RiskXtraSeptember2018
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
x<br />
www.riskxtra.com<br />
RISKXtra<br />
Security and Risk Management September 2018<br />
Smart GDPR Assurance<br />
Stakeholder Roles in Achieving Data Protection<br />
><br />
Mind Your Own Business: Community Guarding Examined<br />
Access Control: Techniques for Tackling the Tailgaters<br />
Training and Career Development: Routes to Learning<br />
Fire Safety Management and Installation Supplement
D E S I G N I M A N U F A C T U R E I I N S T A L L<br />
PERIMETER SECURITY<br />
SOLUTIONS<br />
OUR PASSION<br />
IS YOUR SECURITY<br />
High security perimeter and<br />
access solutions, including fence<br />
and gate systems, designed and<br />
built in the UK to answer the needs<br />
of your project, from security<br />
rating of LPS 1175 SR1 to SR5.<br />
Call 0800 408 4749 or visit<br />
www.jacksons-fencing.co.uk/secure
x<br />
RISKXtra<br />
September 2018<br />
Contents<br />
46 The Changing Face of Security Services<br />
Risk Xtra’s quarterly Security Guarding Supplement features<br />
contributions from Axis Security and Amulet Security<br />
Meet The Security Company (pp50-51)<br />
5 Editorial Comment<br />
6 News Update<br />
BSI Data Security Survey. Industry skills and qualifications<br />
review. Home Affairs Select Committee on security post-Brexit<br />
8 News Analysis: Apprenticeships in Security<br />
New BSIA chairman Simon Banks insists that more work needs<br />
to be done to entice higher levels of apprenticeship take-up<br />
across the security business sector. Brian Sims reports<br />
11 News Special: Global MSC Security Conference<br />
Global MSC Security has announced that Risk Xtra will be the<br />
exclusive Official Media Partner for the Global MSC Security<br />
Conference and Exhibition 2018. Brian Sims previews the event<br />
12 Opinion: The Modernisation of CCTV<br />
The modernisation and digitisation of CCTV means challenges<br />
ahead for the police service. Richard Perkins assesses the detail<br />
14 Opinion: Mind Your Own Business<br />
Daniel Hardy outlines the rationale behind an exciting new<br />
community-based initiative that’s seeking to drive change in the<br />
retail sector and create value through shared resources<br />
17 BSIA Briefing<br />
David Wilkinson on the transition from analogue to an ‘all-IP’<br />
platform for telephony and what this means for security systems<br />
50 Meet The Security Company<br />
In association with the NSI, Risk Xtra continues its ‘Meet The<br />
Security Company’ series by featuring Constant Security Services<br />
52 The Security Institute’s View<br />
What makes the modern security professional? As Tony O’Brien<br />
observes, a mixture of physical and cyber security skills is vital<br />
54 In The Spotlight: ASIS International UK Chapter<br />
Patrick Rea advises today’s security companies on how they can<br />
sell security without having to cut the price for the service<br />
56 FIA Technical Briefing<br />
When talk turns towards fire detectors, there really is no excuse<br />
not to test them on a regular basis. Will Lloyd pinpoints why<br />
58 Security Services: Best Practice Casebook<br />
Mark Folmer lists seven key questions companies should ask to<br />
find the right management software for their security workforce<br />
60 Cyber Security in the Public Sector<br />
Cyber security solutions for professionals operating in the public<br />
sector evaluated in detail by Paul McEvatt<br />
62 Training and Career Development<br />
Employees want more training, but are they receiving enough<br />
instruction in all matters ‘Security’? Louise McCree investigates<br />
64 Risk in Action<br />
65 Technology in Focus<br />
67 Appointments<br />
20 Smart GDPR Assurance for a Smarter World<br />
James Willison and Sarb Sembhi highlight stakeholder roles in<br />
achieving data protection (and security) by design and default in<br />
‘Smart Projects’ with Internet of Things devices<br />
23 Techniques for Tackling the Tailgaters<br />
Iain Entwistle looks to solve the issue of security ‘tailgating’<br />
29 Fire Safety Management and Installation<br />
The FIA, Hochiki Europe, Klaxon, Bosch, Kentec, Vimpex and<br />
Advanced all feature in our regular Fire Safety Supplement<br />
43 Building Evacuation: Let The Voices Be Heard<br />
Ian Bridgewater explains the standards that relate to the design,<br />
specification and installation of voice evacuation technology<br />
69 The Risk Xtra Directory<br />
ISSN 1740-3480<br />
Risk Xtra is published quarterly by Pro-Activ Publications<br />
Ltd and specifically aimed at security and risk<br />
management, loss prevention, business continuity and<br />
fire safety professionals operating within the UK’s largest<br />
commercial organisations<br />
© Pro-Activ Publications Ltd 2018<br />
All rights reserved. No part of this publication may be<br />
reproduced or transmitted in any form or by any means<br />
electronic or mechanical (including photocopying, recording<br />
or any information storage and retrieval system) without the<br />
prior written permission of the publisher<br />
The views expressed in Risk Xtra are not necessarily those of<br />
the publisher<br />
Risk Xtra is currently available for an annual subscription rate<br />
(UK only). Telephone 0208 295 8307 for more details<br />
www.riskxtra.com<br />
Risk Xtra<br />
PO Box 332<br />
Dartford DA1 9FF<br />
Editor Brian Sims BA (Hons) Hon FSyI<br />
Tel: 0208 295 8304 Mob: 07500 606013<br />
e-mail: brian.sims@risk-uk.com<br />
Design and Production Matt Jarvis<br />
Tel: 0208 295 8310 Fax: 0870 429 2015<br />
e-mail: matt.jarvis@proactivpubs.co.uk<br />
Advertisement Director Paul Amura<br />
Tel: 0208 295 8307 Fax: 01322 292295<br />
e-mail: paul.amura@proactivpubs.co.uk<br />
Administration Tracey Beale<br />
Tel: 0208 295 8306 Fax: 01322 292295<br />
e-mail: tracey.beale@proactivpubs.co.uk<br />
Managing Director Mark Quittenton<br />
Chairman Larry O’Leary<br />
Editorial: 0208 295 8304<br />
Advertising: 0208 295 8307<br />
3<br />
www.riskxtra.com>
Add more to your security system<br />
Interact, control and integrate your Texecom security system like never before<br />
<br />
<br />
<br />
www.texe.com<br />
Sales: +44 (0)1706 212524
x<br />
RISKXtra<br />
Editorial<br />
Good for Business<br />
For the first time, directors who dissolve companies in order<br />
to avoid paying workers or pensions could now face hefty<br />
fines or be disqualified from running a business. In a bold<br />
and necessary move, the Government is to press ahead with new<br />
plans to safeguard workers, pensions and smaller suppliers<br />
when a company goes bust. Under the shake-up, bosses will face<br />
thorough investigation if they try to escape paying a dissolved<br />
company’s debts to their own staff and creditors.<br />
While the majority of UK companies are run very responsibly,<br />
there are a minority of directors who deliberately seek to dodge<br />
debts by dissolving operations then starting up a near identical<br />
business with a new name. This practice is known as<br />
‘phoenixing’ or ‘bumping companies’. Under the new powers<br />
invoked at Westminster, though, the Insolvency Service will be<br />
able to fine directors who engage in such tactics or even have<br />
them disqualified.<br />
Business minister Kelly Tolhurst said: “The UK is a great place<br />
to do business with some of the highest standards of corporate<br />
governance. Some recent large-scale business failures, though,<br />
have shown that a minority of directors are recklessly profiting<br />
from dissolved companies. This simply cannot continue. That’s<br />
why we’re upgrading corporate governance to give new powers<br />
to relevant authorities to investigate and hold responsible those<br />
directors who attempt to shy away from their responsibilities. We<br />
want to assist in protecting workers and smaller suppliers.”<br />
In parallel, the Investment Association will be asked to<br />
investigate to see if action is needed to ensure that companies<br />
are giving their shareholders an annual vote on dividends.<br />
The Government is further raising standards by ensuring that<br />
bosses explain to shareholders how a given company can afford<br />
to pay dividends alongside financial commitments such as<br />
capital investments, workers’ rewards and pension schemes.<br />
Additionally, the Government is introducing new measures in<br />
response to its corporate insolvency consultation that will give<br />
financially-viable companies more time to rescue their business.<br />
These include giving viable companies more time to restructure<br />
or seek new investment to rescue their business (in turn helping<br />
to safeguard jobs). This enables companies in financial distress<br />
to continue trading through the restructuring process, thus<br />
ensuring that smaller suppliers as well as workers are still paid.<br />
New restructuring plans are afoot to assist in the rescue of viable<br />
businesses and to preserve jobs.<br />
The Government is also announcing new measures designed<br />
to improve the quality of directors’ work by developing proposals<br />
to introduce new and better training for them such that they’re<br />
more aware of their legal duties, while at the same time inviting<br />
ICSA: The Governance Institute to convene a group of investors<br />
and companies in order to develop a dedicated Code of Practice<br />
for external Board evaluations.<br />
These reforms will help to strengthen the UK’s business<br />
environment. An emboldened disqualification regime in<br />
particular is going to be a vital element in ensuring that directors<br />
are less likely to simply walk away from their responsibilities.<br />
Brian Sims BA (Hons) Hon FSyI<br />
Editor<br />
5<br />
www.riskxtra.com>
x<br />
RISKXtra<br />
BSI highlights “significant variations” in<br />
data security readiness within public sector<br />
An in-depth survey conducted by the BSI’s<br />
Cyber Security and Information Resilience<br />
Centre of Excellence in conjunction with<br />
GovNewsDirect has unearthed a range of<br />
inconsistencies in terms of how prepared the<br />
UK’s public sector organisations really are for<br />
potential cyber attacks and data losses.<br />
In the last 12 months, 77% of those<br />
organisations surveyed have suffered a security<br />
breach. The most common causes were staff<br />
error (32%), phishing (30%), malware (18%),<br />
ransomware (11%) and Denial of Service (7%)<br />
attacks. Although 94% of organisations said<br />
they have a plan in place to handle data<br />
breaches, 58% explained they’re concerned or<br />
not confident about being able to access their<br />
application systems in the event of an attack.<br />
In today’s agile working environment, remote<br />
access has become integral to the provision of<br />
public services with over 73% of all staff having<br />
access to e-mails, while nearly one-in-five of all<br />
staff members have access to their<br />
organisation’s Customer Relationship<br />
Management system on a remote basis. The<br />
research also shows that 31% of organisations<br />
offer a BYOD policy that applies to all staff.<br />
The threat of data security breaches is<br />
exacerbated by the rise in ‘shadow IT’ that’s<br />
often used without the authorisation of IT<br />
managers. Organisational concerns around<br />
shadow IT include data loss (82%), security<br />
(78%) and unauthorised applications (51%).<br />
The transition towards cloud-based IT<br />
systems is one of the positive findings of the<br />
research, with 52% of public sector bodies now<br />
using Office 365 and a further 30% in the<br />
process of adopting it.<br />
68% of respondents said that disaster<br />
recovery/business continuity was the main<br />
reason for moving to the cloud, followed by the<br />
ability to provide mobile/remote working<br />
access (58%) and security (57%).<br />
Commenting on the survey, Stephen Bowes<br />
(head of solutions delivery and IT at the BSI)<br />
explained: “The results of our survey highlight<br />
security concerns and implications associated<br />
with the transition to cloud data management<br />
systems as well as the threat of ‘shadow IT’.<br />
The results also show that responsibility for<br />
data security remains something of a grey area<br />
within public sector bodies.”<br />
Bowes added: “Above all, the survey<br />
demonstrates the need for organisations to<br />
invest in training and education in order to<br />
increase awareness of data security challenges<br />
among all staff and stakeholders.”<br />
Skills and qualifications review for security industry in progress at the SIA<br />
The Security Industry Authority (SIA) has begun a wide-ranging review of available licence-linked<br />
qualifications, widening the scope of this work to consider not just the mandatory qualifications<br />
required by the Regulator, but also how to support the industry in addressing the skills and<br />
knowledge needed by operatives throughout their careers and across the spectrum of security<br />
provision. The review process will also look to ensure that robust assessment processes exist to<br />
make certain of the integrity of those qualifications achieved.<br />
Crucial to the success of this project is the engagement of industry and stakeholders. Therefore,<br />
the SIA is conducting a comprehensive consultation exercise. This will include primary research<br />
interviews with hundreds of operatives, focus groups involving businesses and consultation with<br />
expert stakeholders. The process will be completed by the end of 2019 and the new qualifications<br />
made available in Q1 2020.<br />
This review includes consideration of any refresher training that the SIA requires operatives to<br />
undergo. Every five years, the Regulator reviews the qualifications to ensure that they’re still in line<br />
with industry working practice, new risks that might have emerged and technology changes.<br />
Steve McCormick, the SIA’s director of operations and standards, explained: ”This is a very<br />
important piece of work because we have a statutory responsibility to raise standards in the private<br />
security industry. Our aim is to improve the professionalism of security operatives, drive forward<br />
standards in the industry and help protect the public in the UK. I believe that we can facilitate the<br />
development of a new set of qualifications to raise standards over time. We will also help to better<br />
define career paths and opportunities for those joining the workforce. This will assist the industry<br />
to improve the standards of service delivery, while also helping with recruitment and retention.”<br />
The project encompasses a number of key milestones that will need to be delivered before the<br />
new qualifications are made available.<br />
6<br />
News Update<br />
City of London Police and Lloyds<br />
Banking Group forge three-year<br />
partnership in joint bid to fight<br />
economic crime<br />
The City of London Police, the national<br />
policing lead force for countering fraud, has<br />
signed a partnership agreement with the<br />
Lloyds Banking Group which will see the latter<br />
invest £1.5 million in unique policing<br />
initiatives designed to tackle economic crime.<br />
The money will be allocated to several<br />
projects over a three-year period, with the goal<br />
being to strengthen the UK’s financial<br />
capabilities to detect criminals and protect<br />
members of the public and businesses alike.<br />
For example, the partnership will deliver crosstraining<br />
of financial investigators with the<br />
intention of sharing Best Practice and<br />
expertise across both organisations. This will<br />
enhance capability in the detection, prevention<br />
and awareness of economic crime.<br />
In addition, a programme of secondments<br />
and exchanges between the City of London<br />
Police and the Lloyds Banking Group will take<br />
place, thereby helping investigators and<br />
analysts alike to better understand criminal<br />
methodologies and banking practices and how<br />
this affects law enforcement.<br />
During the three-year period, an economic<br />
crime panel of experts will be established<br />
which will allow for a group of volunteer<br />
specialist economic crime advisors to come<br />
together and share expertise and Best Practice<br />
on an ongoing basis.<br />
Alistair Sutherland, the City of London<br />
Police’s assistant commissioner, observed:<br />
“Developing partnerships to tackle fraud is a<br />
cornerstone of our overall approach. This is a<br />
fantastic opportunity to work closely with a<br />
highly regarded and international private<br />
sector partner and share our expertise and<br />
knowledge. We want to do everything we can<br />
in order to prevent economic crime from<br />
ruining lives and businesses. This sponsorship<br />
agreement will assist us with that aim.”<br />
Brian Dilley, Lloyds Banking Group’s director<br />
of fraud and financial crime prevention,<br />
responded: “This is an important partnership<br />
with the City of London Police and a priority<br />
element of Lloyds Banking Group’s<br />
commitment to keep our customers’ money<br />
safe. By working collaboratively under a<br />
public-private partnership, Lloyds Banking<br />
Group and the City of London Police will be<br />
more effective in reducing the harm caused to<br />
our communities by criminals.”<br />
In parallel, the City of London Police’s<br />
Insurance Fraud Enforcement Department has<br />
just delivered the first in a series of regional<br />
engagement workshops, with at least three<br />
more being planned for the coming months.<br />
Brexit negotiators “putting public<br />
safety at unnecessary risk” claims<br />
Home Affairs Committee<br />
“Lack of progress and political red lines” on<br />
both the UK and EU sides are standing in the<br />
way of a security deal and “putting public<br />
safety at serious and unnecessary risk”. That’s<br />
the view of the Home Affairs Committee as<br />
outlined in its follow-up report into UK-EU<br />
security co-operation in the wake of Brexit.<br />
Lack of progress in the negotiations and the<br />
vast gap between the UK and EU negotiating<br />
positions on security mean there’s “a serious<br />
risk” that crucial aspects of security cooperation<br />
will come to an end after Brexit,<br />
when the transition runs out in 2020 or even<br />
as soon as March next year.<br />
“Both the UK Government and EU<br />
negotiators are showing too much rigidity and<br />
putting political red lines ahead of public<br />
safety and security considerations, despite the<br />
strong shared interest in continued close<br />
policing and security co-operation.”<br />
Both the UK and EU would face a security<br />
cliff edge next March if there’s no deal at all,<br />
with serious ramifications for public safety<br />
and the ability to stop criminals in the UK and<br />
the EU. The Committee states: “The<br />
Government must put workable contingency<br />
plans in place for a ‘no deal’ scenario.”<br />
Without agreement on the Second<br />
Generation Schengen Information System (SIS<br />
II), the UK will forfeit access to a database of<br />
76 million alerts. This database helps police<br />
officers to identify suspected offenders in<br />
serious crimes. Losing that intelligence would<br />
pose a severe threat to the Government’s<br />
ability to stop dangerous criminals from<br />
entering the UK and prevent serious crime.<br />
The EU’s proposals for a future extradition<br />
agreement are “significantly inferior” to the<br />
European Arrest Warrant. Current plans would<br />
mean “major obstacles” in bringing serious<br />
offenders to justice.<br />
Plans for extradition during the transition<br />
period, which will enable Member States to<br />
refuse to extradite their own nationals to the<br />
UK, will lead to cases in which justice for<br />
victims is frustrated or otherwise denied, with<br />
criminals able to evade arrest for longer.<br />
“Both sides must drop some of their rigid<br />
red lines and recognise that compromises will<br />
have to be made to ensure that crucial<br />
policing and security co-operation can<br />
continue without a major loss of capabilities.”<br />
7<br />
www.riskxtra.com>
x<br />
RISKXtra<br />
BSIA chairman Simon Banks targets need<br />
for more apprenticeships in security sector<br />
Speaking at the Trade<br />
Association’s Annual<br />
Luncheon and British<br />
Security Awards 2018<br />
Ceremony held in<br />
central London on<br />
Wednesday 11 July, the<br />
British Security<br />
Industry Association’s<br />
(BSIA) new chairman<br />
Simon Banks – cofounder<br />
and Group<br />
managing director at<br />
CSL – emboldened the<br />
excellent and ongoing<br />
Apprentices for Fire<br />
and Security<br />
programme that he<br />
kick-started several<br />
years ago by insisting<br />
that still more needs<br />
to be done to entice<br />
higher levels of<br />
apprenticeship takeup<br />
across the security<br />
business sector.<br />
Brian Sims reports<br />
Pulling no punches, Banks (pictured above)<br />
told the assembled audience at the<br />
London Marriott Hotel on Grosvenor<br />
Square: “Without a talent pipeline the industry<br />
will be finished. The best technology in the<br />
world is useless if it cannot be installed<br />
properly. We must make it plain that young<br />
peoples’ talents will not be wasted if they<br />
decide to venture into the realms of the security<br />
business sector. Our industry is an exciting one,<br />
complete with technology including thermal<br />
imaging, cyber, drones, biometrics and Deep<br />
Learning Video. Next year, we will be inviting<br />
school and college pupils to IFSEC International<br />
and deliberately embarking on the biggest<br />
push for new talent ever witnessed in this<br />
sector. We want the young people of today and<br />
tomorrow to pursue a career that begins with<br />
an apprenticeship.”<br />
Banks continued: “The BSIA supplies<br />
standards. At present, there’s a ‘Tech Invasion’<br />
occurring right across all of the BSIA’s<br />
Membership Sections. On that basis alone,<br />
everyone in this room should aspire towards<br />
standards involvement and help in protecting<br />
our sector from incoming disrupting verticals.<br />
Let’s not forget that, when home automation is<br />
mixed with security, it’s our responsibility –<br />
nobody else’s.”<br />
Astonishingly, the BSIA’s corporate logo is<br />
presently displayed on only 1% of security<br />
installers’ vehicles, but Banks is adamant that,<br />
in light of the above statement on the ‘Tech<br />
Invasion’, installers have never needed their<br />
Trade Association more than they do now.<br />
“BSIA installers are protected, informed and<br />
credible,” urged Banks.<br />
Clearly, the new chairman firmly believes that<br />
the Trade Association needs an enhanced<br />
cohort of installation companies and dedicated<br />
installers within its ranks.<br />
“Our world is changing from an analogue to a<br />
digital footprint,” continued Banks. “2025 will<br />
see over one million lines challenged to a new<br />
technology with BT’s ‘all-IP’ offer. We also have<br />
to navigate Brexit. Clearly, the BSIA is going to<br />
be pivotal for both occurrences.”<br />
BT announced back in early 2016 that, by<br />
2025, “all customers will be using IP Voice”.<br />
This wasn’t a quick decision for BT, but rather<br />
one taken after lengthy and detailed<br />
discussions with the telecoms industry.<br />
It was felt that the ‘end of life’ for the ISDN<br />
and PSTN networks was “inevitable”, with a<br />
2025 ‘cut-off’ affording providers and<br />
customers alike enough time to transition<br />
towards IP-centric telephone solutions.<br />
Respect and co-operation<br />
Manpower (ie security guarding) continues to<br />
form the biggest element of the Trade<br />
Association’s membership. For its part, the BSIA<br />
is continuing with its important work designed<br />
to reach a situation of mutual respect and cooperation<br />
between service providers and clients<br />
in this sphere. “We must continually strive to<br />
increase the trust between private and public<br />
sector services,” highlighted Banks. “Greater<br />
respectability will justify a fair margin for what<br />
is an excellent service.”<br />
Speaking of the industry’s client base, Banks<br />
– who co-founded the CSL Group (formerly CSL<br />
DualCom) in 1996 to manufacture security and<br />
communications products for the security and<br />
fire sectors, and then steadily built the<br />
company to become a global provider of<br />
connectivity solutions – also touched on the<br />
key subject of end user awareness (and<br />
specifically so in relation to the BSIA itself).<br />
“The public needs to know about the BSIA,<br />
while we also need to ensure as a collective<br />
that our sector isn’t overlooked by Government.<br />
Workable standards, credibility, ongoing<br />
collaboration and robust market intelligence<br />
will all help. The BSIA’s logo is a statement of<br />
quality, trust and integrity. We must put forward<br />
that message at every opportunity.”<br />
8<br />
News Analysis: Apprenticeships in the Security Business Sector<br />
Banks referenced the horrifying Grenfell<br />
Tower tragedy of June last year, which he<br />
dubbed: “The avoidable disaster.” He ventured:<br />
“In my view, the industry needs a Halo<br />
standard. The public has a right to a Halo or a<br />
Gold standard wherein lives and property<br />
matter. The BSIA has a vital role to play here<br />
through standards and training. It’s training<br />
that delivers the competency.”<br />
Skills for Security is, of course, the BSIA’s<br />
training subsidiary, all the while boldly<br />
providing skills education throughout (and not<br />
just at the point of delivery, either).<br />
The challenges ahead<br />
The security industry and its customers benefit<br />
greatly from the BSIA’s work, but it remains the<br />
case that the organisation is only funded by a<br />
select few. “We simply must correct this<br />
imbalance,” asserted Banks.<br />
“With so many new opportunities on offer,<br />
there has never been a better time to engage<br />
with the BSIA. The entire security value chain<br />
should welcome, adopt and promote new<br />
technologies rather than allow competing<br />
verticals to invade our sector. Standards and<br />
competence underpin our industry and should<br />
not be compromised. Participation in the BSIA<br />
ensures that we all remain relevant and a<br />
competitive force backed up by technology and<br />
skills. The professionalism inherent within the<br />
security business sector will undoubtedly<br />
ensure that we become the first choice for the<br />
provision of leading products and services.”<br />
In closing, Banks explained: “The BSIA is a<br />
listening organisation. It’s a Trade Association<br />
for all companies of all sizes. During my term in<br />
office, I look forward to taking this outstanding<br />
organisation forward. With your help, we will<br />
deal with the challenges I’ve outlined and<br />
embrace the opportunities in front of us.”<br />
James Kelly, CEO of the BSIA, explained to<br />
Risk Xtra: “Simon’s appointment as chairman is<br />
very timely and will be of great benefit to the<br />
BSIA and its members. As we seek to extend<br />
our membership and bring about a deeper<br />
talent pool for the industry, Simon’s enthusiasm<br />
and connections will help us to reach out to<br />
new recruits and maintain a high profile for the<br />
industry’s leading Trade Association.”<br />
Talent and commitment<br />
Kelly began proceedings at the British Security<br />
Awards by mentioning the re-branding of the<br />
event – running in its new guise for the first<br />
time – and boldly stating: “It’s our ambition for<br />
the British Security Awards to become the<br />
national event that recognises the talent and<br />
commitment of our industry’s finest.”<br />
“Next year, we will be inviting school and college pupils to<br />
IFSEC International and deliberately embarking on the<br />
biggest push for new talent ever witnessed in this sector”<br />
Thanking the Trade Association’s members<br />
for their many and varied working contributions<br />
across the year, with those contributions<br />
remaining at the heart of the BSIA’s ongoing<br />
success, Kelly expressed his gratitude for all<br />
those who have given of their time in the past<br />
12 months and more to help the BSIA develop<br />
and achieve its strategic goals.<br />
Indeed, there have been notable successes<br />
during the past year. Political lobbying remains<br />
at the core of the Association and “good<br />
progress” has been made at Westminster. “As a<br />
Trade Challenge Partner, we successfully<br />
lobbied the Government to reverse its planned<br />
removal of Trade Show Access Programme<br />
funding for the overseas trade shows, meaning<br />
that grants are now once again available for<br />
Intersec Dubai, IFSEC South East Asia and<br />
Security Essen,” asserted Kelly.<br />
“We’ve also lobbied various UK and European<br />
organisations to raise awareness of the<br />
challenges and added cost implications posed<br />
by the Radio Equipment Directive, which has<br />
resulted in some useful guidance being<br />
produced and a wider understanding of how<br />
members can achieve compliance,” continued<br />
the CEO. “Further, the BSIA has engaged with<br />
UKAS to lobby for the retention of citing<br />
normative standards on ISO quality<br />
management certificates, with UKAS consulting<br />
on a Policy Paper to introduce this into<br />
recognised industry schemes.”<br />
The next generation<br />
The BSIA’s commitment to training the next<br />
generation continues with its training arm,<br />
Skills for Security, developing a series of<br />
successful apprenticeship training programmes<br />
around the subjects of fire, emergency and<br />
security systems, team leadership and<br />
customer service. The team is also looking at<br />
creating a portfolio of other services focused on<br />
legal training, with briefings on key topics<br />
designed to keep organisations compliant.<br />
The BSIA remains a major contributor to<br />
national, European and International Standards<br />
and the Association has made important<br />
contributions to a number of key industry<br />
bodies, with both members and staff making<br />
representations to Euralarm, the Confederation<br />
of European Security Services, the SIA’s<br />
Strategy and Standards Group and the work of<br />
the Surveillance Camera Commissioner.<br />
BSIA CEO James Kelly (below)<br />
addressed Trade Association<br />
members and their guests at<br />
the British Security Awards<br />
Ceremony in central London<br />
9<br />
www.riskxtra.com>
Inner Range’s Integriti<br />
High Security System is<br />
a complete Hardware/<br />
Software solution designed<br />
specifically for High Security<br />
installations.<br />
Our range includes:<br />
All Software<br />
Hardware Controllers<br />
End of Line Modules<br />
Power Supplies<br />
Keypads<br />
Enclosures<br />
Communications Devices<br />
Access Control Readers<br />
Credentials<br />
WHY TAKE CHANCES?<br />
FULL END TO END DATA ENCRYPTION EXTERNALLY CERTIFIED<br />
T: +44 845 470 5000 | E: ireurope@innerrange.co.uk innerrange.com
x<br />
RISKXtra<br />
News Special: Global MSC Security Conference<br />
Global MSC Security announces Risk Xtra as<br />
Official Media Partner for 2018 Conference<br />
Derek Maltby, managing director of Global<br />
MSC Security, explained: “Risk Xtra is the<br />
ideal Media Partner for the Global MSC<br />
Security Conference and Exhibition 2018 as the<br />
print publication and website’s readers mirror<br />
our delegates. They are end users charged with<br />
managing and mitigating risks for organisations<br />
in the public and private sectors. Not only do<br />
they need to be aware of the changing threat<br />
landscape, but they also want to understand<br />
the latest technology available that will assist<br />
them to defend against it.”<br />
The event is free to attend for all delegates<br />
and also delivers double Continuing<br />
Professional Development points from The<br />
Security Institute for anyone who does attend<br />
the conference programme.<br />
Maltby continued: “The General Data<br />
Protection Regulation (GDPR) has been EU law<br />
since 25 May this year, but there’s still much<br />
confusion and misinformation regarding what<br />
the new data protection regulation means for<br />
the surveillance market and, indeed, the wider<br />
security sector. We’re bringing together many<br />
experts for a one-day conference in the hope of<br />
providing clarification as to the best way<br />
forward in order to safeguard people and<br />
assets while adhering to the law.”<br />
Keynote Speakers<br />
Confirmed Keynote Speakers include:<br />
• Tony Porter QPM LLB MSyl (Surveillance<br />
Camera Commissioner) whose role is to<br />
encourage compliance with the Surveillance<br />
Camera Code of Practice<br />
• Anne Russell (senior policy officer at the ICO)<br />
discussing the GDPR in the context of the<br />
security and surveillance sector<br />
• Peter Spindler MSyI (director of Soter<br />
Protective Services) will draw on the learning<br />
from Operation Yewtree to provide insight into<br />
the role security professionals can play in<br />
safeguarding the vulnerable (and how the<br />
GDPR is applied in this regard)<br />
• Sgt Chris Green (Avon and Somerset Police)<br />
will be talking about reducing harm in the<br />
community by maximising the benefits of CCTV,<br />
and how covert methods and body-worn video<br />
cameras are having a dramatic effect on the<br />
