security

S2 Security launches S2 Magic Monitor version 5

Unified security management S2 Security has launched version 5 of S2 Magic Monitor, which brings access control and video surveillance together with forensics, digital signage and real-time data feeds into a unified interface. New features Dynamic cells. Customise Magic Monitor to meet specific operational requirements and program with dynamic content such as interactive floor plans.

Follow events on screen by navigating through between and through various cameras. Supports touch screen-capable, responsive digital signage for general use throughout the enterprise in public areas such as lobbies and cafeterias Enhanced S2 NetBox access control and event monitoring system integration . Userw can view S2 NetBox systems and portals, drag and drop portals into Magic Monitor cells to view access history with photo identification and momentary unlock directly from the portal cell Extra third-party video management system support Now supports video management systems from Avigilon (Control Center 5 and 6), Milestone (2014, 2016 and 2017) and Tyco (exacqVision) S2 Security says Version 5 brings more advances than ever, allowing users to create maps, floor plans and command panels with amazing ease, says John L Moss, CEO of S2 Security. New support for Avigilon and Milestone 2017 video servers makes Magic Monitor a truly universal user interface for video surveillance applications. Availability S2 Security-certified integrators can already download version 5 via S2 Support Central. Visit the website to find out more. About S2 Security S2 Security Corporation specialises in IP-based access control, video management and mobile security management systems.

Products, which include S2 NetBox Series, S2 NetVR Series, S2 Magic Monitor, S2 Global and S2 Mobile Security Officer, are pitched to premises and businesses of all sizes, from small offices to global corporations with multiple sites.

S2 solutions operate on an open platform and support access control, video surveillance, alarm monitoring, temperature monitoring, intercom and digital signage.

Manned Guarding – Andron Facilities Management

You are here: Home > Security > Manned Guarding12

Manned Guarding

Manned Guarding - Andron Facilities Management

Andron can supply any number of trained security guards, for any setting and for any length of time. When building up a team, we take into account the operational nature of a client’s business to ensure we provide the most appropriate solution for the specific location whether it is standard or more specialised. The security we provide fits seamlessly into a client’s existing infrastructure, resulting in an amalgamated, responsive service and personnel who know their role. Extensive induction training, regular refresher courses and the continuous identification of skill gaps against role requirements and legal compliancy delivers a team equipped with relevant, practical abilities. Sometimes, a particular setting requires a certain type of security personnel and we are experienced in finding the right person for the individual needs of the business. In security, one size does not fit all and we always bear this in mind when matching security guards with clients. Andron’s team of security experts work hard to protect not only the premises they work in, but the reputation of their clients too. Our security guards act at all times as ambassadors and every individual is well-presented, well-mannered and well-trained. We understand our duty to protect the wider community and we train and encourage our security guards to be vigilant at all times when dealing with the public.

We recognise that our teams can retrieve vital information and use this to help protect our cities and communities. We are pleased to say that we partner with the police and key organisations as part of Project Griffin. Our involvement includes the gathering and sharing of intelligence to assist counter-terrorism and crime prevention.
Andron’s security personnel are licenced by the Security Industry Authority (SIA) and we are proud to be in the ACS’s top 5 per cent of accredited suppliers through its Approved Contractor Scheme (ACS).

References

  1. ^ Home (www.andron.co.uk)
  2. ^ Security (www.andron.co.uk)

UK government issues cybersecurity guidelines for connected cars

Cyber The Department for Transport has published cybersecurity guidelines for manufacturers of smart or connected cars. Written with help from the Centre for the Protection of National Infrastructure, the principles implore everyone in the automotive supply chain to collaborate during the design process and over software upgrades and maintenance long after cars hit the road. The authorities are concerned about the prospect of older vehicles running outdated software.

