Careers in Close Protection

Why Work in CP?

The close protection industry is a dynamic and fast evolving sector of the global security industry and is itself comprised of several nuanced areas of expertise, such as; celebrity, VIP and high net worth protection, incorporating specialisms in maritime, aviation and hostile environment protection. The role is demanding, competitive and requires dedication beyond that which most jobs ask. However, it can also be an incredibly rewarding profession, allowing you a view of the world that you would never normally see.

This, coupled with the expectation of good salaries, have made close protection an increasingly popular career choice, particularly amongst service leavers.


The British Bodyguard Association established itself a number of years ago, during a period of unprecedented growth in the security industry. The BBA was originally formed to allow operators to network and find employment wherever they were deployed. Since then, the association has grown and now provides support to our many members, guiding and assisting in their professional development and helping them to enjoy long and rewarding careers.

BBA Membership Options >1

What is a Close Protection Operative?

Irrespective of the many niche areas of security, close protection operatives (CPO s), or bodyguards, can commonly be defined by the single most important requirement expected of them in their professional capacity; to provide physical protection to a principal, shielding them from any potential harm and to quickly get them to safety. The different types of threat commonly faced by bodyguards across the globe include: violence, kidnapping, mugging, hostile confrontation, acts of terrorism, natural disasters and more subtle threats such as: reputation damage, bribery and potentially embarrassing situations. To be a successful CPO you will need a wide range of skills and plenty of self discipline and unlike conventional jobs, you will have to make time for, and in many cases, pay for your own professional development.

To be successful as a CPO you will need to meet a certain criteria to ensure you are suitable for the role and will not add any undue risk to the principal or hinder the assignment in any way. Good protection operatives possess the following characteristics in abundance:

High Level of Fitness

Calm under pressure

Fast and effective decision maker

Good Time Keeper

Team Player

Ability to Operate on own initiative


Good communication skills


How do I get Started?

Most CPO s are employed through private companies who are appointed by those who seek protection. Not all jobs are the same and many require different skills and experience from their operators so it s advisable to diversify your development and be prepared for any situation and thereby making yourself more employable. But first off, you need to be licensed, which means getting qualified by undertaking a training course that meets SIA (Security Industry Authority) criteria. There are many other factors which should be considered before opting for the first training provider you come across.

Read more on how to select a training provider >2

What does Close Protection Training Involve?

A close protection course typically involves intensive training that runs continuously from start to finish, immersing a student in the world of a CPO.

It s vitally important to find a training company who offer a high quality professional service and it s advisable to do a great deal of research in this department before enrolling with any training provider. Unfortunately, in the wake a regulation, a lot of companies have appeared, offering students a cheap and quick route to certification by compromising standards in order to process would-be operators through their course at a rapid rate. Sadly, for several years this became a viable route into the industry as demand outstripped supply. But now, in a more settled environment employers scrutinise perspective candidates, and not valuing the training you undertake is a sure fire way to remain unemployed. Suddenly, what seemed like a cheap investment in a training course actually turns out to be quite expensive as you re faced with the prospect of retraining or giving up on your dream of becoming a protection specialist.

For more information go to our Training3 section.


Once you ve passed your entry course and acquired the necessary accreditation and licensing you will be expected to undertake Continuous Professional Development (CPD). From a practical point of view this ensures that your skills and knowledge remain fresh in all the areas you have trained in but also by expanding your ability in other areas it will make you more versatile and more employable. You never know where demand will shift to next in a global market, so remain openminded and adaptable, and commit to development.

For more in-depth information go to our Development4 section.

Close Protection Jobs

Despite a downsizing in the numbers of CPOs employed in hostile protection, in the likes of Iraq, Afghanistan and the Gulf of Aden, the requirement for close protection is increasing all the time. In a hostile and unpredictable world, where natural resources are becoming more scarce and governments can be overthrown via social media, people from all walks of life are more invested in security. So long as you have the necessary qualifications and accreditation, display the correct attitude and have access to experienced networks of professionals then you have a chance of making it as a CPO.

Networking remains an integral part of gaining employment in the close protection industry, it is vitally important to establish and maintain relationships with experienced and operational professionals so that you may be recommended for jobs. It remains the most likely way of learning about new vacancies and given that over 80% of work is given to people who are known by current employees, it s also your most likely route to employment.

More about BBA Job Vacancies >5

Security Industry Authority (SIA) Licence

To work in the private security sector in the UK, or to work for a British company abroad, operatives are required by law to be licensed by the SIA and it is your responsibility to obtain the required licence and ensure you stay in date. The SIA is the organisation responsible for regulating the private security industry; it is a criminal offence to undertake the licensable activities of a close protection operative without an SIA licence.

To obtain an SIA licence you must meet certain criteria to determine whether you are a suitable candidate.

Licensing is in place to ensure that you adhere to industry standards and uphold them.

Find out more about the SIA licensing criteria6.


  1. ^ BBA Membership Options > (
  2. ^ select a training provider > (
  3. ^ Training (
  4. ^ Development (
  5. ^ BBA Job Vacancies > (
  6. ^ SIA licensing criteria (

Deliveries on your doormat even if you re out thanks to a smart new service from ASSA ABLOY and PostNord

In Sweden, a new smart door lock from ASSA ABLOY is making the While you were out delivery card a thing of the past. PostNord customers can now choose to have parcels delivered inside their front door, if it is equipped with an ASSA ABLOY smart lock. It should be simple and convenient to shop online, says Johan Hellman, Head of eCommerce at PostNord.

We ll now be able to deliver items inside the front door in a secure way. The recipient doesn t need to be at home or be available at a particular time, which makes it both simple and convenient. The new service works via a PIN code issued automatically to an authorised PostNord delivery driver. The code opens a recipient s front door just once, so PostNord can leave a parcel on the inside. Now, there s no need for customers to wait in all day, or make a special journey to a collection point. It s another real-world example of smart door locks making life easier. The new service is simple to operate. Customers select home delivery from a participating e-retailer, in the usual way, and approve a specific delivery time slot using their mobile phone. If customers select home delivery inside the front door , their PostNord driver automatically receives a single-use PIN code to open the lock.

The code becomes invalid instantly and automatically after delivery; the customer s phone is notified again when the parcel is delivered. Pilot project A pilot project is already under way in Lerum, near Gothenburg, in conjunction with some of Scandinavia s major e-retailers. Approximately 100 households are trialling this new, ultra-convenient delivery option. With new and innovative products, such as our Yale Doorman lock, customers have an opportunity to simply and securely avail themselves of different services without having to be at home, says Kristoffer Wadman, Director Business Development at ASSA ABLOY Scandinavia. The project illustrates one of many ways a smart door lock can boost convenience and security for everyone. With a smart front door, homeowners no longer have to carry cumbersome keys; there s no need to cut a spare set for a cleaner, the kids or a cat-sitter. With a smart lock, you can let guests in remotely via an app, send them a digital key, or provide a temporary or single-use PIN to open the door. Digital keys are also safer than metal ones: they can t be copied or stolen, and can be instantly revoked if they fall into the wrong hands. Find out more about how smart locks from ASSA ABLOY make in-home delivery with PostNord possible.

embedded content About ASSA ABLOY ASSA ABLOY is the global leader in door opening solutions, dedicated to satisfying end-user needs for security, safety and convenience. Since its formation in 1994, ASSA ABLOY has grown from a regional company into an international group with about 47,000 employees, operations in more than 70 countries and sales close to SEK 71 billion. In the fast-growing electromechanical security segment, the Group has a leading position in areas such as access control, identification technology, entrance automation and hotel security. About PostNord PostNord is the leading supplier of communication and logistics solutions to, from, and within the Nordic region. We ensure the provision of postal services to households and businesses in Sweden and Denmark. With our expertise and strong distribution network, we put in place conditions for tomorrow s communication, e-commerce, distribution and logistics in the Nordic region. In 2015 the Group had 35,000 employees and sales of around SEK 40 billion. The parent company, PostNord AB, is a Swedish public limited company headquartered in Solna, Sweden. Visit us at

Related Topics For connected home and residential service providers, smart locks open doors to new opportunities The pioneer behind the world s first unpickable lock: Abloy celebrates 110th birthday At IFA 2017, smart locks open doors to the connected, integrated home services of the future

How 360 cameras are a hit in casinos and why Oncam is relishing its Milestone partnership

Oncam is a leader in 360-degree network cameras and recently launched a 360-degree dewarping preview tool and a visualisation tool to give users a way of virtually sampling its signature innovations. To find out more about the company s latest products and strategy for growth, we spoke to Simon Reed, regional sales director for EMEA at Oncam. IFSEC Global: Hi, Simon.

So how did IFSEC 2017 go? Simon Reed: It was a super busy show for us. We were, for the first time, exhibiting in the main hall, as one of the partners featured on the Milestone Systems stand. Over the course of three days we did 70 presentations to individual companies, so we felt we had a really good response from the people coming to the booth and hearing about our technology and vertical market offerings. An Oncam 360-degree camera can cover an entire gaming table up close or several gaming tables while still maintaining picture quality and retention rates While retail is one of our strongest vertical applications, we have made significant strides within the casino and gaming industry, as well as hospitality, transportation and manufacturing. So overall, the show was good for us as a brand and a team. IG: Interesting that you have a strong present in gaming and manufacturing; they must have quite specific requirements? SR: Yes, they typically do and this applies to the global market. There are stringent regulations in place that have to be met when implementing security technology, such as video surveillance cameras, and the 360-degree camera we produce does lend itself well to the environment.

