G4S ACADEMY THE MAMUTE SECURITY ANALYSIS MODEL

Similar documents
G4S ACADEMY BALLISTIC ATTACK MANAGEMENT SOLUTIONS

G4S ACADEMY BURGLAR-RESISTANT GLASS DISPLAY CASES & EXHIBITION ROOMS

Vacant Building Loss Prevention Best Practices

Anaheim Campus Safety Information Guide

A Checklist for Library Building Security

Ultimate Security Provider

Frontline Services Ltd

Securing a Better Future Securing a Better Job The IGS Security Academy guide to careers in the private security industry

CCTV Surveillance: Business Security & Video Best Practices.

Smart Monitoring Systems. for Property Management SMART SOLUTIONS. Property Management DOORS & WINDOWS TEMPERATURES LIGHTS CARBON MONOXIDE

PROTECTGLOBAL.COM A FOG CANNON FROM PROTECT. secures your valuables in seconds and makes it impossible for the burglar to steal anything!

Protecting Multi-level Residential Buildings By GERALD A. O ROURKE, CPP

Apartment building safety audit assessment

RR-PM1200 OPERATING AND PROGRAMMING GUIDE

PROTECTGLOBAL.COM A FOG CANNON TM FROM PROTECT TM. secures your valuables in seconds and makes it impossible for the burglar to steal anything!

G4S ACADEMY STANDARDS COMPARISON KEY

For Complete Security

ATM DEVICE THEFT & ATM GAS ATTACKS:

MACHINE GUARDING: PROTECTING YOU FROM HAZARDS

Free Advice Free Quote Nationwide. Security Direct property protection. Home Security Buying Guide SECURITY DIRECT.

American University Safety & Security

SAFETY BY DESIGN Drives Successful Urban Greenways. Brian Charlton - SGJJR Mac McCracken - DRFC

ARTECO White Paper Stop Copper Theft. How Video Analytics are Helping Electrical Utilities Proactively

Security Escort. boschsecurity.com. Reliable wireless location solutions

SECURITY AND TOURISM

Southern Baptist Theological Seminary. The Michael Minger Act Report for 2008 Activity Reported for Calendar Year 2007

Armed Robbery Awareness

PROTECTGLOBAL.COM. Important information for users

Professional Security Officer Program(PSOP)

MCPS School Safety and Security Presentation

SECURITY NOTICE U.S. EMBASSY, HARARE

SELF PRESERVATION SOCIETY By Jim Creak

MCPS School Safety and Security Presentation at Damascus High School

HospitalityLawyer.com P.O. Box Houston, Texas P: (713) F: (713)

A PICTURE NO ONE WANTS TO SEE!

Southern Baptist Theological Seminary. The Michael Minger Act Report for Activity Reported for Calendar Year 2004

Fire Prevention and Safety

GAPS Guidelines THEFT GAP.16.3 INTRODUCTION POSITION. Inventory and Accounting. Physical Security Measures

MCPS School Safety & Security Presentation

Radio Frequency Do s & Don ts

BT SECURITY SECURITY: BEST PRACTICE GUIDE FOR NON-BT PEOPLE

Wireless Linked Emergency Alert Systems

t w. marlowefireandsecurity.com e.

INNOVATION THAT LEAVES RISK BEHIND.

Residential Security. Audrey Hornbuckle Crime Free Programs Coordinator Defensible Space Team City of Tacoma (253)

Every day is filled with decisions let us simplify your day with our technical solutions

Managing technical risks

School Property REVIEWING YOUR BUILDINGS & GROUNDS

Site Security Plan - Operations Baron Winds Project

FACILITY OF EMERGENCY PLAN. (Template)

Preliminary Site Security Plan Operations Cassadaga Wind Farm

Maintaining Schools for the future our initiative. Len Allen

Physical Security Standards WARREN J. BUJOL, IBERIABANK MATTHEW RONIGER, IBERIABANK

Emergency Operations Policy and Safety Plan

Emergency Evacuation Procedures

Florham Park Police Department Community Satisfaction Survey (2016)

What is Window Film? Benefits of Professional Installation. Types of Window Film. For more information

Table of Contents About This User s Guide... 2 Introduction... 2 Security System Basics... 3 What is a Point?... 3 What is a Faulted Point?...