As cars become increasingly automated and ultimately, driverless the stakes will rise. Last year ethical hackers managed to wrest control of a Tesla Model S while the car was moving and slam on the brakes (see how they did it in the video below). Attacks can even inject malicious code into the electronic control units (ECUs) and controller-area-network (CAN) bus, which control critical systems such as electric steering and braking. Mark Noctor, VP EMEA, Arxan Technologies The eight principles, which were launched by transport minister Lord Callanan, follow: Organisational security is owned, governed and promoted at board level Security risks are assessed and managed appropriately and proportionately, including those specific to the supply chain Organisations need product aftercare and incident response to ensure systems are secure over their lifetime All organisations, including sub-contractors, suppliers and potential 3rd parties, work together to enhance the security of the system Systems are designed using a defence-in-depth approach The security of all software is managed throughout its lifetime The storage and transmission of data is secure and can be controlled The system is designed to be resilient to attacks and respond appropriately when its defences or sensors fail embedded content Connecting to WiFi and external devices via Bluetooth, Modern cars are increasingly smart . The communications and entertainment systems are particularly vulnerable to attack, and can be reverse engineered to access the API libraries that facilitate data sharing between systems, says Mark Noctor, VP EMEA at Arxan Technologies. From here attacks can even inject malicious code into the electronic control units (ECUs) and controller-area-network (CAN) bus, which control critical systems such as electric steering and braking. Preventing application code from being accessed and tampered is one of the biggest priorities in protecting a connected vehicle, and it is encouraging to see the government s guidelines specifically list the ability to protect code and ensure its integrity as key principles. Manufacturers must deploy code hardening measures to prevent attackers from accessing their source code and removing vital data such as cryptographic keys which can be used to access other systems. Anti-tampering measures should be hidden in the code to alert them if the code has been changed, and prevent systems from starting if alterations are detected.

The government announced the Autonomous and Electric Vehicles Bill, which will allow innovation to flourish and ensure the next wave of self-driving technology is invented, designed and operated safely in the UK , during the Queens Speech in June. The outcome of recent efforts by the US government to engage with US automakers over the issue do not augur well. Asked by a Senate committee if they supported mandatory privacy and safety standards, executives from Google, General Motors, Delphi and Lyft were evasive. Free Download: the Cyber Security Crashcourse This report contains 40 slides packed with insight into the trends shaping the industry and how you can protect yourself. Eric Hansleman from 451 Research presents a rapid-fire overview of cyber security.

Click here to download now

5 things you may not know that your video management system can do

If you ve visited any of the major security trade show this year, such as Intersec, ISC West or IFSEC International, you will have no doubt seen some of the latest video management systems (VMS). But what does a next generation VMS offer you over and above your incumbent system and is it worth upgrading? Here are five things you may be surprised to know a next-generation VMS is capable of: 1.

Gain access to more video sources without adding more cameras Typically, the primary source of video for the control room are fixed surveillance cameras, but this is beginning to change, with advances in mobile devices and dedicated applications developed for the security industry. Today, it is possible employees (and even citizens) to transmit video from mobile devices to the control room in real-time, from anywhere. In essence, you are adding a whole new sensor to the security system without investing in a single piece of hardware, as the devices are already there!

2. Add new video analytics applications with ease Video analytics applications have been in use for a long time, but earlier versions bear little resemblance to the powerful analytics solutions that can be integrated within the latest VMS . They are evening embracing cutting-edge advances in artificial intelligence and machine learning. One such example is ability to make video searchable and in turn reduce the time taken to locate and track person/s of interest from hours to minutes. The time when it will be possible to search for specific items, colours, movement and even the detection of risks through leading indicators is not far from becoming a reality.

3. Save on upgrading to a full-blow PSIM solution PSIM and situation management systems have a vitally important role to play for many organisations, but others simply want to better manage their security operations, and would benefit substantially from some of the capabilities inherent within PSIM systems. This is one of the major advantages of next-generation VMS. You can integrate and centrally manage the core security systems access control, intrusion detection, fire and of course video (the hallmark of every good VMS). However, in addition it can be extended with incident management capabilities, giving a greater degree of situational awareness that in turn makes decision-making and incident response far more effective and consistent.

4. Control PTZ use case In addition to receiving video from mobile devices, it is also possible to push important information from the control room out to the mobile devices of field personnel, responders and other stakeholders. A mobile application that is bi-directional and fully integrated with your VMS allows control room operators to share live and recorded video, delivering what they are seeing in the control room out to those on-site attending to the incident.

5. Integrate video feeds from drone mounted cameras Drones have become hot property and rightly so (having their very own Drone Zone at IFSEC in London last month). A VMS can distribute video feeds from drones in real-time, providing responders and operations teams with surveillance footage that would be impossible to get unless an aircraft was on site.

Free download: The video surveillance report 2017 Sponsored by IDIS The Video Surveillance Report 2017 covers all things video surveillance based on a poll of hundreds of security professionals.

Specifically looking at topics such as open platforms, 4K, low-light cameras, video analytics, warranties and this year due to the growing threat posed, the cybersecurity landscape.

Click here to Download now

Power-over-Ethernet advice issued to security installers by Dycon Power Solutions

Power supply developer Dycon Power Solutions has issued the following guidance on the pros and cons of using Power-over-Ethernet (PoE) to drive security devices. The guidance is aimed at specifiers and installers of security systems. What is Power-over-Ethernet (PoE)?

Put simply, it is the ability to provide a certain amount of power to drive local peripherals over existing network cabling removing the need to provide separate power supply units adjacent to those devices. Why is this good news for the security industry? Imagine how much easier, and cheaper, an installation would be if you didn t have to fit 230vAC spur points all around a site simply to power the PSUs that are required just to power peripherals such as intruder detection devices, CCTV cameras, access control readers, in fact, anything that needs 12Vdc or 24Vdc. If you are running a network cable to a device you don t need any other power, the same network connection can give you up to 35W, more than enough to power most cameras and many other devices Any other benefits? If you have to move a device because of building alterations, or because the risk has changed, with PoE all you do is move the network cable, no need to search for a suitable location to pick up 230vAC! If you are using the PoE to drive Point-of-Sales equipment, like cash tills, this can mean a rapid refit rather than a point out of commission for days But be careful, you can easily select the wrong PoE solution! You will find many products including switchers and controllers that will tell you that they are PoE-enabled, but you need to check, carefully, the actual power delivered or you may find that you don t have enough available to drive all your devices! Installers often find that a system that claims it can power eight or twelve devices actually struggles to cope with even half that! To be really sure, choose a mid-span solution Equally, it is important to note that standard PoE delivers only 15W per channel, is that really sufficient to drive what you are connecting?

Higher-powered, Mid-Span PoE units, ones that conform to IEEE802.3af and IEEE802.3at PoE PLUS, deliver a useful 35W per channel, more than adequate for most security applications. All Dycon PoE units conform to this higher specification. The savings don t stop there though! All Dycon advanced power supply units, including the D1800 PoE range, use switched-mode technology which is the greenest solution available offering over 85%-90% efficiency as opposed to less than 30% with most traditional linear power supply units. What does that mean in real terms? On a 1A 12Vdc power supply, you could save nearly 121KW p.a by using a switched mode equivalent. For the end user that could mean, if you are paying 14p per KWh, savings of up to 17 p.a. in electricity charges. Now multiply that by the number of PSUs that you are using and you can see the savings start to mount up, and will continue to grow as energy costs rise.