An Oncam 360-degree camera can cover an entire gaming table up close or several gaming tables in an area while still maintaining picture quality and retention rates. Within a manufacturing environment, larger areas can be monitored with fewer cameras which isn t the same with fixed and pan-tilt-zoom cameras that only cover specific focused areas. Additionally, the day-to-day mechanisms in use within the plant can be seen using the advanced picture quality found in Oncam cameras, so security managers can be made aware if people are putting foreign objects into food being processed, for example; so the development of this camera has been a big win for us in these applications. embedded content IG: Did you launch any new products at the show? SR: While we didn t launch new products, we did demonstrate a rewritten version of our software development kit (SDK) as it works with products from Milestone Systems. As they released their upgraded version of their product line, we delivered our updated SDK, ensuring that our products integrate seamlessly with one another for customers. As a result, we re able to speak with Milestone customers about our technology, and they are able to recommend panoramic cameras like ours to their customers. Over the last year, we introduced our new Evolution Stainless Steel camera in both 5MP and 12MP solutions, which has opened up a world of possibility within the pharmaceuticals, food processing, industrial/chemical plants, ports and marine industries. It was specifically designed to meet the needs of customers operating in more extreme environments, with special attention to ensuring the casing is resistant to corrosion from power washing and extreme heat/cold.

NSF International recently certified the camera in the United States with the NSF mark for food service, and it s the first video surveillance camera to have such a distinction. It also boasts IP69K/IK10 ratings, which make the enclosure resistant to high-pressure water jets, dust and vandalism. It s a very unique offering with multiple uses across applications. IG: What s the company s strategy? Where are the most auspicious areas for growth? SR: As we continue to grow and add more technology to our portfolio, there are several vertical market applications that are natural fits for our technology. We have a strong client base in retail, and anticipate adding to that in the coming years, while adding significant presence in the hospitality sector, such as on cruise ships and hotels/resorts. These facilities with their wide-open expanses are ideal for the 360-degree technology we offer. We will also continue to grow within the casinos and gaming market.

Free download: The video surveillance report 2017 Sponsored by IDIS The Video Surveillance Report 2017 covers all things video surveillance based on a poll of hundreds of security professionals. Specifically looking at topics such as open platforms, 4K, low-light cameras, video analytics, warranties and this year due to the growing threat posed, the cybersecurity landscape. Click here to Download now Related Topics Would you wait two minutes to retrieve three-month old surveillance footage if it slashed costs by 50%?

ONVIF Q&A: Latest profiles, cybersecurity and the Highways England project People of interest were known weeks before terrorist incidents but data was part of an unsearched, unstructured archive

How evolving terror tactics have driven advances in perimeter security

Many urban threats used to be seen, at least in the eyes of the public, as things that happened on other shores. However, an increase in urban attacks of late has put pressure on security services to come up with innovative solutions that allow business to continue as normal and the public to enjoy some peace of mind. Amid these new threats, coupled with geopolitical fears and the ongoing refugee crisis in Europe, governments are attempting to make borders more secure and event venues and stewards of high-risk public areas are following suit.

With terrorists now using vehicles as weapons, many existing security solutions need reassessing as they are inadequate at preventing vehicular attack. This month marks the anniversary of the Nice attack and similar incidents have occurred since in Berlin, Stockholm and London. The change in tactics has rendered current security provisions outdated. A proactive, preventative approach is now required if security personnel are to put a stop to such incidents. Mitigating risk While no guarantee can be made about the safety of those attending events or conducting their daily lives in high-risk, crowded public areas, perimeter security does provide an increased level of protection and has seen advancements designed to mitigate the risk and impact associated with today s urban threats. Previously seen on military bases, oil and gas fields and other important infrastructure, perimeter security products have become popular for those looking to secure their event and put public safety firmly back on the agenda. Threats are, of course, unpredictable. However, providing a readily-available solution for areas deemed high-risk due to large volumes of the public passing through, including stadiums or other event spaces, can help deter or reduce the impact of vehicular and some other attacks. The concrete blocks so far installed have actually been found to be near to useless when tested by researchers in Germany While video cameras and security guards are two of the most common security measures that organisations have in place, they aren t always the most effective.

With hostile events increasing in frequency, there has been a reliance on video surveillance to identify perpetrators and ensure that every angle is covered. However, surveillance cameras are mostly effective when the attack has already happened. There s no doubt that the increased threat level has meant that event organisers and those managing security in high-risk areas have had to look at alternative ways in which they can prevent attacks or reduce their impact. Protecting civilian areas has become a higher priority, with perimeter security generating much interest and innovation. In reaction to the London attacks, Metropolitan Police Commissioner Cressida Dick announced that vehicle barriers were to be installed across London in some form or other. Yet while such reactive measures are of course welcomed, it s imperative that everyone involved in public security should take action in the threat against urban terror. The concrete blocks so far installed have actually been found to be near to useless when tested by researchers in Germany, who found that they would be unable to prevent similar attacks. These revelations have prompted the development of barriers that are crash-resistant up to speeds of 50mph and use an anti-climb mesh to prevent further intrusions. As the solutions are flat-packed and can be earth-filled, they are an effective option for event security, minimising installation time and the impact on the surrounding environment.