policing of complex problems<br />
• Jim Guiton (Community Control Room<br />
manager at Dacorum Borough Council) is set to<br />
explain how he ensures the Council complies<br />
with the GDPR in relation to its 350-strong<br />
surveillance camera network<br />
• Professor Pete Fussey (criminologist from the<br />
University of Essex) specialises in the subject of<br />
‘Surveillance and Society’<br />
Technology on show<br />
Running alongside the conference itself will be<br />
an exhibition, which opens on the afternoon of<br />
Monday 12 November. The exhibition includes a<br />
presence from the event’s headline sponsor<br />
Genetec as well as event sponsors Bosch, wcctv<br />
and 360 Vision Technology.<br />
Other major exhibitors confirmed to date<br />
include Cortech Developments, Commend UK,<br />
Digital Barriers, Hikvision, Ipsotek,<br />
IndigoVision, Pivot 3, Purdicom, Redvision,<br />
SilverNet, Synectics and The Security Institute.<br />
Also on Monday 12 November, Global MSC<br />
Security will host a Gala Dinner to raise money<br />
for the Royal British Legion and present the<br />
winner of the 2018 Gordon McLanaghan Award<br />
for Security Innovation.<br />
The winner of 2017’s accolade was Cumbria<br />
Constabulary for its work consolidating all six<br />
District Councils’ stand-alone CCTV systems<br />
into one sustainable system that’s run and<br />
monitored centrally by the Constabulary.<br />
Speaking about the journal’s latest Media<br />
Partnership, Brian Sims – the Editor of Risk Xtra<br />
online and in print – observed: “We’re<br />
absolutely delighted to have been chosen by<br />
Derek and Global MSC Security as the exclusive<br />
Official Media Partner for the 2018 Conference<br />
and Exhibition. I’ve attended this event in the<br />
past and the depth of insight imparted for end<br />
users on the day is always first class. This year<br />
will be no exception to that rule.”<br />
• Registrations are now open and exhibitor<br />
packages are still available. For more<br />
information visit<br />
https://www.globalmsc.net/seminars-2/<br />
Derek Maltby:<br />
Managing Director of Global<br />
MSC Security<br />
Global MSC Security<br />
has announced that<br />
Risk Xtra will be the<br />
exclusive Official<br />
Media Partner for the<br />
Global MSC Security<br />
Conference and<br />
Exhibition 2018, which<br />
takes place on<br />
Tuesday 13 November<br />
at the Bristol Hotel in<br />
Bristol. The headline<br />
theme for the 13th<br />
Edition of this hugely<br />
popular annual freeto-attend<br />
event is<br />
‘GDPR, Surveillance<br />
and Security’.<br />
Brian Sims reports<br />
11<br />
www.riskxtra.com>
x<br />
RISKXtra<br />
Modernising and Digitising CCTV:<br />
Challenges for the Police Service<br />
better way of doing things by transcoding video<br />
footage into a standard format that can be<br />
played on any desktop, laptop or smart phone.<br />
The 2025 Digital Policing Vision calls for the<br />
‘transformation’ of police ICT. Police services<br />
are now on the brink of modernising operations<br />
and digital CCTV is a key element of this<br />
process. While the cameras covering public<br />
spaces provide intelligence to both the police<br />
and local authorities, the current infrastructure<br />
is somewhat siloed. That said, there’s an<br />
opportunity to evolve the technology and adapt<br />
it in such a way that it can then help to tackle<br />
current challenges and improve infrastructure.<br />
Currently, the UK’s<br />
public sector is faced<br />
with an economic<br />
climate that demands<br />
today’s services ‘do<br />
more with less’. One<br />
of those services is<br />
surveillance. For their<br />
part, police forces are<br />
now under immense<br />
pressure to cut crime.<br />
With CCTV assisting in<br />
this regard, it’s<br />
nonetheless fair to<br />
suggest that the<br />
modernisation and<br />
digitisation of CCTV<br />
means plenty of<br />
challenges lie ahead.<br />
Richard Perkins offers<br />
a detailed assessment<br />
of the way forward<br />
CCTV played a vital role in identifying the<br />
perpetrators who carried out the London<br />
Underground and bus bombings in 2005,<br />
and has since been important to myriad other<br />
investigations. The footage obtained from CCTV<br />
not only helps reduce costs, time and effort<br />
expended in the security process, but also<br />
improves prosecution outcomes.<br />
The variation of modern crime renders CCTV’s<br />
application imperative to already stretched<br />
police services, as not only does it act as a<br />
force multiplier, but also supports active officer<br />
units on patrol.<br />
CCTV’s role is diverse and, while providing<br />
quality digital evidence to support<br />
investigations, the recordings also deliver<br />
intelligence relating to potential threats –<br />
anything from anti-social behaviour to<br />
terrorism, in fact. It’s estimated that one third<br />
of all cases handled by the Crown Prosecution<br />
Service (CPS) now include CCTV evidence.<br />
However, with CCTV comes copious amounts<br />
of footage. It can be a challenge to sift through<br />
all of the material. Investigators often collect<br />
CCTV video only to find they have no way of<br />
actually playing it. Proprietary codecs are<br />
needed to make videos playable. Sometimes,<br />
they can be hard to find and obtain.<br />
Given the lack of industry standards in CCTV,<br />
the recovery of digital video evidence has<br />
turned into something of a research project.<br />
Digital Evidence Management solutions offer a<br />
Increasing interoperability<br />
In a bid to deter criminals, protect vulnerable<br />
people and effectively prosecute offenders,<br />
modern digital CCTV services are critical.<br />
However, with an emphasis on digital<br />
transformation and the current deluge of data,<br />
it’s important to tackle the interoperability of<br />
CCTV systems between the criminal justice<br />
system, the police and other public services.<br />
In essence, the challenge presented is<br />
around creating a joined-up approach to<br />
replace the current myriad systems and data.<br />
The latter work independently of each other<br />
and are not integrated.<br />
The benefits of a fully-integrated system are<br />
huge and we’re certainly starting to see a<br />
change in the way digital evidence is managed.<br />
Increased interoperability of CCTV would allow<br />
police officers to use data and information<br />
more effectively during investigations. For<br />
instance, officers investigating a case might<br />
track down a suspect’s vehicle by reviewing<br />
CCTV footage and noting the number plate. If<br />
those same officers could then easily access<br />
other surveillance images and cross-reference<br />
the information with other sources, this would<br />
allow them to build a better picture of the<br />
suspect(s) and their movements leading up to<br />
and after the incident.<br />
With many digital video file formats in use,<br />
there are often inconsistencies between police<br />
services up and down the country. This also<br />
impacts the sharing of evidence between the<br />
police and the CPS, although this issue might<br />
be alleviated with the implementation of the<br />
CJS Common Platform Programme.<br />
Industry body TechUK recently stated that, if<br />
online reporting and submission of digital<br />
12<br />
Opinion: The Modernisation of CCTV<br />
evidence such as CCTV were implemented<br />
nationwide, it could save at least £30 million.<br />
It’s therefore important, then, that common<br />
platforms and systems are established to aid<br />
resource sharing as well as the movement of<br />
digital case files and evidence, ultimately<br />
making the process more efficient and<br />
decreasing the risk of loss.<br />
Smart CCTV: a powerful mix<br />
CCTV is often referred to as the unseen ‘eyes’ of<br />
the police, but soon digital CCTV will be<br />
equipped with the brainpower to boot. More<br />
and more, Artificial Intelligence (AI) and facial<br />
recognition technology will become integrated<br />
with CCTV, equipping cameras with the ability<br />
to analyse live video. Combined with the<br />
digitisation of CCTV, this makes for a powerful<br />
mix and enables live footage to be streamed<br />
directly into remote surveillance centres and<br />
Police Control Rooms, helping first responders<br />
quickly identify crimes and incidents.<br />
Just as Automatic Number Plate Recognition<br />
technology is used to help detect vehicles of<br />
interest, police services will begin to embrace<br />
the use of AI for real-time crime reporting. With<br />
real-time automated detection capabilities,<br />
CCTV will scan for missing and wanted<br />
individuals as well as suspicious behaviour<br />
such as attempted theft.<br />
In fact, the technology is already being<br />
trialled. Last summer, South Wales Police used<br />
facial recognition technology to make an arrest<br />
for the first time, identifying the suspect by<br />
matching his face against images stored on a<br />
database. Facial recognition technology and<br />
live streaming could result in a dramatic change<br />
in the way police officers apprehend offenders.<br />
Instead of playing catch-up and using CCTV to<br />
identify where suspects were a few hours ago,<br />
the police could track their location in real-time<br />
using remote access to connected cameras.<br />
Moving to the cloud<br />
With digital CCTV becoming more prevalent and<br />
increasingly moving towards the cloud, footage<br />
is then more easily accessible. CCTV Control<br />
Centres are starting to adapt to the process of<br />
streaming and sharing footage, eliminating the<br />
need for disks and USB sticks.<br />
Currently, when investigating officers are<br />
handed CCTV footage on a disk or a USB stick,<br />
they must first attempt to find the file format.<br />
They can spend hours searching the Internet,<br />
as well as accessing dedicated forums in a bid<br />
to identify the correct file viewing software.<br />
This is hugely inefficient and time-consuming<br />
and has knock-on effects through the entire<br />
criminal justice system.<br />
“The 2025 Digital Policing Vision calls for the<br />
‘transformation’ of police ICT. Police services are on the<br />
brink of modernising operations and digital CCTV is key”<br />
For many investigating officers, collecting<br />
digital evidence is just the beginning. Often,<br />
putting all of the pieces together can be an<br />
even bigger challenge. There can be hours<br />
spent physically collecting CCTV footage from<br />
public and private systems within the vicinity of<br />
a criminal incident. This currently involves<br />
police officers acting as glorified couriers,<br />
driving to CCTV Control Rooms to manually<br />
download footage to disks or USB memory<br />
sticks. It really is a huge waste of time and<br />
valuable resources.<br />
As stated, there’s then the time-consuming<br />
process of sifting through the CCTV evidence in<br />
order to find the right frames. The move<br />
towards standardised digital facilities is<br />
incredibly important and could remove the<br />
need for disks to be personally collected from<br />
sites. By investing in crowd-sourcing and digital<br />
evidence management systems, police services<br />
will be able to invite businesses and the public<br />
to register their CCTV cameras in a secure<br />
portal. This makes the process of sourcing<br />
footage much easier and uses privately<br />
maintained HD footage for the benefit of the<br />
entire criminal justice system.<br />
Value and impact of surveillance<br />
As mentioned previously, the streaming of<br />
digital CCTV has many benefits and, with cuts<br />
to policing resources, there are varying reasons<br />
why such public agencies are keen to ensure<br />
the survival of CCTV monitoring and response<br />
operations. Local councils will be interested in<br />
public safety and traffic management, while<br />
police forces will want footage for evidence and<br />
the detection of crime.<br />
Digital CCTV footage provides an efficient<br />
and accessible way in which to gain clarity on a<br />
situation and build up a bank of evidence.<br />
That’s why it’s important that funding is<br />
retained. Police services can update local<br />
authorities on the extent to which CCTV has<br />
been useful, duly highlighting those<br />
investigations where surveillance has been<br />
significant to a case. Feedback can be provided<br />
on specific incidents to ensure continued<br />
support for this valuable resource.<br />
There’s most certainly a need to standardise,<br />
modernise and also demonstrate the value of<br />
CCTV, then, but it does feel like the UK is on the<br />
cusp of cracking what might best be described<br />
as ‘the CCTV conundrum’.<br />
Richard Perkins:<br />
Regional Director at NICE<br />
13<br />
www.riskxtra.com>
x<br />
RISKXtra<br />
Community Guarding in the Retail Sector<br />
It would appear that any attempts to buck<br />
these trends are simply not working, with the<br />
BRC also stating that retailers spent the same<br />
amount on non-cyber crime prevention in a 12-<br />
week period as they did the previous year.<br />
All of this is occurring at a time when the<br />
police service has lost nearly 16,000 officers<br />
across England and Wales – the equivalent of<br />
all the forces in the South West of England.<br />
That has meant the police service’s ability to<br />
respond to incidents has been seriously<br />
affected. There’s now a determined focus on<br />
crime prevention rather than prosecution.<br />
Tough trading<br />
conditions in the High<br />
Street right now have<br />
been well documented<br />
but, with theft and<br />
violence also on the<br />
rise, the time has<br />
surely come for a<br />
radical new approach<br />
towards security. With<br />
this firmly in mind,<br />
Daniel Hardy explains<br />
the rationale behind<br />
an exciting new<br />
community-based<br />
initiative that will<br />
drive change and<br />
create value through<br />
shared resources<br />
What are your views on the<br />
Community Guarding idea?<br />
Send your thoughts about the<br />
initiative via e-mail to<br />
enquiries@national<br />
businesscrimesolution.com<br />
Well-known retailers including Maplin,<br />
Toys R Us and Poundworld have already<br />
disappeared in 2018 and, according to<br />
an analysis of the UK’s Top 500 towns and cities<br />
compiled by the Local Data Company for<br />
PricewaterhouseCoopers, there were 5,855<br />
store closures last year alone.<br />
Meanwhile, the number of new High Street<br />
stores opening in 2017 fell to a total of 4,083<br />
from 4,534 in 2016. According to the Office for<br />
National Statistics, there have been 83,500<br />
retail redundancies since the beginning of 2017.<br />
It’s undoubtedly a pretty grim picture.<br />
Online retailing has definitely had an impact.<br />
The British Retail Consortium’s (BRC) research<br />
finds that online sales of non-food items have<br />
soared over the past five years from 11.6% of<br />
the total market in December 2012 to 24.1% in<br />
December last year. However, the Internet isn’t<br />
the only thing to blame for the decline in the<br />
High Street’s fortunes.<br />
Acts of theft and violence are also shockingly<br />
high. The BRC’s 2017 Retail Crime Survey<br />
reported that the total direct cost of crime has<br />
risen 6% year-on-year to just over £700 million,<br />
while the direct cost of customer theft has<br />
grown by £65 million. That’s up by 15%. It<br />
seems one particular trend that’s rapidly<br />
spinning out of control is the amount of danger<br />
that those employed in retail face during their<br />
working day, with the rate of incidents of<br />
violence with injury doubling in 2017 to total six<br />
per every 1,000 members of staff.<br />
Effecting positive change<br />
Within the retail sector, any attempts to deal<br />
with these issues have often focused on hiring<br />
security officers which, although effective in<br />
certain circumstances, isn’t the whole answer.<br />
This additional expense, compounded by the<br />
level of crime, violence, higher business rates<br />
and increased footfall, means that it’s simply<br />
financially non-viable to keep some stores<br />
open. It’s clear that there has to be a radical<br />
reappraisal of how retailers, the police service<br />
and specialist security providers work together.<br />
The seeds of change were sown with the<br />
Violence Reduction Strategy, a collaborative<br />
initiative pioneered by central Government, the<br />
BRC, the National Police Chiefs’ Council (NPCC),<br />
the Association of Convenience Stores, the<br />
National Business Crime Solution (NBCS), the<br />
Association of Police and Crime Commissioners<br />
and USDAW, the Trade Union for shop workers.<br />
As a result, a major retailer, Mitie and the<br />
NBCS decided to take this further by<br />
developing a new retail security model named<br />
Community Guarding. Based on the belief that<br />
co-operation, knowledge sharing and pooled<br />
costs between retailers creates value through<br />
flexible resources with a wider reach, the NBCS<br />
believes that it could positively contribute<br />
towards contemporary business objectives by<br />
harnessing the power of data collection,<br />
analytics and insight.<br />
In turn, this will build increased capacity and<br />
engagement by linking large corporates, local<br />
SMEs, the community, the police service,<br />
councils and other stakeholders to counter the<br />
negative economic effects of persistent retail<br />
crime and episodes of anti-social behaviour.<br />
Proof of the pudding<br />
Although the Community Guarding concept<br />
sounded good in theory, the only way in which<br />
14<br />
Opinion: Mind Your Own Business<br />
to ascertain its viability was to put it to the test.<br />
By partnering with the Police and Security<br />
Group Initiative, Sussex Police and a major<br />
retailer, a pilot scheme deployed community<br />
guards across Brighton & Hove and nearby<br />
areas working in tandem with the Sussex<br />
Warden initiative deployed by SWL Security, in<br />
turn ensuring all major Sussex conurbations<br />
received a community security resource.<br />
Community Guarding uses existing Security<br />
Industry Authority (SIA)-accredited personnel to<br />
act as High Street security to support the local<br />
retail community, displacing criminality from<br />
not only retail premises, but also from local<br />
central business districts. This is achieved<br />
through a two-tier security resource – a<br />
traditional static presence in high risk stores<br />
supplemented by high visibility patrolling in<br />
areas agreed by local police that supports their<br />
own stated initiatives.<br />
In addition, the pilot sought to conduct<br />
evidential capture, support criminal and civil<br />
justice processes and report on the presence of<br />
known criminals to police and the business<br />
community in order to prevent offending.<br />
Six community security officers spent the first<br />
two weeks of the pilot undertaking engagement<br />
with local businesses and supported local<br />
policing operations with a view to project<br />
launch at the Brighton Pride event. They<br />
maintained a high visibility presence in areas<br />
known to be at elevated risk and there was a<br />
positive reaction from members of the public,<br />
who were pleased to see an extra resource<br />
being deployed in the community.<br />
The team also built a good relationship with<br />
other local security firms, the Brighton & Hove<br />
Business Crime Reduction Partnership and local<br />
police to share intelligence between the<br />
organisations. Their activities also included<br />
talking to members of the homeless community<br />
to offer help by putting them in contact with<br />
volunteer agencies working with Brighton City<br />
Council, which could then assist with food,<br />
benefits and housing issues.<br />
Keep talking<br />
Local businesses in the patrol vicinity away<br />
from the major retailer who funded the initial<br />
proof of concept could request support from<br />
community officers by contacting staff at Mitec,<br />
the Mitie Control Room located near Belfast.<br />
These deployments were supported locally by<br />
the use of the Business Crime Reduction<br />
Partnership radio link such that businesses<br />
could communicate effectively.<br />
The community guards assisted in arrests,<br />
searching offenders and diffusing volatile<br />
situations, rendering First Aid and carrying out<br />
welfare checks, gathering intelligence and<br />
evidence of crimes and generally helping<br />
members of the public.<br />
Since the start of the pilot, the community<br />
guards have reported over 1,500 incidents and<br />
450 crimes, conducted 800 rough sleeper<br />
enquiries and detained 59 individuals until<br />
police officers could attend the scene. In a twomonth<br />
period in 2017, among many other<br />
activities, the community guards arrested a<br />
man with five outstanding warrants, supported<br />
a vulnerable female who had escaped from<br />
hospital and intervened in a road rage incident<br />
that developed into a physical altercation.<br />
Setting the standard<br />
Due to the pilot project’s success, the NBCS<br />
and its partners are confident the same model<br />
could be developed and rolled out across the<br />
country. As well as the many benefits that it<br />
offers retailers and law enforcement agencies,<br />
it also represents a valuable opportunity for the<br />
security industry – and the security guarding<br />
sector in particular – to elevate its position and<br />
create a new type of highly-trained, skilled and<br />
service-driven operative.<br />
There’s a vicious circle at play, whereby<br />
customers don’t value guarding services highly<br />
enough and are not willing to pay higher fees.<br />
This means that the sector struggles to attract<br />
high quality individuals from a diminishing pool<br />
of talent due to the low rates of pay that<br />
operatives receive, which then renders the<br />
security industry an unattractive career choice.<br />
To address this issue, work is underway to<br />
establish a set of operational standards via<br />
appropriate bodies like the SIA and the NPCC.<br />
It’s hoped that the development of a nationally<br />
recognised and accredited enhanced security<br />
standard for individuals will raise the credibility<br />
of the private security industry.<br />
It has been mooted that this standard should<br />
include areas such as statement writing,<br />
evidential capture and continuity, the use of<br />
body-worn video, initial responder First Aid<br />
training, an understanding of civil powers,<br />
dealing with vulnerable people, technology<br />
awareness and its use, Community Safety<br />
Accreditation Scheme powers, Project Griffin<br />
awareness and, importantly, corporate<br />
accreditation through the SIA’s own Approved<br />
Contractor Scheme.<br />
Daniel Hardy:<br />
Managing Director at the<br />
National Business Crime<br />
Solution (NBCS)<br />
*Mind Your Own Business is the<br />
space where the NBCS examines<br />
current and often key-critical<br />
business crime issues directly<br />
affecting today’s companies. The<br />
thoughts and opinions expressed<br />
here are intended to generate<br />
debate and discussion among<br />
practitioners within the<br />
professional security and risk<br />
management sectors. If you would<br />
like to make comment on the<br />
views outlined, please send an<br />
e-mail to: brian.sims@risk-uk.com<br />
**The NBCS is a ‘Not-for-Profit’<br />
initiative that enables the effective<br />
sharing of appropriate data<br />
between the police service, crime<br />
reduction agencies and the<br />
business community to reduce<br />
crime and risks posed to all. By<br />
providing a central repository<br />
where business crime data is<br />
submitted, shared and analysed,<br />
the NBCS is able to gather the<br />
necessary intelligence and support<br />
to more effectively detect, prevent<br />
and, subsequently, respond to<br />
crimes affecting the UK’s business<br />
community. For further information<br />
access the website at:<br />
www.nationalbusinesscrime<br />
solution.com<br />
“The British Retail Consortium’s 2017 Retail Crime Survey<br />
reported that the total direct cost of crime has risen 6%<br />
year-on-year to just over £700 million, while the direct cost<br />
of customer theft has grown by £65 million”<br />
15<br />
www.riskxtra.com>
Make sure you can evacuate everyone eryone<br />
safely from your building by having a<br />
FREE SITE SURVEY via Evac+Chair’sair’s<br />
team of evacuation specialists.<br />
CALL 0121 796 1427<br />
For a FREE Evacuation Assessment<br />
or Visit:<br />
EVACCHAIR.CO.UK
x<br />
RISKXtra<br />
BSIA Briefing<br />
Many readers of Risk Xtra will be well<br />
aware that BT has announced its plans<br />
to transition to an all-IP digital platform<br />
over the coming years and expects to complete<br />
the change by 2025. In particular, BT has been<br />
seeking a way in which to identify its<br />
consumers who have a ‘Special Service’ (such<br />
as an alarm or telecare service) operating<br />
within their premises, as these services may be<br />
impacted by the change to all-IP.<br />
The security and fire industries still harbour a<br />
significant number of customers who rely on<br />
analogue phone lines to provide voltage and<br />
dial tone to connected alarm devices. This<br />
configuration will change with the transition to<br />
an all-IP digital platform.<br />
BT envisages that security service providers<br />
will cease buying analogue equipment in the<br />
near future, and that they’ll move to more<br />
compatible solutions designed to communicate<br />
digitally. With the recent announcement of the<br />
opening of BT’s Digital Services Lab at its R&D<br />
Centre, alarm providers (ie installers and<br />
manufacturers) are now able to test both their<br />
existing and any new ‘all-IP’ systems.<br />
BT is extremely keen to work with the BSIA<br />
and the wider security and fire industries to<br />
protect consumers during this transition phase<br />
by ensuring that those who rely on their current<br />
analogue alarm devices move to the new digital<br />
phone service in a controlled manner, in turn<br />
ensuring that alarm services continue to<br />
perform their critical role.<br />
Programme of change<br />
Antoine de la Gardette, who heads up the<br />
engagement team for BT, explained: “It’s really<br />
important that we impart the message of the<br />
switchover to the industry as quickly and as<br />
widely as possible. It’s a massive programme of<br />
change, bigger than the switchover from<br />
analogue TV to digital TV, and we want to make<br />
sure nobody is left vulnerable when the<br />
analogue systems stop working.”<br />
BT has asked the BSIA to contact all of its<br />
members, firstly to convey their desire to help<br />
with testing of alarm equipment at the BT Lab<br />
and, secondly, to request that Alarm Receiving<br />
Centres (ARCs) provide information to help to<br />
manage the transition (namely the in-bound<br />
telephone numbers they use to receive alarm<br />
signals). BT will be able to use this information<br />
confidentially to mark BT’s customer accounts<br />
to show that they may have a ‘Special Service’,<br />
such as an alarm system, and to make sure that<br />
these customers are advised by BT to contact<br />
their alarm service provider before changing.<br />
It’s important to emphasise that BT is only<br />
asking for the phone numbers that alarm<br />
Transforming the UK’s<br />
Telephone Network<br />
As part of a global transformation of telephony services, the<br />
UK is undergoing the transition from an analogue to an ‘all-<br />
IP’ platform. The British Security Industry Association (BSIA)<br />
is working closely with Ofcom, communication service<br />
providers and other stakeholders to ensure that the security<br />
business sector has the opportunity to voice its concerns and<br />
expectations as well as raise awareness of the changes and<br />
impact this will bring. David Wilkinson has the detail<br />
devices dial into (ie ARC receiver numbers) and<br />
not those of service users. These ARC numbers<br />
will likely appear on BT customers’ accounts<br />
and can be used to alert those customers to the<br />
need for further checks. Any information that’s<br />
given to BT will not be used for any other<br />
purpose and will be protected. BT has offered<br />
non-disclosure agreements for those who are<br />
concerned about matters of confidentiality.<br />
It’s also worth noting BT has advised that, as<br />
an interim solution, the organisation would<br />
provide an Analogue Telephony Adapter port<br />
with its new home hub, which could help to<br />
keep some current products working until such<br />
time that they can be upgraded or replaced. It<br />
should be stressed, however, that the new<br />
home hub provides no battery back-up.<br />
Therefore, phone connectivity will be prevented<br />
when home power fails.<br />
Any voice band alarm data exchange could<br />
also be affected by the new IP networks, and so<br />
would at least require further testing.<br />
David Wilkinson:<br />
Director of Technical Services<br />
at the British Security Industry<br />
Association<br />
17<br />
www.riskxtra.com>
x<br />
RISKXtra<br />
BSIA Briefing<br />
*If you’re happy to provide<br />
your ARC receiver numbers to<br />
BT Consumer or if you have<br />
any queries on these issues<br />
please contact the BSIA via e-<br />
mail at technical@bsia.co.uk<br />
or by calling 01905 342020. If<br />
you wish to contract BT<br />
Consumer direct e-mail<br />
btdigitalvoice@bt.com<br />
**Interested parties who wish<br />
to arrange testing of their<br />
signalling equipment (ie<br />
communication using the<br />
PSTN) should contact BT via<br />
https://www.btplc.com/<br />
DigitalServicesLab/index.htm<br />
Therefore, alarm system suppliers should be<br />
consulted as to how their solutions would<br />
continue to operate reliably in this situation.<br />
The BSIA welcomes these very supportive<br />
steps from BT, and we recognise the desire for<br />
alarm service providers to identify or develop<br />
new digital solutions for their customers, while<br />
also providing additional time for the necessary<br />
transition. We continue to work with Ofcom and<br />
telecommunication solution providers in order<br />
to secure similar supportive measures across<br />
the industry.<br />
From PSTN to all-IP<br />
The Public Switched Telephone Network (PSTN)<br />
is a circuit-switched telephone network<br />
operated by national and regional operators,<br />
providing infrastructure and services for public<br />
telecommunications. The PSTN consists of<br />
telephone lines, fibre optic cables, microwave<br />
transmission links, cellular networks,<br />
communications satellites and undersea<br />
telephone cables, all interconnected by<br />
switching centres that allow most telephones to<br />
communicate with each other.<br />
Originally a network of fixed-line analogue<br />
telephone systems, the PSTN is now almost<br />
entirely digital in its core network and includes<br />
mobile and other networks, as well as fixed<br />
telephones. The Integrated Services Digital<br />
Network (ISDN) came about in 1986, allowing<br />
both voice and data services to be delivered<br />
simultaneously. For the technology and services<br />
at the time, it served its purpose and continued<br />
to do so for many years.<br />
PSTN circuits in use<br />
Due to the changes in technology, PSTN and<br />
ISDN are now out of date, as are their<br />
associated maintenance and running costs.<br />
Despite having been updated radically over the<br />
decades since they were introduced, the lines<br />
are still essentially the same in set-up and<br />
design as the original phone lines of the 1800s.<br />
There are approximately 29 million PSTN<br />
circuits still in use across the UK. As of 2018, BT<br />
wants to convert as many of them as possible<br />
and, to attain the desired target figure by 2025,<br />
will need to convert the lines at a rate of<br />
238,000 per month.<br />
There are a total of nine million burglar<br />
alarms in the UK, and work is progressing in<br />
communicating the opportunity migration<br />
offers and the benefits of working in<br />
collaboration with other industry stakeholders.<br />
What is an all-IP network?<br />
An all-IP network is a packet-based network in<br />
which all data is transferred in the same way<br />
and independent of the access or transport<br />
technology. Industry parlance these days points<br />
towards the ‘next generation network’ to<br />
describe the all-IP network.<br />
A next generation network is able to provide<br />
services, including telecommunication services,<br />
and can make use of multiple broadband<br />
technologies in which service-related functions<br />
are independent from underlying transportrelated<br />
technologies. It offers unrestricted<br />
access by users to different service providers<br />
and supports generalised mobility which will<br />
allow the consistent and ubiquitous provision<br />
of services to users.<br />
PSTN and all-IP will differ heavily in terms of<br />
the equipment that they require and also in<br />
relation to how they go about delivering their<br />
calls. While PSTN requires physical lines, all-IP<br />
is digital and requires nothing more than the<br />
Internet to be fully operational.<br />
It’s worth pointing out that the move to all-IP<br />
services isn’t just happening here in the UK.<br />