The Dycon D1800 PoE range uses the same advanced switched mode technology as the Dycon stand-alone PSUs so these cost savings can also be achieved across your networked devices. Dycon D180X PoE range features Perfect for IP network based cameras (fixed or PTZ), access control systems, POS terminals, IP phones and other IP devices: Available with 4, 8, 12 and 16 ports (see above) 35W simultaneous outputs across all ports Simple and cost-effective way to provide power for IP peripherals Simple plug-in installation with 2 x RJ-45 input/output connectors per port Efficiency higher than 85% at full rated output Unmanaged outputs mean that no programming is required to choose the best path Work with all switchers and controllers Free download: The video surveillance report 2017 Sponsored by IDIS The Video Surveillance Report 2017 covers all things video surveillance based on a poll of hundreds of security professionals. Specifically looking at topics such as open platforms, 4K, low-light cameras, video analytics, warranties and this year due to the growing threat posed, the cybersecurity landscape.

Click here to Download now

Longest-ever civilian drone flight recorded beyond the line of sight

British record The condor drone about to take off FlyLogix, a specialist in long-range drone flights to offshore installations, says it has conducted the farthest, beyond-line-of-sight civilian drone flight ever recorded in the UK. On 17 July, a Condor Drone took off from Blackpool Airport and managed an 88km round trip to an inspection of an unmanned platform in Morecambe Bay on behalf of oil and gas operator Centrica. The drone relayed detailed infrared imagery from the flight.

FlyLogix, a start-up based in Chichester, also collaborated with the Civil Aviation Authority (CAA), Blackpool Airport and other air space users before the trial. The use of drones in remote or dangerous locations negates the costs and risks associated with deploying human personnel into such scenarios instead. This is a major milestone for FlyLogix as we showcase the significant benefits of our long range offshore drone service, and ultimately demonstrate the future of offshore inspection and logistics, said FlyLogix Chairman Charles Tavner. We are grateful for the support of the CAA, Centrica, Blackpool Airport and other air space users, to ensure the success of this record service. FlyLogix is uniquely placed to deliver this service. We have clearly shown the track record, the technology and industry knowledge to complete these operations. We are extremely excited about rolling this service out more widely, and the future prospects of FlyLogix as the trusted service provider. Top priority Despite rapid advances in drone technology, constraints on flight duration limit the range and scope of applications. Commercial drones can typically fly continuously for only about 25 minutes.

Developing batteries that are lighter, higher capacity and less hazardous is a top priority for the industry. Condor drone comes in to land There are also restrictions on beyond the line of sight operations, which are banned over populated areas in most developed countries. However, more latitude is given for offshore and other remote deployments. The UK government has just announced plans to introduce mandatory registration of drones and safety awareness courses for pilots of drones weighing more than 250g. A 2016 report from PriceWaterhouseCoopers projects that the security drone market will be worth $10.5bn ( 8bn) by 2020, surpassed only by infrastructure, agriculture and transport. Our recent Security Drones Report 2017 -(sponsored by Aviat Drones) revealed that 16% percent of respondents mostly comprising security professionals, heads of security and other senior executives say they already deploy the technology. A total of 60% either already use drones or can foresee themselves doing so eventually, with only 16% indicating that they probably won t ever need drone technology for any security application , the other 24% admitting that they don t know enough about the technology to commit either way. Free Download: The security drones report 2017 PriceWaterhouseCoopers have forecast that the global security drones market will be worth $10.5bn ( 8bn) by 2020, surpassed only by infrastructure, agriculture and transport. This report commissioned by Aviat Drones examines the prevalence, growth prospects, applications and regulatory challenges of drones and anti-drone tech in the global security market.

Click here to download now

The official body-worn camera supplier for UK prisons on industry trends, VideoManager and VideoTag series

Edesix is a big player in the burgeoning body-worn camera market. Indeed, it is the official body-worn camera provider for the UK prison service and has said that 2016 was its best-ever year for contract wins. On the product development front, Edesix has already launched a series of head and torso-mounted body-worn cameras as well as the small, discrete VideoTag series.

