight into Return on Investment.”

Cardinal’s response to the challenge is the

Guarded 365 intelligent platform, which is

linked to a central data management system.

When an officer arrives at the start of a shift

they use a geocoded tablet – or an app on their

own device – to take a picture of their face. A

controller from Cardinal Security matches this

against a database of staff members and then

approves the officer to begin their shift.

In essence, this simple process ensures

timekeeping is accurate and that the correct,

fully-licensed operative is on duty and wearing

the correct uniform.


Bespoke power supply

solutions for access control

projects unveiled by

Elmdene International

Elmdene International has just

launched a new range of power

supplies specifically for use with

access control systems.

The Access Control range has

been carefully designed to house

some of the most common door controllers

in order to ensure both convenience and

flexibility for installations.

With different power options and

enclosure sizes available, this new access

control range offers the security professional

a choice of PSUs for a variety of

applications. The range could also mean cost

savings, with some of the units having the

capability to provide battery-backed power

for multiple door controllers, saving time

and money on installing singular units.

The Access Control range also includes

multi-access PSUs. These models are

supplied with a hinged cabling system and

can provide either 12 V or 24 V, while also

offering an independent ancillary relay that

can be used for applications such as a fire

door release relay.

The enclosure is also a larger design

capable of accommodating expander plates

should additional door controllers be

required, in turn further adding to the

flexibility this range is able to offer.


Integrated technologies are the key

for ievo and Keytracker partnership

An integration of cutting-edge biometric

recognition technology and key management

systems is offering the very highest levels of

security for organisations managing a large

number of priority keys.

The system is the result of determined cooperation

between ievo, the Newcastle-based

manufacturer of biometric recognition

systems, and Keytracker (the Midlands

manufacturer of key management systems).

Andy Smith, general manager at Keytracker,

explained: “We’ve developed our restricted

key access systems for a huge variety of

sectors ranging from the construction,

engineering, property, education and health

sectors to the vehicle retail trade. By

combining these systems with ievo’s biometric

recognition technology and the corresponding

software, we’ve created

an ultra-secure solution

that tracks the release

of specific keys to

specific people.”

The ‘Restricted Key

Access System’

incorporates state-ofthe-art

hardware with


administration software

restricting access to

only those keys the

user is authorised to

use. Integration of the

ievo ultimate fingerprint

readers ensures that the potential for

fraudulent access via stolen swipe cards or

PIN codes is removed. The registration process

has been integrated into the existing software.





Business News for Security Professionals

Pro-Activ Publications is embarking on a revolutionary

launch: a FORTNIGHTLY NEWSPAPER dedicated to the

latest financial and business information for

professionals operating in the security sector

The Paper will bring subscribers (including CEOs,

managing directors and finance directors within the

UK’s major security businesses) all the latest company

and sector financials, details of business re-brands,

market research and trends and M&A activity



Brian Sims BA (Hons) Hon FSyI

(Editor, The Paper and Risk UK)

Telephone: 020 8295 8304

e-mail: brian.sims@risk-uk.com



Joey Hambidge

Skills for Security has

announced the appointment

of Joey Hambidge in the

newly-created role of

operations manager. This

position at the sector skills

body for the private security

business sector has been

realised to provide the

organisation with essential operational support.

Hambidge will now be responsible for a broad

remit including accreditations, apprenticeship

standards, qualifications and the day-to-day

management of Skills for Security’s operations

and members of staff.

With an extensive background in training,

course design and employer liaison, Hambidge

boasts much experience in delivering

employability training and mapping course

content to an established curriculum.

Commenting on the appointment, Skills for

Security’s interim director general Peter Sherry

explained: “2017 is set to be an exciting year at

Skills for Security as we gear up to provide

guidance and support for security employers

ahead of the introduction of a new

apprenticeship standard. As such, we’re very

pleased to welcome Joey to the organisation,

where his extensive experience of employer

liaison and course development will help us to

develop our current offering and better meet

the needs of the security industry as a whole.”