Some Scandinavian countries have completely<br />
switched, while Europe as a whole is moving<br />
towards all-IP networks.<br />
Although the BT ISDN ‘end of life’ of 2025<br />
hasn’t been set in stone, businesses will be<br />
unable to buy systems that use ISDN and PSTN<br />
after 2020. If you currently have a traditional<br />
ISDN/PSTN-based system, it’s recommended<br />
that you make plans now to look into the<br />
alternative. Although the switch-off isn’t for<br />
another seven years, it’s best to plan ahead and<br />
work towards migrating sooner rather than<br />
later after finding out all of the benefits the<br />
replacement IP-based systems have to offer.<br />
Set against the background of this transition<br />
development, the BSIA has been hosting highprofile<br />
Forum-style events across the UK<br />
focused squarely on how changes to the<br />
telecommunications network may affect the fire<br />
and security industries. The final events in the<br />
series will be held in Manchester and Belfast<br />
later in the year. Further information can be<br />
found on the BSIA’s website (www.bsia.co.uk).<br />
“There are approximately 29 million PSTN circuits still in use across the<br />
UK. As of 2018, BT wants to convert as many of them as possible and,<br />
to attain the desired target figure by 2025, will need to convert the<br />
lines at a rate of 238,000 per month”<br />
18<br />
x<br />
RISKXtra<br />
Advertisement Feature<br />
Mitigating Terror in the Workplace<br />
While many of us plan and prepare for the<br />
practical side of disaster management,<br />
the questions around our team<br />
members’ safety are arguably the most difficult<br />
to address. Yet, with our most important assets<br />
being our people, is there perhaps more that<br />
we can – and should – be doing to protect them<br />
in the event of an incident?<br />
The type of incidents businesses face could<br />
vary greatly depending on a number of factors,<br />
from geography and the working environment<br />
through to individual ways of working and the<br />
job roles performed. Some examples include<br />
natural disasters (storms, earthquakes, floods<br />
and natural fires), man-made events (fires,<br />
airplane crashes, public transport disruption<br />
and road incidents), criminal activities<br />
(terrorism, shootings, riots and vandalism) and<br />
business continuity issues (such as power<br />
outages, water or gas leaks and cyber attacks).<br />
The number of terrorist attacks has also<br />
risen in recent years. In 2016, 77 countries were<br />
affected by terrorism, with Europe experiencing<br />
the greatest increase. Data revealed that there<br />
were 30 attacks in Western Europe in 2016<br />
compared to 23 in 2015, two in 2014 and five in<br />
2013. Such incidents are beyond our control<br />
and often take us by surprise.<br />
Businesses that once faced few large-scale<br />
threats are now witnessing a burgeoning<br />
number of events happening around them.<br />
Coupled with an increasingly varied and mobile<br />
workforce, this means that locating staff and<br />
managing the effects of an incident have<br />
become even more unpredictable and difficult<br />
issues for businesses to remedy.<br />
Managing employees<br />
Perhaps the first step (and the greatest<br />
challenge) in the aftermath of an incident is<br />
locating employees who could be affected and<br />
ensuring their safety.<br />
As more firms turn towards less traditional<br />
ways of operating, such as using remote and<br />
lone workers, manual methods are no longer a<br />
viable solution. Calling employees individually<br />
is far too time-consuming during a time-critical<br />
situation, while missing a call leaves both the<br />
employee and the employer in the dark.<br />
Fortunately, developments in technology<br />
and the widespread use of mobile devices are<br />
providing solutions to many of our incident<br />
management challenges. Whether it be warning<br />
individuals of a nearby incident, providing<br />
peace of mind for friends, family and employers<br />
or communicating practical advice necessary<br />
for keeping safe, technology is able to offer a<br />
solution. How, though, can technology provide<br />
a way for businesses with a large and varied<br />
workforce to locate and protect their staff?<br />
Introducing IncidentEye<br />
At StaySafe, we’ve recently launched a new app<br />
called IncidentEye, which has been specifically<br />
designed to help organisations locate and<br />
protect employees as quickly and effectively as<br />
possible during an emergency. IncidentEye<br />
allows end users to quickly answer the most<br />
important questions a business faces in the<br />
aftermath of an event (ie are my employees in<br />
the affected area and are they safe?)<br />
The IncidentEye app can be distributed via<br />
MDM from the Apple App Store or Google Play<br />
and lays dormant on an employee’s phone until<br />
an incident is activated in the hub. Using<br />
geofencing, the affected area can be isolated<br />
on a map. All employees within the vicinity will<br />
be alerted via the app with details of the event<br />
and prompted to specify whether they’re safe<br />
or in danger. This enables the employer to<br />
focus on employees who need assistance, with<br />
no disruption for unaffected members of staff.<br />
IncidentEye maintains privacy by notifying<br />
employees whenever their location is collected.<br />
Location data should only ever be used for<br />
safety purposes which is maintained through a<br />
fair use policy and the inability to view location<br />
details without employee knowledge.<br />
When an incident is active, monitors can<br />
view employees’ safety status in real-time and<br />
respond accordingly. In-app messages may be<br />
sent to the affected individuals (or groups of<br />
individuals) complete with crucial information.<br />
For example, the end user organisation may<br />
choose to instruct those in the affected area to<br />
evacuate, warn those nearby to avoid the<br />
affected area or provide official Government<br />
advice on how to deal with the situation.<br />
Businesses are<br />
increasingly facing a<br />
growing number of<br />
large-scale incidents<br />
that can affect the<br />
well-being of<br />
employees and an<br />
organisation’s ability<br />
to operate. In the<br />
aftermath of a terror<br />
attack or other<br />
disaster scenario, any<br />
failure to respond<br />
effectively leaves the<br />
business and its<br />
employees vulnerable,<br />
while also costing<br />
valuable time and<br />
resources in the<br />
process. Alan Coulter<br />
searches for a solution<br />
Alan Coulter:<br />
Director of IncidentEye at<br />
StaySafe
x<br />
RISKXtra<br />
Smart GDPR Assurance for a Smarter World<br />
Something needs to<br />
change when you’re<br />
confronted by the<br />
present situation<br />
whereby devices<br />
professing to be<br />
‘Smart’ or part of a<br />
‘Smarter System’ ask<br />
for personal data, but<br />
are then easily hacked<br />
into by criminals such<br />
that valuable personal<br />
information can be<br />
stolen. In an exclusive<br />
article for Risk Xtra,<br />
James Willison and<br />
Sarb Sembhi examine<br />
stakeholder roles in<br />
achieving data<br />
protection (and<br />
security) by design<br />
and default in ‘Smart<br />
Projects’ with Internet<br />
of Things (IoT) devices<br />
We’ve just published a new approach to<br />
the European Union’s General Data<br />
Protection Regulation (GDPR) for<br />
security professionals and the stakeholders<br />
whom they deal with on a daily basis. The 40-<br />
page White Paper, which is sponsored by Axis<br />
Communications, stands out because, until<br />
now, many colleagues in the security world<br />
have lived under the mistaken assumption that<br />
GDPR compliance isn’t something that falls<br />
within their remit, but is instead managed<br />
either by legal, IT or compliance professionals.<br />
At least in part, this is based on the belief<br />
that their security teams are not data<br />
controllers or processors. As far as they’re<br />
concerned, the lengthy 200-plus pages of<br />
legislation issued by the EU isn’t something<br />
they need to worry about.<br />
However, the in-house security manager can<br />
often be described as a project manager in a<br />
large-scale surveillance system<br />
implementation, for example, and will therefore<br />
need to ensure that the devices and systems<br />
duly deployed are secure by both design and<br />
default. He or she should also work closely<br />
alongside others involved with the project to<br />
guarantee that the systems and devices<br />
employed harbour data protection (ie privacy)<br />
by design and default.<br />
In the first half of the White Paper, which is<br />
entitled ‘Smart GDPR Assurance for a Smarter<br />
World’, we cover in some detail the different<br />
ways in which the Internet and the increasing<br />
volume of data which connects to IoT systems<br />
has meant that personally identifiable<br />
information is now placed at a higher risk than<br />
it was back in the 1990s.<br />
As Professor Klaus Schwab, CEO of the World<br />
Economic Forum, has stated on page 59 of his<br />
book entitled ‘The Fourth Industrial Revolution’<br />
(published in 2016): “The digital<br />
transformations of industry mean that<br />
businesses will need to invest heavily in cyber<br />
and data security systems in order to avoid<br />
direct disruption by criminals and activists or<br />
unintentional failures in digital infrastructure.”<br />
This has led to the GDPR being written for<br />
the protection of the individual’s data privacy<br />
and security. It also usually means that the<br />
systems involved – and, indeed, those who<br />
manage them – often need to demonstrate<br />
compliance through the transaction of Data<br />
Protection Impact Assessments (DPIA) because<br />
of their large-scale nature and the use of<br />
innovative technologies such as biometrics and<br />
CCTV in ‘Smart Buildings’.<br />
IoT ‘Smart’ environments<br />
In our new White Paper, we’ve deliberately<br />
dedicated a chapter to those technologies,<br />
products and services related to large-scale IoT<br />
‘Smart’ environments and briefly outline some<br />
that have provided greater functionality, but<br />
that have also created increasing concerns in<br />
terms of the data collected (or around what<br />
that data is used for).<br />
This includes a consideration of key areas<br />
such as Big Data analytics, cloud computing,<br />
Artificial Intelligence, machine learning,<br />
sensors, medical devices, physical security<br />
systems, surveillance monitoring and Security<br />
Information and Event Management services.<br />
We then proceed to introduce scenarios such<br />
as ‘Smart Vehicles’ and ‘Smart Buildings’<br />
because these are prime examples of how<br />
stakeholders are involved in the protection of<br />
high volumes of data and, given the connection<br />
here to the individual (whether that’s a<br />
passenger or consumer), their privacy and<br />
security is vulnerable to attack from those with<br />
criminal intent on their minds.<br />
For the various owners of large IoT<br />
installations such as ‘Smart Buildings’ or<br />
‘Smart Cities’, for instance, processing data in<br />
compliance with the GDPR becomes something<br />
of a complex procedure since there’s a vast<br />
number of suppliers who contributed to the<br />
final working solution and may not have known<br />
20<br />
Data Protection Considerations for Smart Security Projects<br />
what they need to do in order to assist with<br />
that compliance.<br />
In the second half of the document, we group<br />
together important control mechanisms for all<br />
the stakeholders in a large IoT ‘Smart’ project.<br />
The various groups of obligations across the<br />
supply chain in order to comply with the GDPR<br />
can be broken down into the following:<br />
• the obvious legal obligations of data<br />
controllers and data processors to comply with<br />
the GDPR<br />
• the less obvious obligations of manufacturers<br />
to (a) comply with the clarified ‘Opinion’ of the<br />
Article 29 Working Party and (b) assist<br />
customers in complying more easily with their<br />
own legal obligations<br />
• the obligation of the pre-production suppliers<br />
to ensure that the service they provide assists<br />
the manufacturer in meeting its own obligations<br />
(and those of its customers)<br />
• the obligation of the post-production<br />
suppliers to ensure that the service they<br />
provide assists the manufacturer in meeting its<br />
own obligations (and those of its customers)<br />
The major difference between the last two<br />
here is that the third group could design data<br />
protection and security into the product or<br />
service at an earlier stage of the development,<br />
whereas the fourth group mainly implements<br />
the controls once they’re already built into the<br />
product or service provided.<br />
Our White Paper is targeted at the last three<br />
groups on the assumption that most data<br />
controllers and data processors know they<br />
need to comply with the GDPR. To help in<br />
attaining that state of compliance, we’ve<br />
included collated lists of seven groups of<br />
control mechanisms, in turn enabling the<br />
supply chain stakeholder to ensure that it’s<br />
providing added value to be competitive and<br />
make IoT products and services more secure<br />
with built-in functionality which places data<br />
protection at the very heart of the service.<br />
“The digital transformations of industry mean that businesses<br />
will need to invest heavily in cyber and data security systems<br />
in order to avoid direct disruption by criminals and activists or<br />
unintentional failures in digital infrastructures”<br />
Pre- and post-production phases<br />
We focus on the role of manufacturers, project<br />
managers, designers, consultants, software<br />
suppliers and installers in the pre-production<br />
and post-production phases of any large-scale<br />
project. What we discuss applies to SMEs who<br />
could be component manufacturers or codemakers.<br />
Hence, there’s the inclusion of small<br />
and medium-sized enterprises (SMEs) who<br />
might act as suppliers to the larger enterprise.<br />
In fact, it’s often SME data which is less<br />
secure and provides an ‘easy way in’ for a cyber<br />
attacker to gain access to personal information<br />
which might then engender a large fine from<br />
the Information Commissioner’s Office postinvestigation.<br />
It’s now vital that project<br />
managers who are responsible for these<br />
systems give the organisation assurance that<br />
valuable information is protected. Failure to do<br />
so could mean quite serious implications for<br />
the security team as past cyber attacks have<br />
included compromises of HVAC as well as CCTV<br />
and other physical security systems.<br />
Should a hefty fine result, it’s then likely that<br />
questions will be asked of the security team. In<br />
point of fact, the largest fines to date for<br />
Target’s data breach have involved an HVAC<br />
system third party supplier.<br />
Our White Paper covers a wide range of<br />
principles and control mechanisms which, if<br />
readily practised, will make a real difference to<br />
the security strategy and management of these<br />
risks. We emphasise how large volumes of data<br />
and innovative technologies in large-scale<br />
projects such as ‘Smart Buildings’, ‘Smart<br />
Shopping’ and ‘Smart Healthcare’ now involve<br />
new requirements from the GDPR for DPIA.<br />
The security manager may not be required to<br />
lead the assessment, but he or she will need to<br />
understand a complex risk scenario (which our<br />
White Paper introduces). The project manager<br />
can evidence good security practise by<br />
requiring stakeholders – ie the systems<br />
manufacturers, designers, integrators and<br />
installers – to actively demonstrate that they’re<br />
following the legislation.<br />
We welcome Axis Communications’<br />
demonstrable commitment to the GDPR and its<br />
ongoing support for privacy and security by<br />
design and default, and also recognise the<br />
excellent work that the business has<br />
undertaken internally to achieve some of the<br />
recommendations proposed.<br />
Steven Kenny (industry liaison for<br />
architecture and engineering at Axis<br />
Communications) writes in the Foreword to our<br />
document: “GDPR compliance is the first step<br />
in winning back trust from a public wary of<br />
corporate overreach on issues of personal data.<br />
Companies that see beyond compliance and<br />
embrace the underlying logic of ‘privacy by<br />
design’ are the ones who’ll succeed in the long<br />
term in defending against cyber attacks and<br />
maintaining reputations. If the conversation has<br />
changed into something more positive, the<br />
challenges of GDPR compliance and developing<br />
a strong security culture remain.”<br />
James Willison BA MA MSyI:<br />
Founder of Unified Security<br />
Sarb Sembhi CISM is CTO and<br />
CISO at Virtually Informed<br />
It’s recommended that all<br />
stakeholders collaborate and<br />
establish diverse cross-functional<br />
teams, as discussed in the White<br />
Paper ‘Supporting Enterprise<br />
Security Risk Management: How<br />
Vendors Can Support ESRM and<br />
CSM’ (published by Unified<br />
Security Ltd in 2017)<br />
• To download copies of<br />
‘Smart GDPR Assurance for a<br />
Smarter World’ visit<br />
http://www.axiscommunications.com/<br />
smart-assurance-wp<br />
21<br />
www.riskxtra.com>
thepaper<br />
Business News for Security Professionals<br />
www.thepaper.uk.com<br />
The latest must-read financial and business information for professionals<br />
operating in the security and fire sectors<br />
News and Opinion, Business Matters, The View from Westminster,<br />
Technology Updates, Vertical Focus, Appointments<br />
EVERY FORTNIGHT: Details of M&A,<br />
Market Trends and Research<br />
PUBLISHED IN PRINT. Available<br />
only via<br />
subscription.<br />
Register online<br />
today!
x<br />
RISKXtra<br />
Building Management: Access Control<br />
Security is an extremely important aspect of<br />
managing any facility, of course, no matter<br />
how big or small the building may be. For<br />
many years, plenty of building owners and<br />
managers chose to establish highly visible<br />
patrol regimes conducted by security officers to<br />
reduce criminals’ opportunities to commit<br />
crime. Although such patrols act as a visible<br />
deterrent, the most effective option is a<br />
physical access control system such as a<br />
security portal that operates 24/7.<br />
These control systems provide the most<br />
effective way in which to allow authorised<br />
people entry, while acting as a deterrent or a<br />
physical barrier for the unauthorised. In<br />
addition, as well as providing unmanned<br />
security and preventing tailgating around the<br />
clock, a physical access control system can<br />
help companies keep track of the number of<br />
visitors entering the building each day.<br />
Tailgating, which is where a person gains<br />
entry to a building or restricted area without<br />
presenting a valid security permit such as an ID<br />
card or a badge, is one of the most common<br />
causes of unauthorised entry. Also known as<br />
‘piggybacking’, it can occur at any entrance or<br />
exit. All buildings are potentially vulnerable.<br />
In the majority of cases, tailgating happens<br />
unintentionally and is carried out by authorised<br />
personnel unwittingly (for example, when<br />
someone follows a colleague through a<br />
turnstile or speed gate without using their own<br />
pass, or when someone holds the door for<br />
another person, which people are inclined to do<br />
out of kindness). In strict access controlled<br />
environments, however, this can cause major<br />
problems as it may allow would-be intruders to<br />
gain easy entrance into sensitive and highly<br />
restricted parts of the building.<br />
People and assets placed at risk<br />
It’s worth noting here that it’s more common,<br />
and much easier, for an unauthorised person to<br />
gain access into a building or restricted area by<br />
closely following another person through an<br />
entrance, rather than duplicating security<br />
passes or hacking an IT system.<br />
Despite – in most cases – tailgating occurring<br />
innocently, it can put the safety of people and<br />
any assets stored in the building at risk should<br />
an intruder (or intruders) with malicious intent<br />
in mind enter a restricted area of the building in<br />
this way. In commercial buildings, it could also<br />
result in episodes of sensitive data being<br />
stolen, or perhaps valuables being removed<br />
from staff cloakrooms.<br />
For sectors such as the leisure industry,<br />
where controlled access is required, people<br />
may resort to tailgating to gain free entry,<br />
Techniques for Tackling<br />
the Tailgaters<br />
which results in a loss of revenue for<br />
businesses such as leisure centres and gyms.<br />
Once entrance control systems have been<br />
bypassed through tailgating, it’s almost<br />
impossible to confirm who has the right to be in<br />
the building and who doesn’t without rechecking<br />
everyone’s ID badge, card, biometrics<br />
or PIN. In addition, in the event of an<br />
emergency, if an individual isn’t recorded as<br />
being in the building, even if they do have the<br />
authority to be on the premises, then they’re<br />
unaccounted for during a headcount.<br />
It’s for these very reasons that a good deal of<br />
effort has gone into developing modern<br />
entrance control systems that actively prevent<br />
unauthorised access and tailgating.<br />
Many of the latest devices work by only<br />
permitting one authorised person to enter or<br />
leave the building at once using an intelligent<br />
physical barrier, or electronically by<br />
incorporating sensors that detect when an<br />
unauthorised individual attempts to ‘piggyback’<br />
their way into the building.<br />
Making the right choice<br />
When it comes to choosing an anti-tailgating<br />
device, the most appropriate system depends<br />
on the specific entry point that needs to be<br />
secured. The options range from mechanical<br />
and optical turnstiles and security portals<br />
through to smart access control systems<br />
integrated within a building’s existing<br />
infrastructure and access control system.<br />
Whether it’s a<br />
commercial office or a<br />
hospital, managers<br />
and owners must<br />
account for the safety<br />
of a building’s<br />
occupants. As times<br />
and technologies have<br />
changed, so too have<br />
the solutions available<br />
to provide more<br />
effective entrance<br />
security. Here, Iain<br />
Entwistle looks at the<br />
problems that can<br />
arise as a result of<br />
security ‘tailgating’<br />
and how this process<br />
can be prevented<br />
23<br />
www.riskxtra.com>
x<br />
RISKXtra<br />
Building Management: Access Control<br />
Iain Entwistle:<br />
Product Marketing Manager at<br />
Meesons A.I. Ltd<br />
Security portals can prevent unauthorised<br />
access and are a good choice where 24/7<br />
unmanned access control is required. Portals<br />
are a standalone air-lock unit providing a high<br />
level of security and very effective at preventing<br />
tailgating. Some such portals incorporate an<br />
APD (Anti-PiggyBacking Device) which scans<br />
the portal with an ultrasonic sensor to ensure<br />
that only one person has entered. If more than<br />
one person is present in the portal, an alarm is<br />
triggered and the transit is denied.<br />
APDs are therefore highly capable of<br />
detecting whether there’s more than one user<br />
in the portal at any given time.<br />
In larger portals, a two-zone pressure mat is<br />
usually incorporated to add an extra verification<br />
parameter, which requires the person to stand<br />
in a specification zone when inside. It’s worth<br />
bearing in mind that some systems using<br />
weight sensors require cutting into the floor<br />
and can have a maximum weight limit, resulting<br />
in additional works/cost or a solution that’s not<br />
fit for purpose. It’s always worth asking these<br />
kinds of questions before specifying a security<br />
portal as it avoids any complications and<br />
additional costs further down the line.<br />
In buildings such as banks and Data Centres<br />
and for Critical National Infrastructure, where<br />
higher levels of security are required, it’s<br />
recommended that alternative glazing is<br />
considered, including anti-vandal and bulletproof<br />
specifications. It may also be necessary<br />
to incorporate metal detectors into the portal.<br />
Further peace of mind for specifiers and end<br />
users is available through product approvals<br />
such as the Loss Prevention Standard LPS 1175<br />
that ensures the delay within ‘Deter, Detect,<br />
Delay’ to allow other security protocols to be<br />
actioned should a tailgating attempt escalate to<br />
a physical attack. LPS 1175 affords reassurance<br />
that products meet the highest security<br />
standards of intruder-resistant building<br />
components, strong points, security enclosures<br />
and free-standing barriers.<br />
Testing and surveillance audits<br />
Third party certification issued by the Loss<br />
Prevention Certification Board is based on a<br />
combination of testing and ongoing<br />
surveillance audits. Importantly, this provides<br />
security specifiers with another level of<br />
assurance that LPS 1175-rated security portals<br />
“Once entrance control systems have been bypassed<br />
through tailgating, it’s almost impossible to confirm who<br />
has the right to be in the building and who doesn’t without<br />
checking everyone’s ID badge, card, biometrics or PIN”<br />
will continue to deliver the performance<br />
achieved during testing procedures.<br />
Security portals for employee-only access<br />
points, such as service areas and back offices<br />
where higher numbers of staff may come and<br />
go, also reduce operating costs as the need for<br />
higher levels of security personnel is reduced<br />
within such areas.<br />
For mixed use developments, where a high<br />
aesthetic brief is set and a security team is<br />
already in place, speed gates are a popular<br />
choice. Anti-tailgating is incorporated through<br />
the use of sensors that cause the glass wings<br />
to close on unauthorised users who attempt to<br />
follow closely behind. When an attempt at<br />
tailgating takes place, security officers are<br />
alerted through an in-built alarm system, which<br />
can be programmed for manned intervention.<br />
In order to increase the level of security and<br />
assist officers still further, speed gates may be<br />
supplied with a unique pressure-sensitive<br />
cabinet top feature. This will sound an alarm<br />
and/or alert security via the access control<br />
system should an individual use the cabinet to<br />
attempt to climb over the glass wings.<br />
Option of remote control<br />
A ‘fail safe’ feature that can be activated during<br />
an emergency, thereby avoiding the need for a<br />
separate emergency exit, can also be<br />
incorporated into these designs.<br />
In addition, an optional control panel device<br />
for remote controlling of the speed gates,<br />
which can be free-standing or mounted to a<br />
desk, will allow security personnel or reception<br />
staff to control multiple lanes per panel.<br />
Bar turnstiles, which comprise a barrier arm<br />
that’s installed at waist height and electricallycontrolled<br />
using an access card, are also an<br />
option where minimal aesthetics are required.<br />
However, they do present a risk of individuals<br />
attempting to climb over or under the bar<br />
(although this issue has now been addressed<br />
by the development of infrared anti-climb<br />
sensors within systems that alert security<br />
personnel). There are also full-height turnstiles<br />
that present a more robust physical barrier.<br />
The options available to end users for<br />
increasing levels of building security are<br />
continuously developing, and particularly so<br />
when it comes to entrance control solutions<br />
designed to prevent tailgating. LPS 1175 is an<br />
important security standard for forced entry<br />
resistance. Security specifiers who select LPS<br />
1175-rated security portals can do so in the full<br />
knowledge that they offer a very robust<br />
entrance control solution that has the ability to<br />
stop malicious attackers attempting to gain<br />
forced entry in their tracks.<br />
24<br />
x<br />
RISKXtra<br />
Advertisement Feature: HVM Solutions Guide<br />
Blocking Tactics: Developments in HVM<br />
The use of vehicles as<br />
a means to undertake<br />
a range of crimes,<br />
whether they be acts<br />
of terrorism, ram-raids<br />
or attempts at<br />
vandalism, has been a<br />
prominent feature of<br />
news headlines<br />
throughout 2018.<br />
Risk Xtra outlines<br />
some of the latest<br />
security solutions<br />
available to practising<br />
risk management<br />
professionals<br />
With the ever-evolving nature of vehiclecentric<br />
criminal attacks requiring even<br />
greater innovation on the part of<br />
security professionals when it comes to<br />
mitigation, it’s good to know that there are<br />
specialist manufacturers on hand to ensure that<br />
individuals and companies can be protected<br />
from potential threats and that both buildings<br />
and their contents may be very well secured.<br />
One of those manufacturers, namely Heald,<br />
invests significant funds in R&D to enhance the<br />
range and functionality of products available on<br />
the market that meet the needs of whichever<br />
perimeter needs to be protected. This has led<br />
to the company’s award-winning Matador<br />
product evolving to fit a variety of end user<br />
requirements. Available as a static or sliding<br />
bollard and in surface or shallow mount<br />
configurations, the Matador has developed to<br />
offer multiple power functions including<br />
hydraulic and electro-mechanical.<br />
While used to protect some of the world’s<br />
most prestigious buildings and pedestrianised<br />
areas (such as the historic French Quarter in<br />
New Orleans), the Matador is also the perfect<br />
solution for temporary events due to its quick<br />
and easy installation and the ability to operate<br />
this solution from a generator or temporary<br />
power supply. Earlier this year, the Matador<br />
secured the World Snooker Championships,<br />
held as always at The Crucible in Sheffield.<br />
The only product of its type available on the<br />
market to be IWA 14 tested to halt a 7.2-tonne<br />
truck travelling at a speed of 40 mph, the<br />
Matador offers a static solution, but can secure<br />
a perimeter in such a way that still enables<br />
access to authorised vehicles and emergency<br />
responders in the event of an incident occurring<br />
within the perimeter zone.<br />
Risk and security managers should note that<br />
Heald designs and manufactures a range of<br />
perimeter protection products, from road<br />
blockers and bollards right through to other<br />
forms of traffic control solutions.<br />
Range of services<br />
Frontier Pitts is the award-winning British<br />
manufacturer of security gates, automatic<br />
barriers, road blockers, rising and static<br />
bollards, pedestrian control gates, turnstiles<br />
and the Terra HVM range which has been<br />
successfully IWA 14 and PAS 68 impact-tested.<br />
From its UK headquarters in Crawley, Sussex,<br />
Frontier Pitts can provide a complete range of<br />
services including design, site surveys,<br />
manufacture, installation and maintenance.<br />
Since 2004, the business has fulfilled<br />
customers’ requirements to protect their sites<br />
from acts of terrorism where a vehicle may be<br />
used as a weapon. Today, Frontier Pitts has the<br />
complete range of its impact-tested products<br />
listed within the Centre for the Protection of<br />
National Infrastructure’s (CPNI) catalogue of<br />
such solutions. This includes a range of HVM<br />
solutions to mitigate ‘vehicle as a weapon’-<br />
style attacks. The company’s Terra gates, Terra<br />
barriers, Terra blockers and a wide range of<br />
rising and static Terra bollards have all been<br />
impact-tested to IWA 14 and PAS 68.<br />
Retractable bollards<br />
One of Frontier Pitts’ latest products is the HVM<br />
PAS 68 Terra Quantum side-folding retractable<br />
bollard. With a shallow foundation depth of<br />
only 450 mm required on site, the Terra<br />
Quantum bollard has been successfully PAS 68<br />
impact-tested to halt a 7.5 tonne vehicle<br />
travelling at a speed of 30 mph (48 kph),<br />
resulting in zero penetration.<br />
With the security threat ever-changing,<br />
Frontier Pitts has also designed the LPS 1175 bifolding<br />
and sliding Platinum Security Gate<br />
range to Security Rating 2 and 3, which means<br />
that this solution is proven to withstand<br />
forcible attack by an intruder using readily<br />
available hand tools.<br />
Security and risk managers should note that<br />
the Terra Diamond turnstile boasts a Security<br />
Rating of 3 and 4 and has been ‘Approved for<br />
Government Use’ by the CPNI.<br />
To mitigate multiple threats, it’s the case<br />
that a layered security approach should be<br />
employed. LPS 1175-rated security gates can be<br />
interlocked and backed-up by HVM equipment<br />
in order to achieve the ultimate protection.