in 2017. IFSEC Global recently spoke to Richie McBride, the Edinburgh-based company s CEO, about Edesix s direction of travel, its latest products, the future of body-worn video and its recent presence at IFSEC 2017. Richie McBride IFSEC Global: Where is Edesix positioned in the body-worn video (BWV) market? What are your USPs? Richie McBride: Whilst Edesix have a comprehensive range of BWV solutions to meet the needs of our customers across a range of different industries, Edesix prides itself on the back-end solution developed to meet the needs of our customers, and we believe this is what makes our solution unique. Our VideoManager software is the most advanced BWC management software on the market and, paired with our smart networking options, Edesix s full BWC solution means that rolling out any number of body cameras, from 1 to tens of thousands, is efficient and futureproof. VideoManager has all the security features expected of a video management software fit for police and criminal justice. It ensures access to video footage is limited to correct user profiles, utilises encryption keys so only authorised users can access footage from cameras, and provides a full audit trail of each piece of video captured. embedded content In conjunction with this, by utilising our various hardware products such as EdgeControllers, DockControllers and RFID readers, efficient, fast and secure use of pooled cameras from multiple locations is simple, speeding up deployment times and minimising the amount of training required.

We work with all our customers to ensure that the roll-out of their BWCs is suited to their needs, operational workflow and staff routine. We pride ourselves on meeting roll-out deadlines, and have a fantastic track record of on-time roll-outs (eg PSNI and HMPS). Most recently, Edesix has launched ONStream, a gateway product which allows users of our cameras to integrate footage directly to any ONVIF-compliant VMS in short, you can watch live BWC footage alongside fixed CCTV, complementing the static video with video and audio from the perspective of a wearer on the ground we believe this to be an industry first, and are proud to be working with market leaders such as Milestone and Genetec. IG: What was the thinking behind the launch of the VideoTag Series? RM: Our VB-300 series of BWC has been successful within the security market, but having worked closely with VMS integrators, we found that there was a need for a camera which acted in the same way as the VB-300 (with Wi-Fi capability, VMS integration, and high-quality audio/video) for non-security users who didn t require full-shift recording and at a lower price-point, with a smaller footprint. The VT series evolved from this requirement to provide non-security staff with the same protection and recording abilities, without the requirement to record regularly and continually. The VT-50 incident recorder has been designed to be worn for up to 3 months on stand-by, without charge, and requires minimal training and intervention from the wearer if an incident occurs, simply press record and the footage will automatically stream or offload. We believe that VideoTags work well both independently and as a complementary security product. On its own, it provides the wearer with the protection of any BWC, and captures evidential quality footage for reasons such as criminal prosecution, proof of actions taken etc.

However, the VT is also perfect as an incident response tool, and for gathering a full picture of events. With multiple staff wearing VTs, in conjunction with CCTV and/or VideoBadges, if a major incident were to occur, multiple viewpoints could be collated in real-time to assess threat and provide adequate response. IG: To what extent can you and do you help customers navigate the regulatory and political hurdles when it comes to deploying what remains a fairly new technology? RM: We will always work with our customers to ensure that their questions around regulation are satisfied, and that their use of BWCs is suitable for their industry and requirements. None of our cameras are covert or designed for hidden use. Our cameras are configurable to allow approved users to switch on/off LEDs or notification-tone alerts when the cameras are recording to suit regulations. We also offer the ability to turn off either the video or audio record function, as required by some industries. As previously stated, our VideoManager software comes with a multitude of functions, which ensure that the identity of those on cameras is protected (we offer advanced redaction tools for this). VideoManager allows for multiple user levels, ensuring that footage is only viewable by authorised users, and of course our iconic ID badge on most of our cameras ensures that those faced with a VideoBadge know that there is the potential of being recorded.

