Saturday, April 20, 2013

Columbia Leaves Its Mark

As we reach the end of April, it seems timely to feature another episode in our Technical Director Andy Moon's 'Security Travelogue'.

With the continued expansion of our distribution in the USA, Andy recently found himself in South Carolina. When he returned he came back with some fascinating photographs, particularly of the city of Columbia and we'd like to share some of these with you today.

It was in the month of April in 1861 that the first shots of the American Civil War were fired - in the state of South Carolina during an attack on Fort Sumter. The city of Columbia was at that time an important centre for the Confederate States Army and it played a major role throughout the conflict. That has left a legacy which is still visible today - as Andy's photographs below demonstrate.
 
Columbia City Hall plaque

2 of the 10 stars that mark cannon ball hits from the Civil War

Here are some interesting pages for further reading on the subject:

The role of Columbia role in the American Civil War

American Civil War timeline here

Labels: , , ,

Friday, April 12, 2013

Holistic Perimeter Security


The vocabulary of perimeter security encompasses many words but one that has recently come into prominence is the word ‘holistic’. It is an adjective that can apply to many things. Indeed, most people are familiar with the word when relating to health.

Q: So how can an adjective most commonly used when discussing health possibly be of relevance to security?

A: If you look up its meaning, you will find that holistic is used to emphasise the importance of the whole of a subject and how its constituent parts are interdependent.

Here is how and why we see the relevance of a holistic approach to perimeter security …

Many years of experience in providing perimeter security solutions have taught us that when a business suffers a security breach, be it for theft of its stock or vandalism to its premises, the consequences often go far beyond just the material loss itself.

After a perimeter security breach, a business usually has to apportion manpower to deal with the aftermath, having to clean up or organise repairs afterwards, liaise with the police, insurers and staff etc. So the continuity of the business is immediately and adversely affected.

Then there is the matter of whether the reputation of the business might suffer as a result. Customers, having heard about the incident, might lose faith in the business so its credibility for on-going and future business may be at risk.

The answer, therefore, is to plan and implement a perimeter security system as a whole package – ie. a holistic system – and that, in our view, is to address 8 important factors. We call it the DRAMADEC list - a nickname we conjured up making the list easy to remember.

Deterrent
Response
Alert
Monitoring
Assessment
Detection
Evidence
Control


Our Electro-Fence system combined with Flexiguard, Multisys® and Multiviewsystems and integrated into a quality cctv system will cover all these aspects. The package would offer:

  • electric fencing both as a visual and physical deterrent 
  •  discrete and unobvious detection with appropriate alarm signal generation 
  •  centralised control over the electric fencing and monitoring analysers and other alarm devices 
  •  remote control monitoring of single or multiple sites using a virtual network computer system (LAN or WAN) which allows data to be encrypted plus a secure logon.
Having installed such a system, a business must also ensure that its security personnel are appropriately trained to deal with both the technical side of how the security system works as well as what protocols to follow should a security breach be detected and be genuine.

The business also needs to have protocols in place so that, should an intrusion be detected, they can readily identify what happened, when, who dealt with it and the measures they took along with studying the technical data provided by the security system and the cctv footage. By means of adopting this type of approach, perimeter security breaches or attempts to breach the perimeter can be minimized and staff and customers afforded confidence.

If you are interested in taking this holistic approach to your security needs, please feel free to contact us for a no-obligation discussion.

Labels: , , ,