Articles

INSIGHTS FROM OUR EXPERTS

From looking at security in the new normal to future security solutions, explore our latest insights and thinking from our G4S thought leadership community. 
600x420_Articles_Page

latest insights

Guard Mask

New Pandemic-Spurred Training Programs for Security Personnel

As a result of COVID-19 the roles of security personnel have expanded prompting their training to change as well. Managing this while adhering to social distancing regulations have challenged our industry to innovate.
Security_4_0

Security 4.0 The Road to the Future

As an industry, security must be mindful of taking an untried path, to avoid opening up security risks as we make the transition to Security 4.0. If done correctly, our transition will bring similar benefits in efficiency, effectiveness, and overall empowerment for the human side of the human-technology team. 
780x440_Article_Image

Why Moving to a Risk-Based Approach Helps Business

Today’s security leaders encounter many challenges. They have to operate with reduced budgets and face challenging and evolving risks on a daily basis.
780x440_Article_Image

Optimize Your Security Program with an Intelligence Collection Plan (ICP)

With the U.S. economy firing on all cylinders it is a good reason for savvy leaders to think about protecting their key assets from exposure to ever-evolving internal and external security risks.
780x440_Article_Image

Must-Have Business Skills for a Security Risk Management Program

Change is never easy and for many of us who have been in the security industry for a while, our comfort zone is in the “nuts and bolts” of our day-to-day tactics.  We know our details. 
780x440_Article_Image

How Leveraging Big Data Changes the Perception of Security

Security professionals are challenged by a negative perception that exists in the security industry, and most likely in their own organizations. Physical security is often viewed as a cost that is more of a burden to the organization than a benefit.
780x440_Article_Image

The Connected Officer

Joe Young, Senior Vice President of Innovation at G4S, explains how hidden technology and technical know-how will form a critical role in delivering the next generation of security officers.
780x440_Article_Image

Artificial Intelligence in Safety: What Comes Next?

Some of the advantages or AI to the security industry will include a reduction of costs in security labour and a lower overall exposure of security professionals to risky situations. 

Why Campus Environments Should Choose a Unified Security Solution

Campus environments experience many challenges when it comes to securing their facilities. University environments need to find the right balance between having an open environment and a secure environment. Students need to feel secure, but don’t want to feel like their residence hall is restrictive.
780x440_Article_Image

Consumerization of Commercial Security

Senior Vice President of Innovation at G4S, Joe Young, explains how advances in video games, mobile phones, televisions and more will disrupt commercial security.
Drone

Security and Drones: A Force for Good

When people think about drones, it’s generally not in a positive light. But the technology that has long been viewed as a means to invade privacy, or threaten businesses, governments and industrial operations, actually has the potential to play a significant role in integrated security programs.
780x440_Article_Image

Securing the Hydropower Energy Industry

The hydropower industry converts energy from flowing water into electricity. Originally used for mechanical milling, such as grinding grains, today’s hydro plants produce electricity with turbines and generators using a dam, reservoir or flowing river. This natural source of energy encompasses a wide variety of sites and layouts, often remotely located, geographically large, and difficult to get to and maintain.
780x440_Article_Image

Securing the Petrochemical Industry Today

The best way to determine how to meet regulatory requirements is to conduct a thorough risk analysis and any gaps should be analyzed and resolved over time. The organization should work with their security partners and consultants to find technology-based solutions to the security gaps wherever possible. 
780x440_Article_Image

Securing Renewable Energy Today

The U.S. energy infrastructure is the cornerstone of the economy. Without a working energy grid, daily life as we know it would grind to a halt and both health and welfare would be in danger. That is why securing critical infrastructure is considered a top priority, and is highly regulated, often subject to local and state as well as federal guidelines from organizations such NERC (North American Reliability Corp.) that govern both physical and cyber security concerns.
780x440_Article_Image

What you Need to Know About Intelligent Parking Areas

There is a technology evolution happening in our parking spaces.  Solutions for access control, solutions to manage vacancies, and solutions to promote safer environments are now a reality. 
780x440_Article_Image

How to Create Efficiencies with Low Cost of Deployment and Ownership

End-user needs are changing because the dynamics of how organizations function are changing. Companies are forced to use the cost down approach and do more with less. What does that mean?
780x440_Article_Image

What is Open and Why is it Important?

There has been a lot of discussion occurring in the security industry lately around open versus proprietary technology. End users prefer to deploy systems they deem as open, versus systems that are viewed as proprietary.
780x440_Article_Image

Onboarding Best Practice Delivers Secure, Compliant Environment

The security landscape has evolved and new threats have emerged for organizations. Security teams need to do more with their systems to keep their employees, assets and building secure. 
780x440_Article_Image

Slamming the Door on Cloning

The duplication of access credentials can affect access cards, key chains tags or fobs. The cloning of credentials creates a security breach. This is a threat to the integrity of your access control system. 

RISK SURVEY

You should have a good general knowledge of your security program and be able to rate the effectiveness of its components. Complete the risk survey, and receive an analysis of the highest rated security risks your organization faces. Your responses are compared against industry standards and generally accepted practices of security risk assessment.

Subscribe to our newsletter

^