IG: How do you see the BWV market evolving over the next 5-10 years? RM: As an industry, we re only just scratching the surface of the BWC marketplace currently. Over the past few years we ve seen a shift in confidence as trial deployments become full deployments, and industries such as police, prison services and emergency services wholeheartedly adopt the technology. We believe that the popularity of BWCs will grow further within these markets, with all public-facing workers wearing recording devices as standard, and the sophistication by which they re deployed and managed will improve. However, as the introduction of the VideoTag and ONStream shows, we also believe in BWCs as wearable CCTV, and see a growing market here for incident recorders, especially within the retail, education and airport/airlines markets. IG: You recently exhibited at IFSEC International 2017? How did it go? RM: We had a very successful show at IFSEC 2017. This year we had presence on three booths; our own, Milestone and Dell.

We felt that this was the perfect balance for us, as we were able to promote our new VMS-integration solutions with our partners, whilst maintaining our own identity on the Edesix booth. While we re still working through our leads from the show, I think we can safely say that it was a positive event for us. Free download: The video surveillance report 2017 Sponsored by IDIS The Video Surveillance Report 2017 covers all things video surveillance based on a poll of hundreds of security professionals.

Specifically looking at topics such as open platforms, 4K, low-light cameras, video analytics, warranties and this year due to the growing threat posed, the cybersecurity landscape.

Click here to Download now

How to keep your entertainment venue safe following terrorism

Hospitality industry In the wake of recent terror attacks, venue security has never been more paramount. This coupled with the increase in venue closures has led to a sense of sadness within the industry, however in times like this we must remember the positives; the provision of safe places with security, medics on standby, regulated drink sales and curfews. When Fabric was forced to close in September 2016 it was a decision made in the name of the war on drugs, with Islington Council, supported by the Metropolitan Police, moving swiftly after the deaths of two clubbers there in the space of nine months.

Club closures Closing venues like Fabric, which thankfully was reprieved, will not stop clubbers taking drugs. While Fabric survived, there is a long and depressing list of London venues that have closed in the past decade half of the capital s clubs have shut in that time. Make no mistake, this situation is a threat to London s status as a world-class culture hub with a 24-hour nightlife. When the Night Tube service was launched there was great excitement, but you wonder where all these trains will be taking people in a few years time. When these venues close, it s not simply a case of replacing them with something else. Fabric, along with countless other clubs, has its own rich history and identity, something you can t just replicate somewhere else. Avoiding licensing issues There are steps venues can take to avoid falling foul of the licensing committees. We work as closely as we possibly can with the local authority and the Metropolitan Police because dialogue and sharing ideas is a much more healthy approach than clashing over regulations. I m proud of what we achieve at Troxy every day.

We provide a safe, secure venue in the heart of one of the world s biggest and most vibrant cities which helps people create new experiences, discover new music, create new memories and simply live life. When it comes to venue security, the tragic bombing at Manchester Arena caused most venues to reflect and review their security measures. Even before then we had taken steps along with other major venues and festivals to put counter-terrorism measures front and centre of our security policies. Strong police relationship Our relationship with The Met is strong, and we have ongoing conversations with them which includes swapping information before and after events. This allows us to be kept in the loop with regards to the very latest security information and flag up any events the police might have concerns about. The police offer a great service in the form of Project Griffin their counter-terrorism training programme, something we ve put our entire senior management team through. It s free and is aimed at deterring and detecting not just terrorist activity, but crime as well. We work hard to identify potential problems before they might arrive, and we re mindful when liaising with promoters who want to bring artists or shows to Troxy that there might be potential risks. Bringing venues closer together However, amidst all the sadness that these tragic events created, events such as venue closures or terror attacks have helped make our industry stronger.

These horrific events have brought venues closer and helped created a greater sense of community as the industry pulls together to support one another and ensure everyone who steps through our doors is kept as safe as possible. We can t speak for other venues, but this heightened threat level has ensured we re constantly reviewing our security measures to make certain they match the heightened threats. The events industry is brimming with innovation, creativity and is always pushing boundaries to enhance the experience for artists and guests. I do believe other industries can learn from what this industry achieves every year. Our practices around entry and exit, security and safety are constantly evolving. At Troxy we re used to holding multiple shows in one week, all of which present different challenges. From a sold-out drag night to a rock gig, we host events of all shapes and sizes and approach each of them with the same vigilance and care. In the end, it s all about the people who come through our doors. We want them to have an incredible night and create great memories that will stay with them forever, but we must also ensure we create a safe, problem-free experience as well.

This article was first published on our sister site, SHP Online. Free download: The video surveillance report 2017 Sponsored by IDIS The Video Surveillance Report 2017 covers all things video surveillance based on a poll of hundreds of security professionals. Specifically looking at topics such as open platforms, 4K, low-light cameras, video analytics, warranties and this year due to the growing threat posed, the cybersecurity landscape.

Click here to Download now

SIA training Norwich

4 SPACE LEFT 30DAYS REMAINING 4DAYS DURATION

Door Supervisor – Norwich

Location Address: Norwich Hotel, 116 Thorpe Road, Norwich NR1 1RU

Training Provider: Delta Training

Mike Tennent of Tavcom Training wins posthumous industry contribution award all winners revealed

BSIA Awards The late Mike Tennent has been honoured at this year s BSIA awards ceremony. Mike, who sadly passed away in May, founded Tavcom Training in 1994 and built what is now widely recognised as the leader in training provision for physical security systems in the UK. The company has an increasingly global footprint too.

With the help of local partners, Tavcom courses are now available to students in Dubai, Ghana, Singapore, Kuwait, Oman, South Africa and the US. IFSEC Global also recognised Mike for his lifetime of positive influence in the security industry in our latest Top 50 influencers in security & fire 2017. The awards were handed out at the BSIA Annual Luncheon at the Grand Connaught Rooms on 12 July.

It is a huge pleasure to formally recognise the contributions of this year s winners, all of whom have made a lasting impression on the security industry through their dedication, commitment and passion, said Dirk Wilson, director of Sector Security Services Ltd and the BSIA s Police and Public Services Section Chairman.

Find out who won the other awards below: Chairman s Awards Contribution to the Industry: Mike Tennent, Tavcom Training Contribution to Standards: Tim Geddes, former chairman, BSIA s security systems section Contribution to the Community: David Cain and Fiona Noble, Sword Security NI Contribution to Training: Lucie Banham, Banham Group Contribution to Exporting: GJD Manufacturing Security Personnel Awards Service to the Customer Special Commendation: Phillip Hillman, Mitie Total Security Management Runner Up: Winston Cooper, Mitie Total Security Management Overall Winner: Tom Lewis , The Westgrove Group Outstanding Act Special Commendation: Charles Stewart, SecuriGroup Services Runner Up: John Atkins, Vision Security Group (VSG) Overall Winner: Megin Dorrian, The Westgrove Group Best Newcomer Special Commendation: John Moore, Robinson Services Runner Up: Erin Jackson, SecuriGroup Services Overall Winner: Simon Searle, Vision Security Group (VSG) Best Use of Technology Special Commendation: Jason Thomas , The Westgrove Group Runner Up: Steven McKenzie, SecuriGroup Services Overall Winner: Andrew Horner, Kings Security Systems Best Team Special Commendation: JLL Bridgewater Place, Vision Security Group (VSG) Runner Up: North Bristol Trust Southmead, OCS UK Ltd Group Overall Winner: Union Square Security Team, Vision Security Group (VSG) Apprentice Installer Awards Overall winner: Corrie Stewart, Connelly Security Systems Joint runners-up: Callum Walker and Craig McAdorey, Kings Security Special Awards for Outstanding Service Daniel Hennell & Paul Cockerham, CIT drivers, G4S Cash Solutions (UK) Ltd (Inaugural) Security Business Awards International Partnership Award: Concept Smoke Screen Ltd (Special commendation: GJD) Environmental Award: Printwaste Recycling & Shredding (special commendation: Magenta Security Services) Innovative Security Project of the Year Award: CSL, for the CSL Connected project