31/08/2017

Guard Tour Patrol System







A guard tour patrol system is a system used to help organizations to organize, log and execute guard tours and patrols in their assets ensuring that the officers will accomplish their tasks within the predefined time intervals. It is way to check and record the time that a guard executes his guard tour by scanning specific checkpoints assigned on the area he patrols. Checkpoints are placed in certain points either on buildings or on other locations of a site or remote area and help the managing staff to identify each different location and each portion of a specific territory.

Guard tour patrol system is required to monitor that guards are completing their duties on time and at their correct locations. The on-site officers can scan checkpoints, send SOS alerts, track and record events and conduct and send reports to the managing staff or the clients. It reduced the paper load and work time, letting companies and officer’s focus on more significant aspects of their work. A guard tour monitoring system holds historical data for any executed guard tour. All information regarding a specific patrol is recorded and reported at time of the location inspection with much more automation and efficiency.

30/08/2017

Benefits of Hire Private Security Agency




Private security is one of the highest growth sectors in the nation. Due to changing needs, there has been constant innovation in the industry and security services providers are becoming highly mechanized and are offering numerous technological solutions to their client.
At PLN9 Security we provide a comprehensive spectrum of Managed Security Services and Physical Security Solutions. As a private security firm we provide manned guarding services, special event security, corporate security, hotel security and many more. PLN9 providing security consulting, security analysis system, security guarding, security testing, corporate verification and investigation, special events security services, managed security services, Security audits, physical security solutions and Security training. We believe in continuous raising the caliber of our infrastructure and resources to support the ever-changing customer demand. PLN9 is able to offer security services with professionals who are already trained, saving your business thousands. By hiring guards from our agency you get flexibility. You can increase or decrease the number of security officials on duty as you please.
PLN9 security guards have gone through extensive training. Whether a client wants to have an armed or unarmed guard, the company will be more than qualified to get the job done.
Our firm is going to do more than just help you with dangerous situations. Our trained security guards patrol your property, monitor security cameras, control room operations, respond to alarms and even operate a security gate. PLN9 is the most renowned and reliable name in security solutions companies in India.

28/08/2017

Intrusion Security & Detection System




Security systems are used in residential, commercial, and industrial properties for protection against theft or property damage, as well as personal protection against intruders.
These security systems provide round the clock protection against intruders and break-ins. Intrusion detection systems combined with closed-circuit television surveillance (#CCTV) systems to automatically record the activities of intruders and may interface to access control systems for electrically locked doors.
Intrusion detection systems sensors detect intrusions. Sensors can be classified as Passive Infrared Detector, Infra sound detector and Glass-break detector. Passive Infrared Detector do not detect motion, they detect abrupt changes- in temperature at a given point. As an intruder walks in front of the sensor, the temperature at that point will rise from room temperature to body temperature, and then back again. This quick change triggers the detection.
Infra sound detector works by detecting infra sound and sound waves at frequencies as per device. It operates by the transmitter emitting an ultrasonic signal into the area to be protected. The sound waves are reflected by solid and then detected by the receiver.
The glass-break detector may be used for internal perimeter building protection. When glass breaks it produces specific shock frequencies. The glass-break detectors feel these shock frequencies and in turn generate an alarm condition.

26/08/2017

Access Control System




The Biometric Access Control System is a professional fingerprint access and time attendance control system. It uses fingerprint instead of card system for access. This can be widely used in confidential places for its easy installation and high security. It's the best choice for you today, to secure your life tomorrow.
Proximity Access Control System - The proximity Access Control System is widely used in office, factory, bank, etc. Supporting Master and Slave solution it provides more confidential access control system, 50 kinds of time zone settings and 5 open door groups ensure you an absolute safety environment.
BENEFITS OF ACCESS CONTROL SYSTEM
Track and deter access throughout your organization
Assists in auditing of movement and time and attendance of staff
Restrict access to sensitive areas
Provide a safer working environment
Remotely administer and control access to multiple facilities through one interface.

24/08/2017

Precautions from Terrorist Attack




We all citizens can take some safety precautions to confront terror attacks and prevent them in future. Here are a few safety tips that you can share with your near and dear ones to be safe in critical circumstances. Being alert is the only important thing in terror attacks. Be alert, be safe and believe in god.
1- Do not take news bulletin lightly. Do not step out of the house if you come across news reports of terror attack.
2- Call your relatives and friends and ask them to stay back home.
3- Keep all helpline numbers such as numbers of hospitals, blood banks, police stations, etc. handy.
4- Keep your mobile phone charged and make sure that you will not run out of balance on such tricky situation.
5- Be alert. If you come across any suspicious person or belongings, immediately report to the authority.
6- Try to analyse the situation. Rumors spread easily in such situations. Try to know the facts from reliable sources.
7- While traveling, instead of looking outside the window keep your eye under the seats for any suspicious stuff.
8- Look for a place to hide in case of a sudden gunfire or bombarding.
Terrorists can burst into any place at any time. We can not be fully aware about terrorist's moves but we can be alert. In metropolitan like Mumbai many people commute by local trains. We already witnessed the series of bomb blasts on 11th July 2006. Mumbai train bombings were a series of seven bomb blasts that devastated many people's lives. Spirit of the people in Mumbai is outstanding that makes them overcome such man made disasters.