Units can also be branded, so they remain inconspicuous and in line with an organisation s existing branding. New threats are presenting themselves every day. Organisations and urban spaces are aware they can no longer be just reactive in the wake of a hostile event. Precautionary measures are becoming increasingly advanced and accessible, and where public safety is concerned, you truly cannot put a price on it. Free Download: Securing UK borders: An examination of the implications of leaving the EU for UK border management. Recent tragic events in Manchester and London have, among other things, underscored the importance to national security of getting Brexit right. This report considers the implications of leaving the EU for the management of the UK s borders and making it as easy as possible for international business to thrive and legitimate movement to occur in a post-Brexit UK.

Click here to download now

SIA Training Courses at Courses Plus

SIA Level 2 Door Supervisor LEEDS1

Suitable for candidates who want to work in the private security industry and those who already work in the industry, but who need to renew, improve or update their skills….

Course type: Short Course delivered as classroom based Guide price: 199



Course type: Short Course delivered as classroom based Guide price: 135.00

Level 2 CCTV3

CCTV training is now available in several locations such as; Birmingham and many more. These locations have many dates for which you can take the course going all the way up to September 2016. This course is for anyone interested in securit…

Course type: Short Course delivered as classroom based Guide price: 180 – 210

SIA CCTV Training + SIA Licence – FREE4

Are you 19-24 yrs old and on JSA, ESA or Income Support? Fully Funded SIA CCTV training + SIA Licence! Call 0203 478 8496 (London) and 01772 378 979 (Lancashire)….

Course type: Short Course delivered as classroom based Guide price: FREE (Fully Funded)

Show me where this course is available

  • SIA Training Courses At Courses Plus

    Preston Technology Centre,
    Marsh Lane

    PR1 8UQ

  • SIA Training Courses At Courses Plus

    Boardman House, 64 Broadway, Stratford, London
    E15 1NT

Level 2 Door Supervisor5

The Door Supervisor Training is aimed for people looking to work legally in the UK Private Security Industry as a Door Supervisor in a Pub, Club, Music Events. The Door Supervisor Licence also allows you to work as a Security Guard for shop…

Course type: Short Course delivered as classroom based Guide price: 160 – 210

SIA Security Guard – Includes all fees, No hidden costs! – BOOK NOW

FREE re-sit until you PASS Help with EMPLOYMENT Quick RESULTS and CERTIFICATES…

Course type: Short Course delivered as classroom based Guide price: 130 (includes all registration and exam fees, no hidden costs)

Show me where this course is available

  • SIA Training Courses At Courses Plus

    Preston Technology Centre, Marsh Lane, Preston, Lancashire
    PR1 8UQ

  • SIA Training Courses At Courses Plus

    Boardman House, 64 Broadway, Stratford, London
    E15 1NT

CCTV (Level 2 Public Space Surveillance)7

The only course in the UK to be conducted from a live Shopping Centre Control room! Gain hands on experience while you train!…

Course type: Short Course delivered in house Guide price: 150.00

Level 2 CCTV8

CCTV training is now available in several locations such as; Birmingham and many more. These locations have many dates for which you can take the course going all the way up to September 2016. This course is for anyone interested in securit…

Course type: Short Course delivered as classroom based Guide price: 180 – 210

Door supervisor/security guard level 2 training course9

SainTs Training will prepare you for a rewarding and challenging career as a door supervisor, FREE re-sit until you PASS High Standard Training with our female instructors Quick RESULTS and CERTIFICATES……

Course type: Short Course delivered as classroom based Guide price: 150

SIA Door Supervisor Training + SIA Licence – FREE10

Are you 19-24 yrs old on JSA, ESA or Income Support? Fully Funded SIA Door Supervisor training + SIA Licence included FREE! Call 0203 478 8496 (London) and 01772 378 979 (Lancashire)….

Course type: Short Course delivered as classroom based Guide price: FREE (Fully Funded)

Show me where this course is available

  • SIA Training Courses At Courses Plus

    Preston Technology Centre,
    Marsh Lane

    PR1 8UQ

  • SIA Training Courses At Courses Plus

    Boardman House, 64 Broadway, Stratford, London
    E15 1NT


  1. ^ SIA Level 2 Door Supervisor LEEDS (
  3. ^ Level 2 CCTV (
  4. ^ SIA CCTV Training + SIA Licence – FREE (
  5. ^ Level 2 Door Supervisor (
  6. ^ SIA Security Guard – Includes all fees, No hidden costs! – BOOK NOW (
  7. ^ CCTV (Level 2 Public Space Surveillance) (
  8. ^ Level 2 CCTV (
  9. ^ Door supervisor/security guard level 2 training course (
  10. ^ SIA Door Supervisor Training + SIA Licence – FREE (

Home automation: A beginner s guide

Home automation has come a long way since the 1960s when British racing driver Stirling Moss fitted his newly built House of the Future in London s Mayfair with the latest gadgets. The extension of commercial heating, ventilation and air conditioning (HVAC) controls into the residential market alongside smart lighting and security solutions has since revolutionised the way home owners interact with domestic systems and appliances using an expanding combination of hardware, communication protocols and electronic interfaces. Certainly use of devices such as IP cameras for domestic surveillance systems, motion detection hardware, door opening sensors and remote controls have surged, though from a low base.

