Search This Blog

Powered By Blogger

Translate

Sunday, September 27, 2009

security equipment for police

security equipment for police: "police uniform,fireman suit,bullet proof suit,off air interception equipment"

Sunday, April 12, 2009

corporate security -holistic perspective

Corporate Security-Holistic Perspective

In this article I have made an attempt to develop holistic perspective on India Corporate Security Scenario .The Mumbai blasts served a wake up call for the Indian industry …Leaders have rethink on corporate security policies . Industry decided to work with government on security and governance issues rather than dealing with it as another man’s subject. Indian industry was hit by global recession and by image of India as a soft target due to terrorist strikes and now with the Satyam episode as country lacking in good corporate governance policies apart from IP issues . Hence their arose a need for new leadership strategies to overcome and move forward . Foremost concern being safety and security.
India's commercial security woes is more to do with the DNA of the security professionals rather than the prevailing threats at presents. Commercial security is the gap filler between the state, servicing the general public and the corporate requirements to protect, preserve and maximize their vested assets. Mindset transformation is required on the part of corporate security advisors.
Today there is a huge opportunity for security providers .India has a greater divide between the capacity of the government and corporate demands.The problem with the current approach is that it is still very ex-military or ex-police driven. The overall global view of India's security remains below par, and this affects everything from investment to trust and relationships. Corporations want business enablers with sound competent business managers first and security managers second, not professional inhibitors or someone living in the ancient past from their days in the military/police.
Security must be cost effective or mitigation solution based. Despite the oversight and protection mandate of security professionals, very few are actually adequately checked to ensure they meet the corporate needs and technical requirements .In developed countries the escalation of cost for security begins with policy, then technical measures and manpower last. In developed countries, policy, manpower and then technical solutions are the prescribed route for a number of reasons but largely due to the reality that manpower is cheaper than technical measures and therefore dominates the solution options.
VALUE ADD and corporate security debate is gaining importance now .Any investment needs to be validated by VALUE ADD it brings in .Security is viewed as necessary expense. Companies today are making a business case from utilizing security devices and systems to protect life and property (assets), to helping improve productivity, assist with training, and decrease losses.
Companies desire to leverage Security to Maximize Revenue. It must be Vital partner to protect company assets and IP .Attempt to be made to Use security technology to improve business processes and operational efficiencies. End user and integrator ingenuity are merging to bring innovative services eg Video surveillance and access control services . Internet provides realtime, anywhere access to surveillance cameras, activities of employees and visitors via access control logs. Access provides valuable information on security measures . Customer and employee patterns begin to emerge which are valuable data .
Examples of ROI With Security Technology are given below
Is the new line of merchandise displayed prominently in the front of the store? Do I need more lunch staff on Thursdays and Fridays? Are my employees being honest about their hours worked? A security director can view and download footage of an incident online in one city without having to make the roundtrip to pull the incident from the DVR. Remote access can potentially save a business in fleet expenses, travel expenditures, and time and resource management. Be in multiple places at one time. A win-win for all parties anytime, anywhere access. Hence funding for security projects is now coming from the customer’s IT, sales and marketing . Convergence opens new ROI opportunities for security providers, who are investing R&D dollars to position themselves at the forefront of the convergence revolution.
Another aspect neglected till now was Corporate financial fraud Investigation-Satyam Saga Financial investigators role is tosearch for information on the integrity, financial health and reputation of an organization or company . This is done by probing public records and international databases covering patents, corporations, partnerships, contracts, SEC filings, news, business references and Uncovering critical information regarding corporate documents, material contracts and agreements, financial status , litigations, taxation, insurance and liability, or joint venture agreements.
Computer Forensics and Electronic Discovery is another aspect of corporate security.Specialized team of leading experts in information security, focusing on computer forensics, electronic discovery, physical & IT security, and cyber investigations. IT practice supports technology-driven litigation and engagements in the following ways: Computer Forensics/Expert Witness Testimony Physical & IT Security are interlinked in todays e friendly corporate.
There is huge opportunity in Intellectual Property (Brand) Protection .Illegal use of legitimate companies’ brands, trademarks, and product has increased exponentially and become very sophisticated in the process. An MNC was recently penalized for not ensuring adequate action against their counterfeit products
Primary issue is Can enhancement of awareness in corporates prevent terrorist attacks or Can 10 security guards standing outside a mall deter a terrorist. We need to study how Corporates in Srilanka and Israel have been coping with continuous terrorist attacks and yet are able to develop their economy fairly well.
