G4S ACADEMY THE MAMUTE SECURITY ANALYSIS MODEL GUIDE VERSION 170803
G4S MAMUTE INFORMATION This guide focuses on the aspects we, as professionals, automatically take into consideration when working with security projects from a strategic, tactical and operational point of view, concentrating in particular on forced entry, burglary, vandalism and similar criminal activity. We have worked in security and prevention for a great many years. But we still find it difficult to explain security in simple enough terms that the user fully understands the risks and possibilities. In this guide, we describe our MAMUTE security analysis model. CONTENTS The Analysis Model Example Retail Store MAMUTE Illustrated MAMUTE Consulting 100% Security Recommendations
THE ANALYSIS MODEL The MAMUTE analysis model sheds light on the key action areas and types of security at your disposal for achieving the best possible crime prevention and for optimum risk and threat management. The model provides an overview and explanation of the correlation between the security types and protection from criminal activity. We originally developed this model as a teaching tool, but it has since become a valuable tool in our analysis and consulting work. MAMUTE is a thoroughly tried, tested and documented model. The six types of security are outlined briefly here and then described in more detail: Put simply, security is more effective when you think holistically and employ all six types of security. MAMUTE Key action areas and security types HUMAN-BASED SECURITY Prevention activities in which humans respond to incidents and thereby directly or indirectly prevent or effectively stop the incident. ACTIVE SECURITY Security systems that actively prevent theft and/or decrease the value of the protected object, making it less attractive to thieves. MECHANICAL SECURITY Security solutions that physically prevent or impede incidents. TRAINING Awareness that ensures understanding and prevention in terms of risk and risk situations through education, training and drills. TACTICAL SECURITY Prevention solutions based especially on common sense and behavior. ELECTRONIC SECURITY Security systems that detect events and monitor and transmit information. The Analysis Model: MAMUTE
HUMAN-BASED SECURITY Prevention activities in which humans respond to incidents and thereby directly or indirectly prevent or effectively stop the incident. Examples: A guard responding to an intruder alarm or employees as an indirect part of the overall prevention efforts simply with their presence. ACTIVE SECURITY Security systems that actively prevent theft and/or decrease the value of the protected object, making it less attractive to thieves. Examples: Security fog that fills a room with a thick, impenetrable fog, making it impossible for the thief to see what they are trying to steal. Security ink dye in cash transport cases that make the money useless if the transport takes too long or someone attempts to open the case without authorization. MECHANICAL SECURITY Security solutions that physically prevent or impede incidents. These are all the solutions that significantly slow down or stop the thief. Examples: fences, gates, doors, lock systems, windows, walls, safes etc. TRAINING: Awareness that ensures understanding and prevention in terms of risk and risk situations through education, training and drills. Training aimed at helping personnel, guests and others to think in terms of prevention. This generally results in behavior changes and boosted awareness, which helps prevent incidents. Training initiatives can often be carried out without direct costs. TACTICAL SECURITY Prevention solutions based especially on common sense and behavior. Examples: Remembering to lock doors; not leaving a laptop on the windowsill; keeping the shrubbery trimmed so the building can be seen; critically assessing the placement of your building/company and focusing on areas with low crime rates; installing preventive lighting etc. Tactical security initiatives can often be carried out without direct costs. ELECTRONIC SECURITY Security systems that detect events and monitor and transmit information. Electronic systems that monitor entrances, buildings, objects etc. They detect incidents and transmit messages, for instance to an alarm receiving center (ARC). Examples: Automatic intruder alarm systems (AIA); video monitoring systems (TVO); access control systems (ADK); automatic fire alarm systems (ABA) etc. THE WELL-DESIGNED COMBINATION The MAMUTE analysis model shows how the six types of security are inextricably linked. The optimum security solution is achieved by combining the six types and considering the key focus areas. The security model makes it clear that optimum security and safety is not achieved solely by installing a safe or new locks. You can achieve significantly better security by combining multiple security types in a well-designed combination. This model can be used in all situations, from private security to security for companies and institutions. In the following, we give some examples to explain why the six security types are inextricably connected.