The ubiquity of wireless networks using Wi-Fi, Bluetooth and to a lesser extent ZigBee and Z-Wave in the home has also helped, providing the communications channel that devices, sensors and back end software systems need to transmit, store and analyse the information being collected. Security is the biggest are of demand amongst smart home users, with sales of connected cameras and remotely controlled door and window locks driving much of that usage. But the volume and diversity of deployments and applications is diverse, including connected white goods appliances (fridges, cookers, washing machines etc) alongside audio devices and entertainment hubs, lighting and heating controls, pet and baby monitors, and even products designed to automate the watering and monitoring of plant growth. Developments elsewhere may also have a galvanising affect, particularly the growth of the Internet of Things (IoT) which is forecast to connect over devices by 2020. This vast network of interlinked monitors, sensors, computers, controllers, switches and other industrial and consumer gadgets will collect and analyse information from systems as diverse as manufacturing, retail, transportation, automotive and agriculture. The considerable efforts being put into driving the IoT market by the likes of Cisco, Intel, IBM, Microsoft and other heavyweight information communications technology (ICT) companies will inevitably help to push home automation systems (a form of consumer IoT) into the spotlight. Barriers to adoption But while there is a strong feeling that the home automation industry stands on the brink of mass market adoption, significant barriers to its further development remain. The lack of interoperability between so many different devices, protocols, networks and applications continues to undermine user confidence, for example. Home owners also find systems difficult to use, a problem exacerbated by those incompatibility issues and a general lack of familiarity with home automation in general.

Though they have steadily fallen in price, home automation devices remain expensive and are likely to remain so until their popularity reaches a tipping point that will persuade large scale manufacturers to drive down costs further by producing equipment in higher volumes. Long device replacement cycles push suppliers to charge a premium for current deployments and make it difficult for them to build profitable businesses based on recurring revenue streams one reason why many seek to push consumers into managed services contracts wherever possible. Housebuilders are building smart heating controls and thermostats into new homes designed to give residents greater control over their energy costs, but retrofits on older properties remain more difficult and expensive and a thriving DIY market makes it difficult for professional installers to compete. The potential for cyber security breaches to cause disruption is finally starting to be recognised, if not necessarily addressed. But the biggest barrier is the technological fragmentation of the smart home ecosystem that involves so many different types of devices, networks and software systems, and needs them all to work together to deliver value to the house owner. Market adoption rates One analyst firm has gone so far as to predict that sales of home automation hardware, software and services will exceed US$78bn by 2022, with more conservative estimates forecasting US$20.78bn by 2020. As ever with analyst forecasts, there can be discrepancies of definition that tend to skew the numbers one way or another however, though research firm Gartner has predicted that the average home could contain as many as 500 smart devices by 2022. Much of that turnover will continue to be driven by the larger population base of the US and China, followed by Japan ahead of Europe and the UK which are collectively yet to show the same levels of enthusiasm. Figures from Statista suggest that the number of smart homes in the US will grow from 4.6m households in 2015 to 24.5m by 2020 for example, compared to 400,000 growing to 3.3m in Japan and 300,000 increasing to 2.1m in China over the same period.

Statista calculates Germany to be the single largest European market, with 300,000 smart homes last year growing to 2.4m by 2020 compared to 200,000 in the UK increasing to 1.5m in the same period. Key players Research published by CBInsights earlier this year suggests that a lot of venture capitalist funding is going into home automation start-ups such as Nest Labs. These now fight for market share alongside established industrial automation companies which have moved into the home automation space (Honeywell International, GE, Legrand, Siemens, ABB, and United Technologies Corporation, for example) but also home automation specialists such as Crestron Electronics, Savant and Control4. Technology giants such as Samsung, Google and Amazon are also coming to the fore, having spied parallel opportunities for mobile apps, devices and operating systems alongside information processing platforms that they can exploit. Flagship home automation products to date include the Nest smart home thermostats and cameras, Sonos music systems, GE s Z-Wave components and Samsung SmartThings Hub. Amazon s Echo and Google s Home voice activated smarthubs are also driving usage by delivering Internet connected, multimedia gadgets that can also be used to control smart thermostats and other devices. Free download: The video surveillance report 2017 Sponsored by IDIS The Video Surveillance Report 2017 covers all things video surveillance based on a poll of hundreds of security professionals.