Speaking about his new role, Hambidge

informed Risk UK: “I’m looking forward to

working for Skills for Security to improve

diversity and inclusion in apprenticeships. By

liaising closely with employers, it’s my goal that

Skills for Security becomes recognised as the

industry leader for new apprenticeship

standards within our sector.”

Craig Menzies

CNL Software, the specialist in Physical

Security Information Management (PSIM)

solutions, is pleased to announce that it has

appointed Craig Menzies to the role of general

manager for the Middle East. Menzies will

assume direct responsibility for all customerfacing

departments as the company prepares

for further expansion in the region.

Menzies joins CNL from Tyco Fire & Security

UAE where he was the Security Division’s

manager, overseeing multi-disciplinary teams

working on state-of-the-art security solutions

for high-profile projects on behalf of Dolphin

Energy, KOC, the Abu Dhabi Airports Company

and the Road Transport Authority.


Risk UK keeps you up-to-date with all the latest people

moves in the security, fire, IT and Government sectors

Gareth Walsh

Elmdene International is pleased to announce a

new addition to complete the business’ sales

team in the UK. Gareth Walsh has now joined

the company as regional sales manager looking

after the Northern UK area.

In his new role, Walsh will be leading

Elmdene’s growth within the region by

supporting strategic business plans.

Walsh comes to Elmdene with 12 years’

experience in the fire and security industry,

having worked in sales positions at EU Fire and

Security for ten years and at Illumino Ignis for

almost two years, covering the North West

region at both companies.

Previously, Walsh has project-managed and

commissioned the design and implementation

of various system set-ups including fire alarm

systems, emergency lighting systems and

disabled refuge solutions.

Sharon Ramsay, general manager at Elmdene

International, explained: “Gareth brings vast

experience from the industry, in turn adding to

the skills and knowledge of our existing sales

team. Along with our future growth plans,

commitment to customer service and ongoing

product development, the addition of Gareth to

the team means we now have a dedicated focus

in the North of the UK.”

Walsh himself stated: “I’m delighted to be

joining Elmdene. I’m looking forward to sharing

my knowledge with the team, working with our

customer base and building new relationships.”

Menzies brings over 30 years’ experience of

providing technology leadership and

innovation in security solutions, of which 25

have been spent in the Middle East, resulting

in an in-depth understanding of customers and

partners right across the region.

“We’re excited to have Craig join CNL

Software in the Middle East, particularly at a

time when we’re strengthening our teams

globally and deepening collaboration with our

partners to support the growing demand for

our IPSecurityCenter PSIM solution,” said

James Condron, vice-president of global sales

and marketing at CNL Software.

Menzies informed Risk UK: “I’m delighted to

join an already impressive team that boasts a

great track record of innovation.”




Waleed Eltayib

Axis Security, one of the UK’s leading security guarding

and electronic security groups, has appointed Waleed

Eltayib as key account director.

Eltayib’s role includes overseeing the account teams at

the company’s largest sites in London and the South East,

as well as ensuring the delivery of a customer-centric

approach and optimum service levels.

An experienced security operations professional,

Eltayib has worked for Axis Security for the past three

years at the Crown Estate St James’ Portfolio managed by BNP Paribas Real

Estate. Prior to this, Eltayib held senior contract management positions on

behalf of Broadgate Estates, GVA West End Management and ABN Amro.

“It’s useful to look at contract delivery with a fresh pair of eyes,

understanding the host business’ culture and how we can adapt our service

delivery to complement it,” explained Eltayib in conversation with Risk UK.

In his new role, Eltayib is reporting to Axis Security’s operations director John

Fitzpatrick. Key to his remit will be the Rathbone Square project, a flagship

office, retail and residential development which is new to Axis Security’s

London portfolio. Eltayib will be the main point of contact for the management

team and a visible and regular presence on site.