INTRODUCING HEALD’S<br />
NEW ELECTRO MECHANICAL<br />
PRODUCT RANGE<br />
BE SMART!<br />
Read Risk Xtra Magazine on<br />
your tablet or smartphone<br />
using the FREE app<br />
OUR EM RANGE USES<br />
60% LESS ELECTRICITY<br />
TO OPERATE!<br />
QUICKER INSTALL<br />
REDUCED CARBON FOOTPRINT<br />
NO LARGE CABINET<br />
FIND OUT MORE AT<br />
INTERNATIONAL SECURITY EXPO<br />
STAND NUMBER K50<br />
28 - 29 NOVEMBER<br />
www.heald.uk.com<br />
+44(0)1964 535858<br />
info@heald.uk.com<br />
Heald Ltd<br />
@healduk
2018<br />
OLYMPIA LONDON, 28 – 29 NOVEMBER 2018<br />
EVOLVING SECURITY<br />
THROUGH INNOVATION<br />
12,500+<br />
Global Visitors<br />
350+<br />
Commercial &<br />
Homeland Exhibitors<br />
110+<br />
Countries<br />
Represented<br />
Topics covered<br />
Global Counter Terrorism<br />
Crisis Response & Business Continuity<br />
Critical National Infrastructure<br />
Hotel, Retail, Night Time Economy<br />
& Education Security<br />
NEW for 2018<br />
Cyber, IT and Data Security<br />
Designing Out Terrorism<br />
Major Events & Stadium Security<br />
Building & Facilities Management<br />
Transport & Border Security<br />
Back by popular<br />
demand<br />
INTERNATIONAL SECURITY EXPO<br />
Hear from cities<br />
blighted by recent<br />
terrorist attacks<br />
Protecting Urban Spaces<br />
Physical products showcased in an urban and crowded places environment with scenario based live demonstrations.<br />
Bollards, blockers, street furniture and more over watched by CCTV surveillance and tracking all feeding back to a central control room.<br />
NOT TO BE MISSED!<br />
Free to attend register now: www.internationalsecurityexpo.com
FIRE SAFETY<br />
Management & Installation<br />
Fire Protection and Prevention<br />
with Technology and Innovation<br />
x<br />
Special Supplement in association with:<br />
RISKXtra
FIRE SAFETY<br />
What you need to know about installing<br />
fire detection and alarm systems<br />
What do you need to know in order to safely and correctly install a fullyfunctioning<br />
fire detection and alarm system within a building?<br />
There are many aspects at play here: fire safety<br />
legislation, Building Regulations, Health and<br />
Safety (since there’s plenty of opportunity for<br />
accidents when working with tools and up ladders)<br />
and knowing what to do with the old equipment<br />
(there are laws governing disposal of electrical<br />
waste). These are not necessarily the first things<br />
that spring to mind. Having a secure knowledge of<br />
system components, fault-finding and installation<br />
methods are the far more visible and vital parts of<br />
the role, but all of the above help towards<br />
broadening the installer’s knowledge.<br />
Luckily, all of the above can be learned on the<br />
Fire Industry Association’s (FIA) new qualification<br />
pathway. The qualification pathway is currently the<br />
only pathway of courses that will lead to a<br />
nationally recognised qualification set at Level 3 on<br />
the Regulated Qualifications Framework. This<br />
translates as a Level 4 on the European<br />
Qualifications Framework, meaning that those<br />
individuals undertaking the qualification will meet<br />
the level specified in the EN 16763 Services<br />
Standard, which was released last year.<br />
EN 16763 ‘Services for Fire Safety and Security<br />
Systems’ outlines the minimum levels of education<br />
that technicians should have at their disposal.<br />
Although not mandatory by law, the Services<br />
Standard specifies that those working on a system<br />
should be qualified to at least Level 3 on the<br />
European Qualifications Framework.<br />
In a nutshell, EN 16763 lays out a Europe-wide<br />
benchmark of quality that should be expected and<br />
maintained throughout the industry. It sets out all<br />
the prerequisites for the levels of skill, knowledge<br />
and education that should be expected.<br />
EN 16763 is all about hitting quality standards<br />
for fire safety systems, focusing on who’s actually<br />
doing the work and whether they’re doing it<br />
correctly. With life safety systems, it really isn’t<br />
acceptable that, in 2018, people are able to claim<br />
that they can do the job without a certain level of<br />
expertise behind them, but that’s what this<br />
standard aims to define. The message is clear –<br />
education is key. Fire detection and alarm installers<br />
must be educated to at least Level 3 on the<br />
European Qualifications Framework.<br />
“The FIA’s<br />
qualification pathway<br />
is currently the only<br />
pathway of courses<br />
that will lead to a<br />
nationally recognised<br />
qualification set at<br />
Level 3 on the<br />
Regulated<br />
Qualifications<br />
Framework”<br />
30<br />
www.riskxtra.com
Thankfully, those taking the installation<br />
qualification can rest assured in the knowledge<br />
that they’ll be able to both meet and exceed the<br />
standard, providing employers with quality<br />
technicians and the customers of installation<br />
companies with greater confidence in the level of<br />
skill that they’re purchasing.<br />
Qualification structure<br />
There are four units to complete in order to become<br />
qualified, and each has a range of topic areas that<br />
are taught in detail from a syllabus set by the FIA’s<br />
Awarding Organisation (ie the examination body).<br />
(1) Foundation Course<br />
(2) Health and Safety<br />
(3) Environmental<br />
(4) Advanced Installer<br />
Although these courses are numbered 1-4 in<br />
this list, it’s important to note that this is just a<br />
suggested order of study. The learner must study<br />
the Foundation Course first and then the remaining<br />
three units of the qualification can be studied in<br />
any desired order of preference.<br />
After passing all four units, the learner will then<br />
be awarded the FIA Awarding Organisation’s Level<br />
3 in Fire Detection and Alarm Installation, Theory<br />
and Regulatory Requirements.<br />
“In a nutshell, EN 16763 lays out a Europe-wide benchmark of<br />
quality that should be expected and maintained throughout<br />
the industry. It sets out all the prerequisites for the levels of<br />
skill, knowledge and education that should be expected”<br />
(8) System Design (according to the requirements<br />
of BS 5839)<br />
(9) Explosive Environments<br />
(10) False Alarms and Unwanted Fire Signals<br />
Health and Safety<br />
The eight areas of study necessary for this unit are<br />
as follows:<br />
(1) Health and Safety Legislation<br />
(2) Manual Handling<br />
(3) Working at Heights<br />
(4) Lone Workers<br />
(5) Provision and Use of Work Equipment<br />
Foundation course<br />
This unit is the first unit to be studied on the<br />
qualification pathway. The Foundation in Fire<br />
Detection and Alarms is a two-day intensive course<br />
and runs throughout the year at locations across<br />
the UK. Training is delivered by professionals<br />
within the fire industry who have a background of<br />
both training and extensive technical expertise.<br />
Instruction is delivered in class through means of<br />
PowerPoint presentation and a course handbook.<br />
As the name ‘Foundation’ suggests, this course<br />
covers a broad base of knowledge that will prepare<br />
learners to undertake further fire detection and<br />
alarm courses. There are ten areas within the<br />
syllabus and all of these are assessed.<br />
Throughout the course, all of the areas are<br />
covered by the trainer. More extensive notes are<br />
available in the course Handbook, which is given to<br />
learners on the first day of study.<br />
The ten areas of study are as follows:<br />
(1) Legislation<br />
(2) Standards, Codes of Practice, Guidance and<br />
Technical Notes<br />
(3) Working with Third Parties<br />
(4) Documentation<br />
(5) Fire Events<br />
(6) Passive protection<br />
(7) Fire Detection and Alarm System Technology<br />
www.riskxtra.com<br />
31
FIRE SAFETY<br />
“All pre-learning materials are freely available whether<br />
you’ve booked a course or not, so you can get started even<br />
before you’ve booked. However, attendance in class is a<br />
necessary part of the qualification, so these two methods of<br />
study should complement each other”<br />
About the FIA<br />
The FIA (Fire Industry<br />
Association) is a not-forprofit<br />
organisation. We’re<br />
the leading Trade<br />
Association for the fire<br />
industry in the UK. The<br />
education and training that<br />
we offer through our<br />
qualifications and industry<br />
recognised courses exists<br />
to provide you with a high<br />
level of knowledge and<br />
understanding that will<br />
help to develop your career<br />
and build your business.<br />
Our courses are<br />
delivered by experienced<br />
professionals from the<br />
industry, who can not only<br />
deliver the learning, but<br />
also answer questions and<br />
provide real-life examples,<br />
enabling all delegates to<br />
deliver excellent results for<br />
their host organisations.<br />
In tandem with our<br />
website (www.fia.uk.com),<br />
we aim to provide a service<br />
that both contributes to<br />
and promotes technical<br />
developments in the<br />
industry. Standards are<br />
constantly being revised<br />
and updated and it’s vital<br />
to stay up-to-date with the<br />
changes. By taking our<br />
qualifications and courses<br />
and using our extensive<br />
Resource Library, you can<br />
be sure that you’ll be well<br />
informed of any changes as<br />
and when they happen.<br />
Regulations (PUWER)<br />
(6) Personal Protective Equipment (PPE)<br />
(7) Asbestos<br />
(8) Control of Substances Hazardous to Health<br />
(COSHH)<br />
Environmental<br />
This unit also has eight areas of study. These are:<br />
(1) Environmental Law<br />
(2) Restriction of the Use of Certain Hazardous<br />
Substances in Electrical and Electronic Equipment<br />
(RoHS)<br />
(3) Waste Electrical and Electronic Equipment<br />
(WEEE)<br />
(4) Waste Management<br />
(5) Energy Consumption<br />
(6) Ionising Radiation Regulations IRR17<br />
(7) F-Gas<br />
(8) Ozone-Depleting Substances (ODS) (Halon)<br />
Advanced Installer<br />
This unit is designed to further develop knowledge<br />
and understanding gained in completing the<br />
Foundation Course. While the Foundation<br />
introduces a range of topic areas, this unit focuses<br />
in even further, examining how fire safety law,<br />
Codes of Practice and guidance can be applied to<br />
the role of the systems installer.<br />
You will then develop your knowledge and<br />
understanding into the application of systems<br />
installation, systems testing and fault-finding and,<br />
of course, the documentation necessary for<br />
installation and handover to other key<br />
stakeholders (including commissioning<br />
technicians and end users).<br />
The course has five areas of study (labelled A-E<br />
on the syllabus set by the FIA Awarding<br />
Organisation). These are as follows:<br />
(1) BS 5839/IS 3218<br />
(2) The Construction (Design and Management)<br />
Regulations (CDM) 2015<br />
(3) Building Regulations<br />
(4) Installation Methodology<br />
(5) Documentation<br />
Assessment procedure<br />
Long gone are the days of putting pen to paper<br />
(well, maybe not so long). All assessments on the<br />
qualification pathway are taken digitally on a<br />
tablet at the end of each individual unit.<br />
The assessment for each course is a series of<br />
multiple choice questions designed to challenge<br />
the knowledge and understanding of the learner.<br />
As the learner progresses from the Foundation<br />
Course to the other units, the knowledge gained in<br />
previous units will be built upon and tested.<br />
As with all formal examinations, the usual rules<br />
apply: no talking, texting, conferring or reference<br />
material allowed. However, the advantage here is<br />
that those walking out of the examination can be<br />
proud of the fact that they passed on their own<br />
brain power and knowledge alone (and, later on,<br />
can use that knowledge in the workplace).<br />
Pre-learning materials<br />
For those worried about examinations, fear not.<br />
The FIA has put together a number of pre-learning<br />
materials that are freely available on our website.<br />
A word of advice... Use the pre-learning<br />
materials to study before attending the course and<br />
don’t neglect this. These are an important part of<br />
the course and help learners on the way towards<br />
achieving a pass for the qualification.<br />
Those who do pre-study tend to do a lot better<br />
on the courses than those who don’t, purely<br />
because attending the courses will then draw on<br />
anything you may have learned through self-study<br />
and develop that knowledge even further.<br />
All pre-learning materials are freely available,<br />
whether you’ve booked a course or not, so you can<br />
get started even before you’ve booked. However,<br />
attendance in class is a necessary part of the<br />
qualification, so these two methods of study<br />
should complement each other to realise a more<br />
rounded learning experience.<br />
Other courses<br />
The FIA will be releasing other units in<br />
Maintaining, Designing and Commissioning Fire<br />
Alarm Systems over the coming weeks and months<br />
(at the time of writing one of the units listed is<br />
gearing up for release), so now is the perfect<br />
moment to start on the initial units if you’re<br />
interested in becoming qualified.<br />
The best way in which to remain up-to-date with<br />
the latest developments is to head to the FIA’s<br />
website and sign up for the training newsletter.<br />
Simply go to www.fia.uk.com and click ‘Sign up<br />
to e-News’ at the top of the page<br />
www.fia.uk.com<br />
32<br />
www.riskxtra.com
TCP/IP<br />
network<br />
PAVIRO<br />
Public Address and Voice Evacuation System<br />
with Professional Sound Quality<br />
Flexibility from the start<br />
PAVIRO offers you smart features making system specification and installation faster, simpler<br />
and more efficient than ever before. Design a complete system with just a few parameters. Avoid<br />
unexpected costs thanks to the system’s extreme flexibility and low operational costs. What‘s<br />
more? The new Dante network interface module ensures IP networking functionality allowing<br />
larger areas with more audio channels with up to four decentralized controllers.<br />
Find out more at boschsecurity.com
FIRE SAFETY<br />
Hochiki launches FIREscape+<br />
FIREscape+ features<br />
Hochiki Europe’s<br />
highly successful and<br />
cost-effective<br />
FIREscape emergency<br />
lighting system, as<br />
well as its ESP<br />
intelligent range of<br />
fire detection products<br />
Hochiki Europe brings combined<br />
emergency lighting and fire<br />
detection system to market<br />
ochiki Europe, the leading manufacturer of<br />
Hlife safety solutions, has launched<br />
FIREscape+, an innovative system which<br />
combines emergency lighting, fire detection and<br />
wayfinding technology. The solution, which is<br />
the first of its kind, significantly enhances<br />
building occupants’ safety during an emergency,<br />
while simultaneously offering additional<br />
efficiencies for building owners.<br />
FIREscape+ features Hochiki Europe’s highly<br />
successful and cost-effective FIREscape<br />
emergency lighting system, as well as its ESP<br />
intelligent range of fire detection products. By<br />
combining the two ranges and creating dual<br />
function exit signs, Hochiki Europe can now<br />
offer integrated life safety and innovative<br />
wayfinding technology in one system.<br />
Innovative wayfinding<br />
In the event of a fire, dynamic emergency exit<br />
signs will illuminate with a red cross to prevent<br />
building occupants using an escape route<br />
compromised by fire. Meanwhile, in unaffected<br />
areas, the exit signs will illuminate with the<br />
internationally recognised BS EN ISO 7010 green<br />
graphic to safely guide building occupants to<br />
the closest available emergency exit. This<br />
ensures that building occupants are given the<br />
best possible opportunity to escape, even if<br />
they’re unfamiliar with the building layout.<br />
Intelligent false alarm<br />
management<br />
The integration of Hochiki Europe’s Enhanced<br />
Systems Protocol technology also offers a<br />
number of benefits when it comes to false alarm<br />
management. Every 24 hours, the system<br />
checks for any changes to the environment and<br />
recalibrates the sensors to suit.<br />
In addition, each sensor can be individually<br />
adjusted to match the expected risk of its<br />
environment, while alarm verification<br />
technology uses time delay algorithms to<br />
eliminate unwanted alarms. These features help<br />
to ensure that the life safety system operates at<br />
optimum performance at all times.<br />
Efficient installation and<br />
maintenance<br />
FIREscape+ is the only truly combined fire<br />
detection and emergency lighting solution<br />
currently available on the market. A single panel<br />
controlling both fire detection and emergency<br />
lighting units on a single low voltage cable can<br />
cut costs by up to 40%.<br />
Ian Watts, emergency lighting manager at<br />
Hochiki Europe, noted: “We know that our<br />
customers, and especially those working with<br />
large premises, want to be able to specify and<br />
install the most effective life safety solutions at<br />
an affordable cost. By integrating our fire<br />
detection and emergency lighting technology,<br />
we’re able to offer an innovative range that<br />
helps them do just that.”<br />
Watts added: “The launch of FIREscape+ has<br />
been greatly anticipated. Now, the release to<br />
market marks another exciting development for<br />
Hochiki Europe and a great milestone for the<br />
Hochiki Corporation, which celebrates its 100th<br />
Anniversary this year.”<br />
For more information about FIREscape+ visit<br />
www.hochikieurope.com/product/firescapeplus<br />
34<br />
www.riskxtra.com
What Fire System Would You Choose<br />
to Protect Scotland’s Most Sacred Site?<br />
Iona Abbey is a globally important<br />
heritage site, only accessible by two<br />
ferry rides, when the weather allows.<br />
You can imagine the fire protection<br />
challenges.<br />
It’s protected by an Advanced intelligent<br />
fire system, because our products lead the<br />
way in performance, reliability and ease-ofuse.<br />
From simple sites to large, challenging<br />
networks we continue to set the Standard in<br />
Fire Systems around the world.<br />
Contact us now for a demo or to discuss your site.<br />
www.advancedco.com<br />
Tel: +44 (0)1670 707 111 Fax: +44 (0)1670 707 222<br />
Email: sales@advancedco.com Web: www.advancedco.com
FIRE SAFETY<br />
Pulse Alert VADs<br />
lower installation<br />
costs, making the<br />
latest fire evacuation<br />
technology affordable<br />
and, importantly,<br />
without compromising<br />
performance<br />
EN54-23 for VADs<br />
Pulse Alert Technology is fully<br />
compliant with EN54-23, the<br />
European Standard for Visual<br />
Alarm Devices (VADs). EN54-<br />
23 specifies the minimum<br />
performance requirements for<br />
VADs, providing performance<br />
criteria and test methods in a<br />
uniform and consistent way.<br />
This affords manufacturers a<br />
mechanism to specify VAD<br />
device performance, allowing<br />
system designers to choose<br />
the most appropriate device<br />
for a particular application<br />
Pulse Alert Technology<br />
Fire alarm systems should be able to evacuate Sonos Pulse and Nexus Pulse LED circuits are both<br />
everyone. Relying on audible fire alarm<br />
designed to provide over five years of continual<br />
notification alone, however, disadvantages operation without any degradation of light output<br />
those individuals with hearing impairments or • Lens Technology The optics for both ceilingmount<br />
and wall-mount versions are optimised to<br />
those working or living in a sound-reducing<br />
environment. Even something as simple as wearing produce an even light dispersion over the covered<br />
a pair of headphones could prevent someone from area. This minimises ‘hot spots’ and ensures that<br />
hearing an audible fire evacuation warning. In all of the available light is contributing towards<br />
order to truly evacuate everyone from a building, alerting people of a fire emergency<br />
fire alarms should signal effectively using light as<br />
well as sound.<br />
Coverage details<br />
Klaxon Signals’ Pulse Alert Technology is a The simpler an evacuation system is, the more<br />
beacon warning system which produces a light effective it’s likely to be. Sonos Pulse and Nexus<br />
output that can protect most rooms with just a Pulse fulfil evacuation requirements with just a<br />
single device. Using new LED lighting technology single device for most rooms. Ceiling-mounted<br />
derived from automotive applications, it disperses devices are rated at 15-metre diameter coverage,<br />
light evenly and efficiently, maximising its<br />
while wall-mounted devices can cover an 11.5 x 11.5<br />
effectiveness. The solution’s<br />
square metre room. System<br />
patented electronic design also<br />
design requirements are<br />
maximises electrical efficiency<br />
therefore made easier,<br />
and reduces current<br />
evacuation messages are<br />
consumption, minimising the<br />
clearer and more people are<br />
cost of ownership and allowing<br />
protected than ever before.<br />
more devices to be installed on<br />
a single alarm system.<br />
Energy efficiency<br />
Pulse Alert Technology<br />
Pulse Alert technology ensures<br />
provides all the benefits that an<br />
that Klaxon’s VADs notify all<br />
EN54-23-compliant system can<br />
personnel of a fire emergency<br />
bring, while answering all of the<br />
while also reducing the power<br />
design challenges in doing so. This<br />
consumption of each device. This means<br />
means a greater coverage area with lower current that systems can be upgraded without imposing<br />
consumption and greater flexibility for system any restrictions on the number of devices used or<br />
designers, as well as reduced cost of ownership for compromising system performance.<br />
end users – all without compromising on<br />
Low power consumption is vital to fire system<br />
evacuation notification performance.<br />
designers and installers – Sonos Pulse and Nexus<br />
Pulse ensure that all buildings can realisee the<br />
Pulse Alert Technology<br />
very best fire evacuation scenario.<br />
Pulse Alert is able to provide EN54-23-compliant<br />
visual alarm signalling without any increase in Low installation costs<br />
power consumption because of three technological Pulse Alert VADs devices lower installation costs,<br />
breakthroughs:<br />
making the latest fire evacuation technology<br />
• Intelligent Power Management Pulse Alert affordable and without compromising<br />
converts power intelligently, minimising power performance. A wider coverage area per device<br />
usage and presenting a near-perfect current source reduces both the number of devices required and<br />
to fire alarm panels. This means the Sonos Pulse expensive cabling requirements, while in parallel<br />
and Nexus Pulse VADs require less power than low current consumption removes the need for<br />
previous models, while also exceeding EN54-23 additional power supplies.<br />
light output requirements<br />
With a greater coverage pattern, fewer devices<br />
• LED Drive Pulse Alert features the latest high are needed to cover open areas. Sonos Pulse<br />
power LED technology and advanced LED drive ceiling-mount units have a 15-metre coverage<br />
circuitry, further improving efficiency, light output diameter capable of covering a 10 x 10-metre room<br />
performance and long-term device reliability with a single device.<br />
36<br />
www.riskxtra.com
FIRE SAFETY<br />
End-to-End Fire Protection<br />
Integrating fire alarm<br />
and voice evacuation<br />
systems into networks<br />
on an IP-level<br />
emerges as a futureproof<br />
strategy with<br />
significant benefits<br />
uk.boschsecurity.com<br />
38<br />
The combination of fire alarm and voice<br />
evacuation systems has emerged as the<br />
status quo over the past few years across a<br />
wide range of sites. Significant safety benefits<br />
arise from combining fire alarms with clear voice<br />
alarm capabilities as studies have demonstrated<br />
that voice alarm with clear instructions<br />
significantly improves fire evacuation times when<br />
compared to mere noise alarms.<br />
Future levels of technology and automation in<br />
buildings and industrial facilities are only going to<br />
rise. Electrical hazards, combustible chemicals and<br />
complex as well as extensive cabling have further<br />
increased the fire loads. Smouldering cable fires<br />
develop slowly and over extended periods of<br />
overheating, subsequently placing high demands<br />
on an addressable system of panels for fire<br />
detection at an early stage. These IP-based<br />
solutions are ideally combined with voice<br />
evacuation to move people out of dangerous areas<br />
as fast and efficiently as possible.<br />
Need for IP network integration<br />
However, the combination of fire alarm and voice<br />
evacuation doesn’t equal integration of these<br />
systems on a network level. In many installations,<br />
fire detection and emergency PA technologies<br />
currently co-exist as separate systems, which can<br />
prove to be somewhat roblematic.<br />
Bosch covers fire detection and evacuation with<br />
a suite of compatible solutions. The company’s<br />
modular Fire Panel 5000 Series includes highquality<br />
panels and peripherals designed for<br />
accurate and early detection and high immunity to<br />
false alarms. A typical network can encompass 20<br />
panels with up to 32,000 detection points. At<br />
Munich Airport, the company has installed 19<br />
panels and 18,000 automatic fire detectors.<br />
On the other side, Bosch’s proven Plena,<br />
Praesideo and PAVIRO voice evacuation systems<br />
deliver clear voice messages, including prerecorded<br />
warnings for emergency situations. In<br />
terms of scalability, the Plena Voice Alarm System<br />
supports small applications with up to six zones<br />
and 254 fire detectors, while PAVIRO supports<br />
medium-sized venues with up to 492 zones and<br />
2,000 detectors. Praesideo secures larger<br />
buildings and complex configurations.<br />
Interfacing these two technologies is simple.<br />
Without the need for additional hardware or<br />
cables, Bosch’s Smart Safety Link creates a standalone<br />
interface between voice evacuation and fire<br />
alarm systems in buildings of all sizes. It requires<br />
no installation of additional General Purpose Inand<br />
Outputs between voice evacuation controllers<br />
to distribute the alarm trigger, in turn bringing<br />
down installation times.<br />
Enhanced functionality and scalability<br />
Aside from ease of installation, Bosch’s Smart<br />
Safety Link achieves new levels of building safety<br />
by creating a single IP-based interface (or multiple<br />
interfaces) between the company’s performanceproven<br />
fire alarm and voice evacuation systems.<br />
Fully customisable to client specifications, the<br />
scalable system supports a new generation of<br />
dynamic evacuation protocols for a fast and<br />
targeted emergency response.<br />
These protocols include phased evacuation or<br />
multi-staged dynamic evacuation targeted to<br />
specific zones in a building (for instance to give<br />
priority to evacuating people in closer vicinity to a<br />
fire). The system provides targeted acoustic and<br />
visual signals to guide people to safety and can be<br />
configured into six-to-500 zones depending on<br />
building size and complexity. This also allows for<br />
evacuating large buildings such as Shopping<br />
Centres, train stations or industrial facilities in<br />
several phases in order to ensure orderly vacation<br />
of the building and prevent panic or delays.<br />
The system is also highly scalable. With only<br />
one fully-expanded panel, complex medium-sized<br />
systems with up to 4,000 detection points can be<br />
created. The networking of several panels lends<br />
itself to wide area coverage at large sites and<br />
between facilities across property lines.<br />
In addition, the combination of Ethernet and<br />
controller area networking allows the greatest level<br />
of flexibility for all kinds of applications, as well as<br />
the connection of even more panels in a single<br />
network structure.<br />
The system can exchange data with<br />
infrastructure solutions such as the Building<br />
Integration System via open IT standards including<br />
OPC. This unlocks a range of possibilities for<br />
integration with other critical infrastructure<br />
systems (such as video surveillance infused with<br />
intelligence and building automation).<br />
Ultimately, investing in the integration of fire<br />
alarm and voice evacuation systems provides<br />
buildings of all types and sizes with end-to-end fire<br />
protection, from early-stage detection through to<br />
an orderly evacuation. It also affords system<br />
operators the peace of mind of knowing that their<br />
systems are future-proof in light of fire safety<br />
legislation as well as technological progress.<br />
www.riskxtra.com
FIRE SAFETY<br />
Kentec introduces<br />
four-way Relay Unit<br />
New unit eases maintenance without<br />
compromising safety on site<br />
entec, a leading life safety<br />
Kcontrol systems manufacturer, has launched a four-way<br />
Relay Unit aimed at both conventional and addressable<br />
extinguishing systems in order to enable key maintenance to be<br />
undertaken without compromising safety.<br />
The four-way Relay Unit enables third party systems (eg<br />
HVAC, security and access control, etc) connected to the fire<br />
alarm panel to be isolated such that repairs and maintenance can<br />
be completed without compromising the integrity of the overall<br />
installation. Volt-free contacts mean that voltages are kept<br />
completely separate, in turn increasing overall system safety.<br />
The solution features four pairs of up to 125 V DC at 5 AMPs or<br />
250 AC at 10 AMPs-rated relay contacts housed in a robust sheet<br />
steel enclosure that can be operated using switch negative<br />
signals from up to four control panels. Isolated switches and<br />
status LEDs are provided for each relay.<br />
Kevin Swann, managing director at Kentec, has stated that the<br />
four-way Relay Unit is an important addition to Kentec’s portfolio<br />
of high quality and reliable safety control systems.<br />
“The Relay Unit enables easy isolation for installers and<br />
engineers,” explained Swann, “and with relays each up to 10<br />
AMPs, it has the capacity to isolate high power equipment. It’s<br />
the ideal demarcation point for third party equipment.”<br />
The UK’s leading<br />
independent manufacturer<br />
and supplier of Alarm<br />
System Products and<br />
Accessories for Building<br />
Infrastructure Systems
FIRE SAFETY<br />
Vimpex makes move into manufacturing<br />
Vimpex is a UK-owned business that has<br />
been at the forefront of fire alarm and<br />
evacuation equipment and alarm system<br />
accessory products for nearly 25 years. The<br />
company is proud to be a trusted distributor,<br />
and is now even more prouder to bring its<br />
expertise into the manufacturing of those same<br />
life-saving products.<br />
Thanks to a recent grant funding from bodies<br />
such as South East Business Boost, Southend<br />
Best Growth Hub, Manufacturing Growth<br />
Programme and, most valuably, Essex Rivers LLG<br />
(LEADER), the business has transformed itself<br />
into a specialist electronics manufacturer.<br />
This evolution in direction will now provide<br />
Vimpex with a platform for significant growth<br />
through increased efficiencies, development of<br />
its own products and IP – such as Identifire, Fire-<br />
Cryer and Hydrosense – along with an energetic<br />