23/08/2017

Hotel Security & Terrorist Attack





Hotels in particular have been considered a soft target by extremist groups across the world, so what can hoteliers and indeed other hospitality businesses do in the way of a proportionate response to the increasing threat?
It is important to ensure that the response is proportionate and in particular a hotel needs to maintain a friendly and welcoming atmosphere in order to attract guests whilst doing all it can to protect them. There are also legal requirements under health and safety laws for companies and individuals who own or run hotels to consider a real possibility of a terrorist incident.
Terrorism can come in many forms, not just a physical attack on life and limb. Terrorism also includes threats or hoaxes designed to frighten and intimidate gold attacks designed to cause disruption and economic damage. It can include interference with vital operational, information or communication system, which can have an effect on the businesses ability to operate. Some attacks are easier to carry out if the terrorist is assisted by an 'insider' or by someone with specialist knowledge or access.
A compulsory action : 
You have to understand your premises, identifying the threats to it, and its vulnerability to those threats. Hoteliers should over the coming month review and test current safety arrangements, audit them and as a result improve planning and response. In particular you should ensure training; information and equipment are provided to all staff, and especially to those involved directly on the safety and security side. 
Supplementary security measures
You have to think about physical security, information security and personnel security. There is little point investing in costly security measures if they can be easily undermined by a disaffected member of staff or by a lax recruitment process. In the run up to a busy period it is easy to fall into the trap of being desperate for additional staff, and so be willing to circumvent normal background checks.
Before you invest in additional security measures, review what you already have in place. You may already have a good security system on which you can build. You should have measures in place to limit access into service or back of house corridors and vehicle access control measures into goods and service yards.
The staff may be unaware of existing security measures, or may have developed habits to circumvent them, e.g. short cuts through fire exits. Simply reinstating good basic security practices and regularly reviewing them will bring benefits at negligible cost. If you need additional security measures, then make them cost-effective by careful planning wherever possible. Try to introduce new equipment or procedures in conjunction with planned building work and remember that significant changes may require statutory consents such as planning permission or building regulations consents.
Re-examine your security measures
You have to regularly review and exercise your plans to ensure that they remain accurate, workable and up-to-date. You should be aware of the need to modify them to take into account any changes in your hotel. Rehearsals and exercises should wherever possible, be conducted in conjunction with emergency services and local authorities.
Be sure that your staff understand and accept the need for security measures and that security is seen as part of everyone's responsibility, not merely something for experts security professionals gold. Make it easy for people to raise concerns or report unusual activity and ensure that you investigate such comments.

22/08/2017

School Security Training




Given the numerous mass shootings at schools that we have seen across the country, it only stands to reason that administrators are looking to integrate security features into any new school buildings or renovations. 
Beyond the practical benefits, these safety upgrades can also provide important peace of mind for those who attend or work at the school as well as parents and community members.
But these physical changes to buildings are only as successful as the security measures integrated into them and the training to support them.
School administrators must realize that preparedness occurs in three layers. The first layer is physical and technical security measures. The second is the development of policies and procedures to ensure those features are utilized as designed and intended. And the final and most important security layer is training. These layers are like the legs of a stool — you need all three to make a safety plan successful.
A key part of new construction or remodeling of schools to implement safety features is understanding the security needs behind different features and how those measures are best utilized in an emergency.
The three primary goals are deterrence, minimize loss, and notification. Physical
security can be a deterrent to criminal activity. Cameras are a good example of this. They can be
either overt or covert. Overt cameras are not hidden and a monitor may be visible to indicate
"we're taping and watching!" Overt cameras are part of a prevention plan.

18/08/2017

Advantages of Surveillance cameras For Schools



Surveillance cameras have redefined security monitoring, surveillance activities and law enforcement measures. Due to the prevalence of theft and the threats from unscrupulous elements and wrongdoers that vulnerable youngsters, teens and young students face, school administrators, principals, supervisors and trustees have deemed it important to deploy surveillance cameras in schools in recent years. There are many advantages of investing in surveillance cameras for schools.
1-    General Safety and Security
Investment in surveillance camera systems by school districts ensures parents and guardians that the general safety and security of children are being addressed during schools hours and at all after-school extracurricular activities and programs.
2-    Crime Deterrent
The presence of highly visible surveillance cameras at strategic locations in buildings and public areas/premises of a school property prevents theft, vandalism and acts as a deterrent to thieves and criminals from indulging in illegal activities.
3-    Sexual Predators
One of the biggest threats that school children face is the threat of sexual predators and pedophiles hanging around unobtrusively on school campuses or in parking lots. Camera systems' footage is very useful in tracking down predators or helping inform police about threatening situations in real time.
4-    Prevent Bullying
New-generation surveillance camera systems have audio, voice and sound capturing capabilities. Teenagers bullying or harassing other students can be disciplined based on video and audio footage records.
5-    Emergency Evacuation
School security personnel manning surveillance camera systems in real-time can take quick action about evacuating children, faculty and staff in case of emergencies related to fire or other potentially dangerous situations.


