Security Guarding Services

We devote extensive time and resources to hiring, training, developing and retaining our security officers to achieve a high level of service. Our security officers are certified and kept abreast with the latest security developments.

Security System Integration

As an expansion of our security guarding services, we commenced offering a wide range of security systems and solutions to provide protection of people, premises and assets to our customers in 2017.

Security Guarding Services

Licensed by the Police Licensing Regulatory Department

As part of our security guarding services, the Group supplies security officers to provide unarmed guard and patrol services to our customers.

Our security officers may be deployed for various operations or security needs:

  • Event Security
  • Commercial Security
  • Security for Industrial Premises
  • Security for Residential Premises
  • Security for Governmental Sites

01.

Supervised by Senior Security Team

Our security officers are under the supervision of a senior security team comprising an operation director, an operation manager and operation executives. The members of our senior security team are either former Singapore Police Force personnel or Singapore Armed Forces military servicemen.

02.

Certified and Kept Abreast with the Latest Security Developments

We devote extensive time and resources to hiring, training, developing and retaining our security officers to achieve a high level of service. Our security officers are certified and kept abreast with the latest security developments.

We are certified to bizSAFE Star Level 3 by the Workplace Safety and Health Council for complying with the requirements in the WSH Act and its subsidiary legislation. The Group is also a member of Security Association of Singapore.

Security System Integration

As an expansion of our security guarding services, we commenced offering a wide range of security systems and solutions to provide protection of people, premises and assets to our customers in 2017.

Wide Range of

security systems and solutions

We customise, source, integrate, install, implement the security tools and technologies required by our customers and provide the necessary training for the use of the security system.

Additionally, we provide services for the regular maintenance of security systems. The key security systems and solutions that our Group offers are as follows:

Remote Video Surveillance

Remote video surveillance systems refer to tools and technologies to enable the visual monitor of designated areas from a remote location. A basic remote video surveillance system comprises a video camera to acquire and capture video images and a monitor to which the live feed of the images are transmitted to (such as CCTV system). Based on our customers’ needs and requirements, video monitoring can be carried out at our customers’ premises by their own security officers, or our Group may offer remote monitoring services, where video feeds are delivered to our Group’s command centre and monitored by our own personnel.

Communication

Communication systems offer one-way communication, such as public address systems or two-way communication, such as audio/video intercoms and conference systems. Communication systems are usually use in conjunction with video surveillance systems and other security management systems to facilitate real-time communication so as to enable the coordination of personnel and events so as to prevent or manage security risks or malicious activities.

Physical Access Control and Intrusion Detection

Physical access control refers to technologies and tools which are deployed to prevent, restrict or limit physical access to a controlled designated area. Physical access control systems using technologies include biometric control systems (such as fingerprint scanners), access cards systems (such as contactless smart cards) and facial recognition tools to control or restrict the ingress and egress of selected persons to and from controlled areas.

Intrusion detection systems are systems which enable the monitoring and detection of physical access or breach into a restricted designated area, for instance with the use of contact or motion sensors or pressure detection systems Each of these intrusion detection systems send off an alarm or signal to an administrator or security management system when the appropriate trigger is set off.

Centralised Security Management

A centralised security management system involves the integration of various remote video surveillance, communication and physical access control and intrusion detection systems into a unified interconnected system. This allows the various security systems to be managed and controlled under a central system rather than operated as independent systems. Security management systems can be designed to automate the monitoring of security risk to reduce the reliance on security personnel. For instance, a central security management system can be setup to receive and process triggers arising from a security breach, such as intrusion or breach of a controlled area, and automatically determine the next course of action, such as alarming the appropriate in-house security personnel, or to alert external security contractors or the police, or to set-off an alarm.

This website uses cookies in order to offer you the most best experience. Please accept cookies for optimal performance.