Specifically looking at topics such as open platforms, 4K, low-light cameras, video analytics, warranties and this year due to the growing threat posed, the cybersecurity landscape.

Click here to Download now

Comelit s IP door entry system used for Battersea Power Station development

IFSEC exhibitor One of the UK s most iconic developments Circus West apartments at Battersea Power Station in London is using Comelit s IP video entry system. The first phase of the development comprises of 865 apartments at the Circus West site and uses Comelit s IP-enabled ViP entry system that sits on a shared network. The apartments are fitted with ICONA monitors.

More than 50 entrances are equipped with a mixture of 3one6 Sense flush-mounted panels, Vandalcom digital panels and Vandalcom single button panels. Help points have also been fitted in the carparks so residents can speak to the concierge/security office. The ICONA monitors in each apartment feature a 16:9 4.3-inch colour screen with capacitive, touchscreen and swipe activation. The 3one6 entrance panels feature LCD graphic displays, in 4mm mirror-finishes or brushed steel, and have a concealed loudspeaker. The network itself, supplied by Skanska Konnect, incorporates the site s access control system, as well as Comelit s video entry system, which consists of over 900 devices. Because it is IP-based, the system has no distance limitations and can provide an unlimited number of users with simultaneous video and audio communications. The on-site concierge is able to manage calls made from call points to apartments, and can call individual apartments. Residents can call the concierge via the intercom directory on their ICONA monitors, and can communicate with the other apartments via the same directory, which can be programmed by the installer on request. We are absolutely thrilled to have been chosen to take part in this iconic and exceptional project, said Francesca Boeris, Comelit s managing director.

With our emphasis on cutting-edge product design and aesthetics, we are proud to be associated with a development which showcases some of the best designers in the world. Comelit is exhibiting at IFSEC International between 20-22 June 2017 at London ExCeL. You will find them on stand G1150.

Get your free badge now. Visit Europe s only large-scale security event in 2017 Taking place in London, 20 22 June 2017, IFSEC International gives you exclusive hands-on access to over 10,000 security solutions, live product demonstrations, and networking with over 27,000 security professionals. Covering every aspect of security, from access control and video surveillance to smart buildings, cyber, border control and so much more.

Time is running out, register now to avoid missing out

The security of security is our top priority in the IoT era

With data protection laws being tightened and internet of things hacks proliferating, physical security vendors are talking a lot more about cybersecurity than they used to. For Genetec, whose systems are popular in the enterprise space and installed in 70% of airports in the Middle East, safeguarding systems against cyberattack is a particularly urgent priority. We spoke to Simon Cook, sales engineering manager EMEA and APAC, about the company s defining mantra: the security of security.

Genetec has just been confirmed as sponsor for Borders & Infastructure Expo, which debuts at IFSEC 2017 in June. IFSEC Global: Why is cybersecurity such a big priority for Genetec right now? Simon Cook: The security of security should be high on every physical security professional s priority list. A large part of this is the recent growth in DoS, or denial-of-service, attacks that took place last year, targeting internet of things devices from cameras to campus vending machines. But these things aren t new; DoS attacks have been happening since the start of the internet and cybercrime. The 21 st Century has been characterised by a large growth in the IoT. This is great for business efficiency and personal communication, but the more devices that come online, the more vulnerabilities there are for cybercriminals to exploit, especially seeing as pretty much everything can be connected to the internet these days even fridges! What we want to do is be sure that whatever is connected to our solutions via our customers networks is pure , or safe It s pretty terrifying when you think about the potential of DoS attacks, which is only growing with the number of connected devices. Think about it: when you get 1.5 million devices generating over 600-odd gig of traffic, aimed at a handful of organisations, the result is going to be quite a serious attack.

The world that Genetec operates in seems, on the surface, to be largely physical as we deal with CCTV, access control and automatic number plate recognition (ANPR) to name a few. But, it s important to recognise, which we do, that crime is moving away from the physical world and into the cyber. This is why the surveillance market should be thinking more carefully about security from a cyber threat angle, rather than purely from the physical. (Check out the latest solutions from Genetec at IFSEC International, 20-22 June 2017, London ExCeL. You can find Genetec on stand F500. Get your free badge now.) This issue is also now consumer as well as commercial. More and more we see people with cameras at home that can be turned into a node and hacked, which in a way is even more worrying as they will lack the awareness and training to ensure their devices are protected that professionals in the security industry have. What we want to do is be sure that whatever is connected to our solutions via our customers networks is pure , or safe. The vital thing is to work to continuously build up that level of security in response to the rapid development of cyber-crime. We call this the security of security .

