SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Retail security
  • Home
  • About
  • White papers
  • Case studies
  • News
  • Expert commentary
  • Security beat
  • Round table
  • Products
  • Videos

Amberstone Security to become UK’s largest privately owned security company

19 May 2022

Amberstone Security to become UK’s largest privately owned security company
icon Add as a preferred source Download PDF version
Related Links
  • Amberstone Security becomes security partner for Tesco across Northern Ireland, Scotland, and Northern England
  • Amberstone Security warns of increased risk due to busier trading periods over the Platinum Jubilee weekend

Security solutions services company Amberstone Security has released ambitious plans to become the UK’s largest privately owned security provider by 2025.

The business was born out of Cardinal Security, which fell into administration just two years after an MBO. Cardinal’s Founder, Jason Trigg, who had exited the business on completion of the MBO returned to save the remnants of Cardinal in 2018, ultimately creating the new company Amberstone Security.

Risk-based model for security and guarding solutions

Amberstone Security offered a new risk-based model for deploying security and guarding solutions, using proprietary AI based systems. The objective was to make sure the right people were in the right place at the right time and with the right equipment.

Amberstone’s risk-based model was a surprising development in the industry

This risk-based approach, using historical data as well as myriad of live data points, offered retailer customers numerous advantages. Not least among them was the opportunity to avoid wasting resources to reduce costs and eliminating inefficiencies. This has led to costs being driven down whilst standards were simultaneously driven up!

The guarding industry has often accused of being slow to adapt. So Amberstone’s risk-based model for deployment of personnel and resources was perhaps a surprising development in the industry. Unsurprisingly it proved a big hit with retailers, many of whom were being tasked to do more with less. As a result, Amberstone’s sales accelerated rapidly from £14M in 2019 to over £77M in 2021. The business is currently on track to exceed £100M per annum of profitable sales.

Profitable turnover & reorganisation

Now the company has set a goal to hit £300M of profitable turnover by 2025. To achieve this the business is reorganizing, to better focus on the needs of its individual customers.

The reorganisation sees Amberstone changing its operations for retail from just horizontal integration to vertical segmentation as well. Within retail, the vertical categories are Grocery, Non-grocery, Distribution & Manufacturing, Fashion and Hospitality.

Each vertical has its own senior director to whom the account lead reports. Each lead is a director or manager of the business. They are each supported by a team of colleagues.

Support Services Division

“We want to be respectful of the different facets of each client’s business and ensure that they see a greater level of service than they get now,” comments Dan Hardy, Managing Director of Amberstone.

Amberstone has created a new Support Services Division that will work across vertical business segments

In addition, Amberstone has created a new Support Services Division that will work across vertical business segments. This division offers tailored support in areas such as IT and HR that again respects the differences between, say, a distribution business and a non-grocery retail business.

As new business verticals are established and expanded, there will be ever greater scope for clients to flex up or down manpower requirements as part of a risk-based security model. The size of the business will then offer greater flexibility on even a geographic location. For example, keeping particular staff with local knowledge in their locale yields obvious operational benefits.

Strategy statement

The overall strategy of the new approach is summed up in the company’s strategy statement for 2022–2025, which is:

“To facilitate the right person, in the right place at the right time internally and externally, by using data to drive a risk-based approach to all business decisions and investments. Excellent customer service must be our number one priority, supporting client problem statements by taking a company values-based approach, every time.”

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Biometrics
  • Retail surveillance
  • Retail security systems
  • Shop security systems
  • Mall security
  • Shopping centre security
  • Store security
  • Store surveillance
  • Retail security
  • Physical Security Information Management (PSIM)
  • Related links
  • Access Control Software Access control software
  • Face Recognition Software Access control software
  • Related categories
  • Access control software
  • Intruder detectors
Related white papers
Physical access control

Physical access control

Download
Precision and intelligence: LiDAR's role in modern security ecosystems

Precision and intelligence: LiDAR's role in modern security ecosystems

Download
Verkada workplace safety survey

Verkada workplace safety survey

Download
Related articles
Retail security in 2021 and beyond

Retail security in 2021 and beyond

What security technologies are impacting the retail market?

What security technologies are impacting the retail market?

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Retail security
  4. News
  5. Corporate news
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec