Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Follow the Euros by Security Video

July 1, 2006
Security video captures cash counters from head to toe to document their work. Video works in conjunction with an electronic cash management system.


A billion Euros a year flow across the cash-counting desks at the Westfälischen Wachschutzes (WWS) enterprise in Recklinghausen, Germany. That’s 2.8 tons of hard cash every day. WWS employees must count all the money. And it’s all been recorded through both the firm’s electronic cash management system, and by a GEUTEBRÜCK CCTV system too.

Besides providing guarding and protection services for commerce and industry, WWS also offers secure cash transportation, cash processing, ATM support services and main cash desk functions for clients such as high street banks, savings and mortgage banks and the Deutsche Post. When WWS moved into a new secure headquarters building and won a significant new cash-handling contract, its insurers advised that an electronic surveillance system providing comprehensive, water-tight documentation of the whole operation would be a wise investment.

Good business sense

Increasing surveillance and traceability made good business sense.

Not just because money must not go missing, but because even innocent accounting discrepancies can cause long delays and generate not only downtime and investigation costs, but a great deal of unpleasant suspicion, too.

Security video recording starts with the arrival of the cash transporter vehicle and the hand-over of the cash. The barcodes on each sealed bag and container are scanned and videoed with high resolution cameras. Since the barcode and video data are automatically paired up and stored in a secure format, the barcode data can be used later to quickly retrieve relevant footage from the database. Any shipment can be tracked through the processing procedures and the synchronous replay facility allows supervisors to analyze any relevant surrounding activity too. In fact the recording of checking-in and the ability to write evidential quality video to CD has itself enabled many discrepancies between customer and service provider to be resolved quickly and has led to an improved working relationship.

Images of workstations, counters

With video documented at every step, the cash makes its way to the 15 cash-counting workstations. Here, workers have welcomed the monitoring system because it has dispelled any unjustified suspicion, which traditionally fell on them.

At least two cameras focus on each workstation, covering the operation and the person from top to toe, recording permanently in near real-time. Pictures of the whole scene enable the full facts to be established. At separate workstations four supervisors have access to live and recorded pictures to help them decide: Was the container damaged or already open? Was the seal broken? Did the counter drop a note and cover it with her foot? Or was the discrepancy due to customer error?

Although customer claims have to be lodged within 120 hours, WWS retains all picture data for 30 days and sequences relating to substantiated discrepancies for 6 months. Besides recording the workstations from 6 am to 10 pm, video detectors trigger the recording of any out-of-hours activity, and of course the site perimeter, the safe and many other areas are also routinely monitored.

As an official of WWS explained, “We didn’t want to leave anything to chance. We chose an all-round, worry-free package. We also play it safe with our 9 Terabyte database which offers extremely high data security owing to the redundancy of our three RAID systems.”

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Code

Security Leaders Discuss the Marquis Data Breach

Digital human mind

Should Organizations Block AI Browsers? Security Leaders Discuss

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • The 'People' Part of Enterprise Cybersecurity Strategies

    20% of workers don’t follow company security policies all the time

    See More
  • Policy-based Systems: Follow the Rules

    See More
  • 2008 Legislative Agenda: Follow the Money

    See More

Related Products

See More Products
  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

  • The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing