Ademco Security Group

Last updated
Ademco Security Group
IndustrySecurity technology
PredecessorAdemco Far East PLC
Founded1977
Headquarters
Singapore
Area served
Southeast Asia
Website ademcosecurity.com

Ademco Security Group is a Singapore-based security services company that sells monitoring services, manpower security services, unified security management, and enterprise security software. The company has approximately 8000 corporate and government clients across Asia, including Singapore, Malaysia, Philippines, Indonesia, Thailand, Vietnam, India, and China’s major cities. [1] [2]

Contents

Ademco established Singapore’s first private wireless mesh network for security clients in 1998. [3] It currently employs 400 in Singapore and its branch locations in six other countries. In 2018, it reported annual revenue of $40 million. [4] The company also runs Singapore's fire decentralized central alarm monitoring center. [5]

History

In 1977, Ademco USA hired business executive T.C. Koh to set up a regional headquarters, Ademco Far East PLC, to expand security services in Asia, primarily fire sprinklers, alarm systems and sensors, and locks. Koh opened offices in Singapore, Malaysia, and Hong Kong. [3] [6]

In 1985, on a visit to a friend in the eastern United States who owned a central alarm monitoring company, Koh decided to start his own security monitoring business in Asia. At the same time, the US was suffering a recession, and Ademco USA offered to sell its Asian subsidiary directly to Koh. Koh purchased the subsidiary for $1 million, establishing the new company as Ademco (Far East) Pte Ltd. [6] [1] Koh set up a private alarm monitoring station enterprise for client facilities in Singapore. [6]

In the 1980s, the company installed alarms in elevators for the Housing and Development Board (HDB) to deter local crime. It also helped the Singapore Civil Defense Force set up their fire alarm monitoring station. [7] In the 1990s, Ademco outfitted the highway speed cameras with proximity sensors and surveillance equipment to protect highway speed cameras for the Singapore police. [6]

In 1995, Ademco began a failed attempt to enter the Chinese market. In the same year, T.C. Koh’s son, Toby Koh, joined the company after spending three years as a corporate banker. The younger Koh started at Ademco in sales, then eventually became managing director and spokesperson for the company. [3]

In 2006, Rentokil Initial, a London Stock Exchange-listed British company bought out Ademco with plans to expand across Asia. The expansion plan was canceled with a management team turnover in 2008. [3] In 2007, the company established an in-house development and design division. [8] In 2010, a group of Asian businessmen bought the business back from Rentokil through a management buyout, returning control to the Koh family. A merger with a competitor in China allowed Ademco to relaunch on the mainland in 2010, opening offices in Tianjin, Beijing, Chongqing, Shanghai, and Shenzhen.

In 2009, Ademco Security Group won a Resorts World Sentosa (RWS) contract and provided the resort with integrated security management for security and business functions. [3] [6]

In February 2018, the company announced a 60 percent acquisition of TNT Technologies Joint Stock Company, a security provider in Vietnam. [4]

Services

Products and services include 24-hour central alarm monitoring, managed facility security services, video surveillance, digital policing, closed circuit TV (CCTV), biometric and identity management, personal contraband scanners, RFID tags, access control systems, and electronic barriers. [3]

AES Wireless Mesh Security Network: Approved in 1998 by iDA, Singapore Police Force and Singapore Civil Defence Force, the AES private wireless network attained countrywide coverage in 1999. [9] As of 2016, this network served more than 2,400 buildings in Singapore. [10]

Alarm Monitoring and Intrusion Detection: Ademco built an Alarm Monitoring Station in Singapore. The Monitoring Station is also a Fire (DECAM) Monitoring provider in Singapore.

CCTV/Surveillance: Ademco Security Group’s network digital video provides monitoring, access control, intrusion detection and fence intrusion in applications for retail, corporate, petrochemical, and government use at airports, seaports, and high-security facilities. [6]

Access Control Systems and Biometrics: The Access Control systems prevent unauthorized entry into controlled environments. Ademco’s biometric solutions[ buzzword ] include authenticating identities using fingerprint, palm geometry, iris, vein, voice, facial and other human characteristics. [11]

Managed Services: Outsourced security functions such as remote surveillance and video control meant for small-medium enterprises. [12] [13]

Robot Security: The company launched Robot as a Service (RAAS) in 2017. The robots are autonomous four-wheel vehicles that use artificial intelligence to patrol an area like a security guard. [14] [15] [16]

Awards

The company is the only security company in Singapore audited with the SS540 certification for Business Continuity Management by the international certification organization TUV SUD PSB PTE Ltd. [1] In 2013 the company was cited as an honoree in the 2013 Spirit of Enterprise Award competition, a Singapore-based non-profit organization that recognizes innovation and achievement among small to medium size (SME) entrepreneurships. [17] In 2015, the company was honored in both the Singapore Enterprise 50 Awards and the Singapore Prestige Brand Awards in the Heritage Brands category. [8] [18] In 2017, it was named the Overall Winner of the 2017 Entrepreneur of the Year awards in the Established Entrepreneur category. [19] [20]

Related Research Articles

<span class="mw-page-title-main">Computer security</span> Protection of computer systems from information disclosure, theft or damage

Computer security, cybersecurity, digital security or information technology security is the protection of computer systems and networks from attacks by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide.

<span class="mw-page-title-main">Access control</span> Selective restriction of access to a place or other resource, allowing only authorized users

In physical security and information security, access control (AC) is the selective restriction of access to a place or other resource, while access management describes the process. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization.

<span class="mw-page-title-main">Physical security</span> Measures designed to deny unauthorized access

Physical security describes security measures that are designed to deny unauthorized access to facilities, equipment, and resources and to protect personnel and property from damage or harm. Physical security involves the use of multiple layers of interdependent systems that can include CCTV surveillance, security guards, protective barriers, locks, access control, perimeter intrusion detection, deterrent systems, fire protection, and other systems designed to protect persons and property.

<span class="mw-page-title-main">Mass surveillance</span> Intricate surveillance of an entire or a substantial fraction of a population

Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by local and federal governments or governmental organizations, but it may also be carried out by corporations. Depending on each nation's laws and judicial systems, the legality of and the permission required to engage in mass surveillance varies. It is the single most indicative distinguishing trait of totalitarian regimes. It is often distinguished from targeted surveillance.

Network security consists of the policies, processes and practices adopted to prevent, detect and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs: conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: it secures the network, as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password.

<span class="mw-page-title-main">Rentokil Initial</span> British business services company

Rentokil Initial is a British business services group based in Crawley, England. It was founded in 1925 as a pest-control business but subsequently expanded and diversified, in part through organic growth under the leadership of Sir Clive Thompson in the 1980s and 1990s, and in part, through the acquisition of BET plc in 1996, into a business delivering a wide range of facilities management services. It is listed on the London Stock Exchange and is a constituent of the FTSE 100 Index.

FCAPS is the ISO Telecommunications Management Network model and framework for network management. FCAPS is an acronym for fault, configuration, accounting, performance, security, the management categories into which the ISO model defines network management tasks. In non-billing organizations accounting is sometimes replaced with administration.

<span class="mw-page-title-main">Check Point</span> Israeli security company

Check Point Software Technologies Ltd. is an American-Israeli multinational provider of software and combined hardware and software products for IT security, including network security, endpoint security, cloud security, mobile security, data security and security management.

Verint Systems is a Melville, New York–based analytics company which was founded in 2002. The company sells software and hardware products for customer engagement management and business intelligence. Their products are designed to assist clients in data analysis, specifically large data sets.

<span class="mw-page-title-main">Singapore passport</span> Passport of the Republic of Singapore issued to Singapore citizens

The Singapore passport is a travel document and passport issued to citizens of the Republic of Singapore. It enables the bearer to exit and re-enter Singapore freely; travel to and from other countries in accordance with visa requirements; facilitates the process of securing assistance from Singapore consular officials abroad, if necessary; and requests protection for the bearer while abroad.

Computer security software or cybersecurity software is any computer program designed to influence information security. This is often taken in the context of defending computer systems or data, yet can incorporate programs designed specifically for subverting computer systems due to their significant overlap, and the adage that the best defense is a good offense.

Daon is an international biometrics and identity assurance software company founded in 1999 by Irish entrepreneur Dermot Desmond. The name, Daon, was chosen because it stems from the Celtic word for human being, duine daonna. Daon is headquartered just miles outside of Washington, DC in Fairfax, VA. Daon also has major operations in Dublin, located in the International Financial Services Center (IFSC). It has an additional offices in Belgrade, Serbia and Canberra, Australia.

In computing, managed security services (MSS) are network security services that have been outsourced to a service provider. A company providing such a service is a managed security service provider (MSSP) The roots of MSSPs are in the Internet Service Providers (ISPs) in the mid to late 1990s. Initially, ISP(s) would sell customers a firewall appliance, as customer premises equipment (CPE), and for an additional fee would manage the customer-owned firewall over a dial-up connection.

Physical security information management (PSIM) is a category of software that provides a platform and applications created by middleware developers, designed to integrate multiple unconnected security applications and devices and control them through one comprehensive user interface. It collects and correlates events from existing disparate security devices and information systems to empower personnel to identify and proactively resolve situations. PSIM integration enables numerous organizational benefits, including increased control, improved situation awareness and management reporting. Ultimately, these solutions allow organizations to reduce costs through improved efficiency and to improve security through increased intelligence.