Museum security: integrated security systems to protect the priceless

CFPA-E No 1:2014 F. Fire protection management system CFPA-E -GUIDELINES

NOTTINGHAM CITY HOMES

Warrington Road Nursery School

Crime Reduction Advice

LYNX Touch DYNAMIC, FULL COLOR TOUCHSCREEN SECURITY SYSTEM AND HOME CONTROLLER. Your Connected Home

WORKPLACE HAZARDS INSPECTION FORM

PASS Security Plan Checklist

SECURITY SOLUTIONS Banking and finance

Effective Deployment of the Integrated Wireless Network Video Systems for the Homeland Security & Government Sectors

Retail security solutions

CHAPTER 91: ALARM SYSTEMS

342 Perimeter Security SECURITY SURVEY FORMS

Emergency Readiness for St. John s University Adjunct Faculty

Workplace Violence Risk Factors and Controls Checklist

MANNED GUARDING. CALL US today for a FREE Quotation on +971 (4) Dubai, UAE

This is a preview - click here to buy the full publication

Workplace Violence Risk Factors and Controls Checklist

Evacuation and Lockdown Plan

Record of Amendments. Version Date Amendment Section/page affected

The Gas Company Public Awareness Information Pipeline Installation & Maintenance-Southern California Gas Company (SoCalGas)

HOME SECURITY INFORMATION

Intruder Alarm Advice for Domestic Properties

Campus Emergency Response Plan Standard Operating Procedure

Perimeter Security. Gates and fences are the first signs of a secure home and act as a good deterrent to intruders. Make sure they are in good repair.

security WHAT MAKES US DIFFERENT? We Place A Huge Importance On Integrity.

Article 3: Police Regulated Occupations and Businesses. Division 37: Burglary, Robbery and Emergency Alarm Systems

For Building Managers: outsourcing the maintenance of fire safety and security systems

Instructions for Robust Fiber Appendix 4 Robust sites and nodes. Ver 1.2

dss PHILADELPHIA POLICE DEPARTMENT DIRECTIVE 4.11

FIRE SAFETY. This easy-to-use Leaders Guide is provided to assist in conducting a successful presentation. Featured are:

Austin Independent School District Police Department Policy and Procedure Manual

Security System. User s Guide for the Text Command Center

How to Lock Out Crime: Home Security 101

APPENDIX 4J SECURITY AND SURVEILLANCE SERVICES

Your partner for security solutions

Emergency Guidebook WEAPONS ON CAMPUS ACTIVE SHOOTER BOMB THREAT FIRE / EXPLOSION CRIME REPORTING EVACUATION HAZMAT SPILL HIGHWAY HOSTAGE SITUATION

Axis thermal cameras. Reliable detection and verification, without compromising privacy.

Visitor & Intruder Security Policy

Chapter ALARM SYSTEMS

San Francisco Health Commission

Emergency Notification Plan. Developed By: Cleveland State University Police Department Office of Emergency Management

Transcription:

G4S ACADEMY THE MAMUTE SECURITY ANALYSIS MODEL GUIDE VERSION 170803

G4S MAMUTE INFORMATION This guide focuses on the aspects we, as professionals, automatically take into consideration when working with security projects from a strategic, tactical and operational point of view, concentrating in particular on forced entry, burglary, vandalism and similar criminal activity. We have worked in security and prevention for a great many years. But we still find it difficult to explain security in simple enough terms that the user fully understands the risks and possibilities. In this guide, we describe our MAMUTE security analysis model. CONTENTS The Analysis Model Example Retail Store MAMUTE Illustrated MAMUTE Consulting 100% Security Recommendations