push for growth through export. The company is<br />
excited by the opportunities created by this<br />
investment, which will see it develop markets<br />
for Vimpex-produced and distributed products.<br />
This move into a manufacturing model has<br />
allowed Vimpex to create a phenomenal<br />
capacity for business growth. Not only will the<br />
business grow financially though this move, but<br />
it will also create significantly more skilled jobs<br />
for local people. That’s something about which<br />
the company is extremely proud.<br />
Vimpex’s experience in the distribution side<br />
of this industry has established its reputation<br />
worldwide, and it now looks forward to leading<br />
this exciting venture into manufacturing.<br />
Takt is<br />
the panel<br />
for larger sites<br />
Taktis® is Kentec’s most powerful and sophisticated analogue addressable<br />
fi re panel. Intelligent and technically robust, the next generation Taktis 16L has<br />
enhanced integration and networking capabilities designed to meet the current<br />
and future needs of larger buildings and installations. As a truly Open Protocol<br />
panel it offers installers and their customers maximum fl exibility in systems’<br />
design, site-customisation and in the third-party devices that they use.<br />
+44 (0)1322 222121 www.taktis.co.uk
FIRE SAFETY<br />
Ensuring Fire System Effectiveness at Historic Sites<br />
The characteristics of heritage buildings tend to<br />
be complex. Ensuring the safety and integrity<br />
of occupants, infrastructure and contents<br />
within is of paramount importance, and especially<br />
so where large numbers of staff and visitors are<br />
involved, such as in stately homes, museums or<br />
other historical attractions.<br />
An in-depth fire risk assessment covering active<br />
and passive protection methods needs to be<br />
carried out and, in the case of historic structures,<br />
normally needs to be supplemented with a more<br />
in-depth fire safety management plan in line with<br />
the Regulatory Reform (Fire Safety) Order 2005.<br />
Discrete detection<br />
Features such as irregular room geometry, large<br />
windows, archways, open fireplaces and high,<br />
suspended or decorative ceilings can create<br />
detection challenges. The standards for detector<br />
placement are dictated by BS 5839 in the UK,<br />
which also gives detailed guidance on the options<br />
for different detection types in unusual spaces.<br />
Another key to effective fire safety is to ensure<br />
that critical or high-risk areas, such as kitchens,<br />
boiler rooms or gallery spaces, are specified for a<br />
higher level of detection, using single or multiple<br />
detector types so that incidents are confirmed as<br />
quickly as possible.<br />
Extreme care must be taken to ensure that<br />
smoke can reach detectors. For this reason, there<br />
are many detection methods suitable for historic<br />
structures. Commonly, you may find many of them<br />
on a single system, including:<br />
• Optical smoke detectors – the most common type<br />
of detector with many detection options available<br />
and analysis methods used<br />
• Heat detectors – commonplace in spaces such as<br />
kitchens, where steam from cooking smoke is very<br />
often present<br />
• Wireless point detectors – these offer a far less<br />
invasive solution to their cabled counterparts and<br />
are faster and cheaper to install<br />
• Aspirating detectors – widely used in harder to<br />
access spaces such as cellars or attics, they<br />
continually sample the air several times a second,<br />
and can be set to various sensitivity levels<br />
• Beam detectors – work well in taller spaces such<br />
as great halls or chapels and function on the basis<br />
of smoke obscuration of a beam of light<br />
• Video and CCD-driven flame detectors – flames<br />
will often (but not always) be detected after<br />
smoke. These devices are useful where quickly<br />
visible flame fires are more likely<br />
• Linear heat or heat sensing cable – This can be<br />
run through any area and is especially suited to<br />
sensitive installations. It alerts the fire system to<br />
tiny changes in temperature, even pinpointing the<br />
exact location<br />
Matters of compliance<br />
BS 5839-1:2017 recommends that the system user<br />
appoints “a single, named member of the premises<br />
management to supervise all matters pertaining to<br />
the fire detection and fire alarm system”. This<br />
places responsibility firmly in the hands of one<br />
individual whose role is “to ensure that the system<br />
is tested and maintained in accordance with the<br />
recommendations of this part [Section 7: User’s<br />
responsibilities] of BS 5839”.<br />
Service Tool from Advanced is a simple and<br />
efficient tool offering a range of features that can<br />
demonstrate proof of servicing by allowing you to<br />
download service reports, inspect device history<br />
and keep track of service schedules. This tool for<br />
powerful and flexible service reporting helps to<br />
ensure compliance and delivers peace of mind to<br />
the individual with ultimate responsibility.<br />
In conclusion, historic structures have always<br />
presented a unique challenge for the fire system<br />
industry, but innovation is delivering more choice<br />
and performance for end users, specifiers and<br />
responsible individuals within the sector. The<br />
choices made need to be based on a thorough<br />
understanding of the technology and standards<br />
present within the context of a particular site.<br />
System selection<br />
A fire in any building<br />
can have grave<br />
consequences, of<br />
course, but such<br />
episodes occurring<br />
within historic<br />
structures pose a<br />
particular challenge<br />
for the people and<br />
systems responsible<br />
for protecting them<br />
Advanced has produced a<br />
comprehensive brochure for fire<br />
protection at historic and<br />
heritage sites which is available<br />
by sending an e-mail to:<br />
marketing@advancedco.com<br />
At the centre of any active system is the fire panel – single or multi-loop, standalone<br />
or networked. The choice available is wide and the installation costs are likely to<br />
dwarf equipment prices. For this reason, finding a system that’s easily installed, with<br />
flexible cabling, a range of communication options, multiple cause and effect<br />
options to accommodate the wide range of uses, room sizes, layouts and technical<br />
challenges should be the priority.<br />
A recurring challenge is to make the system as unobtrusive as possible without<br />
impacting performance. Thanks to repeater panels, such as Advanced’s TouchControl<br />
touchscreen, the larger fire panel can be hidden from view. TouchControl is designed<br />
to suit many locations and flush fit, and includes new performance features such as<br />
digital zone plans and active maps highlighting fire status throughout a site.<br />
www.riskxtra.com<br />
41
Evacuate everyone<br />
EN54-23 Approved Fire Beacons<br />
<br />
<br />
<br />
<br />
<br />
Seminars<br />
<br />
<br />
EN54-3 Sonders & Beacons<br />
Nexus 105/110/120 Sounders<br />
<br />
Sonos Sounder Beacon<br />
<br />
Tel: +44 (0)1706 233879
x<br />
RISKXtra<br />
Emergencies and Life Safety: Voice Evacuation<br />
When confronted with an emergency<br />
situation, individuals don’t always react<br />
as expected. It might seem logical to<br />
suggest that, in the event of a fire, people<br />
would panic and react immediately, but this<br />
type of behaviour is considered a myth as, in<br />
many cases, the sound of a fire alarm is either<br />
completely ignored or building occupants<br />
otherwise look for the reaction of others before<br />
doing anything themselves.<br />
Pre-movement time – ie the time it takes from<br />
an alarm sounding to the building occupants<br />
initiating their escape – is very significant and,<br />
in some instances, more significant than the<br />
distance travelled to an exit.<br />
If further proof were needed about the<br />
reluctance of certain people to act<br />
appropriately in a fire alarm situation, it’s worth<br />
remembering the events of 8 May 1979, when a<br />
fire broke out on the second floor home<br />
furnishings department of the Manchester<br />
branch of Woolworths, leading to the tragic<br />
deaths of ten people. It transpired that a<br />
number of customers in the restaurant<br />
apparently refused to leave the store and that<br />
some even continued to queue at an<br />
abandoned checkout. It was suggested that<br />
those in the restaurant section declined to<br />
leave because they’d just paid for their meals.<br />
Since the tragic events of that day, it seems<br />
that little has changed. A survey conducted by<br />
the Building Research Establishment found<br />
that, in the event of a fire, only 13% of people<br />
responded to a bell or sounder warning, while<br />
45% reacted to a written text message display.<br />
What’s particularly interesting is that some<br />
75% responded positively to a spoken message<br />
from a voice evacuation system.<br />
Route planner<br />
Whether it’s a rail terminal, a workplace, a<br />
school, a sports stadium, a Shopping Centre or<br />
a restaurant, the principles of making sure<br />
people are routed to a safe place are the same.<br />
The ability to easily navigate a route to safety is<br />
crucial, yet evacuation from public buildings is<br />
usually hindered by a lack of detailed<br />
knowledge of the internal connectivity of the<br />
building space along with confusing and poorly<br />
thought out instructions.<br />
Studies have shown that occupants tend to<br />
use familiar routes – typically the exit through<br />
which they entered the building. Research<br />
conducted by academics at the University of<br />
Greenwich under the banner ‘Human Behaviour<br />
in Fire Networks’ (HUBFIN) discovered that only<br />
38% of people see passive signage in an<br />
emergency. Voice evacuation systems, however,<br />
are able to communicate any dangers simply,<br />
Building Evacuation:<br />
Let The Voices Be Heard<br />
effectively and without any ambiguity, giving<br />
clear directions on how occupants must react.<br />
Standards and increased support from<br />
manufacturers are helping to further awareness<br />
of the benefits of using voice evacuation<br />
systems. Foremost is BS 5839 Part 8, which is<br />
the Code of Practice for the Design, Installation,<br />
Commissioning, Servicing and Maintenance of<br />
Voice Evacuation Systems. It states that a true<br />
voice evacuation system is a highly secure<br />
public address (PA) solution which includes<br />
several features such as monitoring of all<br />
internal and external circuits, a number of prerecorded<br />
emergency messages, battery back-up<br />
and a secure link to a fire alarm panel.<br />
BS 5839 Part 8 defines five types of voice<br />
evacuation system, ranging from automatic<br />
evacuation to full manual control, with the<br />
specification depending on the cause and<br />
effects of the fire detection strategy. It also<br />
provides specific requirements for audibility<br />
and intelligibility of the system.<br />
BS EN 54 is a suite of European guidelines<br />
that harmonises fire detection and fire alarm<br />
system design, installation and servicing. BS<br />
EN 54-16 specifies that a rack system must be<br />
certified as a complete unit. It’s not viable to<br />
use components from various third party<br />
suppliers, as this doesn’t guarantee integrity<br />
and reliability.<br />
Also, since the Construction Products<br />
Regulation came into force, it’s illegal for a<br />
manufacturer to sell voice evacuation products<br />
Despite the clear<br />
benefits of integrating<br />
voice evacuation as<br />
part of a life safety<br />
infrastructure, there’s<br />
no mandatory<br />
requirement in the UK<br />
to do so. Here, Ian<br />
Bridgewater explains<br />
how such systems can<br />
keep building<br />
occupants safe<br />
Ian Bridgewater:<br />
Director at TOA Corporation UK<br />
43<br />
www.riskxtra.com>
x<br />
RISKXtra<br />
Emergencies and Life Safety: Voice Evacuation<br />
that are not third party certified to EN54-16 for<br />
voice alarm control and indicating equipment,<br />
EN54-4 (covering power supplies) and EN54-24<br />
for loudspeakers.<br />
Thorough risk assessment<br />
As with any proposed life safety equipment<br />
installation, it’s first of all necessary to carry<br />
out a full and thorough risk assessment. The<br />
introduction of the Regulatory Reform (Fire<br />
Safety) Order 2005 (RRFSO) brought together<br />
all the elements of fire safety. It places the onus<br />
on a designated ‘responsible person’ within an<br />
organisation to carry out assessments to<br />
identify, manage and reduce the risk of fire.<br />
When it comes to fire detection, the RRFSO<br />
states that the primary purpose is to detect the<br />
presence of fire at an early stage and provide<br />
audible and/or visual warning to the building<br />
occupants to allow for an orderly evacuation.<br />
Within high-rise buildings, for example,<br />
ensuring that a voice evacuation system is fit<br />
for purpose and commissioned so that, in the<br />
event of a fire, people are guided to safety in a<br />
structured manner is imperative. The latest<br />
state-of-the-art ‘intelligent’ voice evacuation<br />
systems incorporate a number of essential<br />
features that can prioritise which levels to<br />
evacuate first as part of a phased evacuation<br />
strategy, thereby avoiding a potentially<br />
catastrophic mass stampede. This is very<br />
important in multi-use locations where floors<br />
can be used for different purposes.<br />
Most of today’s modern networked systems<br />
are also equipped with a live speech capability<br />
so that, when necessary, the pre-configured<br />
messages may be overridden and people<br />
spoken to directly. Also, if a building houses a<br />
number of people who have impaired hearing, a<br />
voice-based system can be used in conjunction<br />
with flashing beacons to provide a visual<br />
indication that there is indeed a fire alert.<br />
Leading the way<br />
Surprisingly, in the UK there’s no regulatory<br />
requirement for buildings to have a voice<br />
evacuation system installed, even though<br />
buildings requiring phased evacuation can<br />
benefit from an element of voice as part of a<br />
comprehensive detection and response<br />
strategy. This is in stark contrast to some other<br />
countries, such as the United Arab Emirates<br />
“Most of today’s modern networked systems are also<br />
equipped with a live speech capability so that, when<br />
necessary, the pre-configured messages may be overriden<br />
and people spoken to directly”<br />
(UAE), which has introduced some leadership<br />
to this subject with its excellent Fire and Life<br />
Safety Code of Practice.<br />
Now considered one of the world’s definitive<br />
documents on life safety provision, adherence<br />
to this Code of Practice is mandatory on all new<br />
UAE building projects. It classifies any building<br />
with seven or more levels as a high-rise and<br />
states that, in these locations, a voice-based<br />
evacuation system must be used.<br />
However, it isn’t only seven-storey buildings<br />
where this type of fire safety system is a must –<br />
structures larger than 2,800 m 2 , or which have<br />
1,000 persons living or working in them are also<br />
included, as are warehouse or distribution<br />
facilities of 5,000 m 2 or more.<br />
Likewise, Germany’s DIN VDE V 0827<br />
standard for emergency and danger response<br />
systems was implemented in July 2016 with the<br />
objective of providing technical assistance for<br />
emergencies and dangerous situations.<br />
Requirements are now in place governing the<br />
technical systems that trigger alarms in<br />
dangerous situations, call for help, warn those<br />
involved or issue audible instructions.<br />
More than meets the eye<br />
As well as performing a fundamental role as<br />
part of a life safety infrastructure, a voice<br />
evacuation system can also maximise return on<br />
investment by acting as a PA solution to issue<br />
audible instructions in addition to broadcasting<br />
pre-programmed voice messages, issuing live<br />
announcements or even playing music.<br />
A terrorist incident, a traffic accident, an<br />
intruder, air pollution or even a dangerous dog<br />
roaming around are some of the situations that<br />
could require clear communication within a<br />
building. UK schools, for example, are<br />
increasingly looking to develop coherent<br />
strategies for lockdown procedures. They can<br />
use voice-enabled technology to allow<br />
emergencies to be immediately reported to a<br />
central location.<br />
In a fire situation, minutes and even seconds<br />
could mean the difference between life and<br />
death. Even though voice evacuation has<br />
obvious benefits, the regulations are lacking.<br />
This type of technology is still principally used<br />
only as directed by a Fire and Rescue Authority,<br />
or where the provision of a PA system to meet<br />
other needs makes the incremental cost<br />
significantly lower than where a simple upgrade<br />
from sounders is being considered.<br />
However, there are now growing calls for<br />
tighter regulation that makes the use of voice<br />
evacuation in certain environments mandatory<br />
here in the UK. These calls should be heeded<br />
and actively supported.<br />
44<br />
We go to greater lengths.<br />
Axis Security – setting new standards in customer service.<br />
• Our employees – are highly trained, valued and rewarded<br />
• Our proactive management approach – ensures service is continually improving<br />
• Our intelligent technology – ensures open lines of communication and transparency<br />
• Our prestigious industry recognition – includes 3 Security Guarding Company of the Year awards<br />
T. 020 7520 2100 | E. info@axis-security.co.uk | axis-security.co.uk
x<br />
RISKXtra<br />
The Changing Face of Security Services: Case Study<br />
Front-of-House and Security in Unison<br />
Acuity, Axis Group’s<br />
Front-of-House<br />
division, is delivering<br />
a combined security<br />
and professional<br />
reception services<br />
contract to the British<br />
Medical Association’s<br />
(BMA) headquarters in<br />
Tavistock Square,<br />
central London. Risk<br />
Xtra reports<br />
46<br />
x<br />
RISKXtra<br />
The Race to the Bottom in Security<br />
Services: Playing A Loser’s Game<br />
Security can often feel<br />
like a sector that’s in<br />
the doldrums, much of<br />
which is down to the<br />
constant flurry of<br />
negative outsourcing<br />
stories unveiled within<br />
the national press.<br />
Sometimes,<br />
outsourcing’s<br />
condemnation is<br />
justified, asserts<br />
Darren Read.<br />
Carillion’s collapse,<br />
for example, shone a<br />
telling light on areas<br />
in need of real reform<br />
including public sector<br />
procurement and the<br />
‘race to the bottom’<br />
that now pervades the<br />
outsourcing of<br />
facilities services<br />
48<br />
The Changing Face of Security Services: Output Specifications<br />
little-to-no facilities for mental health support<br />
or other health issues.<br />
The second possibility could be the pricing of<br />
security services ‘at cost’ (as in without any<br />
added margin for profit). This would, if<br />
anything, exacerbate the existing issue, with<br />
providers looking to squeeze profitability from<br />
other avenues.<br />
On both counts, it’s security staff who will<br />
suffer the most. Not just – and reprehensibly so<br />
– in terms of a reduction in life expectancy, but<br />
also by dint of not having a single iota of<br />
benefits at work or job satisfaction. As it<br />
stands, a career in security isn’t an attractive<br />
option for prospective employees, resulting in<br />
an impending talent gap so vast we may not be<br />
able to recover from it.<br />
As an industry, we have an image problem.<br />
Ultimately, the solution is to collectively<br />
articulate the value of our services much better<br />
and re-brand the industry. After all, there’s<br />
virtually no public or private organisation that<br />
doesn’t have a security provision in some shape<br />
or form – be it in-house or outsourced.<br />
According to the Ministry of Defence,<br />
approximately half a million people are<br />
employed in the private security sector and the<br />
security industry contributes roughly £6 billion<br />
to the UK’s economy each year. If we’re<br />
indispensable, why are we not priced as such?<br />
When we consider the potential risks that<br />
would come from security service failure, to put<br />
such a small price on the safety of people<br />
seems flippant to the point of being insulting.<br />
Our image overhaul could start with a reevaluation<br />
of the nuts and bolts of the<br />
specification process, which itself hasn’t been<br />
altered for years. Security is the last stream of<br />
facilities management that uses input<br />
specification, which is now widely considered<br />
to be outdated and clunky. We’ve lagged behind<br />
other sectors, such as cleaning, that now<br />
primarily use output specifications – giving<br />
them the license to offer their expertise and<br />
define what equates to a high level of<br />
performance on their contracts.<br />
If we adopt output specification like our FM<br />
peers, perhaps then we would have the<br />
opportunity to not only demonstrate our<br />
expertise, but also actively collaborate with<br />
clients on producing contracts that are flexible<br />
and tailored to their unique requirements.<br />
Likewise, in the bid process, rather than<br />
using language that centralises on price and<br />
cost savings, we must explain how good<br />
security can offer a return on investment. We<br />
can do this by weaving the customer service<br />
value of security staff into our proposition as<br />
well as tackling the misconception that<br />
security is an unskilled profession. Of course,<br />
we know full well the value of security to our<br />
client’s day-to-day operations. We’re not just<br />
mitigating risk. Often, it’s a customer service<br />
role – a concierge is frequently the first<br />
individual a customer meets when visiting a<br />
building and can therefore set the tone for the<br />
rest of their visit on site.<br />
Communicating value<br />
Every day, I hear of staff going that extra mile<br />
and doing wonderful things for our clients, but<br />
are we communicating this value to prospective<br />
clients? No, we’re not. If we don’t reflect the<br />
value we see in our services in our pricing, how<br />
can we blame organisations for only caring<br />
about the costs as opposed to the value good<br />
security can bring to their business?<br />
A shopper looking to buy a sofa will not<br />
necessarily purchase the cheapest sofa they<br />
can find. They will take into consideration the<br />
quality of the sofa, customer service, product<br />
warranty and returns policies. Paying more is<br />
offset by the perceived benefits of these<br />
factors. This is the scenario we really need to<br />
be striving for in security.<br />
There’s an opportunity here to galvanise our<br />
industry and drive some much-needed change,<br />
as well as improve the perception of security,<br />
and outsourcing in general, in the eyes of the<br />
general public and prospective clients alike.<br />
Darren Read:<br />
Managing Director of Amulet<br />
Security<br />
“If we adopt output specification like our FM peers,<br />
perhaps then we would have the opportunity to not only<br />
demonstrate our expertise, but also actively collaborate<br />
with clients on contracts that are flexible and tailored”<br />
49<br />
www.riskxtra.com>
x<br />
RISKXtra<br />
Meet The Security Company<br />
company that can respond and is always<br />
capable of delivering, often at little or very<br />
short notice.<br />
This is the twelfth<br />
instalment in a series<br />
of articles for the<br />
readers of Risk Xtra<br />
where we shine the<br />
spotlight on NSIapproved<br />
businesses<br />
for the benefit of risk<br />
and security managers<br />
who purchase security<br />
guarding as well as<br />
systems-focused<br />
solutions. Answering<br />
our questions on this<br />
occasion is Christine<br />
Lee, co-founder and<br />
managing director of<br />
Constant Security<br />
Services<br />
About the National Security Inspectorate<br />
Risk Xtra: Can you briefly describe your<br />
business’ activities and what you consider to<br />
be your USP as an organisation?<br />
Christine Lee: Constant Security Services<br />
supplies the very highest quality security and<br />
support services. We are an independent,<br />
family-run, privately-owned and national<br />
award-winning business. We are security<br />
specialists and do not diversify. The security of<br />
our clients is truly our foremost priority.<br />
We have grown for over 30 years and now<br />
employ well over 700 colleagues who work on<br />
assignments throughout the North and the<br />
Midlands. We have industry-leading customer<br />
and client retention numbers, which is evidence<br />
of our culture of quality, care and responsibility.<br />
Our quality management, accreditations,<br />
memberships and industry involvement have<br />
made us quite a unique company in the<br />
marketplace and an exclusive proposition for<br />
customers and new colleagues alike.<br />
We’re a small company in comparison to the<br />
household names in our industry, but this is<br />
exciting for us, our clients and our colleagues<br />
as we have the ability to move at a fast pace in<br />
responding to requests for services and to<br />
solve problems. We’ve become well-known as a<br />
The National Security Inspectorate (NSI) is a wholly-independent, not-for-profit<br />
company limited by guarantee and operates as a UKAS-accredited certification<br />
body specialising in the security and fire safety sectors.<br />
For over 40 years, the NSI has served to protect businesses, homeowners<br />
and the general public alike, raising standards by providing robust and high<br />
quality audits of both security and fire safety service providers.<br />
Risk Xtra: What do your clients value most<br />
about the services you deliver?<br />
Christine Lee: Clients most value our<br />
immediate ability to respond to any eventuality,<br />
with the flat management structure of the<br />
business meaning accessibility to all. The<br />
openness of our operation allows for no<br />
dilution of responsibility.<br />
We also recognise that our customers choose<br />
us and remain with us due to our enduring<br />
commitment to care and responsibility<br />
throughout the business. As a family-run<br />
operation, we’re dedicated and loyal and this is<br />
something that customers and colleagues can<br />
really buy into and trust.<br />
Our values of care and responsibility in<br />
everything we do act as the guiding principles<br />
regarding every aspect of our operation.<br />
Risk Xtra: How do you feel accreditations<br />
have assisted your company?<br />
Christine Lee: Accreditations have assisted us<br />
in really streamlining the business by helping<br />
us to understand and recognise areas of the<br />
company where improvements could increase<br />
our efficiency and improve our service. They<br />
have also driven greater understanding of<br />
process interconnectivity.<br />
Our accreditations have allowed us to verify<br />
to our customers and colleagues that we’re a<br />
high-quality company that can be trusted.<br />
We’ve been able to build our brand as a<br />
business around quality standards and<br />
accreditations, demonstrating our integrity,<br />
professionalism and ongoing commitment to<br />
Best Practice and innovation.<br />
Risk Xtra: Specifically, what value does ACS<br />
registration and NSI Guarding Gold approval<br />
bring to your business and its clients?<br />
Christine Lee: ACS registration and NSI<br />
Guarding Gold approval bring credibility. They<br />
are both clearly demonstrable and transparent<br />
50<br />
Meet The Security Company: Constant Security Services<br />
In association with the<br />
methods by which customers can understand<br />
the independent verification of our service<br />
offer. They know they will receive the highest<br />
quality of service from the company. They will<br />
be doing business with an organisation that<br />
they can absolutely trust.<br />
Risk Xtra: In practice, what are the main<br />
differences between ACS registration and NSI<br />
Guarding Gold approval?<br />
Christine Lee: The ACS takes an holistic view of<br />
the business and hopefully motivates members<br />
to recognise real value in areas other than just<br />
financial return. The ACS registration is<br />
significant as this is a scheme run by the<br />
Security Industry Authority (SIA) that has<br />
powers to terminate membership in case of<br />
poor performance or criminality.<br />
From our perspective, NSI Guarding Gold<br />
approval is entirely indispensable. Through the<br />
Inspectorate, we are able to demonstrate<br />
standards that are far higher than those<br />
demanded by ACS registration.<br />
Risk Xtra: How do you feel technology has<br />
changed the industry over the last couple of<br />
years and what do you believe will be the<br />
direction of travel in the future?<br />
Christine Lee: The development of CCTV along<br />
with remote monitoring capabilities has<br />
certainly altered the industry somewhat over<br />
the last few years. We have seen a number of<br />
traditional static security guarding customers<br />
work with us on innovative projects which have<br />
resulted in the incorporation of CCTV systems,<br />
linked to our CCTV monitoring facility and<br />
supported by our mobile response which has<br />
resulted in head count rationalisation on some<br />
sites. This has brought significant cost savings<br />
for those end users involved.<br />
In the future, the industry will undoubtedly<br />
move towards the increased use of drone and<br />
robotic technology. We don’t view technology<br />
as a threat to our industry, but rather as a tool<br />
that can help us to provide an even higher<br />
quality service for the end user customer.<br />
Risk Xtra: When it comes to negotiating<br />
contracts and responding to tender requests,<br />
what aspects are of most value to customers<br />
and how are these changing?<br />
Christine Lee: Reputation is hugely important,<br />
but accreditation and certification is vital.<br />
Without recognised accreditation, standards<br />
and memberships we wouldn’t be invited to<br />
tender for many contracts.<br />
However, although there’s a slow change<br />
towards better understanding of our quality<br />
standards among the end user cohort, many<br />
tenders still contain simple ‘tick box’-style<br />
quality questions and don’t allow suppliers to<br />
demonstrate differentiation. Unfortunately, in<br />
some cases the criteria involved are clearly<br />
price-driven with little consideration for added<br />
value and quality of service provision.<br />
Risk Xtra: How has Government legislation<br />
(eg the National Minimum Wage, the<br />
National Living Wage and changes to holiday<br />
pay) affected your business? Do you believe<br />
such legislation is a good thing?<br />
Christine Lee: Legislation regarding wages and<br />
other Terms and Conditions has been very well<br />
received and is certainly a good thing up to a<br />
point. For those of us who remember the days<br />
when staff were forced to work excessive hours<br />
to earn reasonable money, the situation today<br />
is dramatically improved.<br />
That said, I’m concerned about the impact on<br />
peoples’ career development aspirations when<br />
supervisor and managerial differentials are<br />
being eroded as they cannot continue to<br />
maintain 4% annual increases.<br />
Risk Xtra: What are the most important<br />
attributes you look for in your security<br />
officers and staff members in general?<br />
Christine Lee: An inability to integrate into a<br />