17/08/2017

How to Motivate Security Personnel




Security guards are hired for many reasons. However, it is very important that you look for a company that provides fully proficient guards. Generally it is believed that the company with a high turnover rate is not a good option to consider because constant turnover of security officers means that there is a high chance that a few or all the officers on duties are either inexperienced or new.
It usually takes six month to train a security guard which means that a company with more new security officers is not reliable as their guards will not be able to detect an unusual activity due to their unfamiliarity with the site. Furthermore they will be less likely to make a good decision in case of any emergency.
The security guard company is bound to take essential steps to retain their experienced security guards. However this is certainly not sufficient as there are a number of things that the client company should do to improve security guard retention. Both the client and the company has to work together to solve this problem.
Here are some of the suggested changes that you can make to keep the security guards motivated in working for you:
• Treating them with respect
• Get to know your security guards
• Providing clear directions to the security guards
• Show them your support when they are doing the right thing
• Acknowledge good performance
• Provide a healthy working environment

16/08/2017

Indian Security Challenges




Governments of numerous nations make huge investment and provide good support for the border security. Still, border and maritime security continues to present challenges to governments around the world. The proper management of borders presents many challenges and includes coordination and concerted action by administrative, diplomatic, security, intelligence; legal, regulatory and economic agencies of the country to secure the frontiers and sub serve its best interests. India's land borders exceed 15,000 km which it shares with seven countries including a small segment with Afghanistan (106 km) in northern Jammu and Kashmir (J&K).
Wagah is a border town straddling the line between Pakistan and India, 29 km from the town of Lahore on the Pakistani side and 27 km from Amritsar on the Indian side. This is the only crossing point between Pakistan and India that is regularly open to foreigners.
The most attractive aspect of the Wagah Border is the ‘Beating the Retreat’ ceremony that takes place every evening. The ceremony starts at sundown and lasts for about 30 minutes to 45 minutes. The retreat includes the changing of guards and the retreat of the Indian and the Pakistani flag. The show is synchronized between the Indian Border Security Force (BSF) and the Pakistani Sutlej Rangers and has been conducted every day since 1959. The drill includes long and brisk strides, foot stamping and crisp salutes as each side tries to outdo the other with respect to the sound of the footsteps and speed. When the heavy gates are opened, there is an exhibit of furious looks and a show of anger that is staged. While there are thousands of spectators, there is complete silence during the ceremony as everyone looks in awe. The lowered flags are respectfully folded and carried back to the respective countries, after which the gates are slammed shut. 

12/08/2017

Responsibilities of the Traffic Marshal





A traffic marshal recently sustained a lost time injury whilst carrying out his marshaling duties. ... The Traffic Marshal is the eyes of the vehicle/plant operator, his/her primary responsibility is to guide vehicles and plant safely, ensuring contact is avoided with people or objects.
Being a traffic marshal is a little like being the eyes and ears of the driver of a large vehicle, particularly cranes. These vehicles are awkward to move and don’t allow the driver a good line of sight around him so a traffic marshal is instrumental in this safe movement. The marshal can use a number of ways to communicate with the driver, ranging from simple hand signals to a radio connection to give full and specific instructions.
The responsibilities of the traffic marshal therefore start with ensuring that the area around the vehicle is clear and safe before it begins to manoeuvre. The marshal will then walk in the front of the vehicle, clearing any obstructions from the vehicle’s path, while also looking out for anything that could cause an obstacle for its progress or even a distraction for the driver.
Once the path is clear, the marshal will then stand still in a safe position where the driver of the vehicle can see him and communicate with them, regardless of the means used. If there is a long distance movement involved, then the marshal will repeat the process, ensuring each section of the route is clear and that he can stand in a new position for the driver to watch.
While doing this, the marshal should also keep watch for other people in the area as well as other vehicles.

11/08/2017

Security Technique - Access control




Access control is a security technique that can be used to regulate who or what can view or use resources in a computing environment.
There are two main types of access control: Physical and Logical. Physical access control limits access to campuses, buildings, rooms and physical IT assets. Logical access limits connections to computer networks, system files and data. The four main categories of access control are:
• Mandatory access control
• Discretionary access control
• Role-based access control
• Rule-based access control
Access control technology evolves rapidly, so you always want to plan for a path forward with each installation. Ensure that you are using devices and systems that can be easily integrated and added on to. It will make your position much more seamless in the years to come.