We have a lot of high level enterprise customers so a lot of banks, airports, big businesses etcetera so access into their networks could open up some critical issues for customers. We need to make sure that whatever connects to our system does not open a door for potential attacks. embedded content IG: So what measures do you take to ensure connected systems are as robust against cyber-attacks as Genetec solutions? When we develop our software we ask ourselves the important questions from the outset to ensure our tech is secured against anything which may try to attack it. Penetration testing, regression testing, adding devices and having them tested is all part of the development of the software rather than relying on just reacting to cyber-crime by retrofitting after an attack. We ve done a number of regression tests on our software so we know our platforms are as secure as they can be. But, the cleverer you make the tech, the more sophisticated the attackers become so it is a constant battle. Another problem for us is that we want to be more open platform, so we don t just connect cameras but access control, body-worn cameras, other third-party systems. So, in the unified space, when we try to build up one holistic platform, we have to do a lot of testing to ensure we can still call ourselves secure.

The way we counter this is through authorisation, authentication and encryption. We start by using certificate-based authentication. This may sound complex, but if you use online banking, you have a certificate between yourself and the third-party so the browsers share certificates to verify you are who you say you are, and the banks are who they say they are. Some hardware we work with has a good level of security built in; some of the more traditional stuff is more legacy, and we have to compensate for these devices In terms of encryption, we used to use SSL. But, a quick google will now tell you that SSL can be hacked quite easily. There are even wiki pages about how to hack SSL within 20 minutes! So we had to evolve and now use TLS, or transport layer security, which is a cryptographic protocol that provides communications security over a computer network , which is much more advanced. The thing with hacking, it is company to company, person to person, government to government, and it can be used in many ways. It s not always just the case that cybercriminals want to break in and steal your information or credit card.

Sometimes DoS attacks aim to bring websites or companies down for a period of time. In the 50s, 60s and 70s we wanted to protect against bank robberies and attacks on people and property. But these days you can bring a company down without leaving your house. So, we have to get smarter. Some hardware we work with has a good level of security built in; some of the more traditional stuff is more legacy, and we have to compensate for these devices. I m sure you can see now why the security of security is something that always has to be top of mind for Genetec! The industry already has to collaborate to make sure these devices connect to each other presumably collaboration is just as important where cyber is concerned Absolutely. And it s not just between manufacturers. Whether it s end users, integrators or consultants, to a lot of our customers we are trusted advisors.

We don t just sell kit and software and then move on to the next customer, and there is a gap of knowledge in the industry for this level and kind of security. So we are trying to work with other manufacturers to collaborate with our systems integrators, consultants and end users so that best practice is followed. Genetec has always been very IT-focused and we work with IT departments too. We want everyone that works with us to know that they can trust our solutions to be secure, and that we can offer them advice on security if they ever feel any confusion or worry about the security of their technology. Many of our customers are more enterprise level, so you can see how a breach could not only put company data at risk, but even people s lives in some instances Is there any trade-off with convenience and the user experience when you tighten up cybersecurity? We try and make the system as user-friendly as possible. When we talk about certificates and TLS, it s all done at installation level. So the customer will work with one of our certified installers, who will be familiar with our product, and the operator shouldn t notice any difference to their user experience. They just type the username and password on their client machine and the security is all done on set up.

Once they are logged in, what they do and don t have access to has already been set up according to company policy. All the clever stuff happens under the hood. Cybersecurity is presumably a particularly high priority in critical national infrastructure? Of course, many of our customers are more enterprise level, so airports, train stations, cities, high end retail, mid-tier retail you can see how a breach could not only put company data at risk, but even people s lives in some instances. Airports, for example, are one of our largest sectors: at last count, 85 of the world s largest airports use Genetec systems, and 70% of all airports in the Middle East one of our fastest growing markets are protected by Genetec Security Center systems. As well as this, when it comes to urban security, we have worked with a lot of blue light services in city centres and they want us to do a lot of regression testing. This is not something we re doing just because it s a buzzword or because of the DOS coverage last year. It s to keep up to speed with developments to make sure we are in line with best practice. It goes back to building this into the core rather than being a retrofit after an event or attack.

And it s equally important to encourage our partners and customers to be vigilant. Now we re starting to look at cybercrime insurance. As more devices come online, there are more data points and we need to be more cautious about what we are adding to the system. We also need to continue our core precautions of regression and security testing to make sure that security devices don t expose holes into our customers networks. Presumably cybersecurity will be a big talking point on your stand at IFSEC 2017? This will all be very much a focus when our customers end users, integrators and consultants visit the booth. See you at stand F500! Check out the latest solutions from Genetec at IFSEC International, 20-22 June 2017, London ExCeL. You can find Genetec on stand F500.

Get your free badge now. Visit Europe s leading security event in June 2017 Register here to attend IFSEC International where you will be able to take advantage of our meetings service, allowing you to select and meet with the manufacturers you want to see and with 600 companies exhibiting you are not short on choice. There are also discounts of up to 20% across a large range of products at the show, helping you to get the best value for your money.

Click here to register your place now to join us at London Excel on 20 22 June 2017.