culture that’s friendly, welcoming, collegiate<br />
and positive and wherein customers,<br />
colleagues and other stakeholders share equal<br />
standing. We’re fortunate to have enthusiastic<br />
colleagues. After any audit, I’m regularly asked<br />
“How did we get on?” by members of staff. I<br />
believe that this demonstrates my front line<br />
colleagues are truly bought into what we’re<br />
trying to achieve with the business.<br />
Risk Xtra: How can the SIA, the NSI and<br />
industry standards best serve the sector in<br />
addition to the needs of your company’s<br />
clients and the wider public interest? Will<br />
the planned introduction of business<br />
licensing be a positive step?<br />
Christine Lee: At times, the industry has<br />
attempted to become more collaborative, but<br />
unfortunately this still has some way to go.<br />
Security companies are, of course, competitors,<br />
but greater co-operation would undoubtedly<br />
strengthen us all. It would be great if this is<br />
something the NSI could assist in harnessing.<br />
Regarding business licensing, we’re entirely<br />
open-minded on this issue. If it can be<br />
demonstrated that the proposed business<br />
licensing will improve the industry and the<br />
people working within it then we will absolutely<br />
support such a move. If it’s just an expensive<br />
‘token’, however, then we will not.<br />
Name<br />
Christine Lee<br />
Job title<br />
Managing Director<br />
Time in security business<br />
sector<br />
I’m the co-founder of<br />
Constant Security Services,<br />
which began life in 1981<br />
Location of the business<br />
The company is based in<br />
Mexborough, South Yorkshire<br />
and serves clients throughout<br />
the North and the Midlands<br />
Areas of expertise<br />
Static security guarding,<br />
special event stewarding and<br />
door supervision, mobile<br />
patrols, keyholding and<br />
response, open/lock visits,<br />
CCTV remote monitoring,<br />
security training, risk<br />
assessments and security<br />
surveying, security screening,<br />
integrated services and<br />
specialist FM consultancy<br />
Accreditations<br />
QMS operates to ISO<br />
9001:2015 (and specifically<br />
the Codes of Practice for BS<br />
7499, BS 7858, BS 7984, BS<br />
7960, BS 8406 and BS 7958).<br />
NSI Gold Award Member.<br />
Registered ACS business with<br />
the SIA for security guarding,<br />
keyholding, Public Space<br />
CCTV Surveillance and door<br />
supervision services<br />
Christine Lee: Co-Founder and<br />
Managing Director of Constant<br />
Security Services<br />
51<br />
www.riskxtra.com>
x<br />
RISKXtra<br />
‘What makes the<br />
modern security<br />
professional?’ As Tony<br />
O’Brien observes, the<br />
right combination of a<br />
security mindset, hard<br />
and soft skills,<br />
technical ability, selfawareness<br />
and<br />
adaptability is almost<br />
impossible to define.<br />
Today, and<br />
increasingly so, it’s all<br />
about an individual<br />
who’s every bit as<br />
comfortable in the<br />
cyber world as they<br />
are in the physical<br />
space and who readily<br />
understands the<br />
connectivity (and<br />
indeed, the<br />
interdependency) of<br />
both realms<br />
Creating The Security<br />
Professional of The Future<br />
As converged security services develop at a<br />
rapid pace, finding people with this<br />
diverse skill set is proving to be somewhat<br />
challenging for many reasons. There’s a<br />
requirement, then, to talk about building these<br />
professionals from the ground up and assess<br />
what we can do now to prevent the rest of the<br />
industry from becoming the next dinosaurs.<br />
When I think of the pace at which the world is<br />
evolving and developing, it both amazes and<br />
worries me. If we consider that, just ten years<br />
ago, many of the platforms we now use on a<br />
daily basis didn’t even exist, and that in five<br />
years’ time they’ll likely be obsolete, this<br />
illustrates precisely how quickly the world – not<br />
to mention ourselves as its inhabitants – can<br />
evolve. It also illustrates how those who are not<br />
willing to adapt and develop can be left behind<br />
in the wake of evolution.<br />
The security industry isn’t immune to this<br />
risk, and particularly so in the area of cyber<br />
security. I would estimate (both anecdotally<br />
and from the new entrants I see coming<br />
through the doors) that 90% of the physical<br />
security industry is well below a basic level of<br />
understanding in areas of cyber security, cyber<br />
crime and information security. To change this<br />
situation could take a generation. However,<br />
given the pace at which these areas are<br />
evolving, our current security population could<br />
be seen as obsolete long before that time.<br />
As someone who teaches in this industry<br />
both at entry level and higher up, I will be the<br />
first to admit that the current training system<br />
will not be fit for purpose in even two-to-three<br />
years. It’s barely plugging the gap now. We<br />
have large skills gaps in the cyber security area<br />
and a large pool of under-trained physical<br />
security operatives. This system, I believe, is<br />
the very root of the problem.<br />
Typically, we still treat the two areas as<br />
completely separate roles when they’re not. Of<br />
course, at higher levels the technical skills<br />
involved will differ, but as converged services<br />
become a reality, every single security operative<br />
needs to be at least familiar with both<br />
information and cyber security basics.<br />
The problem I see daily is that professionals<br />
operating in the physical security industry still<br />
perceive that cyber security isn’t their job.<br />
There’s a real fear of the subject. It’s the fear of<br />
the unknown and the fear of new challenges<br />
that terrifies the physical security industry and<br />
those resident within. What we’re left with is a<br />
group of security specialists who know a lot<br />
about crime prevention and the essence of<br />
what a crime looks like in their field.<br />
We also have a cyber security industry<br />
predominantly made up of IT specialists who<br />
know lots about the cyber world, but not a<br />
great deal when it comes to how criminals think<br />
and act, or indeed about the knock-on physical<br />
consequences of cyber security.<br />
Why can’t we determine to build security<br />
operatives with a skill set in both?<br />
This issue then escalates at the security<br />
management level, where we have people<br />
promoted from within the physical security<br />
ranks or recruited from policing and military<br />
backgrounds. They possess high levels of<br />
physical security knowledge, but no idea about<br />
cyber or information crime. Upskilling these<br />
individuals (of which I count myself as being<br />
one) is both challenging and time-consuming.<br />
Ultimately, the pace of skills development is<br />
always going to struggle to keep up with the<br />
pace of change.<br />
Pathways for transition<br />
Currently, there are very few pathways whereby<br />
physical security professionals can transition to<br />
cyber security and even fewer pathways in the<br />
opposite direction. There are some, but they<br />
52<br />
The Security Institute’s View<br />
often require many years of study and at an<br />
advanced level.<br />
My own opinion here is that we don’t need to<br />
develop many more pathways between the two<br />
areas. Instead, we need to begin treating the<br />
two areas as a single field, and building entry<br />
level training programmes for the future<br />
security specialist which afford a solid<br />
grounding in both areas.<br />
At the top level, we will always have<br />
specialists like there are in every professional<br />
field, but this is where the specialisation should<br />
start. Once all security professionals have a<br />
solid competency level across security fields,<br />
then we can branch off into specific fields<br />
where the individual’s passions or career<br />
opportunities lie. This is the way in which every<br />
other professional field works.<br />
Consider medicine, teaching or the sciences<br />
as the perfect examples. Every professional<br />
here receives a basic grounding in the<br />
fundamentals and then chooses their specialist<br />
area at a higher level. If we want to be seen as<br />
a profession and not just a job, then this is<br />
where we need to be aiming. We simply cannot<br />
continue to ‘silo’ our efforts or both sectors will<br />
inevitably suffer over time.<br />
Building from the ground up<br />
My suggestion is that we begin to develop an<br />
international occupational standard for the<br />
future security operative. You will note that I<br />
said international standard as part of the<br />
International Labour Organisation’s<br />
International Standard Classification of<br />
Occupations (ISCO) which informs many<br />
countries’ national occupational standards. This<br />
would be a move beyond the typical focus in<br />
most countries on developing national<br />
occupational standards for security operatives.<br />
We now live in a global world, both in terms<br />
of cyber and physical security. Our future<br />
training needs to reflect this reality and equip<br />
security professionals to work in a global<br />
landscape. Security in the future will have<br />
fewer physical and national boundaries and we<br />
must equip ourselves now for this eventuality.<br />
This will take time to develop and, in the<br />
meantime, we can begin to take steps with<br />
programmes that we already have in place to<br />
make them better suited. Until we can converge<br />
cyber, information and physical programmes,<br />
we can begin to insert modules into the current<br />
programmes so as to begin to give each area<br />
basic knowledge of the other.<br />
This works both ways. Just as our current<br />
physical security training programmes have<br />
limited or no content on cyber security, the<br />
same applies in the cyber security sphere.<br />
I don’t see too many cyber security<br />
programmes out there at any level which cover<br />
areas such as criminal mindset, securing<br />
physical assets or even police statement<br />
writing. Beginning to introduce these subjects<br />
into each area can really help in setting the<br />
groundwork for the future development of<br />
converged security programmes.<br />
While we can begin to introduce these<br />
subjects to the industry at entry level, I<br />
certainly believe that we should be looking to<br />
develop robust, converged security<br />
programmes at certificate, diploma and degree<br />
levels before the specialisation begins at<br />
Master’s level and beyond.<br />
Appreciating the cyber risk<br />
It’s difficult for an individual who has worked in<br />
physical security for many years to appreciate<br />
the cyber risk and to comprehend the skills<br />
required to be proficient. Now that cyber<br />
incidents have started to manifest themselves<br />
in real physical injuries and deaths, perhaps<br />
the risks involved will become more apparent.<br />
There’s huge scope here for both sides to<br />
work together to everybody’s benefit. There is<br />
currently a large skills gap in the cyber security<br />
area. There’s also a pool of talent resident at<br />
mid-level in the physical security arena who<br />
would love to help out, but simply don’t have<br />
the tools to do so. While it may take some time<br />
to help them develop those tools, spending<br />
that time would certainly be proven to be a<br />
worthwhile endeavour.<br />
Planning for the future<br />
That only provides a temporary respite,<br />
however. The cyber security arena will continue<br />
to grow, as will all other areas of the industry. I<br />
sincerely hope that we’re not sitting here in a<br />
number of years’ time having the same<br />
conversation. In order to avoid that scenario,<br />
we have to begin planning, developing and<br />
implementing training programmes for future<br />
security operatives which reflect not just<br />
today’s risks, but also the foreseeable risks of<br />
five and even ten years’ time down the line.<br />
The development of this generation of<br />
security professionals has the potential to be<br />
the vanguard for the future of the industry, but<br />
only on the proviso that we determine to act<br />
now. If we wait, it could be too late even for the<br />
next generation.<br />
The Security Institute’s View<br />
is compiled and edited by Dr<br />
Alison Wakefield FSyI<br />
(Chairman of The Security<br />
Institute) and Brian Sims BA<br />
(Hons) Hon FSyI (Editor of<br />
Risk Xtra)<br />
Editors’ Note: Any security<br />
practitioner can commence<br />
their cyber security education<br />
online (and at no cost) via the<br />
FutureLearn ‘Introduction to<br />
Cyber Security’ course.<br />
There’s also the option to pay<br />
£62 for a certificate of<br />
achievement. The course<br />
development was supported<br />
by the UK Government’s<br />
National Cyber Security<br />
Programme. It provides GCHQ<br />
‘Certified Training’ and is also<br />
IISP accredited<br />
Tony O’Brien:<br />
Managing Director of Security<br />
Operative Training Services<br />
“We now live in a global world, both in terms of cyber and<br />
physical security. Our future training needs to reflect this<br />
reality and equip professionals to work in a global landscape”<br />
53<br />
www.riskxtra.com>
x<br />
RISKXtra<br />
Selling Security Without Cutting The Price<br />
In a buyers’ market, and whether we like it or not, price can<br />
be the issue that ultimately decides which suppliers are<br />
chosen by buyers, but does it have to be like that for security<br />
businesses? As Patrick Rea explains, there are new<br />
opportunities available for those security companies with a<br />
strategy in place that wholly understands how buying<br />
decisions are really made (and who makes them) and who<br />
can clearly differentiate their offer, while also proving their<br />
stated business case<br />
Patrick Rea FCIM:<br />
CEO of Rea Marketing, a<br />
Security Marketing Specialist<br />
and a Member of ASIS<br />
Narrow your focus to your best market.<br />
Mass marketing is dead: there are too<br />
many companies selling generic security<br />
solutions to the same audience, so the solution<br />
is to narrow your focus on a group of buyers<br />
with a problem for which you can offer a<br />
specific security and service solution. Then<br />
engage them through ‘key account’ marketing.<br />
To fully understand their needs and issues,<br />
develop contacts and manage the relationship<br />
through to the sales ‘close’. Thereafter, make<br />
sure you retain them as clients.<br />
This whole process requires profiling your<br />
best clients and developing a new database of<br />
prospects. It also includes finding niche market<br />
opportunities, such as those present within<br />
logistics chains and networks or perhaps new<br />
sectors with a common security problem.<br />
Understand those companies involved and the<br />
key decision-makers.<br />
Understand what buyers really want. This is<br />
very much the era of the buyer as the dominant<br />
partner in the buyer-seller relationship. They<br />
are resistant to indiscriminate ‘me too’<br />
approaches. Buyers decide what they want,<br />
which suppliers they want to see and,<br />
ultimately, whom they’ll work with.<br />
The key, then, is to completely understand<br />
the buyers’ process: how security needs arise<br />
and develop, how buying decisions are made<br />
and who makes and influences those decisions.<br />
Only then can you build awareness and<br />
enquiries through marketing.<br />
You need to ensure the sales team develops<br />
a good rapport and degree of trust with your<br />
prospects and customers. This wins sales,<br />
keeps the relationship alive and, importantly,<br />
retains and ring-fences business.<br />
Map the buying process<br />
There’s a step-by-step process major buyers of<br />
security follow in each and every market sector.<br />
First, they are unaware that they have a<br />
problem. Then they know they have a problem<br />
and look for information. They then select<br />
candidate suppliers, ask for quotations and,<br />
finally, choose a vendor.<br />
“Today’s business buyers don’t contact<br />
suppliers directly until 57% of the purchase<br />
process is complete. You have to ensure you’re<br />
part of that first 57% of the process” (B2B<br />
Marketing Summit).<br />
The best strategy is to be there at the start of<br />
the process. You need to build awareness and<br />
trust early in the buying process if your<br />
company is to have any chance of influencing<br />
the brief and the ultimate buying decision.<br />
You’re then ready and prepared to provide the<br />
information and attention that the buyer needs<br />
to choose your solution.<br />
Plan your sales and marketing process. You<br />
want a step-by-step process that matches the<br />
buyers’ process to (1) generate awareness and<br />
(2) enquiries and then (3) develop leads and (4)<br />
close them. Finally, there’s the overriding desire<br />
to (5) retain clients. Consistency is the<br />
important factor in all of this. A transparent and<br />
measurable process affords you full control of<br />
your sales pipeline. It’s ‘scalable’, so you can<br />
either step up or reduce activity according to<br />
your business needs.<br />
When you have an agreed process you can<br />
then align your Customer Relationship<br />
Management (CRM) System in support such<br />
that leads are recorded and tracked, responses<br />
and required actions scheduled, the results<br />
measured and relationships managed.<br />
CRM is an approach to manage a company’s<br />
interaction with current and potential<br />
customers. It uses data analysis about<br />
customers’ history with a company to improve<br />
business relationships with customers,<br />
specifically focusing on customer retention and<br />
driving sales growth. One important aspect of<br />
the CRM approach is the systems that compile<br />
data from a range of different communication<br />
channels, including a company’s website, the<br />
telephone, e-mail, live chat, marketing<br />
materials and, more recently, social media.<br />
Through the CRM approach and the systems<br />
used to facilitate it, businesses are able to<br />
learn more about their target audiences and<br />
how to best cater to their needs.<br />
You first need to map out the key steps in<br />
your process, then specify the tactics and tools<br />
required for the task of lead generation.<br />
Purposefully differentiate your business from<br />
that of your competitors not on price, but on<br />
54<br />
In the Spotlight: ASIS International UK Chapter<br />
the value delivered. If you focus on price, the<br />
buyer will make a decision based on that too,<br />
but there will always be a competitor who’ll be<br />
willing to sell at a lower price – perhaps<br />
because they are a start-up or simply desperate<br />
for the business. As we know, this tactic isn’t<br />
sustainable in the longer term.<br />
Instead, you can differentiate on those issues<br />
where you have (or can otherwise create) a real<br />
advantage – perhaps in relation to your<br />
experience in the sector, the service range,<br />
systems, support and back-up. Maybe even all<br />
of these or, indeed, other areas as well.<br />
You also need to prove the business case and<br />
the Return on Investment (RoI). This might be<br />
by demonstrating the cost savings of your<br />
solution or the losses that will subsequently be<br />
prevented. It will take work and analysis to<br />
develop evidence of the RoI.<br />
Most importantly, though, the business case<br />
is proven and demonstrated through Case<br />
Studies and solid testimonials.<br />
Build rapport and trust<br />
Trust makes all the difference in building the<br />
critical relationships that underpin a successful<br />
sales and marketing process. Proven methods<br />
to build awareness, understanding and trust<br />
include accreditations and awards, using<br />
LinkedIn to develop contacts and provide<br />
authoritative Publisher Posts (increasingly this<br />
is a key method to build your brand, if you<br />
know how to work with it), the use of Case<br />
Studies (on the basis that good application<br />
stories show the real-world problems you solve<br />
and how you solve them) and the leveraging of<br />
relationships (ie collaboration with third<br />
parties, such as through professional<br />
associations and companies that offer<br />
complementary services).<br />
A common thread in all of this is content:<br />
Case Studies, security tips, advice and news.<br />
It’s all about demonstrating thought leadership.<br />
This makes a positive impression by showing<br />
your experience and areas of expertise, but the<br />
process does demand an experienced and<br />
dedicated writing resource.<br />
Does ‘content’ really produce results?<br />
Research shows that it does. “You can deliver<br />
four times as much Return on Investment from<br />
content marketing than from adverts” (B2B<br />
Marketing Summit). Case Studies in particular<br />
provide unique, benefit-laden content<br />
encompassing insights, guidance and evidence.<br />
Choose your methods wisely<br />
Both your time and budget will likely be limited<br />
so you need to pick marketing media and<br />
methods wisely. Ideally, focus on a limited<br />
number and do it well and consistently.<br />
Frequently, we are asked about the following<br />
specific areas:<br />
Facebook and Twitter campaigns: Perhaps. It<br />
really depends on whether or not the decisionmakers<br />
and buyers in your sector are consistent<br />
users of social media<br />
LinkedIn: Definitely. Increasingly, LinkedIn is<br />
used by all B2B sectors, but it needs a wellhoned<br />
process to produce sales. Too often,<br />
companies energise a ‘Connection’ and then<br />
don’t know what to do next<br />
Search Engine Optimisation (SEO): Perhaps.<br />
This is because most B2B security buyers rarely<br />
locate suppliers based on a Google Search.<br />
They prefer to contact companies with whom<br />
they have some pre-existing relationship or<br />
knowledge. You need an ongoing programme to<br />
create awareness and understanding. SEO can<br />
be useful, but such a campaign requires a real<br />
understanding of (1) how buyers buy security<br />
and what they look for and (2) the quality of<br />
your dedicated web landing page.<br />
“Today’s business buyers don’t contact suppliers directly<br />
until 57% of the purchase process is complete. You have to<br />
ensure that you’re part of that first 57% of the process”<br />
55<br />
www.riskxtra.com>
x<br />
RISKXtra<br />
Despite the ongoing<br />
best efforts of industry<br />
bodies such as the<br />
Fire Industry<br />
Association when it<br />
comes to shouting<br />
loudly about the need<br />
for Best Practice<br />
within the fire safety<br />
space, there will<br />
always be a few<br />
lingering cases of<br />
poor practice. When<br />
talk turns towards fire<br />
detectors, there really<br />
is no excuse not to<br />
test them. Will Lloyd<br />
outlines precisely why<br />
Will Lloyd: Technical Manager at<br />
the Fire Industry Association<br />
Fire Detector Testing:<br />
Best Practice Makes Perfect<br />
Perhaps the most common example of poor<br />
practice is simply not testing present fire<br />
detectors at all. The fact of the matter is<br />
that all such detectors located on site should<br />
be tested over a 12-month period. This is to<br />
ensure that, no matter where a fire might<br />
originate, there’s an assurance that the area<br />
where the fire has indeed broken out is covered<br />
by a working detector.<br />
Simply put, when you need a fire detector to<br />
work, you really need it to work. Unlike a<br />
mobile phone or a TV or any other<br />
entertainment device that can easily be<br />
replaced at any time (you might feel like you<br />
cannot live without a mobile phone, but trust<br />
me you can), a detector cannot wait to be<br />
replaced. It needs to be replaced as soon as<br />
possible so that people are safe from the<br />
danger that fire brings. Life safety isn’t<br />
something to ‘forget to test’ or ‘do later’ – the<br />
process is active and ongoing, and it’s<br />
important to make sure that it’s right.<br />
Need for competence<br />
For those working within the fire detection and<br />
alarm maintenance sector, it’s vital that the<br />
term ‘competence’ is understood. Under current<br />
fire safety legislation, only a ‘competent’<br />
individual should carry out the testing work. A<br />
‘competent’ person in this regard is defined as<br />
an individual with the relevant current training<br />
and experience, and with access to the<br />
requisite tools, equipment and information, and<br />
who’s capable of carrying out a defined task.<br />
Let’s break this down. First, the individual in<br />
question needs to be properly trained and have<br />
the right level of experience. Experience is<br />
simple – it’s gained over time on the job.<br />
Training helps to complement that. The Fire<br />
Industry Association (FIA) now offers vocational<br />
qualifications in fire detection alarm<br />
maintenance and installation, so it’s fairly<br />
simple to make sure that aspect is ticked off.<br />
The second part of current legislation to pay<br />
attention to is the tools and equipment that the<br />
individual’s using. There are so many anecdotes<br />
of improper testing equipment. Some people<br />
have been known to use a hairdryer or paint<br />
stripper heat guns to test a heat detector. Not<br />
only is this an example of the improper use of<br />
equipment, but it may even melt the detector<br />
and/or damage the sensors and components<br />
inside, thus rendering the detector useless.<br />
Another classic example of malpractice is<br />
when a screwdriver is used to short the<br />
thermistor to obtain a fire signal on the panel.<br />
This should be avoided at all costs as it simply<br />
changes the electrical signal and doesn’t test<br />
the sensors in the detector which, obviously,<br />
defeats the entire object of testing a detector<br />
that’s designed to activate when the presence<br />
of heat/smoke is sensed.<br />
Training requirements<br />
In the above cases, the individual would not be<br />
classed as ‘competent’ in the eyes of the law<br />
and the immediate remedy would be to obtain<br />
the correct equipment immediately and<br />
organise some proper training, such as the FIA’s<br />
Advanced Maintainer Level 3 qualification.<br />
Training is the vital part because even with<br />
the right equipment and tools, there’s still the<br />
chance to use them in the wrong way.<br />
Standards such as BS 5839-1 cover this, so<br />
making sure that there’s proper training on this<br />
standard is a step in the right direction.<br />
Sometimes, people want to do the right thing<br />
and procure the necessary tools, but perhaps<br />
don’t have the right knowledge and experience<br />
to use them correctly. The advice here is<br />
simple: read through the instructions that came<br />
with the equipment and, if all else fails, ask for<br />
technical support (either from the manufacturer<br />
of the product or the FIA).<br />
Testing equipment such as aerosol<br />
dispensers can also be problematic. This is an<br />
example of using the correct equipment, but in<br />
an incorrect manner. Unfortunately, this can<br />
happen even when the intention to test<br />
correctly is there in abundance.<br />
Typically, aerosol canisters designed for the<br />
testing of smoke detectors only require a small<br />
amount of spray. There’s no need to use loads<br />
of the spray to test the detector, and that’s<br />
where a lot of people can go wrong. It really is a<br />
case of reading the instructions that come with<br />
the testing equipment, or asking a more<br />
experienced colleague to teach less<br />
experienced individuals as to the proper use of<br />
aerosol canister testing equipment.<br />
If you haven’t had any training for a while,<br />
then it must always be said that a ‘refresher’<br />
course never hurts. Technology is always<br />
changing and detectors are slowly becoming<br />
more complex to test due to the number of<br />
multi-sensor variants on the market that detect<br />
56<br />
FIA Technical Briefing: Testing Procedures for Fire Detectors<br />
different things such as heat and smoke, for<br />
example, at the same time.<br />
Multi-sensor detectors<br />
Due to a recent study sponsored by the FIA in<br />
partnership with the BRE and other industry<br />
bodies, it has been scientifically proven that<br />
multi-sensor detectors are more effective at<br />
reducing false alarms. As a result, over the next<br />
few months and years it’s likely that many<br />
buildings will make the switch to multi-sensor<br />
detection methods.<br />
As a result of this move towards more<br />
sophisticated detectors, so there’s a need for<br />
more sophisticated testing equipment. It’s<br />
important that this type of detector is tested<br />
correctly using specialist equipment. Multisensor<br />
detectors have two or more sensors – eg<br />
heat and smoke – and they need to be tested<br />
simultaneously. The test equipment for this<br />
type of detector may be more specialised and<br />
expensive, but considering the precious need to<br />
demonstrate ‘competence’, a review of the<br />
equipment you have and the types of detectors<br />
you’re testing may well be required in order to<br />
ensure that you have the correct equipment –<br />
and that it’s being used in right way.<br />
An effective service<br />
Maintenance technicians really must have the<br />
right knowledge, tools and experience at their<br />
disposal to do the job of testing detectors<br />
effectively. If not, there’s a danger that the<br />
individual would not be seen as ‘competent’<br />
under current fire safety legislation.<br />
As an additional pressure, there’s currently a<br />
significant focus on fire safety at Government<br />
level that’s likely to affect the industry for some<br />
time to come.<br />
Those in-house professionals buying the<br />
services of fire detection and alarm<br />
maintenance companies are looking to ensure<br />
that the services they enlist will do the best job<br />
they can. Buyers are a lot more ‘savvy’ and,<br />
though many will shop purely based on price,<br />
plenty will also now be looking to consider the<br />
level of skills and training of the company<br />
they’re hiring, which is why obtaining third<br />
party certification is an important method of<br />
developing the business.<br />
Third party certification is simply gaining an<br />
independent audit to certify that your company<br />
is capable of providing an effective service, and<br />
indeed is the main criteria for membership of<br />
the FIA. Those working within the maintenance<br />
sector should certainly consider this as it will<br />
inevitably help the business to grow and<br />
demonstrate to buyers the trustworthiness of<br />
the skills they’re hiring.<br />
Guidance from the FIA<br />
The ‘FIA Guidance Document on Best Practice<br />
for Fire Detector Testing/Test Equipment’ covers<br />
a wide range of Best Practice in an easily<br />
downloadable PDF format. Obviously, all the<br />
examples of bad practice shared above are not<br />
to be followed. The advice in the FIA’s Guidance<br />
Document will show you exactly what you<br />
should (rather than should not) do in order to<br />
test equipment.<br />
The Guidance Document covers the<br />
competency requirements of technicians in<br />
more detail, as well as breaking down the<br />
requirements for the testing of fire detection<br />
devices (what requires testing, functional<br />
testing, general testing procedure, test<br />
methodology and more examples of bad<br />
practice, etc), as well as test medium and fire<br />
detection types (including how to test multisensor<br />
detectors as well as other regular smoke<br />