Jos Beernink

Genetec, a leading

provider of open

architecture and unified IP

security solutions, has

recently unveiled two new

senior executive


Jos Beernink has been

appointed vice-president

of sales for Europe, the Middle East and Africa,

where he will direct the sales organisation,

developing new business and helping the

channels address growing business demand.

Beernink joins from a valued Genetec partner,

Honeywell, where he served as vice-president

of sales and marketing. In this role, his primary

remit was to drive territory growth, which he

will now apply in his new position at Genetec.

Beernink has been a highly respected member

of the technology sector for over two decades.

In addition, Cyrille Becker joins as general

manager for Europe to oversee European

operations, positioning the business for growth

within the European market.

Becker is a seasoned business developer

with 15 years’ experience gained in the security

industry. He most recently served as a business

unit general manager at Stanley Security

France, a long-time Genetec partner.

“With the appointments of Jos and Cyrille,

we’re well positioned to address the rapid

business growth that Genetec has experienced

over recent years, while also meeting the needs

of physical security projects across the many

different vertical markets we serve in Europe,”

said chief commercial officer Georges Karam.

Georgios Kastias

Apollo Fire Detectors has

announced the

appointment of Georgios

Kastias as the company’s

new operations director.

Bringing a raft of

experience to the role,

Kastias’ appointment

reflects the commitment

made by Apollo to achieving organisational

excellence within the company, spearheaded by

a dynamic and effective leadership team.

Born and raised in Greece, Kastias later

obtained a BEng in Mechanical Engineering at

Heriot-Watt University, followed by an MSc from

Cranfield University and, more recently, an MBA

which was gained at the Imperial College

Business School.

Kastias joins Apollo Fire Detectors from

Danfoss, where he held the role of operations

director, duly transforming the business into a

high-performing organisation thanks to a

determined focus on operational excellence and

effective cultural change.

Speaking about his new role, Kastias told

Risk UK: “I’m absolutely delighted to be joining

Apollo’s leadership team.”

Kim Jørgensen

Milestone Systems, the

specialist in open

platform IP video

management software,

has made two seniorlevel


To strengthen

Milestone’s business

support, Kim Jørgensen

joins in the newly-created position of vicepresident

for global IT and operations. In this

role, he will be part of Milestone’s extended

leadership team with a focus on continued

improvements around internal IT solutions,

as well as online services.

Jørgensen brings a strong business and

technical background to the role as well as a

proven track record of helping fast-growing

businesses to both align and mature their

technical services with underlying

Information Technology infrastructures.

After more than 15 years at Microsoft,

Jesper Lachance Raebild has joined

Milestone as director of product marketing.

Heading up the global product marketing

team in Copenhagen, he will use his strong

background in software channel business

and global product marketing to accelerate

the Milestone platform and products.



20 - 22 JUNE 2017 EXCEL LONDON, UK

New exhibition within

IFSEC International 2017


• Access a VIP Meeting Service

live product demonstration and testing area

BRE Global

Networking Lounge

• See the latest UAVs at The Drone Zone.

against them

Best Value Security Products from Insight Security

www.insight-security.com Tel: +44 (0)1273 475500






Anti-Climb Paints

& Barriers

Metal Detectors

(inc. Walkthru)