Cloud computing security or, more simply, cloud security, refers to a broad set of policies, technologies, applications, and controls utilized to protect virtualized IP, data, applications, services, and the associated infrastructure of cloud computing. It is a sub-domain of computer security, network security, and, more broadly, information security.

IDEMIA is a multinational technology company headquartered in Courbevoie, France. It provides identity-related security services, and sells facial recognition and other biometric identification products and software to private companies and governments.

<span class="mw-page-title-main">Mass surveillance in China</span>

Mass surveillance in the People's Republic of China (PRC) is the network of monitoring systems used by the Chinese central government to monitor Chinese citizens. It is primarily conducted through the government, although corporate surveillance in connection with the Chinese government has been reported to occur. China monitors its citizens through Internet surveillance, camera surveillance, and through other digital technologies. It has become increasingly widespread and grown in sophistication under General Secretary of the Chinese Communist Party (CCP) Xi Jinping's administration.

The 2018 SingHealth data breach was a data breach incident initiated by unidentified state actors, which happened between 27 June and 4 July 2018. During that period, personal particulars of 1.5 million SingHealth patients and records of outpatient dispensed medicines belonging to 160,000 patients were stolen. Names, National Registration Identity Card (NRIC) numbers, addresses, dates of birth, race, and gender of patients who visited specialist outpatient clinics and polyclinics between 1 May 2015 and 4 July 2018 were maliciously accessed and copied. Information relating to patient diagnosis, test results and doctors' notes were unaffected. Information on Prime Minister Lee Hsien Loong was specifically targeted.

The Maritime Security Task Force is a high-readiness standing task force of the Republic of Singapore Navy (RSN) responsible for maritime security operations.

<span class="mw-page-title-main">ADI Global Distribution</span> Wholesaler of security products

ADI Global Distribution is a wholesale distributor of security, pro-AV and low-voltage products for contractors, installers, and resellers. The company has over 190 locations throughout North America, Puerto Rico, Europe, the Middle East, and Africa. ADI's inventory includes products such as video surveillance, building access control, home intrusion, fire safety, and alarm systems as well as professional and residential audio/video (AV) equipment such as commercial speakers and video displays, networking equipment, data communications solutions, tools, wire, cabling, and more.

References

  1. 1 2 3 Chng, Grace. “Protecting Businesses with Digital Know-How” Archived 2014-02-03 at the Wayback Machine The Straits Times, 25 December 2013.
  2. Teik, Tan Chee. “Securing the Business Interests of Companies.” Originally appeared in Today’s Manager, October-November 2010.
  3. 1 2 3 4 5 6 Koh, Bryan. “Turning a Childhood Passion into Reality.” The Business Times, 27 March 2012.
  4. 1 2 Mui, Rachel. "Ademco partners IE Singapore to buy Vietnam security firm, aims to grow overseas revenue". The Business Times. Retrieved 2018-03-13.
  5. hermes (2017-11-25). "From security to bak kut teh, awards recognise local businesses". The Straits Times. Retrieved 2018-03-13.
  6. 1 2 3 4 5 6 Devadas, Dhevarajan. “A secure way of making money.” The Straits Times 16, Feb. 2011
  7. "Securing a place in the industry". The Business Times. Retrieved 2018-03-13.
  8. 1 2 Maine, Wong Sher. "Staying on the Safe Side." The Straits Times. November 20, 2015
  9. Seow, Timothy. "Securing the Future.” Archived 2016-03-03 at the Wayback Machine The Business Times. Mar. 30, 2010.
  10. STEPHANIE, LEONG YEE HUI, LINDA, MI MUQING, VANIA. "Selling out-of-the-box security solutions". The Business Times. Retrieved 2018-03-13.{{cite news}}: CS1 maint: multiple names: authors list (link)
  11. Access Controls Ademco website accessed June 9, 2014
  12. Access Controls Ademco website accessed June 9, 2014
  13. Chan Chao Peh. "A Safe and Secure Future." The Edge: Singapore. March 11, 2013
  14. "Singapore's security industry, plagued by high turnover, to see robots in its midst". Channel NewsAsia. Retrieved 2018-03-13.
  15. "CIO-Asia - Robots to assist security guards in Singapore". www.cio-asia.com. Retrieved 2018-03-13.
  16. Wong, Pei Ting (April 6, 2017). "Robot 'security guards' up for hire". Today Online.
  17. Nair, Suresh. “Spirit of Enterprise Awards 2013” The Sunday Times. Nov. 10, 2013.
  18. "Winners 2015." Archived 2015-11-24 at the Wayback Machine Singapore Prestige Brand Award website
  19. hermes (2017-11-25). "From security to bak kut teh, awards recognise local businesses". The Straits Times. Retrieved 2018-05-08.
  20. "entrepreneurs-digest". entrepreneurs-digest. Retrieved 2018-05-08.