THE ANALYSIS MODEL The MAMUTE analysis model sheds light on the key action areas and types of security at your disposal for achieving the best possible crime prevention and for optimum risk and threat management. The model provides an overview and explanation of the correlation between the security types and protection from criminal activity. We originally developed this model as a teaching tool, but it has since become a valuable tool in our analysis and consulting work. MAMUTE is a thoroughly tried, tested and documented model. The six types of security are outlined briefly here and then described in more detail: Put simply, security is more effective when you think holistically and employ all six types of security. MAMUTE Key action areas and security types HUMAN-BASED SECURITY Prevention activities in which humans respond to incidents and thereby directly or indirectly prevent or effectively stop the incident. ACTIVE SECURITY Security systems that actively prevent theft and/or decrease the value of the protected object, making it less attractive to thieves. MECHANICAL SECURITY Security solutions that physically prevent or impede incidents. TRAINING Awareness that ensures understanding and prevention in terms of risk and risk situations through education, training and drills. TACTICAL SECURITY Prevention solutions based especially on common sense and behavior. ELECTRONIC SECURITY Security systems that detect events and monitor and transmit information. The Analysis Model: MAMUTE

HUMAN-BASED SECURITY Prevention activities in which humans respond to incidents and thereby directly or indirectly prevent or effectively stop the incident. Examples: A guard responding to an intruder alarm or employees as an indirect part of the overall prevention efforts simply with their presence. ACTIVE SECURITY Security systems that actively prevent theft and/or decrease the value of the protected object, making it less attractive to thieves. Examples: Security fog that fills a room with a thick, impenetrable fog, making it impossible for the thief to see what they are trying to steal. Security ink dye in cash transport cases that make the money useless if the transport takes too long or someone attempts to open the case without authorization. MECHANICAL SECURITY Security solutions that physically prevent or impede incidents. These are all the solutions that significantly slow down or stop the thief. Examples: fences, gates, doors, lock systems, windows, walls, safes etc. TRAINING: Awareness that ensures understanding and prevention in terms of risk and risk situations through education, training and drills. Training aimed at helping personnel, guests and others to think in terms of prevention. This generally results in behavior changes and boosted awareness, which helps prevent incidents. Training initiatives can often be carried out without direct costs. TACTICAL SECURITY Prevention solutions based especially on common sense and behavior. Examples: Remembering to lock doors; not leaving a laptop on the windowsill; keeping the shrubbery trimmed so the building can be seen; critically assessing the placement of your building/company and focusing on areas with low crime rates; installing preventive lighting etc. Tactical security initiatives can often be carried out without direct costs. ELECTRONIC SECURITY Security systems that detect events and monitor and transmit information. Electronic systems that monitor entrances, buildings, objects etc. They detect incidents and transmit messages, for instance to an alarm receiving center (ARC). Examples: Automatic intruder alarm systems (AIA); video monitoring systems (TVO); access control systems (ADK); automatic fire alarm systems (ABA) etc. THE WELL-DESIGNED COMBINATION The MAMUTE analysis model shows how the six types of security are inextricably linked. The optimum security solution is achieved by combining the six types and considering the key focus areas. The security model makes it clear that optimum security and safety is not achieved solely by installing a safe or new locks. You can achieve significantly better security by combining multiple security types in a well-designed combination. This model can be used in all situations, from private security to security for companies and institutions. In the following, we give some examples to explain why the six security types are inextricably connected.

EXAMPLE RETAIL STORE A store sells valuable Hi-Fi equipment. The store s insurance company requires level 50S security, but the owner-managed company feels the insurance requirements alone do not ensure enough security. The store and some of the personnel were taken over from the previous owner, so there is already some security in place. First and foremost, the personnel are trained to handle high-value items and to be aware of shady customers (training and awareness). The store also has AIA and TVO (electronic security), as well as bars on the windows and doors (mechanical security). In the stockroom, there are fog generators, too (active security). For additional robbery protection, there is DNA spray at all entrances and exits (active security). The store keeps its cash in a secure cash box (mechanical security). At closing time, all valuable equipment is removed from windows (tactical security), and they have an agreement with an ARC (human-based security), which sends out an alarm patrol if there is an intruder alert (human-based security). The overall strategy employs all six security types; they are all indispensable and the combination ensures that they complement and support each other in a single coherent solution.