Security, Search

& Safety Mirrors

Security Screws &


Padlocks, Hasps

& Security Chains

Key Safes & Key

Control Products

Traffic Flow &


see our




Tel: + 44 (0) 1763 273 243

Fax: + 44 (0) 1763 274 106

Email: sales@kerisystems.co.uk





ACT – Ireland, Unit C1, South City Business Park,

Tallaght, Dublin, D24 PN28.Ireland. Tel: +353 1 960 1100

ACT - United Kingdom, 601 Birchwood One, Dewhurst Road,

Warrington, WA3 7GB. Tel: +44 161 236 9488

sales@act.eu www.act.eu



Aberford Road, Leeds, LS15 4EF

Tel: 01132 813511

E: richard.samwell@absoluteaccess.co.uk


Access Control, Automatic Gates, Barriers, Blockers, CCTV



Bi-Folding Speed Gates, Sliding Cantilevered Gates, Road Blockers & Bollards

Consultancy, Design, Installation & Maintenance - UK Manufacturer - PAS 68

Tel: 01293 553888 Fax: 01293 611007

Email: sales@covasecuritygates.com

Web: www.covasecuritygates.com



Products include Electric Strikes, Deadlocking Bolts, Compact Shearlocks,

Waterproof Keypads, Door Closers, Deadlocks plus many more

T: 01202 676262 Fax: 01202 680101

E: info@alpro.co.uk

Web: www.alpro.co.uk



St. James’ Bus. Centre, Wilderspool Causeway,

Warrington Cheshire WA4 6PS

Tel 01925 552740 M: 07969 650 394





Integrated Design Limited, Feltham Point,

Air Park Way, Feltham, Middlesex. TW13 7EQ

Tel: +44 (0) 208 890 5550





Authorised Dealer

Tel: 0845 1 300 855 Fax: 0845 1 300 866

Email: info@secure-access.co.uk

Website: www.secure-access.co.uk



Nortech House, William Brown Close

Llantarnam Park, Cwmbran NP44 3AB

Tel: 01633 485533

Email: sales@nortechcontrol.com


Custom Designed Equipment

• Indicator Panels

• Complex Door Interlocking

• Sequence Control

• Door Status Systems

• Panic Alarms

• Bespoke Products



Tel: +44 (0)1744 886600



Planet Place, Newcastle upon Tyne

Tyne and Wear NE12 6RD

Tel: 0845 643 2122

Email: sales@ukbinternational.com

Web: www.ukbinternational.com

Hoyles are the UK’s leading supplier of

custom designed equipment for the

security and access control industry.

From simple indicator panels to

complex door interlock systems.




Suite 7, Castlegate Business Park

Caldicot, South Wales NP26 5AD UK

Main: +44 (0) 2036 300 670

email: info.uk@vanderbiltindustries.com

web: www.vanderbiltindustries.com



Creating Continuity ....... Building Resilience

A not-for-profit organisation providing help and support

Tel: +44(0)208 993 1599 Fax: +44(0)1886 833845

Email: membership@continuityforum.org

Web: www.continuityforum.org

www.insight-security.com Tel: +44 (0)1273 475500




Rapid Deployment Digital IP High Resolution CCTV

40 hour battery, Solar, Wind Turbine and Thermal Imaging

Wired or wireless communication fixed IP

CE Certified

Modicam Europe, 5 Station Road, Shepreth,

Cambridgeshire SG8 6PZ

www.modicam.com sales@modicameurope.com



Tower House, Parc Hendre, Capel Hendre, Carms. SA18 3SJ

Tel: +44 (0) 1269 831431

Email: cctvsales@altron.co.uk

Web: www.altron.co.uk



Specialist in:- Outsourced Control Room Facilities • Lone Worker Monitoring

• Vehicle Tracking • Message Handling

• Help Desk Facilities • Keyholding/Alarm Response

Tel: 0208 889 0475 Fax: 0208 889 6679

E-MAIL eurotech@eurotechmonitoring.net

Web: www.eurotechmonitoring.net




Gtec House, 35-37 Whitton Dene

Hounslow, Middlesex TW3 2JN

Tel: 0208 898 9500





3 Beaufort Trade Park, Pucklechurch, Bristol BS16 9QH

Tel: +44 (0) 117 303 9 303

Fax: +44 (0) 117 303 9 302

Email: dallmeieruk@dallmeier.com



Unit A10 Pear Mill, Lower Bredbury, Stockport. SK6 2BP

Tel +44 (0)161 430 3849







Distributor of electronic security systems and solutions for over 250 leading manufacturers, the company

also offers an internal technical support team, dedicated field support engineers along with a suite of

training courses and services. ADI also offers a variety of fast, reliable delivery options, including specified

time delivery, next day or collection from any one of 28 branches nationwide. Plus, with an ADI online

account, installers can order up to 7pm for next day delivery.

