The key to good security—learn to think like a burglar
Good security solutions are made like an onion—layer by layer. It should take a long time to reach protected assets, the time necessary to act on the security breach. Coor has implemented and is fine-tuning the very latest security solutions at its new head office so it can achieve the perfect overall solution.
For Pasi Rahko, Coor security expert, customizing the security solution for the new head office has been an interesting challenge.
"We've designed the security solution using the latest technology, so that the office is something of a showroom for innovative and intelligent solutions, and an in-house testbed for new technology."
All the solution's components are IT-based, i.e. they utilize Coor's existing IT infrastructure fully, including the power supply for all components and communication between them. This does away with any need to create dedicated infrastructure or a cable network for the security solution, which really helps flexibility and brings value for money.
The new office will also contain a Coor operational unit that delivers centralized services that maintain and manage different customer security systems remotely (Security-as-a-Service, or SaaS). This unit is called Coor Security Center and currently has 30 people that manage several major security facilities for customers around Sweden.
"The move means the Coor Security Center gets access to a better technology platform and premises that are more suited to its operations. We're very proud to demonstrate this to existing and potential customers, as the operations are the backbone of our security offering", commented Pasi Rahko.
So what is security and what are the best solutions?
"Physical security means using people, procedures and technology to protect assets. The purpose is to discover, delay and then respond. It's a common misconception that physical measures are enough of a deterrent—in our experience, that just isn't the case. Our aim is to discover and then delay a breach as early as possible, which means buying time to respond," commented Pasi Rahko.
The latest security solutions are technology-based, meaning that the customer's purchasing and operational costs reduce and are gradually written off. If a solution is based on a lot of people safeguarding assets, costs don't reduce.
The latest security solutions are technology-based, meaning that the customer’s purchasing and operational costs reduce and are gradually written off.Pasi Rahko, Security Expert, Coor Service Management
Pasi Rahko believes that businesses must have the courage to minimize the ratio of manned patrol hours to optimize security costs and benefit from their tech investments fully.
“Traditionally, site security has been based on high numbers of security guards. We often see businesses that invest in comprehensive technology-based security solutions, but fail to downsize or phase out their security guards. While security guards are necessary to be proactive and to react fast and effectively, security breaches should be discovered and delayed by using technical and mechanical security solutions.
Overview and a systematic approach yield results
Coor often delivers assignments to assist customers in analyzing existing premises security in order to propose optimization measures.
“Many businesses don’t adopt a systematic and long-term approach to security. They often stick with solutions that don’t reflect current security issues. Because we work on long-term contracts and have close relationships with our customers, we’re familiar with customer requirements and potential threats to security. Consequently, we’re able to customize the right solutions. There are no generic security packages that suit everyone,” comments Pasi.
Most of today’s FM assignments include security services as part of the package. These then become an integral part of the overall service delivery. It’s important to Coor to identify synergies between security services provided by security guards or other technical maintenance personnel, and other Coor employees.
“We train and utilize service personnel who are already providing other services to execute some security tasks. These people can quickly supplement trained security staff as and when required. It’s better to focus on rapid response and increased staffing when it’s really needed, rather than to provide 24-hour surveillance by security guards.”
The security solutions of tomorrow
Pasi believes that the security sector of the future will follow trends in IT and consumer electronics, and increasingly utilize this technology.
“I anticipate increasingly technology-intensive and mobile trends to create more flexible solutions that avoid restricting valuable resources to fixed positions. Solutions will be significantly more proactive and damage limitation will become more customized and precise. This is a question of preventing threats and risks and taking appropriate measures when something does go wrong, rather than maintaining continuous readiness in the event that something should happen.
All security solutions are built in three phases:
- First, existing risks are evaluated, i.e. risks to operations and the likely methods potential criminals. To anticipate weaknesses and approaches that could be exploited to breach existing security measures, you need to think like a burglar. Geographical location is also important, as it determines how quickly help can arrive and what other resources are available nearby.
- A range of countermeasures can then be implemented, including mechanical and building security, technology and security guards, but also procedures, processes and guidelines about what to do and how to act on the premises. There’s always interaction between technology and people.
- Finally, the overall efficiency of the measures within a critical timeframe is evaluated, i.e. the time it takes for potential perpetrators to gain access to secure assets and then exit the premises.