Facets of security are Protecting Assets and Increasing Effectiveness consists of Virtual security and Physical security ,Financial security IP intellectual property,Detection, Prevention, Monitoring of security and of course guarding at each of the 3 rings of security Perimeter , Entry point and Usage areas
Business SEGMENTS where corporate security is of prime significance are
Travel and Tourism Industry-Hotels Transportation - aviation security , mass transit rail systems ,shipping ,bus,taxi,auto,cycle Critical Infrastructure - The industries and institutions, buildings and distribution networks that are essential to everyday life ,refineries,banks .Ports & Borders -Systems for Customs officers and border protection, including monitoring cross-border cargo and reducing international shipments of contraband, screening for explosives, arms and weapons of mass destruction..Emergency Responders - Enabling emergency response teams to face potential threats with confidence when dealing with a potentially toxic incident, equipped with the most advanced technology.Military - Meeting the requirements of our armed forces and the application of smart science on the battlefield, principally the threat from potentially lethal chemical and biological warfare agents.Diagnostics – eg hospital screening programmes for infectious diseases.
In Security Products Importance of non lethal arms versus lethal arms is increasing today Alongwith good Intelligence collection and analysis and sharing .Innovative products are being developed to counter new threats like Taser --Ideal non lethal weapon for private security guards .Can be used extensively by Aviation personnel –for example to temporarily disable a drunken deranged person in an aircraft .All previous less-lethal weapons have worked on pain compliance that can be overcome by drugs, alcohol, emotionally disturbed persons (EDPs), or by focused, combative individuals. The X26 and M26 ECDs do not solely rely on pain to achieve compliance. They affect the sensory and motor functions of the nervous system and can cause incapacitation.
Leverage Customer IT Investments -New video services are changing the way companies conduct business. Security providers offer online services that allow a customer to access their local video surveillance systems via the Internet for realtime and historical viewing of their cameras, plus control pan/tilt/zoom (p/t/z) units. Customers view, store and retrieve video images from their local DVR unit, while leveraging their existing infrastructure. When a customer requests IP video, to access live and stored video footage using a secure Internet network. build robust IT capabilities to provide services without taxing the customer’s IT infrastructure. These systems allow companies to leverage their existing security and IT investments. Image Content Navigation (ICN ) .In 3D users can plan new camera sites to improve performance of the system. eVideo Audit is a video monitoring service that provides realtime audits, notification and exception reporting of a customer’s business processes.
Investment in open architecture technology and a common IT platform allows a to offer their customer online, realtime alarm data and video that helps a customer improve their security and improve their business operations.” Central station managed access control is ideal. Provides 100 percent of the management and administration of the customer’s local access control system. Provide new employee access cards, photo ID badges, changing of door lock schedules, deleting or modifying access levels, generating activity reports and more for the customer. Eliminates the customer having to purchase, administer or manage access control software on their computer. Customers can pick up the phone or request all changes via an online, realtime Web portal. Has access to realtime reports and other system and activity information without an IT infrastructure investment. Smart organizations are making their security personnel more efficient by integrating video with security control so that video is pushed directly to security guard’s monitor, PDA or cell phone.
Risk assessment is key to moving forward . Each organisation has to assess and manage security across your international operations. Need is to Mitigate the risks and threats facing each of your operating facilities Security consultants have to develop a detailed risk assessment and provide a report with specific, actionable recommendations to reduce and mitigate your risks. Specialized intelligence designed to meet organization’s strategic requirements is to be done . including forecasts for specific countries, risk comparisons of specific locations, and in-depth reports on threats such as terrorism, kidnapping and crime. The corporate security advisor has to Identifies the security risks and steps required to protect organization and assets. Plans must cover physical security, personnel security and emergency response protocols. New exciting technologies and service offerings aside, security providers should never lose sight of primary objective of asset safety. Technology gains have created new opportunities Security needs to continue to grow to become a viable and competent technical skill such as medicine, law, engineering and the like. India is well short of this objective and the companies that sell product or people to suit their revenue projections are an endangered species until more professional security personnel, companies, business skills and vendors come into the market. Risk management is not discretionary spending and business resilience is rapidly becoming a competitive edge. Successful companies will complement their security message with tangible business benefits — a true partnership
firoze zia hussain
firoze_z@toteminfra.com
00919618621234

