Enigma uses the state-of-the-art MOCO system as part of its tailor-made security packages offered to clients. We use the MOCO system on 85% of all our current contracts and the system works through Near Field Communication (NFC) scanning. We have specific NFC enabled highly ruggedised phones, used specifically to carry out this process.
By using the MOCO system, we are able to place tags at various checkpoints, ensuring that our officers are patrolling the sites as per the client’s request. Each NFC tag is unique and is registered specifically for each section of the building or landscape.
Security officers are issued with the MOCO Touch phones to indicate their arrival, departure and patrols at their particular site. In this way, the phones act as an important lone worker tool. As added value, clients are given a systems password to access Proof of Attendance and Activity data. The system offers a reporting facility enabling many of our clients the opportunity to be able to check in and monitor activity at their own convenience.
We are able to monitor events as they occur in real time, allowing us to check the progress of the patrol scans and also determine the activity of lone workers via instant on-screen monitoring at Enigma’s Alarm/CCTV Receiving Centre (ARC).
We believe this MOCO system ensures that our officers patrol their sites to the high standards that our clients have come to expect from Enigma.
Enigma has BS 5979:2007 Alarm Receiving, and 8418:2010 Public Space CCTV Monitoring accreditations (SSAIB) for its state-of-the art Alarm Receiving Centre/Control Room (ARC).
We employ highly experienced and qualified staff, all of whom are SIA CCTV Licensed with backgrounds in alarm installation and operation.
An internal Training Programme, instigated under the process of continuous development, is also undertaken for ARC staff using an Induction, Training and Review Form, QSF 018 CCTV. This comprehensive programme includes modules relating to testing alarm signals, installing CCTV software and IP addresses, reviewing-recording/transfer of CCTV and alarm data, comparison studies of alarm/CCTV systems, alarm escalation and call-out procedures.
The ARC Intruder Alarm Systems are controlled by integrated policy management processes and alarm monitoring is stand alone or used in combination with either sensor or non-sensor activated CCTV cover. Current sites monitored by Enigma’s ARC include retail and office centres, manufacturing plants, Water Pumping/Water Treatment Works and Electric Power Facilities. Our clients include Commercial Groups, Utility Companies, and both Local Authority and UK Government.
The Enigma ARC staff also track and direct regular site patrols, and instigate alarm and mobile responses using the latest GPS technology using on-screen mapping and device location.
Enigma’s Control Room is open 24/7, and the staff are always on hand to advise and/or instruct our other security operatives in regard to issues with on-site alarms or in-house CCTV systems. All of Enigma’s Static Guards, Key-Holders and Mobile Response Officers undergo basic operational training in high level Intruder Alarms and CCTV Monitoring Systems and a majority of staff would use these systems on a regular basis.
When CCTV Licensed Operators are legally required on particular sites or are required as part of our contractual obligations, Enigma will ensure nationally recognised CCTV courses are undertaken by the intended operatives within a specified period or will otherwise directly employ Licensed Operators.
Enigma Security Solutions uses small text files called cookies, and other technologies, so that we can improve your online experience - for example by remembering you when you come back to visit us, and making the content you see more relevant to you. Cookies also enable us to track online purchases made through any of our online shops, so that we can provide you with a smoother experience.
Managing cookies: the cookie consent wizard
We want you to have sight and control over what cookies are being used when you visit our websites.
For this reason we have provided a cookie consent wizard at the bottom of this page, so you can see a complete list of cookies used by our sites, and change your preferences.
A cookie is a piece of information which a website transfers to the cookie file of the browser on your computer. The browser saves the information and sends it back to the website server whenever the browser returns to the website.
A cookie will typically contain the name of the domain (internet location) from which the cookie has come, the "lifetime" of the cookie (i.e. when does it expire), and a value, usually a randomly generated unique number.
Two types of cookies are used on this website:
Session cookies which are temporary cookies that remain in the cookie file of your browser until you leave the site.
Persistent cookies which remain in the cookie file of your browser for much longer (though how long will depend on the lifetime of the specific cookie).
We use session cookies:
To allow you to carry information across pages of our site and avoid having to re-enter information.
To compile statistics that allow us to understand how users use our site and to help us improve the structure of our website.
We use persistent cookies:
To display your name and points balance each time you access our site (using the "Remember me" cookie).
To pre-complete your Nectar collector number when you logon to our website (using the "Remember me" cookie).
We may use other persistent cookies from time to time to help us recognise you as a unique visitor when you return to our website and to monitor your use of our website. This will allow us to tailor the content of certain areas of our site and offer you promotions that match your preferred interests.
Cookies and Enigma Security Solutions.
When you browse Enigma Security Solutions, a persistent cookie may be placed on your computer by the companies who assist us with the operation of our online e-commerce, social networking or other software systems.
Use of web beacons
Some of our web pages may contain electronic images known as web beacons (sometimes known as clear gifs) that allow us to count users who have visited these pages. Web beacons collect only limited information including a cookie number, time and date of a page view, and a description of the page on which the web beacon resides. These beacons do not carry any personally identifiable information and are used to track the effectiveness of a particular campaign.
You can change your cookie preferences using our cookie consent wizard at the bottom of this page.
You also have the ability to accept or decline cookies by modifying the settings in your browser.
You can easily delete any cookies that have been installed in the cookie folder of your browser. For example, if you are using Microsoft Windows Explorer:
- Open 'Windows Explorer'
- Click on the 'Search' button on the tool bar
- Type "cookie" into the search box for 'Folders and Files'
- Select 'My Computer' in the 'Look In' box
- Click 'Search Now'
- Double click on the folders that are found
- 'Select' any cookie file
- Hit the 'Delete' button on your keyboard
If you are not using Microsoft Windows Explorer, then you should select "cookies" in the "Help" function for information on where to find your cookie folder.
You can turn off the "Remember me" persistent cookie at any time by visiting the "Your Account" section and selecting "Change data choices" and "online preferences" and then unticking the "Remember me" box.
Enigma complies with the Modern Slavery Act 2015 and is committed to driving out acts of Modern Day Slavery or Human Trafficking within its own business and that from within its supply chain.
Enigma opts to publish details of the steps our organisation takes; the Act does not prescribe the information that must be included in our statement, because the Act does not require organisations to take particular steps and also because the Government wants organisations to be completely transparent about what they actually do.
The information we include in our statement is:
- Our structure, the nature of our business and details about our supply chains
- Our policies relating to slavery and human trafficking;
- Our due diligence processes relating to slavery and human trafficking in our business and supply chains;
- The parts of our business and supply chains where there is a risk of slavery or human trafficking taking place, and the steps we have taken to assess and manage that risk;
- Our effectiveness in ensuring that slavery and human trafficking is not taking place in our business or supply chains, measured against such performance indicators as we consider appropriate; and
- The training about slavery and human trafficking available to our staff.
Download our full Modern Slavery Statement here.