and heat detectors).<br />
In addition, there’s a good deal of salient<br />
advice on Health and Safety during the test<br />
procedures (since detectors tend to be on the<br />
ceiling and fairly inaccessible).<br />
To download the ‘FIA Guidance Document on<br />
Best Practice for Fire Detector Testing/Test<br />
Equipment’, visit the FIA’s website<br />
(www.fia.uk.com) and search the publications<br />
library under the ‘Resources’ tab.<br />
“Technology is always changing and detectors are slowly<br />
becoming more complex to test due to the number of<br />
multi-sensor variants now available on the market”<br />
57<br />
www.riskxtra.com>
x<br />
RISKXtra<br />
Selecting Workforce Management<br />
Software for Security Operatives<br />
Workforce<br />
management software<br />
comes in different<br />
forms, but all of them<br />
claim they will help<br />
your security services<br />
company run more<br />
effectively. When it<br />
comes to the crunch,<br />
though, which<br />
solution are you going<br />
to believe in? Mark<br />
Folmer outlines seven<br />
key questions you<br />
should ask in order to<br />
find the right software<br />
for your day-to-day<br />
operations schedule<br />
Workforce management software is really<br />
a ‘catch-all’ phrase for desktop and<br />
mobile systems that help a business<br />
manage its staff scheduling. The term<br />
originated in Contact Centres and within the<br />
realms of other service businesses that employ<br />
a large number of workers who are paid on an<br />
hourly basis. The ultimate goal of such software<br />
is to gain visibility into key business metrics,<br />
such as the number of operatives needed on<br />
site at a particular time of day.<br />
By using a software solution for demandoriented<br />
workforce management, planners<br />
within the business can optimise staffing by<br />
creating schedules that, at all times, conform to<br />
the forecasted requirements.<br />
At the same time, a workforce management<br />
solution helps end users to observe all relevant<br />
legislations, local agreements and the contracts<br />
of individual employees (including those allimportant<br />
work-life balance guidelines).<br />
So you’ve reached the point where you’ve<br />
‘kicked the tires’ on a number of software<br />
platforms in security workforce management.<br />
You can recite by heart the claims they’re<br />
making about being the best solution since nolick<br />
envelopes, but now it’s shortlist time. You<br />
want to identify the software that lives up to its<br />
claims. You want to determine which solutions<br />
will truly contribute towards the efficiency and<br />
profitability of your security services company.<br />
You need to eliminate the vendors making<br />
“noise” from the ones that signal a path<br />
towards genuine efficiency and growth.<br />
To help save you time and money, we’re going<br />
to focus on seven areas to help you zero-in on<br />
the workforce management platform that will<br />
truly contribute towards the efficiency and<br />
profitability of your security services company.<br />
Before we examine these seven areas,<br />
though, do make sure your firm is carrying out<br />
its software search in a sound and systematic<br />
way. There are five recommended steps in the<br />
software-selection process.<br />
First, plan and budget for the software. You<br />
will need senior management buy-in and a<br />
project team. Second, analyse your<br />
requirements. Focus on what’s most important<br />
to you and document it. Third, search for<br />
vendors. Shorten your long list of vendors to<br />
approximately three key solutions.<br />
Next, test the software in demos. Keep your<br />
Demo Script consistent for all the vendors so<br />
you can compare apples to apples. Be sure they<br />
live up to their industry claims. Last, but not<br />
least, decide on the best software ‘fit’ for your<br />
company. Include implementation and training<br />
in your evaluation of the best solution.<br />
It’s at step three that we recommend you ask<br />
the following seven key questions about the<br />
workforce management software that you’re<br />
considering for use among your employees…<br />
(1) Does the platform provide a solution that<br />
takes into account your entire business?<br />
No sane individual hires a personal trainer to<br />
build their biceps only. Similarly, when you<br />
want to attain maximum success in your<br />
business — when you want to strengthen and<br />
make more efficient and profitable your entire<br />
organisation — you want to make sure the<br />
platform you adopt can empower you to<br />
automate your business from end-to-end.<br />
After all, to derive all of the benefits inherent<br />
within a security workforce management<br />
system, you have to take the blinkers off and<br />
strive for optimisation of your entire operation.<br />
You have to look at security workforce<br />
management as a mission-critical system<br />
connected to other critical functions, such as<br />
your accounting and payroll systems.<br />
Vendors who don’t have an end-to-end<br />
solution can easily be detected. Their questions<br />
will be focused on one or two particular<br />
functions in your business, or they’ll address<br />
your pain points in a site-by-site manner and<br />
58<br />
Security Services: Best Practice Casebook<br />
not assess the business as a whole. That’s<br />
because they’re simply not equipped to handle<br />
what might be termed ‘the bigger picture’.<br />
(2) Does the platform require the purchase or<br />
use of “their hardware”?<br />
Before the widespread use of smart phones,<br />
workforce management platforms required all<br />
kinds of extra equipment to collect and<br />
download guard tour information.<br />
Today, it’s the case that some platforms still<br />
demand this costly, inconvenient and servicerequiring<br />
equipment. Yet a contemporary smart<br />
phone has all the necessary features to carry<br />
out an efficient and data-rich guard tour —<br />
assuming, of course, that the platform involved<br />
can take advantage of current technology.<br />
Do you want to be constrained by the costs<br />
and hassles of managing and maintaining<br />
“their hardware”?<br />
(3) Is the platform designed to be mobile?<br />
Anytime and anywhere access to the Internet<br />
has become a ‘given’ in our day-to-day lives.<br />
Why should your operations platform offer you<br />
less convenience and flexibility than that?<br />
However, some security workforce<br />
management platforms still rely upon on-site<br />
hardware for data exchange. As a result, data<br />
collection may be limited by location and time<br />
of day. This lack of flexibility constrains what<br />
your staff and management can do, and that<br />
inevitably translates into reduced productivity.<br />
Cloud-based platforms, on the other hand,<br />
offer 24/7 access, dependable data security<br />
and the convenience of automatic software<br />
maintenance for the end user.<br />
(4) Does every modification of the software<br />
require custom in-house programming?<br />
Perhaps one of the function leaders in your<br />
company believes that their software needs are<br />
unique. If so, make sure they have a business<br />
case to prove it because, when it comes to<br />
software customisation, you must carefully<br />
consider the cost benefits involved.<br />
More customisation means a longer time to<br />
write and test the code, a longer time to yield a<br />
return on investment and more system and staff<br />
instability as you work through the transition<br />
period to the new implementation.<br />
Furthermore, when upgrades are necessary,<br />
the custom code will need the ‘white glove’<br />
treatment. Is your company comfortable about<br />
making these costly concessions? If not, the<br />
stability and cost savings of a turnkey platform,<br />
and especially one focused on the security<br />
industry, must be thoroughly considered even if<br />
a little flexibility must be traded-off.<br />
“Anytime and anywhere access to the Internet has become<br />
a ‘given’ in our day-to-day lives. Why should your<br />
operations platform offer the business less convenience<br />
and flexibility than that?”<br />
(5) Does the platform have a roadmap for future<br />
development?<br />
Before you sign a multi-year contract, you want<br />
to be sure that the software platform you<br />
commit to today will be evolving with you<br />
tomorrow. Since the security environment,<br />
technology and your business are in constant<br />
evolution, your security workforce management<br />
platform must evolve and adapt as well.<br />
A vendor with an “If it isn’t broke, don’t fix<br />
it”-style mindset will leave you with a set-inconcrete<br />
platform that will limit your options for<br />
adapting to new business conditions.<br />
Ask your potential vendors questions like<br />
these: ‘What kind of roadmap for development<br />
do you foresee?’ ‘What input determines how<br />
the platform will develop?’ and ‘What will be<br />
the frequency of upgrades?’<br />
(6) Does the platform seem to be designed with<br />
customer input in mind?<br />
Anybody who has worked in the security<br />
industry knows that its operational concerns<br />
and challenges are distinctive. If, during the<br />
demo stage, you notice platform features that<br />
seem unrelated to the industry, or not remotely<br />
relevant to your own needs, ask your vendor<br />
how these features came to be.<br />
Some companies systematically solicit<br />
customer feedback as an integral element of<br />
software development. To stay on top of a<br />
changing world, they also consistently<br />
participate in industry-related conferences and<br />
dedicate people to monitoring trends. Does<br />
your vendor engage in this kind of dialogue and<br />
information gathering?<br />
(7) Does the platform try to be a jack-of-alltrades<br />
for multiple industries?<br />
A Swiss Army knife certainly comes in handy on<br />
a day-to-day basis, but when you’re talking<br />
about survival in the big bad woods you need<br />
to resort to more serious tools.<br />
Similarly, a general purpose enterprise<br />
resource planning system that does the job for<br />
a pizza delivery firm isn’t going to stand eye-toeye<br />
with a software platform specifically<br />
designed for mission-critical functions in the<br />
security sphere.<br />
When it comes to workforce management<br />
software selection, it’s important to commit the<br />
right resources and approach to the process.<br />
Mark Folmer MSyI CPP:<br />
Vice-President for the Security<br />
Industry at TrackTik<br />
59<br />
www.riskxtra.com>
x<br />
RISKXtra<br />
CTI: Keeping UK Citizens Safe in 2018<br />
operational challenge facing their organisation.<br />
How, then, can Government organisations<br />
embrace digital transformation while also<br />
ensuring that their systems – and, critically,<br />
citizens’ data – is kept safe?<br />
You know you’re<br />
facing an area of grave<br />
concern when experts<br />
at the World Economic<br />
Forum signpost ‘cyber<br />
attack’ as one of the<br />
Top Three most<br />
probable global risks<br />
of 2018. The threat of<br />
such an attack has<br />
been put up there with<br />
extreme weather<br />
events and natural<br />
disasters as one of the<br />
events most likely to<br />
cause problems on a<br />
worldwide scale this<br />
year and into the<br />
future. Paul McEvatt<br />
addresses the issue<br />
For the public sector, the threat is even more<br />
acute. Cyber security has stormed its way<br />
on to the political agenda of late as<br />
allegations of election tampering, breaches of<br />
Government agencies and departments and<br />
industrial sabotage have dominated the news<br />
headlines. Malignant actors have targeted<br />
Government and political organisations with<br />
forms of sabotage since Government has<br />
existed, of course, but the difference now is<br />
that hacking into a Government body by digital<br />
means can be done remotely by an unidentified<br />
actor and can happen remarkably quickly.<br />
Government bodies often hold a variety of<br />
sensitive information – whether that’s medical<br />
data, criminal records or confidential Civil<br />
Service plans – that can be used by others for<br />
financial or other forms of gain. For a malignant<br />
hacker, the possibilities here are endless and<br />
mouth-watering in equal measure.<br />
The UK’s public sector is fast embracing<br />
digital technology. When conducting our own<br />
research, we found that 76.7% of public sector<br />
organisations said that they were undergoing<br />
digital transformation – the highest percentage<br />
of any sector we surveyed. This is largely a<br />
positive thing, with a view towards making sure<br />
Government works more efficiently and delivers<br />
better services.<br />
However, the adoption of digital can<br />
sometimes create more angles of attack for<br />
hackers. In fact, almost half of all civil servants<br />
state that cyber security is the biggest<br />
Going back to fundamentals<br />
With the public sector fast adopting new ways<br />
of doing things in the sphere of IT, it’s<br />
important to maintain some of the<br />
fundamentals of security. In 2017, the headlinegrabbing<br />
Petya and WannaCry ransomware<br />
outbreaks exploited a vulnerability to software<br />
propagation that was known months before the<br />
attack. What could have prevented the<br />
vulnerability? Patching.<br />
It’s easy to repeat the mantra “Thou shalt<br />
patch whenever necessary” from afar, but<br />
business reality dictates that this is sometimes<br />
not the right move depending on the context.<br />
For example, you might choose not to patch a<br />
critical vulnerability in a financial system if it’s<br />
the day before the end of the financial year for<br />
fear of breaking that system.<br />
One of the ways in which public sector<br />
organisations can mitigate risk is through Cyber<br />
Threat Intelligence (CTI). This can function as<br />
an early warning mechanism, guiding security<br />
professionals on which vulnerabilities are most<br />
open to exploitation and should, therefore, be a<br />
patching priority.<br />
CTI is often simply referred to as a threat<br />
feed. However, faced with the kind of ‘savvy’<br />
and aggressive attackers that have the audacity<br />
to go after public sector organisations, the<br />
system shouldn’t just express the severity of<br />
the vulnerability as a technical risk. Given the<br />
vital work that public sector organisations<br />
transact, it should also communicate this risk in<br />
financial, business and, indeed, human terms.<br />
At its core, effective CTI provides strategic<br />
direction that cuts through the complexity of<br />
patch management, subsequently indicating<br />
where attention is most needed. For example, a<br />
threat advisory that addresses a vulnerability<br />
early on can protect an organisation months<br />
before hackers begin developing a ransomware<br />
variant to take advantage of that vulnerability.<br />
Automating the guard dogs<br />
The public sector is increasingly embracing the<br />
power of data. Collecting and analysing large<br />
volumes of data about how we live, how our<br />
businesses operate and even how the public<br />
sector itself runs can be beneficial on several<br />
60<br />
Cyber Security in the Public Sector<br />
levels. However, with data increasingly shared<br />
across departments and regional authorities,<br />
this growth in data volumes is also providing<br />
more angles of attack for hackers.<br />
Those charged with protecting Government,<br />
therefore, face a double quandary – more<br />
territory to guard and a more sophisticated foe<br />
to defend against. Monitoring these security<br />
perimeters is too large a task for traditional<br />
technologies that use a manual approach.<br />
Fortunately, there’s an array of automated<br />
monitoring services now available, as well as<br />
advanced analytics tools. Public sector security<br />
professionals can combine these tools with<br />
their own capacities for creative and lateral<br />
thinking in order to develop an advanced<br />
security monitoring ecosystem.<br />
With Artificial Intelligence (AI) coming into its<br />
own, this blended approach will offer a path<br />
forward for security monitoring. As AI<br />
technologies such as machine learning enable<br />
teams to automate the more prosaic elements<br />
of security monitoring, this will free-up valuable<br />
time for analysts to apply their brainpower to<br />
the most high-value problems. Moreover, these<br />
technologies can augment humans’ own<br />
analytical capabilities, providing them with a<br />
superior overview of the threat landscape as<br />
incidents can be automatically enriched.<br />
Rapid response<br />
It’s becoming increasingly apparent to all<br />
organisations that a cyber attack occurring is<br />
simply a matter of time. This sense of<br />
inevitability has renewed attentions on how to<br />
respond to that eventuality, rather than simply<br />
focusing on matters related to prevention.<br />
Damage limitation is vital for public sector<br />
organisations, which can rapidly come under<br />
political pressure and heavy media scrutiny in<br />
the event of a breach. The latter is especially<br />
relevant in a post-EU General Data Protection<br />
Regulation world wherein a notifiable breach<br />
now has to be reported to the Information<br />
Commissioner’s Office within 72 hours.<br />
The first step towards developing a rapid<br />
response approach to addressing threats is<br />
quantifying the speed with which you currently<br />
do so. Mean Time To Respond (MTTR) is a key<br />
metric for this. Alarmingly, a FireEye study<br />
looking at EMEIA organisations found that the<br />
average Mean Time To Dwell (MTTD) – ie the<br />
time between compromise and detection – was<br />
489 days. This is plenty of time for malignant<br />
actors to do significant damage (and shows the<br />
importance of optimising for this metric).<br />
Public sector cyber security must be about<br />
more than just throwing technology at the<br />
problem. The Number One way of<br />
“According to our own recent research at Fujitsu, only 51%<br />
of public sector organisations are confident that their<br />
employees have the right skills to take advantage of<br />
today’s new technology”<br />
compromising an organisation’s security, even<br />
today, is still a phishing e-mail with a malware<br />
exploit sent directly to an employee. Cyber<br />
attackers have a keen understanding of human<br />
error and the kind of mistakes ordinary people<br />
can make when confronted with an officiallooking<br />
e-mail.<br />
Upskilling system end users<br />
According to our own recent research at Fujitsu,<br />
only 51% of public sector organisations are<br />
confident that their employees have the right<br />
skills to take advantage of today’s new<br />
technology. It’s reasonable to assume, then,<br />
that these same people will also not have the<br />
correct knowledge to ensure that they’re using<br />
these new technologies in a secure fashion.<br />
In fact, upskilling users is one of the most<br />
cost-effective ways of reducing the probability<br />
of a human error that leads to a cyber attack.<br />
For budget-conscious public sector<br />
organisations, it’s a good way to bolster the<br />
first line of defence. The one-off generic<br />
quarter-day on IT isn’t enough – training needs<br />
to be adapted to how employees are using their<br />
technology and the kind of tools they employ<br />
on a regular basis, as well as their seniority.<br />
Confident public sector<br />
The public sector touches almost every facet of<br />
life in the UK, from business to education and<br />
on to health. It has an admirable ambition of<br />
using digital technology to transform how<br />
Government functions in this country: a goal<br />
which would deliver all kinds of gains to<br />
citizens and civil servants alike. It’s absolutely<br />
vital public sector organisations know that they<br />
can embrace the future safely without exposing<br />
themselves to malignant actors in cyber space.<br />
A two-pronged approach can help them<br />
tackle the risk. By ensuring that their<br />
employees understand the risks and use digital<br />
tools in a secure way, public sector<br />
organisations will be able to make certain that<br />
they have a strong first line of defence in place.<br />
Investing in the latest and best security<br />
technology and controls, whether that’s CTI,<br />
machine learning-fuelled monitoring or<br />
implementing MTTR as a key metric, they can<br />
put themselves on the front foot for proactively<br />
identifying and managing threats instead of<br />
simply waiting for breaches to happen.<br />
Paul McEvatt:<br />
Senior Manager (EMEIA) for<br />
Threat and Strategy at Fujitsu<br />
61<br />
www.riskxtra.com>
x<br />
RISKXtra<br />
Routes to Learning: Staff Training and<br />
Development in the Security Industry<br />
According to a recent<br />
report published by<br />
Totaljobs, two thirds<br />
of employees have<br />
moved roles as a<br />
result of lack of<br />
training opportunities.<br />
In addition, nine out<br />
of every ten<br />
respondents wanted<br />
their employer to offer<br />
additional learning<br />
and development<br />
programmes. Quite<br />
clearly, observes<br />
Louise McCree,<br />
employees want more<br />
training, but they’re<br />
not receiving it and, as<br />
a result, appear to be<br />
voting with their feet<br />
The security industry most certainly needs<br />
to work towards attracting new talent and<br />
retaining the employees it does have under<br />
its wing. One way of achieving this is by<br />
focusing on a Learning and Development<br />
strategy and identifying if, as a business, your<br />
organisation could in fact be doing more.<br />
Untrained staff are not only a liability if their<br />
knowledge is lacking, but they’re also likely to<br />
be less productive and motivated.<br />
Once an employee has their Security Industry<br />
Authority licence, the dangerous assumption in<br />
some security businesses is that the employee<br />
then knows what they’re doing because they’ve<br />
passed their basic training. Failing to provide<br />
additional support and development is shortsighted,<br />
risky and often very costly. Security<br />
personnel would benefit from a vast range of<br />
training, not to mention upskilling, mentoring<br />
and/or coaching on a regular basis.<br />
Technology is constantly changing and, as<br />
such, training in this area is vital. Your people<br />
need to be aware of any new products and<br />
systems and how to use them successfully.<br />
Employees also need to be kept up to speed<br />
with ever-changing client processes on site.<br />
The security industry itself is also constantly<br />
evolving and so it’s important for a business to<br />
develop its staff in order to avoid being left<br />
behind. In addition to this, it’s crucial that your<br />
business is compliant with all security industry<br />
regulations by making sure that the knowledge<br />
of your team is up-to-date. Training in this<br />
sense could take the form of informal on-site<br />
workshops or ‘toolbox talks’.<br />
One of the main obstacles to overcome with<br />
training is time spent out of the business and<br />
the perceived cost attached to that, but the<br />
benefits always far outweigh any negatives. For<br />
example, Health and Safety training will not<br />
only help reduce claims, but also ensure that<br />
your sites are safer and more comfortable<br />
places at which to work.<br />
It’s important to be aware of any resistance<br />
to training. This will be experienced in some<br />
organisations at a number of levels. Engaging<br />
stakeholders from the outset is imperative in<br />
order to garner support and achieve buy-in.<br />
More than ever, security teams need to be<br />
confident in handling difficult discussions,<br />
calming anxious or ‘worked up’ visitors and<br />
dealing with angry contractors. As such,<br />
workshops on ‘Conflict at Work’ are an ideal<br />
way to ensure that your employees have the<br />
tools required to do their jobs. Staff need to<br />
know how to escalate matters quickly,<br />
efficiently and professionally.<br />
Part of handing difficult situations is about<br />
improving communication. Security officers<br />
need to be able to interact with a wide variety<br />
of individuals and communicate not only<br />
verbally, but also through their physiology and<br />
tone. It sounds obvious, but it’s particularly the<br />
case in the security industry that a smile,<br />
positive eye contact and remembering<br />
someone’s name goes a long way. This last<br />
point also impresses today’s clients who are<br />
now looking for an added value service.<br />
Expectations of today’s clients<br />
Clients’ expectations are ever-increasing.<br />
Nowadays, security personnel often double as<br />
receptionists or concierge staff. They’re<br />
expected to meet and greet visitors and act as<br />
the first point of contact on site. Officers should<br />
be able to act as ambassadors for the business<br />
as well as the client so it follows that customer<br />
services training should be compulsory.<br />
Prevention is always better than cure, and<br />
this is most definitely the case when it comes<br />
to the issue of diversity. As such, developing<br />
your people to understand that working within<br />
a diverse team makes them stronger will prove<br />
62<br />
Training and Career Development<br />
to be immensely valuable. It will also render<br />
bullying and harassment claims less likely.<br />
A stronger and more robust training plan and<br />
a structured approach to Learning and<br />
Development will also help you in attracting<br />
the right talent, as well as assisting in the<br />
retention of those members of staff you do<br />
have. This then reduces turnover and spend on<br />
recruitment. Continued investment from the<br />
business means that your people will have<br />
improved motivation towards their work, in turn<br />
increasing productivity and profitability. It will<br />
also help to avoid competitors taking away your<br />
best employees as those training staff will be<br />
more eligible for internal promotions.<br />
This enables the client to have faith that<br />
security personnel harbour a complete<br />
understanding of their role, have the right skills<br />
set to hand and know how to do the job to the<br />
very best of their ability.<br />
It’s unsurprising, then, that Totaljobs’ recent<br />
training survey also discovered no less than<br />
90% of employers identified that individual<br />
training had a noticeable and positive effect on<br />
the larger team.<br />
Delivering the training programme<br />
There are various methods of delivering your<br />
training programme, with the approach you<br />
take determined by a number of factors. These<br />
include the size of groups to be trained, the<br />
length of the course, where your staff are<br />
based, what information and detail needs to be<br />
conveyed and whether or not any members of<br />
the team have disabilities and thus require a<br />
targeted learning approach. The ‘one-size-fitsall’<br />
approach rarely works.<br />
e-Learning, for example, is a relatively low<br />
cost, easy and quick way of disseminating key<br />
information. ACAS provides some great online<br />
modules which are simple, quick and can be<br />
completed away from the workplace. They’re<br />
also free. In parallel, ‘on the job’ training is a<br />
great way of sharing knowledge that’s already<br />
held within the business. You know who your<br />
subject experts are. Make good use of them.<br />
Coaching is also a great way of developing<br />
your security management team. Some<br />
individuals may need support with leadership,<br />
others with delegation. The advantage with<br />
coaching is that there’s great flexibility for<br />
managers to be developed in a way that best<br />
suits them.<br />
NVQs are a much more structured way of<br />
learning, but one which demonstrates your<br />
commitment to and investment in your people,<br />
not only in terms of cost, but also the fact that<br />
the business is willing to invest time in their<br />
progression. Some of the most successful<br />
“Some individuals may need support with leadership,<br />
others with delegation. The advantage with coaching is<br />
that there’s great flexibility for managers to be developed<br />
in a way that best suits them”<br />
training programmes use a mix of all these<br />
methods and more.<br />
Profile, values and strategy<br />
The next steps would be to ramp up a<br />
dedicated and bespoke training programme<br />
which is matched to your company’s profile,<br />
values and strategy. Ensuring that you have a<br />
clear training policy which communicates to<br />
your people what your expectations are, but<br />
also what support they should expect from you.<br />
This last point is absolutely vital.<br />
A word of caution for eager businesses.<br />
Ensure that your training is accessible to all of<br />
your people and doesn’t accidentally omit one<br />
group or another. It’s easy to fall into this trap<br />
and many well-meaning organisations end up<br />
falling foul of it. For example, when it comes to<br />
external training, consider whether the rooms<br />
involved are accessible to wheelchairs. Does<br />
the trainer harbour facilities for those who have<br />
sight problems or who are hearing impaired in<br />
some way? Is software available for PCs in<br />
order to enlarge fonts for anyone who needs<br />
this? Has due consideration been given to any<br />
learners who are dyslexic?<br />
If training always falls on one particular day<br />
(for example, a Friday) and this is when a<br />
certain member of staff doesn’t work, you could<br />
be accused of discrimination. Make sure that all<br />
training is available to everyone.<br />
Five key rules to remember<br />
There are five key rules to remember. One:<br />
Undertake a training needs analysis before you<br />
conduct any kind of training programme to<br />
ensure you understand which gaps need to be<br />
addressed and what you want to achieve.<br />
Two: Make sure the Board is on board. Buy-in<br />
from upper management is essential otherwise<br />
whatever measures you put in place will not<br />
work. Three: Ensure you know how much the<br />
training is going to cost, where the funds are<br />
coming from and the timeframes for delivery.<br />
Four: Make sure you record all training which<br />
takes place and consider whether you want to<br />
generate e-Certs and how you plan to capture<br />
and log the training that’s occurring.<br />
Five: Find a suitable way of capturing training<br />
feedback and evaluation to make certain that<br />
whatever programme of learning you put in<br />
place is fit for purpose with relevant content.<br />
Louise McCree:<br />
Founder of effectivehr<br />
63<br />
www.riskxtra.com>
x<br />
RISKXtra<br />
Risk in Action<br />
Dahua’s CCTV<br />
equipment underpins<br />
all-new Smart City<br />
surveillance scheme<br />
in Lincoln<br />
Risk in Action<br />
A 300-plus CCTV camerasupported<br />
city centre video<br />
surveillance scheme in<br />
Lincoln has been installed<br />
and commissioned using<br />
cameras, monitors and<br />
switching equipment<br />
supplied by solutions specialist Dahua Technology.<br />
The previous analogue-based surveillance system was more than 20 years<br />
old and had become expensive to maintain. That being the case, the City of<br />
Lincoln Council decided to replace the analogue cameras and transmission<br />
system with HD digital equipment.<br />
The total cost of ownership has been reduced by the savings made on legacy<br />
fibre lease costs. Energy consumption has also been reduced, while the new<br />
cameras may be configured and maintained on a remote basis.<br />
The design of the new all-wireless encrypted system is based around<br />
delivering flexible technology, ease of installation, smart edge analytics and the<br />