EXAMPLE RETAIL STORE A store sells valuable Hi-Fi equipment. The store s insurance company requires level 50S security, but the owner-managed company feels the insurance requirements alone do not ensure enough security. The store and some of the personnel were taken over from the previous owner, so there is already some security in place. First and foremost, the personnel are trained to handle high-value items and to be aware of shady customers (training and awareness). The store also has AIA and TVO (electronic security), as well as bars on the windows and doors (mechanical security). In the stockroom, there are fog generators, too (active security). For additional robbery protection, there is DNA spray at all entrances and exits (active security). The store keeps its cash in a secure cash box (mechanical security). At closing time, all valuable equipment is removed from windows (tactical security), and they have an agreement with an ARC (human-based security), which sends out an alarm patrol if there is an intruder alert (human-based security). The overall strategy employs all six security types; they are all indispensable and the combination ensures that they complement and support each other in a single coherent solution.
G4S ACADEMY ANALYSIS The following is a graphic representation of MAMUTE. You can rank the security level based on the following: 1 Unacceptable 2 Acceptable 3 Good From the Hi-Fi store example, the owner registered the following security levels when taking over the store: Human-based security 2 Active security 3 Mechanical security 1 Training 3 Tactical security 2 Electronic monitoring 2 The risk analysis in conjunction with the insurance requirements and the owner s wishes resulted in the following target security levels: Human-based security 2 Active security 3 Mechanical security 3 Training 3 Tactical security 3 Electronic monitoring 2 With the help of the MAMUTE model, a spider diagram can be created to analyze: Diagnostics = current security level Strategy = target security level HUMAN-BASED SECURITY ELECTRONIC SECURITY ACTIVE SECURITY 3 2 1 1 2 3 TACTICAL SECURITY MECHANICAL SECURITY TRAINING
The spider diagram clearly shows where decisions need to be made and where action is required. For example, the current security level for mechanical security is unacceptable. Because the desired level is good, action is required in this area. On the other hand, all the other security areas are good in relation to the current and target security requirements. Thus, they do not require action. There are a variety of measuring points you can use, such as: Do you have the necessary competences within the organization? What are the fastest and easiest initiatives to implement? Budget etc. What matters most is that you always remember that an optimized security strategy consists of all six elements. MAMUTE CONSULTING Can suppliers provide consulting as well? This is a discussion we often hear in the security industry. In our view, serious suppliers can always give their customers good advice. In any case, it is important that the consultant, or consultant supplier, provide a 360 degree analysis of the potential action areas while taking an organized approach in their consulting to ensure the production of uniform reports as well as a high standard of professionalism. With the MAMUTE analysis system you get both. With that said, however, it is important to bear in mind that the various MAMUTE elements and security types can be combined in countless ways. Finally, a security strategy is always some combination of these six security forms. But how they are combined depends on many factors: Threat assessment Physical location Temperament and attitudes Architecture and preservation Valuables Consequence analysis And more G4S has been ISO certified as a supplier and consultant since March 2017. 100% SECURITY In theory, it is physically possible to secure a building s facade (shell) in such a way as to make it impenetrable. However, it is without a doubt less expensive to reduce the shell security somewhat and combine it with a permanent guard or alarm monitoring and a patrol guard. We are capable of creating solutions that are 100% secure. But besides the fact that people would have to live or work in a bunker or Fort Knox, it is always possible to circumvent a security solution when people are involved. Finally, it is often acceptable to have a certain degree of remaining risk, which can be covered by insurance. To sum up, a complete security solution should ALWAYS be a combination of the six security types as described in MAMUTE.
G4S ACADEMY CONSULTING, EDUCATION & INFORMATION G4S is the largest security company in Denmark and the world, with more than 100 years experience. We share our knowledge through our ISO-certified G4S Academy. Our goal is to establish a partnership with our customers and to improve risk mitigation through close collaboration and knowledge sharing. We welcome all comments and ideas, so we can continue to develop our material and ensure that it is as useful as possible, now and in the future. UPDATES Contact G4S Academy to receive updated material free of charge. We update our material whenever there is a need for it. You will find the version number on the front page. LIABILITY AND RESERVATIONS FOR PRINTING ERRORS G4S Academy assumes no liability for security decisions made based on this material. The material is developed as a project among several stakeholders, and G4S Academy can therefore not assume full liability. STANDARDS Most professional security products are tested according to international standards. This is ideal for the user, supplier and consultant, as it makes it possible to actually compare products. G4S Academy provides overviews of the standards we primarily employ. We always recommend using products that are tested and classified to the extent it is technically possible and in accordance with current standards. OTHER MATERIAL, EVENTS, SEMINARS AND COURSES We regularly develop new material. See more at www.g4s.dk/academy. CONTACT You are welcome to contact us for further information. Just call +45 4386 5000 or send an email to academy@dk.g4s.com. SUBSCRIBE TO OUR NEWSLETTER Text the word G4S to 1980 to receive our G4S Academy newsletters.