BA (Hons) Security Consultancy

Is this course for me?

BA (Hons) Security Consultancy

This programme is suitable for those who aspire to become qualified and capable security consultants. It is designed for employees who are currently working in, or have the potential to work in, a key role
with responsibilities for ensuring that security protection is incorporated into operations and organisational functions. Alternatively, you could have experience and skills in security consultancy or management as a generalist or specialist.

We welcome mature students who have not been within a formal education system for some time or graduates from other relevant programmes who wish to continue their professional and academic development.

What will this course cover?

We have designed this course to provide prospective and practising security consultants with a range of skills and knowledge in order to be able to operate with confidence within the security sector. Our aim is to blend the academic framework for consultancy practices with the security needs and requirements for today’s businesses. It will also allow you to develop
your advisory, technical, business, communication and management skills

From an initial focus on the more fundamental elements of security processes, the programme will address the requirements for project planning and management skills and knowledge, before moving towards the development of strategic and other essential functions.

You will benefit from using our virtual learning environment (VLE), which will help you to fit in your studies around your personal and professional commitments and study at times that suit you. This programme is eligible for funding under the Ministry of Defence Enhanced Learning Credits (ELC) scheme. Our ELCAS number is 1682.

Attendance and Personal Study

You will be expected to allocate up to 20 hours a week for self-directed study.

Avigilon video surveillance solutions: A brand profile

The first and only CCTV hardware developer to take resolution into the 7K realm, Avigilon is a highly respected video surveillance company headquartered in Canada. History Avigilon is a Canadian company that specialises in the development, design and sale of video surveillance and management, access control and video analytics solutions. Founded in 2004 it posted its first EBITDA profit in the financial year ending 31st December 2009 (FY9) and floated on the Toronto stock exchange in 2011.

Avigilon has since invested heavily in its domestic and international expansion. It acquired access control company RedCloud Security for US$17m in 2013, followed by video analytics specialist VideoIQ for US$32m in 2014, and the patent portfolio of video analytics firm ObjectVideo for US$80m in 2014. Market position An aggressive business strategy has delivered considerable financial return and Avigilon remains one the largest players in a global security and surveillance market within which no one supplier is estimated to hold more than 6% share. Avigilon s turnover has grown at a compound annual growth rate (CAGR) of 71% over the last 9 years to reach US$354m in FY16, yielding adjusted EBITDA of US54m. Target verticals include retail, banking, education, casinos, critical national infrastructure (CNI) and transportation, with high profile customers including Miami Dolphins Hard Rock Stadium, the Universities of Tennessee and Sydney, King Abdulaziz International Airport in Saudi Arabia, the City of Pittsboro and the Old Bailey in London. embedded content Latest technologies Avigilon s flagship Control Center network video management software is now in version 6.6 having been regularly updated to support emerging security and surveillance hardware. The company also delivers a range of HD cameras, recorders and edge solutions with a particular emphasis on providing big megapixel IP cameras with embedded video analytics solutions. Its latest hardware includes cameras with multiple sensors and individually configurable camera heads that provide several viewpoints from a single platform to minimise blind spots. Avigilon also introduced 6K 24MP and 7K 30 megapixel HD cameras as well as 4k (8mp) and 5K (16pm) cameras in 2015.

The company has invested a lot of time in the development of innovative self-learning video analytics. It recently launched a deep learning AI search engine (Appearance Search) able to search hours of video footage to find specific persons of interest across multiple cameras, tracking their route and last know locations. Elsewhere a partnership with security firm G4S involves an 8 week trial of video analytics to prevent smuggling in UK prisons, tracking the movement of people at the prison s perimeter who often throw drugs and other contraband over prison walls. embedded content Avigilon and installers/integrators Avigilon s sales and distribution model is based on a business to business (B2B) rather than business to consumer (B2C) model that relies heavily on a large network of installers, resellers and systems integrators in Canada, US, UK, EMEA, Asia Pacific, and Latin America. UK installers include Contact Security, API, iFacility, Amax, Sonic Security Services, Eclipse (IP), Vuetek, AlertSystems, Advance Security and iC2. Rather than selling direct, Avigilon s own sales staff work with those partners to develop security and surveillance solutions which are tailored to individual customer requirements in its key industry verticals. The company runs an extensive global partnership programme that offers various incentives to its partners, including silver, gold and platinum certification; co-branded sales and marketing material; and access to market development funds and financial rebates. Visit Europe s leading security event in June 2017 Register to attend IFSEC International where you will be able to network with over 30,000 of your industry peers, meeting new suppliers and gaining access to the latest and best security products to hit the market, helping you gain a competitive advantage over your competitors. You will also be able to get hands on to test and trial the latest technology at the Installer World Zone, which is sponsored by Risco Group , so that you can select not only the best priced products but you will be confident that it works for you.

Click here to register your place now to join us at London Excel on 20 22 June 2017.