Sunday, March 1, 2009

export import workshop

Workshop on “Simple ways to reduce transaction cost in Import –Export” on 24th February 2009 at CII Conference Hall

—MASSIVE AMOUNTS OF EDIBLE OIL AND OTHER COMMODITIES LYING AT THE INDIAN PORTS SINCE PRICES HAD FALLEN BY 50 %
—SIMILAR SCENES BEING SEEN AT OTHER LARGE IMPORTERS
—REDUCTION OF TRANSACTION COST-HOW TO PREVENT COMPLETE LOSS OF THE GOODS
—SALES PEOPLE WHO HAD SAVED FEW DOLLARS AND SENT GOODS IN SHIP TAKING LONGER ROUTE WERE BIGGEST LOSERS

corporate security scenario india

¡ Mumbai blasts - Wake up call for the Indian industry …Leaders have rethink on corporate security policies .
¡ Industry decides to work with government on security and governance issues rather than dealing with it as another man’s subject.
¡Indian industry hit by global recession and by image of India as a soft target due to terrorist strikes and now with the Satyam episode as country lacking in good corporate governance policies apart from IP issues .
¡ New leadership strategies to overcome and move forward.
¡Foremost concern being safety and security.

leadership strategies in view of mumbai blasts

The Mumbai blasts have served as wake up call for the Indian industry leaders to have a rethink on there own corporate security policies .The incident has also led the industry to decide to work with government on security and governance issues rather than dealing with it as another man’s subject.
The Indian industry has been hit by global recession and by image of India as a soft target due to terrorist strikes and now with the Satyam episode as a country lacking in good corporate governance policies .
The question which arises is what are the new leadership strategies to be adopted to be able to overcome this bad patch and move forward. Foremost concern being safety and security.
Corporate participation in debate on security
Expressing shock over the terrorist attack in Mumbai claiming about 100 lives, Indian industry has demanded tougher laws along with ‘stronger and firmer’ leadership to tackle terrorism.
The industry leaders, including heads of the apex chambers, said that the country needs to be on a high alert since its institutions are becoming vulnerable to the terrorists’ attacks. Condemning the killer attacks in India’s financial capital, HDFC Chairman Deepak Parekh said: “Blasts are bad for investor confidence.”Demanding stringent laws to deal with terrorists, FICCI President Rajeev Chandrasekhar said: “It is time we all join this debate on terrorism and demand stronger and firmer leadership and approach to this threat of terrorism, including better laws.” He also said that the Indian business has so far been mute and very detached from this debate on terrorism and tougher approach to terrorism and terrorists, including anti-terror laws.

We need to study how Srilanka and Israel have been coping with continuous terrorist attacks and yet are able to develop their economy fairly well.

Strategically leaders guide the direction of the organization. Tactically they oversee projects and measure the effect of the organizations activity. At first glance the Leadership of a corporation is seen at the Executive and C-Level. The Executive sets strategy and the C-Level and middle managers set tactics to accomplish strategic goals. The efficacy and profitability of an organization is not merely determined by the vision of the executive and his or her capacity to communicate that vision to the crew. I believe the real value is in the tactical leaders within an organization and this could mean middle management right down to line personnel. I guess I am looking at an effective corporation and effective leadership in military terms which is by no means strange. What I believe Leaders do is properly facilitate their subordinates and gives them the tools and opportunities to achieve. Leaders point the way and then GET OUT OF THE WAY! Leaders recognize the qualities of their employees and will not try to micromanage their employees. Leaders who micromanage show that they have no confidence in their employeeʼs ability to accomplish the task set for them. Again, take a military unit, strategic goals are put forth by the executive, C-Level and middle management figure out how to achieve those goals and set forth tactics, NCO's and line personnel do it. Ideally that is how it should work. Leaders will not only set Strategic Goals, as in the case of Executive Level, or Tactical Goals, as with C-Level and middle management, Leaders also inspire and influence. Leadership can and should exist and be promoted within all levels of any organization. However, beware of the PETER PRINCIPLE whereas a person whom achieves professionally in his or her role will be promoted until they reach a role they cannot perform. Leaders are both hard to find and everywhere. Leaders get others to FOLLOW THEM because they have confidence in their acumen or abilities. A person in a leadership position that cannot inspire others to follow is not a Leader.. One solution is to focus on de-centralized leadership. The value of de-centralized leadership is born out in the ability of an organization to respond quickly to changes of environment. This is necessary in an environment that is subject to drastic change i.e. under the threat of terrorist attack. Top down leadership while valuable in the communicating the direction and raison d’être of any organization cannot possibly respond to changes that occur at the line level. In the world today Leadership at all levels of an organization is necessary not only as a business prerogative but in the case of terrorist threat may be a life saving prerogative. Every organization should be doing a continuous Risk Assessment cycle and have plans to preserve business continuity in the case of crisis. These plans will of course be communicated to all leadership levels of an organization and from there to the appropriate personnel.Fostering proper Leadership at the line level will result in situational awareness not possible at the C-Level. Situational Awarness in these times is not only a valuable commodity but may make the difference between the collapse and survival of an organization.(I recommend reading about John Boyd's OODA Loop as well)
Important is to learn from disasters.
The NYPD is examining ways to shut down cell phone calls in and around future hostage-taking scenarios without also shutting down the communications devices of the police trying to rescue them.
Cell phones were simple tools used to deadly effect in the Mumbai terror attacks.According to phone transcripts, the attackers received instructions and real-time updates about the officers amassing against them. Some of the phones they used for the calls apparently were taken from hostages.The November siege showed that well-trained assailants with simple weaponry can cause massive casualties."I think we can expect that groups will look to that as a model for themselves," "We sometimes focus on tactics that may be exotic and esoteric ... but for most terrorists, they're looking for what works." I believe, is the kind of thing that can be conducted against soft targets around the world."As much as governments worry about chemical, biological or radiologic attacks, what happened in India may encourage terrorists to launch low-tech violence."This kind of attack, I think we have to be prepared for it and be prepared for soft targets to be attacked," he said.
We need to run government like a corporate, recruit the best people, deploy best technology have best processes in place. Enable a certain section of police force to deal with such kind of situation, provide them all the gadgets and machinery

Achieving double digit growth is a challenge no doubt but if taken up with right leadership strategies will definitely lead to success.

Firoze Zia Hussain
00919910333249
firoze.hussain@gmail.com
former superintendent of police pondicherry
corporate security professional