Tel: 0161 767 2990 Fax: 0161 767 2999 Email: sales.uk@adiglobal.com www.adiglobal.com/uk




Panasonic House, Willoughby Road

Bracknell, Berkshire RG12 8FP UK

Tel: 0207 0226530

Email: info@business.panasonic.co.uk




Excel House, Junction Six Industrial Park, Electric Avenue, Birmingham B6 7JJ

Tel: 0800 881 5199

Email: securitysales@mayflex.com

Web: www.mayflex.com



Barham Court, Teston, Maidstone, Kent ME18 5BZ


Phone: 01622 618787

Fax: 020 7100 8147

Email: emeasales@kbcnetworks.com



High resolution ATEX certified cameras, rapid deployment

cameras and fixed IP CCTV surveillance solutions available with

wired or wireless communications.

1 Rotherbrook Court, Bedford Road, Petersfield, Hampshire, GU32 3QG

Tel +44 (0) 1730 230530 Fax +44 (0) 1730 262333

Email: info@sesys.co.uk www.sesys.co.uk




210 Wharfedale Road, IQ Winnersh, Wokingham, Berkshire, RG41 5TP

Tel: 0118 912 5000 Fax: 0118 912 5001


Email: info@norbain.com



Unit 39 Sir Frank Whittle Business Centre,

Great Central Way, Rugby, Warwickshire CV21 3XH

Tel: 01788 567811 Fax: 01788 544 549

Email: jackie@plettac.co.uk




Hikivision & MaxxOne (logos) Authorised Dealer

Unit A10 Pear Mill, Lower Bredbury,

Stockport. SK6 2BP

Tel +44 (0)161 430 3849


www.insight-security.com Tel: +44 (0)1273 475500





Telephone: 01420 525260



Units 10 - 11, Theale Lakes Business Park, Moulden Way, Sulhampstead,

Reading, Berkshire RG74GB, United Kingdom

Tel: +44(0) 845 470 5000 Fax: +44(0) 845 470 5001

Email: ireurope@innerrange.co.uk






Unit 2 Birch Business Park, Whittle Lane, Heywood, OL10 2SX

Tel: + 44 (0) 1706 363998

Fax: + 44 (0) 1706 363991

Email: info@gjd.co.uk




1 The Ashway Centre, Elm Crescent,

Kingston upon Thames, Surrey KT2 6HH

Tel: +44 (0)20 8546 9826

Fax:+44 (0)20 8547 1026




14 Low Farm Place, Moulton Park

Northampton, NN3 6HY UK

Tel: +44(0)1604 648344 Fax: +44(0)1604 646097

E-mail: info@gpsperimeter.co.uk

Web site: www.gpsperimeter.co.uk





Tel: 0845 389 3889

Email: info@bsia.co.uk

Website: www.bsia.co.uk

Twitter: @thebsia



7-11 Earsdon Road, West Monkseaton

Whitley Bay, Tyne & Wear

NE25 9SX

Tel: 0191 2963242

Web: www.ssaib.org




Unit A, Cwm Cynon Business Park, Mountain Ash, CF45 4ER

Tel: 01443 471900 Fax: 01443 479 374

Email: sales@dyconpower.com




Herongate, Hungerford, Berkshire RG17 0YU

Tel: 01488 680500





Adept House, 65 South Way, Walworth Business Park

Andover, Hants SP10 5AF

Tel: 01264 351415 Fax: 01264 351217

Web: www.adeptpower.co.uk

E-mail: sales@adeptpower.co.uk



Tel: +44 (0) 844 8000 235

E-mail: securitysales@honeywell.com



Woodgate, Bartley Wood Business Park

Hook, Hampshire RG27 9XA

Tel: 01256 386700 5152 e-mail:



www.insight-security.com Tel: +44 (0)1273 475500




Challenger House, 125 Gunnersbury Lane, London W3 8LH

Tel: 020 8752 0160 Fax: 020 8992 9536

E: info@contractsecurity.co.uk

E: sales@contractsecurity.co.uk

Web: www.contractsecurity.co.uk



Cliff Street, Rotherham, South Yorkshire S64 9HU

Tel: 0845 330 4400

Email: contact@constant-services.com




Frenchmans Road

Petersfield, Hampshire GU32 3AP

Tel: 01730 237100

Fax: 01730 264915

email: fencing@jbcorrie.co.uk



Redwall® infrared and laser detectors for CCTV applications and Fiber SenSys® fibre

optic perimeter security solutions are owned by Optex. Platinum House, Unit 32B

Clivemont Road, Cordwallis Industrial Estate, Maidenhead, Berkshire, SL6 7BZ

Tel: +44 (0) 1628 631000 Fax: +44 (0) 1628 636311

Email: sales@optex-europe.com




Challenge Way, Martland Park,

Wigan WN5 OLD United Kingdom

Tel: +44 (0) 1942 322744

Fax: +44 (0) 1942 829867

Website: www.c-tec.com



Aviary Court, Wade Road, Basingstoke

Hampshire RG24 8PE

Tel: +44 (0) 1256 475555

Fax: +44 (0) 1256 466268

Email: sales@takex.com

Web: www.takex.com



Units 1 & 2 Cliffe Industrial Estate

Lewes, East Sussex BN8 6JL

Tel: 01273 475500





Secure House, Braithwell Way, Hellaby,

Rotherham, South Yorkshire, S66 8QY.

Tel: +44 (0) 1709 700 100 Fax: +44 (0) 1709 701 042


www.linkedin.com/company/pyronix www.twitter.com/pyronix



125 Pasture road, Moreton, Wirral UK CH46 4 TH

Tel: 0151 606 1000

Fax: 0151 606 1122

Email: andyw@cqr.co.uk




PO Box 750, Uxbridge, Middlesex UB9 5ZJ

Tel: 0330 1239979

E-mail: uk.securitysystems@bosch.com

Web: uk.boschsecurity.com



Salamander Quay West, Park Lane

Harefield , Middlesex UB9 6NZ

T: +44 (0)1895 474 474





Secure House, Braithwell Way, Hellaby,

Rotherham, South Yorkshire, S66 8QY

TEL +44 (0) 1709 700 100 FAX +44 (0) 1709 701 042

www.facebook.com/castlesecurity www.linkedin.com/company/castlesecurity




Commerce House, Whitbrook Way, Stakehill Distribution Park, Middleton,

Manchester, M24 2SS

Tel: 0161 655 5500 Fax: 0161 655 5501

Email: sales@riscogroup.co.uk

Web: www.riscogroup.com/uk



Eaton is one of the world’s leading manufacturers of security equipment

its Scantronic and Menvier product lines are suitable for all types of

commercial and residential installations.

Tel: 01594 545 400 Email: securitysales@eaton.com

Web: www.uk.eaton.com Twitter: @securityTP



Lincoln House,

Malcolm Street

Derby DE23 8LT

Tel: 0871 208 1187




Brunel Way, Fareham

Hampshire, PO15 5TX

United Kingdom


www.insight-security.com Tel: +44 (0)1273 475500

Simple & Easy Installation

Integrated Security - Access Control

Inception is an integrated access

control and security alarm system with

a design edge that sets it apart from the pack.

Featuring built in web based software, the Inception

system is simple to access using a web browser on a

Computer, Tablet or Smartphone.

With a step by step commissioning guide and outstanding user interface,

Inception is easy to install and very easy to operate.

For more information, visit www.innerrange.com/inception.

There you will find installation guides and videos to help you

get the most out of your Inception system.











No Software




Easy Setup

with Checklist


Send IP Alarms via

the Multipath-IP


Visit www.innerrange.com or call 0845 470 5000 for further information

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!