A New Era of Security

Providing the best capability and technology in such critical areas as: Entrance & Access Control, Intruder Alarms, Remote Monitoring, CCTV and Biometric Systems.

SYSTEMS

Bespoke Integrated Security Solutions.

ACCESS CONTOL

Remote and local access control options.

CONSULTANCY & DESIGN

Bespoke single-point solutions – both for individual sites and also multi-jurisdictional sites.
SW cctv

About

Electronic Security Systems

Our Electronic Security Division provides several services to clients to further enhance our security offering.

Accurate site surveys, along with client consultation, provides sufficient information to prepare accurate designs to best address client specific needs. Our in-house draftsmen will plot security components as per the Sales Engineer’s designs, providing our client with a visual presentation of our security rationale. These drawings later assist installation teams to install and commission solutions to best address client specific needs identified by the Sales Engineer.

Features

Installations

Installations are completed with attention to detail according to previous client consultations and made more proficient due to our ability to pre-commission vital components  by our Commissioning Engineers in a controlled environment. Once installations are complete, systems are checked and tested for functionality according to international recognised methodologies and, where applicable, functional confirmation through our National Control Centre.

Our Technical Division subscribe to strong Project Management principles when executing large projects. PMBOK and PRINCE2 have been widely adopted as preferred framework and project management methodologies. These methods ensure delivery of projects well within scope, time and customer budgets.

Technologies we install and support according to manufacturer’s specifications include the following:

Access Control

Video Intercom

Gate Automation

Electric Fencing

Intruder Detection Systems

HD IP Video Surveillance Solutions

Pepper and Smoke Defence Solutions

Our Approach to Security

CCTV

Our CCTV solutions can be installed to operate either overtly or covertly. We offer a wide variety of CCTV systems, including:

  • Analogue, digital and IP
  • Both hard-wired and wireless

CCTV systems may be either monitored locally by a client’s own personnel or configured to allow the images to be viewed, recorded and re-viewed remotely through an internet communications link to our National Control Centre using the latest IP technology.

Biometric Systems

Biometrics consists of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioural traits. In particular, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance.

Biometric characteristics can be divided into two main classes:

Physiological are related to the shape of the body. Examples include, but are not limited to fingerprint, face recognition, DNA, Palm print, hand geometry, iris recognition, which has largely replaced retina, and odour/scent.

Behaviorioul is related to the behaviour of a person. Examples include, but are not limited to typing rhythm, gait, and voice. Some researchers have coined the term behaviometrics for this class of biometrics.

The first time an individual uses a biometric system is called enrollment. During the enrollment, biometric information from an individual is stored. In subsequent uses, biometric information is detected and compared with the information stored at the time of enrollment.

Integrated Systems

A bespoke security system that meets the present and future needs of our clients is core to our design philosophy.

With our in-house engineers and IT department, we develop practical solutions which result in significant time and cost savings for our clients. This in turn creates greater security protection.

All our systems are capable of being viewed and controlled either locally by an onsite team in a control room or offsite by a remote monitoring station.

Entrance & Access Control

Access control and entryphone systems can be used as a management tool to effectively monitor personnel movement and to generate reports for proof of entry.

Our close association with several world leaders in the manufacture of access control systems allows us to constantly provide the most up-to-date technology and solutions.

To meet the specific requirements of each installation, we use a wide variety of operating devices, including Proximity Readers, Biometric Readers, Key Fobs, Tags and Swipe/Proximity Cards.

Remote Monitoring

Remote Monitoring Stations are as reliable as an on-site Control Room, but with the added benefit of significant cost savings – by removing reliance upon human guarding resources.

Once the incident is fully investigated and resolved, a report is produced for our client without having had to disturb a member of their staff after hours.

Access Control Database

Remote Access

These systems are managed and maintained by SW Security Solutions SA

  • A WinPak Access Control System is used.
  • The System is linked to our Servers to enable us to provide remote bureau support and diagnostics.
  • Access programming is done via e-mailed instruction, employing a remote ADSL link.
  • A nominal fee is charged for this service.
  • Instructed transactions are logged and we invoice quarterly in arrears.
  • A full user database is maintained and all historic transactions are stored for three months.
  • Transactional reports are available at any time for a nominal fee.

 

Local Access

These systems are managed by security/on-site staff.

  • Access control software can be utilised on an on-site PC.
  • Access programming is done via Access Control software. A user database and all history transactions are made available.
  • On-site card lamination can be used for ID purposes.
  • Lamination software/hardware can be maintained on-site
  • A remote facility can be installed for guidance and system diagnostics.

Visitor ID

  • The visitor ID Control System uses an on-site PC.
  • Print and lamination software produces visitor passes.
  • This allows for a fire-alarm roll-call to be implemented.
  • This provides management with a visitor tracking report.

Reader Controllers

  • A non-PC based system can be used.
  • Access programming is done on-site, at a reader controller.
  • These systems do not generate a database or transaction records.
  • Certain systems may be programmed by on-site staff.

Consultancy & Design

We are regularly requested to provide a design service and also technical specifications for equipment and to then supply that equipment to a variety of projects in many jurisdictions around the globe.

Typically, upon receiving consultancy instruction and a brief from a client, we will conduct a site Inspection and survey. Armed with this information, a design is prepared and the proposal is discussed with our client. At this stage, we will also specify what equipment is needed.

In conjunction with our client, we will then make a decision: whether to send our engineers to carry out the installation or to engage the services of a sub-contractor with whom we will then partner in that specific jurisdiction.

Even when the installation is carried out by a partner sub-contractor, SW Security Solutions SA will undertake the final set-up and commissioning of the system. That way, we can ensure full compliance with the agreed design proposal.

We also provide a pure consultancy service. This is where we are engaged to adjudicate and advise on tender proposals for a specific project. We undertake a review of the designs and equipment specified by the tender participants and evaluate the bid in terms of its efficacy, practicality and value for our client’s money. Our report is then submitted for our client’s consideration – before implementation.

We develop practical solutions which result in significant time and cost savings for our clients.