G4S ACADEMY ANALYSIS The following is a graphic representation of MAMUTE. You can rank the security level based on the following: 1 Unacceptable 2 Acceptable 3 Good From the Hi-Fi store example, the owner registered the following security levels when taking over the store: Human-based security 2 Active security 3 Mechanical security 1 Training 3 Tactical security 2 Electronic monitoring 2 The risk analysis in conjunction with the insurance requirements and the owner s wishes resulted in the following target security levels: Human-based security 2 Active security 3 Mechanical security 3 Training 3 Tactical security 3 Electronic monitoring 2 With the help of the MAMUTE model, a spider diagram can be created to analyze: Diagnostics = current security level Strategy = target security level HUMAN-BASED SECURITY ELECTRONIC SECURITY ACTIVE SECURITY 3 2 1 1 2 3 TACTICAL SECURITY MECHANICAL SECURITY TRAINING

The spider diagram clearly shows where decisions need to be made and where action is required. For example, the current security level for mechanical security is unacceptable. Because the desired level is good, action is required in this area. On the other hand, all the other security areas are good in relation to the current and target security requirements. Thus, they do not require action. There are a variety of measuring points you can use, such as: Do you have the necessary competences within the organization? What are the fastest and easiest initiatives to implement? Budget etc. What matters most is that you always remember that an optimized security strategy consists of all six elements. MAMUTE CONSULTING Can suppliers provide consulting as well? This is a discussion we often hear in the security industry. In our view, serious suppliers can always give their customers good advice. In any case, it is important that the consultant, or consultant supplier, provide a 360 degree analysis of the potential action areas while taking an organized approach in their consulting to ensure the production of uniform reports as well as a high standard of professionalism. With the MAMUTE analysis system you get both. With that said, however, it is important to bear in mind that the various MAMUTE elements and security types can be combined in countless ways. Finally, a security strategy is always some combination of these six security forms. But how they are combined depends on many factors: Threat assessment Physical location Temperament and attitudes Architecture and preservation Valuables Consequence analysis And more G4S has been ISO certified as a supplier and consultant since March 2017. 100% SECURITY In theory, it is physically possible to secure a building s facade (shell) in such a way as to make it impenetrable. However, it is without a doubt less expensive to reduce the shell security somewhat and combine it with a permanent guard or alarm monitoring and a patrol guard. We are capable of creating solutions that are 100% secure. But besides the fact that people would have to live or work in a bunker or Fort Knox, it is always possible to circumvent a security solution when people are involved. Finally, it is often acceptable to have a certain degree of remaining risk, which can be covered by insurance. To sum up, a complete security solution should ALWAYS be a combination of the six security types as described in MAMUTE.

G4S ACADEMY CONSULTING, EDUCATION & INFORMATION G4S is the largest security company in Denmark and the world, with more than 100 years experience. We share our knowledge through our ISO-certified G4S Academy. Our goal is to establish a partnership with our customers and to improve risk mitigation through close collaboration and knowledge sharing. We welcome all comments and ideas, so we can continue to develop our material and ensure that it is as useful as possible, now and in the future. UPDATES Contact G4S Academy to receive updated material free of charge. We update our material whenever there is a need for it. You will find the version number on the front page. LIABILITY AND RESERVATIONS FOR PRINTING ERRORS G4S Academy assumes no liability for security decisions made based on this material. The material is developed as a project among several stakeholders, and G4S Academy can therefore not assume full liability. STANDARDS Most professional security products are tested according to international standards. This is ideal for the user, supplier and consultant, as it makes it possible to actually compare products. G4S Academy provides overviews of the standards we primarily employ. We always recommend using products that are tested and classified to the extent it is technically possible and in accordance with current standards. OTHER MATERIAL, EVENTS, SEMINARS AND COURSES We regularly develop new material. See more at www.g4s.dk/academy. CONTACT You are welcome to contact us for further information. Just call +45 4386 5000 or send an email to academy@dk.g4s.com. SUBSCRIBE TO OUR NEWSLETTER Text the word G4S to 1980 to receive our G4S Academy newsletters.