aforementioned remote connectivity. Environmentally friendly aspects of the<br />
project have included the specification of lower-energy equipment, integrating<br />
remote support and recycling hardware wherever possible.<br />
Both fixed and PTZ cameras are installed over the all-new 1 GB duplex<br />
network. These include cameras from the Dahua Pro Series, which feature high<br />
image quality, bandwidth efficiency using H.265 compression and “excellent”<br />
low-light performance. Bullet cameras from Dahua’s Ultra Series – complete<br />
with powerful optical zoom, IR distances of up to 50 metres and software which<br />
supports people-counting and heat-mapping – have also been installed.<br />
Bandwidth efficiency meant that multiple cameras could be installed in any<br />
given position, providing 360-degree coverage of locations and up to 20<br />
Megapixels of video capacity per location.<br />
Synectics on board with<br />
Stagecoach for bespoke<br />
surveillance solutions delivery<br />
Synectics has extended its relationship with<br />
leading UK bus operator Stagecoach, with the<br />
business having been granted a three-year<br />
contract renewal to deliver on-vehicle CCTV<br />
systems, as well as continuing maintenance<br />
support for the entire fleet.<br />
The global surveillance specialist is<br />
Stagecoach’s preferred technology supplier for<br />
on-vehicle surveillance solutions. Under this<br />
latest agreement, Synectics will provide an<br />
upgrade path for new and existing vehicles in<br />
the fleet designed to support Stagecoach in its<br />
long-term objectives which include investment<br />
in on-vehicle surveillance, driving uptime and<br />
Securiton specified for fire<br />
protection at major supermarket’s<br />
national cold store<br />
The popular Securiton aspirating smoke<br />
detection (ASD) system has been selected as<br />
the fire protection method of choice for a new<br />
cold store to be operated by one of the UK’s<br />
major supermarket retailers.<br />
The new 68-truck bay, 30,000 square metre<br />
hub in Pineham, near Milton Keynes, offers a<br />
state-of-the-art facility and has been built<br />
alongside an existing 58,000 square metre<br />
Distribution Centre to which it will be linked via<br />
interconnecting yards.<br />
It’s vital that fire detection for the new facility<br />
is both fast and reliable. Patol is the UK<br />
distributor for the Securiton range of ASD<br />
systems and has extensive experience in<br />
meeting the specific challenges presented by<br />
cold stores. This knowledge and expertise has<br />
proven invaluable in this particular project, with<br />
the company extensively involved in developing<br />
the final solution.<br />
One of the prime challenges was to ensure<br />
that the ASD system could cope with<br />
temperatures as low as -30°C. The final design<br />
involves the inclusion of heated sampling<br />
points to prevent any ice build-up.<br />
Maintenance of the system can be carried out<br />
from a remote location via the network<br />
capability of the control panels.<br />
reliability and, of course, ensuring passenger<br />
safety and security.<br />
The initial phase of the roll-out<br />
encompasses an enhanced on-vehicle solution<br />
to be fitted to all new vehicles entering the<br />
fleet. This solution will incorporate health<br />
monitoring of CCTV system performance and<br />
the capability to remotely download incident<br />
footage using the depot Wi-Fi network.<br />
Footage being downloaded remotely can<br />
actively support cross-functional collaboration<br />
with third party agencies.<br />
Such flexibility allows the specific footage<br />
to be shared promptly which can prove to be<br />
vital during the early stages of an<br />
investigation. The footage is also<br />
authenticated with SHA-2 watermarking to<br />
ensure data integrity for audit purposes.<br />
64<br />
Technology in Focus<br />
Technology in Focus<br />
StaySafe app locates employees in event of terror attacks<br />
Safety app specialist StaySafe has<br />
launched IncidentEye, a smart phone<br />
app compatible with both Android<br />
and iOS devices that allows<br />
companies to quickly locate and<br />
monitor the safety of their staff in<br />
the event of a terrorist attack or<br />
other emergency scenario.<br />
IncidentEye has been developed in<br />
response to the growing number of<br />
episodes, both man-made and<br />
natural, that are now affecting<br />
businesses right around the world.<br />
The app, which lies dormant on staff phones until an incident is triggered by<br />
their employer, uses location data to establish if any employees are in the<br />
danger zone and prompts them to check-in safely.<br />
Importantly, the app can then be used to communicate with affected<br />
members of staff, sharing crucial up-to-date safety information and warning any<br />
nearby employees to avoid a given area until the incident is resolved.<br />
www.staysafeapp.com<br />
Anti-passback logic and<br />
interlocking doors added to<br />
Inner Range’s Inception<br />
Inner Range’s powerful and budgetfriendly<br />
Inception access control and<br />
intruder detection system has been<br />
upgraded to allow a range of extra<br />
reporting functions, anti-passback<br />
protocols, language translation and<br />
interlocking doors. The upgrades will<br />
afford security and facilities managers alike better and greater control over<br />
who’s accessing their site.<br />
Several new reporting functions can be scheduled and automated. For<br />
example, security managers can receive a monthly report on access card<br />
inactivity to help them delete credentials that are no longer in use. Automatic<br />
muster reports, showing who’s where on site, can also be scheduled to run in<br />
the event of a fire alarm in order to assist with Health and Safety procedures.<br />
Anti-passback logic, meanwhile, provides additional validation for user<br />
access requests. The system checks the user’s last known location to see if<br />
they’re already in the area they’re trying to access. The protocol helps to<br />
prevent tailgating and the sharing of access cards, while also ensuring that<br />
individuals move through a building correctly by dint of following the right<br />
access control procedures.<br />
Anti-passback is commonly employed on sites where accurate user locations<br />
are critical and in relation to site reports, accurate muster reports or secure<br />
locations. It can also help to protect resources such as car park spaces by<br />
preventing multiple drivers presenting the same access credential.<br />
The system can ‘auto-forgive’ or exempt passback violations such that cards<br />
continue to work, but security managers are alerted so they can deal with the<br />
issue in a ‘gentle’ fashion. This is often helpful before rolling out a ‘hard’ antipassback<br />
protocol. Locking two – or more – doors to ensure they cannot both<br />
be open at the same time is now an option thanks to the system upgrades.<br />
www.innerrange.com<br />
Zaun’s ArmaWeave perimeter<br />
security fencing system achieves<br />
“steepest rake yet”<br />
ArmaWeave installer Crime and Fire Defence<br />
Systems has carried out an installation at a<br />
high security site where the Zaun Group’s<br />
fencing solution climbs a 50 metre-long, 25°<br />
slope using full width panels.<br />
The specialist perimeter protection<br />
solutions manufacturer developed the raking<br />
installation method to make best use of the<br />
properties of the high security fabric, which<br />
itself is the most intruder-resistant fence<br />
available on the high security market.<br />
Zaun’s owner and co-founder Alastair<br />
Henman explained to Risk Xtra: “The raking<br />
powers of this fencing solution are such a<br />
big benefit over 358 and could help in<br />
protecting so many high security sites.”<br />
www.zaun.co.uk<br />
Keri Systems’ single-door controller<br />
offers simple programming and<br />
control via mobile device<br />
The economical Intelliprox Blue grants access<br />
to a single point of entry and is designed for<br />
quick implementation and ease of use.<br />
Intelliprox Blue is capable of controlling two<br />
readers on a single door, providing both ‘In’ and<br />
‘Out’ reads. This is accomplished through the<br />
use of Keri Systems’ exit readers in combination<br />
with standard NXT readers.<br />
The Intelliprox Blue is programmed<br />
wirelessly through the use of a Bluetooth<br />
connection. The only requirement is the app<br />
(loaded on a smart phone) and proximity to the<br />
controller via a Bluetooth connection with a<br />
mobile device.<br />
Features include<br />
manual door unlock,<br />
adjustable door unlock<br />
time and auto-unlock<br />
scheduling. There’s also<br />
door held open and door<br />
forced open sensing.<br />
Low power consumption<br />
is another key feature.<br />
www.kerisys.com<br />
65<br />
www.riskxtra.com>
BENCHMARK<br />
Smart Solutions<br />
BENCHMARK<br />
Innovative and smart solutions can add value and benefits to<br />
modern systems for customers. With the technological landscape<br />
rapidly evolving, the Benchmark Smart Solutions project assesses<br />
the potential on offer from system integration, advanced<br />
connectivity and intelligent technology. Bringing together field trials<br />
and assessments, proof of concept and real-world experience of<br />
implementing smart solutions, it represents an essential resource<br />
for all involved in innovative system design.<br />
Launching in 2017, Benchmark Smart Solutions will be the industry’s only real-world resource for<br />
security professionals who are intent on offering added value through the delivery of smarter solutions.<br />
@Benchmark_Smart<br />
Partner Companies<br />
www.benchmarksmart.com
x<br />
RISKXtra<br />
Appointments<br />
Ashley Almanza<br />
G4S Group’s CEO Ashley<br />
Almanza has been<br />
announced as the new chair<br />
of the International Security<br />
Ligue, an association of<br />
private security<br />
organisations responsible<br />
for defining, establishing<br />
and maintaining the highest<br />
ethical and professional standards within the<br />
private security industry worldwide.<br />
The International Security Ligue was founded<br />
in 1934. Its registered offices are based in<br />
Berne, Switzerland. Maintaining the highest<br />
ethical and professional standards across the<br />
private security industry has been achieved<br />
through the very open and cordial exchange of<br />
ideas and experiences between member<br />
companies, all of whom are leading businesses<br />
in the countries whom they represent.<br />
The International Security Ligue is now<br />
represented on all continents and in 34 nations.<br />
As a mark of the high esteem in which the Ligue<br />
is held across the globe, it’s represented in a<br />
consultative capacity as a non-Governmental<br />
organisation at the United Nations and within<br />
the European Common Market.<br />
Almanza commented: “With more than two<br />
million staff providing security and related<br />
services in over 120 countries, members of the<br />
International Security Ligue play a vital role,<br />
contributing to the security and safety of people<br />
and assets all over the world. To be successful,<br />
we must employ the very best people, apply<br />
effective screening and training and meet or<br />
exceed the requirements of both national and<br />
international laws as well as ethical standards.”<br />
Almanza concluded: “Our goal has to be to<br />
eradicate injuries and fatalities across our<br />
industry. It’s an appropriate goal.”<br />
Appointments<br />
Risk Xtra keeps you up-to-date with all the latest people<br />
moves in the security, fire, IT and Government sectors<br />
Simon Banks<br />
The British Security Industry Association (BSIA)<br />
is pleased to welcome Simon Banks, Group<br />
managing director of CSL, as its new chairman.<br />
The announcement was made at the British<br />
Security Awards Ceremony, held at the London<br />
Marriott Hotel in Grosvenor Square on 11 July.<br />
Banks brings with him a wealth of industry<br />
knowledge gained through a highly successful<br />
career. He co-founded the CSL Group (formerly<br />
CSL DualCom) back in 1996 to manufacture<br />
security and communications products for the<br />
security and fire sectors and, in the intervening<br />
period, has built the business to become a<br />
global provider of connectivity solutions.<br />
Banks will now be leading the BSIA’s Board,<br />
comprising of 15 Membership Section head<br />
directors, in responding to advancing<br />
technology and changing attitudes towards<br />
securing peoples’ lives and property.<br />
Speaking about his new appointment, Banks<br />
explained to Risk Xtra: “With so many new<br />
opportunities on offer, there has never been a<br />
better time to engage with the Trade<br />
Association. The entire security value chain<br />
should welcome, adopt and promote new<br />
technologies rather than allow competing<br />
verticals to invade our sector. Standards and<br />
competence underpin our industry and they<br />
should never be compromised. Active<br />
participation in the BSIA ensures that we all<br />
remain a relevant and competitive force with<br />
key technologies and skills.”<br />
Gary Stanton<br />
Axis Group, the integrated security and<br />
cleaning services business, has promoted<br />
Gary Stanton to the newly-created role of<br />
Group commercial director as part of bold<br />
restructuring plans specifically designed to<br />
focus the organisation on long-term growth<br />
and profitability.<br />
Stanton will now manage both the<br />
commercial security and cleaning teams,<br />
which are to be aligned into a single<br />
department. This move reflects the increasing<br />
success that the Group is having in delivering<br />
its services as an integrated contract offer.<br />
With over 14 years’ experience in the<br />
industry, Stanton joined Axis Security back in<br />
December 2009. He was promoted to the role<br />
of commercial director in 2015.<br />
In his new role, Stanton will report directly<br />
to Jonathan Levine, the Group’s CEO, who’s<br />
looking forward to working closely with him.<br />
“I’m pleased to welcome Gary into this new<br />
position and wish him well in the role,”<br />
observed Levine. “We’ve already begun to see<br />
the success of the Group’s commercial team<br />
with the centralisation of all Bid Writing<br />
functions, and we believe these changes can<br />
lead to further success and achievement in<br />
relation to our commercial aims. For his part,<br />
Gary harbours exceptional experience both<br />
within our industry generally and also across<br />
the Axis Group, which makes him the ideal<br />
choice for this new role within the company.”<br />
67<br />
www.riskxtra.com>
x<br />
RISKXtra<br />
Appointments<br />
Martin Harvey<br />
During the 50th General Assembly of Euralarm, the<br />
European association representing the fire safety and<br />
security industries, the members chose Martin Harvey of<br />
Johnson Controls to be the organisation’s new president.<br />
Harvey succeeds Enzo Peduzzi who has served in the role<br />
for the past three years.<br />
A new general manager – namely Paul van der Zanden<br />
– to represent the association in Brussels was also<br />
introduced and begins in post during Q3.<br />
In separate meetings, new chairs were elected for the myriad Euralarm<br />
Sections and will also join as members of the Euralarm Board. Lance Rütimann<br />
(of Siemens) will chair the Fire Section of Euralarm with Michael Scharnowsky<br />
(from Hekatron) as vice-chairman.<br />
Tornbjörn Laursen (of SikkerhedsBranchen) will chair the Extinguishing<br />
Section with Alan Elder (of the Fire Industry Association) serving as vicechairman.<br />
Jon Könz (Siemens) has been elected chair of the Services Section<br />
with Philippe Lecuyer (DEF) taking the role of vice-chairman.<br />
David Wilkinson of the British Security Industry Association is to carry on as<br />
chairman of the Security Section. Milan Ceeh (AGA) has been elected to serve<br />
as Wilkinson’s vice-chairman.<br />
Paul Grist<br />
Trigion Security, the<br />
specialist security<br />
solutions division of<br />
Facilicom UK, has<br />
announced the<br />
appointment of Paul Grist<br />
as its new security<br />
director. Grist started in<br />
this role on Monday 16<br />
July and succeeds Neil Ricketts.<br />
Grist brings many years’ experience and<br />
knowledge to his new role and now assumes<br />
responsibility for sales, marketing and strategy.<br />
He will be supported on electronic security<br />
matters by Dave Bonci and on security<br />
guarding-related issues by Sean Titheridge,<br />
who also joined Trigion Security in July.<br />
Grist joins Trigion from Insafe International<br />
where he was head of electronic systems. Prior<br />
to this, Grist served as managing director of the<br />
Swift Alarms Group.<br />
Speaking about the move, Grist informed<br />
Risk Xtra: “I’m looking forward to building upon<br />
Trigion Security’s good name to further<br />
strengthen and develop the company’s<br />
presence throughout the UK.”<br />
Jan-Hein Hemke, managing director of<br />
Facilicom UK, added: “We welcome Paul to the<br />
team. I’m fully confident that his experience<br />
and skills will contribute towards the continued<br />
growth of our security division over the months<br />
and years to come.”<br />
As a business, Trigion operates to the very<br />
highest standards in the industry and has<br />
gained Security Industry Authority Approved<br />
Contractor status as well as ISO 9001.<br />
Ben Draper<br />
Security guarding<br />
solutions specialist Ward<br />
Security has announced<br />
that executive finance<br />
director Ben Draper has<br />
been appointed chief<br />
operating officer (COO), a<br />
new position created<br />
within the business.<br />
In this role, Draper will be an integral part of<br />
the Ward Security Executive Leadership Team<br />
alongside Kevin Ward (managing director) and<br />
CEO David Ward, the co-founders of the<br />
business. Draper joined Ward Security back in<br />
2013 from an accountancy practice to become<br />
finance director designate. During his time in<br />
practice, he gained considerable experience<br />
across a number of industries and qualified as a<br />
Chartered Accountant.<br />
Draper was promoted to executive finance<br />
director (and the Board of Ward Security<br />
Holdings) in 2015.<br />
As the company’s COO, Draper’s input will be<br />
pivotal when it comes to overseeing the daily<br />
operations of the business encompassing all<br />
departments as well as implementing core<br />
long-term financial objectives.<br />
Alan Clamp<br />
Alan Clamp, CEO at the<br />
Security Industry<br />
Authority, is to step<br />
down from the<br />
organisation after more<br />
than three successful<br />
years at the helm.<br />
Clamp will then take on<br />
the role of CEO at the<br />
Professional Standards Authority from<br />
Thursday 1 November.<br />
Commenting on his decision to leave the<br />
private security industry’s Regulator, Clamp<br />
explained: “It has been a great privilege to<br />
lead the SIA. I have been supported by a<br />
staff team who have consistently performed<br />
to a very high standard with dedication and<br />
professionalism. I would like to thank them<br />
for this. Their commitment, together with the<br />
engagement and support of the private<br />
security industry itself, has enabled us to<br />
achieve our objectives and rise to the<br />
challenges and opportunities we’ve faced<br />
over the last three years.”<br />
Clamp joined the SIA back in June 2015. He<br />
has since overseen the introduction of the<br />
online licensing system and work designed<br />
to strengthen and review the Regulator’s<br />
voluntary Approved Contractor Scheme.<br />
68<br />
ACCESS CONTROL<br />
ACCESS CONTROL<br />
ACCESS CONTROL MANUFACTURER<br />
KERI SYSTEMS UK LTD<br />
Tel: + 44 (0) 1763 273 243<br />
Fax: + 44 (0) 1763 274 106<br />
Email: sales@kerisystems.co.uk<br />
www.kerisystems.co.uk<br />
ACCESS CONTROL & DOOR HARDWARE<br />
NORTECH CONTROL SYSTEMS LTD.<br />
Nortech House, William Brown Close<br />
Llantarnam Park, Cwmbran NP44 3AB<br />
Tel: 01633 485533<br />
Email: sales@nortechcontrol.com<br />
www.nortechcontrol.com<br />
ACCESS CONTROL – BIOMETRICS, BARRIERS,<br />
CCTV, TURNSTILES<br />
ALPRO ARCHITECTURAL HARDWARE<br />
Products include Electric Strikes, Deadlocking Bolts,<br />
Compact Shearlocks, Waterproof Keypads, Door<br />
Closers, Deadlocks plus many more<br />
T: 01202 676262 Fax: 01202 680101<br />
E: info@alpro.co.uk<br />
Web: www.alpro.co.uk<br />
UKB INTERNATIONAL LTD<br />
Planet Place, Newcastle upon Tyne<br />
Tyne and Wear NE12 6RD<br />
Tel: 0845 643 2122<br />
Email: sales@ukbinternational.com<br />
Web: www.ukbinternational.com<br />
ACCESS CONTROL – SPEED GATES, BI-FOLD GATES<br />
ACCESS CONTROL<br />
COVA SECURITY GATES LTD<br />
Bi-Folding Speed Gates, Sliding Cantilevered Gates,<br />
Road Blockers & Bollards Consultancy, Design,<br />
Installation & Maintenance - UK Manufacturer - PAS 68<br />
Tel: 01293 553888 Fax: 01293 611007<br />
Email: sales@covasecuritygates.com<br />
Web: www.covasecuritygates.com<br />
HTC PARKING AND SECURITY LIMITED<br />
St. James’ Bus. Centre, Wilderspool Causeway,<br />
Warrington Cheshire WA4 6PS<br />
Tel 01925 552740 M: 07969 650 394<br />
info@htcparkingandsecurity.co.uk<br />
www.htcparkingandsecurity.co.uk
ACCESS CONTROL<br />
CCTV<br />
CCTV<br />
INTEGRATED DESIGN LIMITED<br />
Integrated Design Limited, Feltham Point,<br />
Air Park Way, Feltham, Middlesex. TW13 7EQ<br />
Tel: +44 (0) 208 890 5550<br />
sales@idl.co.uk<br />
www.fastlane-turnstiles.com<br />
ACCESS CONTROL<br />
MODICAM EUROPE<br />
Rapid Deployment Digital IP High Resolution CCTV40<br />
hour battery, Solar, Wind Turbine and Thermal Imaging<br />
Wired or wireless communication fixed IP. CE Certified.<br />
Modicam Europe, 5 Station Road, Shepreth,<br />
Cambridgeshire SG8 6PZ<br />
www.modicam.com sales@modicameurope.com<br />
CCTV<br />
SECURE ACCESS TECHNOLOGY LIMITED<br />
Authorised Dealer<br />
Tel: 0845 1 300 855 Fax: 0845 1 300 866<br />
Email: info@secure-access.co.uk<br />
Website: www.secure-access.co.uk<br />
G-TEC DISTRIBUTION<br />
Gtec House, 35-37 Whitton Dene<br />
Hounslow, Middlesex TW3 2JN<br />
Tel: 0208 898 9500<br />
www.gtecsecurity.co.uk<br />
sales@gtecsecurity.co.uk<br />
CCTV & IP SECURITY SOLUTIONS<br />
PANASONIC SYSTEM<br />
COMMUNICATIONS COMPANY EUROPE<br />
Panasonic House, Willoughby Road<br />
Bracknell, Berkshire RG12 8FP UK<br />
Tel: 0207 0226530<br />
Email: info@business.panasonic.co.uk<br />
CCTV POLES, COLUMNS, TOWERS AND<br />
MOUNTING PRODUCTS<br />
ALTRON COMMUNICATIONS<br />
EQUIPMENT LTD<br />
Tower House, Parc Hendre, Capel Hendre, Carms. SA18 3SJ<br />
Tel: +44 (0) 1269 831431<br />
Email: cctvsales@altron.co.uk<br />
Web: www.altron.co.uk
DIGITAL IP CCTV<br />
DISTRIBUTORS<br />
SESYS LTD<br />
High resolution ATEX certified cameras, rapid deployment<br />
cameras and fixed IP CCTV surveillance solutions<br />
available with wired or wireless communications.<br />
1 Rotherbrook Court, Bedford Road, Petersfield,<br />
Hampshire, GU32 3QG<br />
Tel +44 (0) 1730 230530<br />
Fax +44 (0) 1730 262333<br />
Email: info@sesys.co.uk www.sesys.co.uk<br />
ONLINE SECURITY PRODUCTS<br />
Security distributors direct to installers, property<br />
maintenance & facilities management companies<br />
CCTV SPECIALISTS<br />
PLETTAC SECURITY LTD<br />
Unit 39 Sir Frank Whittle Business Centre,<br />
Great Central Way, Rugby, Warwickshire CV21 3XH<br />
Tel: 01788 567811 Fax: 01788 544 549<br />
Email: jackie@plettac.co.uk<br />
www.plettac.co.uk<br />
Phone 0800 880 6123<br />
Phone 0113 850 6123<br />
sales@onlinesecurityproducts.co.uk<br />
www.onlinesecurityproducts.co.uk<br />
AWARD-WINNING, LEADING GLOBAL WHOLESALE<br />
DISTRIBUTOR OF SECURITY AND LOW VOLTAGE<br />
PRODUCTS.<br />
CONTROL ROOM & MONITORING<br />
ADVANCED MONITORING SERVICES<br />
EUROTECH MONITORING SERVICES LTD.<br />
Specialist in:- Outsourced Control Room Facilities •<br />
Lone Worker Monitoring • Vehicle Tracking • Message<br />
Handling • Help Desk Facilities • Keyholding/Alarm<br />
Response<br />
Tel: 0208 889 0475 Fax: 0208 889 6679<br />
E-MAIL eurotech@eurotechmonitoring.net<br />
Web: www.eurotechmonitoring.net<br />
ADI GLOBAL DISTRIBUTION<br />
Distributor of electronic security systems and solutions<br />
for over 250 leading manufacturers, the company also<br />
offers an internal technical support team, dedicated<br />
field support engineers along with a suite of training<br />
courses and services. ADI also offers a variety of fast,<br />
reliable delivery options, including specified time delivery,<br />
next day or collection from any one of 28 branches<br />
nationwide. Plus, with an ADI online account, installers<br />
can order up to 7pm for next day delivery.<br />
Tel: 0161 767 2990 Fax: 0161 767 2999 Email:<br />
sales.uk@adiglobal.com www.adiglobal.com/uk
GATE AUTOMATION & ACCESSORIES<br />
WHOLESALER/DISTRIBUTOR<br />
COMPLETE SOLUTIONS FOR IDENTIFICATION<br />
KING SYSTEMS LTD<br />
Your one stop Gate Automation Wholesaler/Distributor<br />
Unit B. Nicholson Court,<br />
Geddings Road, Hoddeston,<br />
Hertfordshire, EN11 0NE, England.<br />
Tel: 01992 465999 Fax: 01992 465791<br />
Email: info@kingsystemsltd.com<br />
www.kingsystemsltd.com<br />
THE UK’S MOST SUCCESSFUL DISTRIBUTOR OF IP,<br />
CCTV, ACCESS CONTROL AND INTRUDER DETECTION<br />
SOLUTIONS<br />
DATABAC GROUP LIMITED<br />
1 The Ashway Centre, Elm Crescent,<br />
Kingston upon Thames, Surrey KT2 6HH<br />
Tel: +44 (0)20 8546 9826<br />
Fax:+44 (0)20 8547 1026<br />
enquiries@databac.com<br />
INDUSTRY ORGANISATIONS<br />
TRADE ASSOCIATION FOR THE PRIVATE SECURITY<br />
INDUSTRY<br />
NORBAIN SD LTD<br />
210 Wharfedale Road, IQ Winnersh, Wokingham,<br />
Berkshire, RG41 5TP<br />
Tel: 0118 912 5000 Fax: 0118 912 5001<br />
www.norbain.com<br />
Email: info@norbain.com<br />
IDENTIFICATION<br />
WWW.IDENTIFICATIONSOLUTIONS.CO.UK<br />
BRITISH SECURITY INDUSTRY<br />
ASSOCIATION<br />
Tel: 0845 389 3889<br />
Email: info@bsia.co.uk<br />
Website: www.bsia.co.uk<br />
Twitter: @thebsia<br />
INTEGRATED SECURITY SOLUTIONS<br />
SECURITY PRODUCTS AND INTEGRATED SOLUTIONS<br />
IDENTIFICATION SOLUTIONS<br />
Members • Staff • Visitors • Contractors • Conference<br />
• Clubs • Delegates • Corporate ID<br />
www.identificationsolutions.co.uk<br />
HONEYWELL SECURITY AND FIRE<br />
Tel: +44 (0) 844 8000 235<br />
E-mail: securitysales@honeywell.com
INTEGRATED SECURITY SOLUTIONS<br />
UPS - UNINTERRUPTIBLE POWER SUPPLIES<br />
INNER RANGE EUROPE LTD<br />
Units 10 - 11, Theale Lakes Business Park, Moulden<br />
Way, Sulhampstead, Reading, Berkshire RG74GB, United<br />
Kingdom<br />
Tel: +44(0) 845 470 5000<br />
Fax: +44(0) 845 470 5001<br />
Email: ireurope@innerrange.co.uk<br />
www.innerrange.com<br />
UNINTERRUPTIBLE POWER SUPPLIES LTD<br />
Woodgate, Bartley Wood Business Park<br />
Hook, Hampshire RG27 9XA<br />
Tel: 01256 386700 5152 e-mail: sales@upspower.co.uk<br />
www.upspower.co.uk<br />
PERIMETER PROTECTION<br />
PERIMETER PROTECTION<br />
SECURITY<br />
CASH & VALUABLES IN TRANSIT<br />
GPS PERIMETER SYSTEMS LTD<br />
14 Low Farm Place, Moulton Park<br />
Northampton, NN3 6HY UK<br />
Tel: +44(0)1604 648344 Fax: +44(0)1604 646097<br />
E-mail: info@gpsperimeter.co.uk<br />
Web site: www.gpsperimeter.co.uk<br />
POWER<br />
UPS - UNINTERRUPTIBLE POWER SUPPLIES<br />
ADEPT POWER SOLUTIONS LTD<br />
Adept House, 65 South Way, Walworth Business Park<br />
Andover, Hants SP10 5AF<br />
Tel: 01264 351415 Fax: 01264 351217<br />
Web: www.adeptpower.co.uk<br />
E-mail: sales@adeptpower.co.uk<br />
CONTRACT SECURITY SERVICES LTD<br />
Challenger House, 125 Gunnersbury Lane,<br />
London W3 8LH<br />
Tel: 020 8752 0160 Fax: 020 8992 9536<br />
E: info@contractsecurity.co.uk<br />
sales@contractsecurity.co.uk<br />
Web: www.contractsecurity.co.uk<br />
EXPERTS IN X-RAY SCANNING SECURITY EQUIPMENT<br />
SINCE 1950<br />
TODD RESEARCH<br />
1 Stirling Way, Papworth Business Park<br />
Papworth Everard, Cambridgeshire CB23 3GY<br />
United Kingdom<br />
Tel: 01480 832202<br />
Email: xray@toddresearch.co.uk<br />
FENCING SPECIALISTS<br />
J B CORRIE & CO LTD<br />
Frenchmans Road<br />
Petersfield, Hampshire GU32 3AP<br />
Tel: 01730 237100<br />
Fax: 01730 264915<br />
email: fencing@jbcorrie.co.uk
INTRUSION DETECTION AND PERIMETER PROTECTION<br />
LIFE SAFETY EQUIPMENT<br />
OPTEX (EUROPE) LTD<br />
Redwall® infrared and laser detectors for CCTV applications<br />
and Fiber SenSys® fibre optic perimeter security<br />
solutions are owned by Optex. Platinum House, Unit<br />
32B Clivemont Road, Cordwallis Industrial Estate,<br />
Maidenhead, Berkshire, SL6 7BZ<br />
Tel: +44 (0) 1628 631000<br />
Fax: +44 (0) 1628 636311<br />
Email: sales@optex-europe.com<br />
www.optex-europe.com<br />
C-TEC<br />
Challenge Way, Martland Park,<br />
Wigan WN5 OLD United Kingdom<br />
Tel: +44 (0) 1942 322744<br />
Fax: +44 (0) 1942 829867<br />
Website: www.c-tec.com<br />
INTRUDER AND FIRE PRODUCTS<br />
PERIMETER SECURITY<br />
CQR SECURITY<br />
125 Pasture road, Moreton, Wirral UK CH46 4 TH<br />
Tel: 0151 606 1000 Fax: 0151 606 1122<br />
Email: andyw@cqr.co.uk<br />
www.cqr.co.uk<br />
SECURE CONNECTIVITY PROVIDERS<br />
TAKEX EUROPE LTD<br />
Aviary Court, Wade Road, Basingstoke<br />
Hampshire RG24 8PE<br />
Tel: +44 (0) 1256 475555<br />
Fax: +44 (0) 1256 466268<br />
Email: sales@takex.com<br />
Web: www.takex.com<br />
SECURITY SYSTEMS<br />
CSL<br />
T: +44 (0)1895 474 474<br />
sales@csldual.com<br />
@CSLDualCom<br />
www.csldual.com<br />
ONLINE SECURITY SUPERMARKET<br />
BOSCH SECURITY SYSTEMS LTD<br />
PO Box 750, Uxbridge, Middlesex UB9 5ZJ<br />
Tel: 0330 1239979<br />
E-mail: uk.securitysystems@bosch.com<br />
Web: uk.boschsecurity.com<br />
SECURITY PRODUCTS<br />
EBUYELECTRICAL.COM<br />
Lincoln House, Malcolm Street<br />
Derby DE23 8LT<br />
Tel: 0871 208 1187<br />
www.ebuyelectrical.com<br />
EATON<br />
Eaton is one of the world’s leading manufacturers of<br />
security equipment its Scantronic and Menvier product<br />
lines are suitable for all types of commercial and residential<br />
installations.<br />
Tel: 01594 545 400 Email:<br />
securitysales@eaton.com<br />
Web: www.uk.eaton.com Twitter: @securityTP
thepaper<br />
Business News for Security Professionals<br />
Pro-Activ Publications is embarking on a revolutionary<br />
launch: a FORTNIGHTLY NEWSPAPER dedicated to the<br />
latest financial and business information for<br />
professionals operating in the security sector<br />
The Paper will bring subscribers (including CEOs,<br />
managing directors and finance directors within the<br />
UK’s major security businesses) all the latest company<br />
and sector financials, details of business re-brands,<br />
market research and trends and M&A activity<br />
FOR FURTHER INFORMATION<br />
ON THE PAPER CONTACT:<br />
Brian Sims BA (Hons) Hon FSyI<br />
(Editor, The Paper and Risk UK)<br />
Telephone: 020 8295 8304<br />
e-mail: brian.sims@risk-uk.com<br />
www.thepaper.uk.com
NOTHING MISSED<br />
Independent left and right detection<br />
with BX Shield PIRs<br />
BX Shield<br />
Outdoor curtain PIRs<br />
up to 12m per side<br />
wired/wireless & anti masking<br />
The BX Shield sensors combine superior outdoor performance with<br />
a versatile, modern design. The result is a range of easy-to-install curtain<br />
sensors protecting the immediate boundary of your premises against intrusion.<br />
With two pyro-elements on the left, and two on the right, the motion sensors<br />
detect completely independently on each side and up to 12m to suit the needs<br />
of your property. Not affected by small animals or by environmental changes,<br />
it is a perfect trigger for outdoor CCTV cameras providing visual verification<br />
for residential or commercial applications.<br />
For more information visit www.optex-europe.com<br />
or contact us at +44(0) 1628 631 000<br />
INDOOR DETECTION | OUTDOOR DETECTION | TAILGATING DETECTION | PEOPLE COUNTING | ENTRANCE DETECTION