09/08/2017

VIP Security



The level of security cover usually depends on the threat perception. Currently, there are four different levels, starting with Special Protection Group (SPG) cover, which is provided to the prime minister and his family and former prime ministers and their family members. For instance, the Gandhi family still moves with SPG cover. The SPG is a specially trained elite security force with members from paramilitary forces.
The Z-plus security cover comes next. It is provided by National Security Guard and CISF commandos. The next level is Z security cover provided by the police or personnel from the paramilitary outfits Indo-Tibetan Border Police and Central Reserve Police Force (CRPF). The next two categories are Y and X.
All decisions are taken by a committee consisting of Intelligence Bureau officials, home secretary and the Union home minister.
VIP security has always been under scrutiny as it eats into the precious manpower needs of the country’s security forces. According to a report of the Bureau of Police Research and Development, 47,557 personnel are protecting 14,842 VIPs across the country.

05/08/2017

Precautions from Terrorist



Today's terrorists kill in quantity and kill indiscriminately — there are no bystanders. They continue to be fascinated with unconventional weapons — anthrax, ricing, and radio logical material. They are redefining national security. Preparedness requires improving intelligence, increasing security and developing effective response capabilities.
1- Intelligence
2- Security
3- Effective Response
4- Community Involvement
Terrorism is violence aimed at the people watching. Combating terrorism means not only trying to prevent terrorist attacks, but also reducing the terror these create. That can be achieved by actively involving the public. People cannot be permitted to be passive observers or vicarious victims of terror. Frightening the public with warnings but no specific instructions only increases anxiety.
People can be instructed about how they are targets of terror's psychological effects. They can be informed of the actual as opposed to imagined risks. The public can be enlisted in surveillance. Authorities in the Country, which suffered from years of terrorism, are confident they will be quickly informed of suspicious objects or activities. Children and adults can be educated about ordinary measures to take in case of man-made or natural disasters.
The ultimate protection against terrorism depends not on the thickness of concrete barriers or the severity of the penal code. It depends on the individual and collective courage of the entire population. We may have to live with terrorism, but we do not have to live in terror.


02/08/2017

Security System - CCTV



CCTV should form only part of a whole security system; it should not be used on its own. It cannot replace security staff, although it may permit a reduction in their number or their redeployment to other security activities.
In its simplest form a CCTV system consists of a television camera joined by a transmission link such as a cable to a monitor sited in the guard room or central control point. More complex systems use several cameras and monitors or a single monitor with a switching system to display camera pictures in sequence. Additional facilities such as recorders, automatic switching in response to an alarm signal may be used.
Using CCTV can help clarify whether a security alert is real and is often vital in post-incident investigations, but only if the images are good enough to identify what happened and be used in court.
External lighting will help security staff and improve the capabilities of CCTV systems if it is carefully designed and used. Effective CCTV systems may help to deter a terrorist attack or even identify planning activity. Good quality images can provide crucial evidence in court.CCTV equipment is deployed into fixed positions or has a pan, tilt and zoom capability and where operators:
• Proactively monitor the activities of members of the public whether they are in public areas or on private property;
• Use cameras to focus on the activities of particular people either by controlling or directing cameras to an individual's activities;
• Use cameras to look out for particular individuals;
• Use recorded CCTV images to identify individuals or to investigate their activities.

01/08/2017

The Private Security Industry

The private security industry is enjoying a period of great prosperity and growth. Throughout the States, uniformed private security guards now patrol many locations, including schools, banks, hospitals and apartment buildings, protecting both life and property. Residents of some areas even have found it necessary to supplement the municipal police force. They have hired private security companies to provide twenty-four hour vehicle patrols of their neighborhood. 
Accordingly, protective services are the third fastest growing occupation in the States. Some studies estimate that over one million people earn their living in the private security industry. This figure greatly exceeds the total number of public law enforcement employees." Notwithstanding the availability of job opportunities in the industry, there are numerous problems endemic to employment as a security guard. Wages typically are low' and risks can be high, especially if the guard is armed. Although union membership among security guards has increased, collective bargaining has been unsuccessful in alleviating the occupation's problems.' This failure of collective bargaining is an unsettling fact, given the staggering damages that could result from a major labour dispute in this industry. This Note explains and analyzes the unique provision of the National Labour Relations Act (the Act) that governs unionization of guards, and proposes a consistent approach for the courts and the National Labor Relations Board (the Board)", to follow in cases concerning security guards. The adoption of this approach should improve the quality of collective bargaining in the industry by creating greater stability in bargaining relationships.