SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision Gets ISO 37301 Certification For Compliance Management System
    • SentriGuard: Revolutionizing Key Management Solutions
    • Axis Signs CISA Secure By Design For Cybersecurity
    • Xtract One's SmartGateway Boosts Security In Nova Scotia
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Software House
    Other Resources
    • eMagazines
    • Videos
    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

    Enhancing Physical Access Control Using A Self-Service Model

    Enhancing Physical Access Control Using A Self-Service Model

About us Advertise
  • AI special report
  • Cybersecurity special report
  • Casino security & surveillance
  • Cloud-based security
  • 6
Intrusion detection
  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check Out Our Special Report On Casino Security

Get it now!

G4S Ensures State-Of-The-Art Diplomatic Security Services Provided At Foreign Embassies In Jordan

G4S Ensures State-Of-The-Art Diplomatic Security Services Provided At Foreign Embassies In Jordan
Contact company
Contact G4S Technology Ltd.
icon Add as a preferred source Download PDF version
Related Links
  • Cutting Through The Hype: AI And ML For The Security Space

Foreign embassies are an essential part of establishing and maintaining peaceful cooperation, and collaboration between countries all over the world. They can also be the focus of tensions, peaceful and violent protests, terrorism, and many other risks, which mean that thorough and effective security solutions are essential to keep people, property, and sensitive documents safe.

Foreign embassies

Usually located in capital cities, each foreign embassy is the workplace and often residence, of a Country Ambassador. They are used for important diplomatic meetings, holding events, hosting VIPs, and a range of other activities that focus on the political, cultural, and social relationships with the host nation.

In some instances, foreign embassies even provide sanctuary to their nationals and individuals from other nations

In some instances, foreign embassies even provide sanctuary to their nationals and individuals from other nations, during times of trouble.

G4S security services in Jordan

“Anywhere in Amman, where a foreign embassy has outsourced their security, you can be certain that G4S is the company they have come to,” said Ashraf Abul-Hajj, the Managing Director of G4S in Jordan.

Ashraf Abul-Hajj adds, “We’ve been doing this for decades and have excellent, long-standing relationships providing security for many embassies in the capital city. We secure over 30 embassies at the moment, and we’ve been working with some of them for over 20 years.”

In fact, it was a small Jordanian security company, called Safe and Sound (now under G4S), which started to provide embassy security in Amman, Jordan, all those years ago, before it became a part of G4S, in 2004.

Embassy security services

G4S now provides a wide range of services to the embassies that it secures in Jordan. These include manned guarding, installing and maintaining security systems, such as CCTV, access control and alarms, secure escorting for VIPs, during their visits, with G4S vehicles and highly-trained drivers, and coordinating security for events, which are being hosted at the embassy.

“The main purpose of most of our security solutions is to ensure that nobody gains access to an embassy, who shouldn’t be there,” said Ashraf Abul-Hajj, adding “There are a lot of different risks that embassies face - big and small. Terrorist incidents, while very rare, remain a threat, so our security teams are trained to be vigilant and notice any suspicious behavior.”

Securing embassies during protests

Protests at embassies are more common, when people disagree with the actions of a specific country"

Ashraf Abul-Hajj adds, “Protests at embassies are more common, when people disagree with the actions of a specific country. Protests, even peaceful ones, are volatile and have the potential to turn violent, so our security officers and systems are there to monitor tensions, continuously assess the risk levels and prevent breaches.”

Terrorism and protests are the more extreme examples of security threats, but day-to-day G4S security teams also deal with lower level threats that still need to be managed sensitively and professionally.

Preventing breaches

Ashraf Abul-Hajj stated, “People try to access their foreign embassies for a variety of reasons, often at times of personal stress or hardship, and can become distressed, and even aggressive, if they are not permitted to enter.”

He adds, “Sometimes, we have to deal with very unusual scenarios. At one embassy, a man turned up saying that he had been informed by the embassy that he had won a competition and he was visiting the embassy to collect his cash prize. It was obvious to the team that he was the victim of a con, but his behavior became very challenging, when he realized this and could not gain entry. Our security officers had to try to calm him down, while stopping him from entering the embassy, without consent.”

Ashraf Abul-Hajj concludes, “This shows how varied the challenges facing our teams at foreign embassies can be. An embassy can be peaceful for a long time, but it can only take one negative news story or a single social media post, to spark a significant protest. With our security systems, highly trained security officers and extensive experience, G4S is more than prepared to meet those risks. We are proud to deliver such an important service, keeping foreign embassies safe and secure in Jordan.”

From facial recognition to LiDAR, explore the innovations redefining gaming surveillance

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Remote surveillance
  • Counter surveillance
  • Mass surveillance
  • Remote video surveillance
  • IP video surveillance
  • Electronic security systems
  • Application security
  • Physical security
  • Remote security
  • Perimeter security
  • Public sector security
  • Security management
  • Security policy
  • Security devices
  • Security installation
  • Security cameras
  • Security camera systems
  • Security access systems
  • Network monitoring
  • Vehicle tracking
  • Asset tracking
  • Electronic access control
  • Intrusion detection
  • Identity management
  • Building security
  • Facility security
  • Public security
  • Network cameras
  • Door security
  • Door access control
  • IP Surveillance
  • Security service
  • Outdoor video surveillance
  • Physical Security Information Management (PSIM)
  • Indoor surveillance
  • IP security solutions
  • Security communication
  • Counter terror
  • Gates & Fencing
  • Event security
  • Perimeter protection
  • Cyber security
  • Crime prevention
  • Internet of Things (IoT)
  • Crowd Management
  • Outdoor Security
  • Indoor Security
  • Data Security
  • Warning Devices
  • Incident Management
  • Security Assessments
  • Cloud security
  • Artificial intelligence (AI)
  • Mobile access
  • Video surveillance
  • Machine Learning
  • Touchless Security
  • Related links
  • Proximity Access control systems & kits
  • Network IP cameras
  • Indoor/Outdoor IP Dome cameras
  • Standalone / Networked Access control systems & kits
  • TCP / IP / GPRS Intruder alarm communicators
  • Related categories
  • Intruder alarm communicators
  • Access control systems & kits
  • IP cameras
  • Barricades
  • Gates
  • IP Dome cameras
  • Barriers
Related white papers
Precision And Intelligence: LiDAR's Role In Modern Security Ecosystems

Precision And Intelligence: LiDAR's Role In Modern Security Ecosystems

Download
The Top 4 Reasons To Upgrade Physical Security With The Cloud

The Top 4 Reasons To Upgrade Physical Security With The Cloud

Download
11 Advantages Of A Combined System For Access Control And Intrusion

11 Advantages Of A Combined System For Access Control And Intrusion

Download
Related articles
Securitas UK & Hays Travel Partnership Milestone

Securitas UK & Hays Travel Partnership Milestone

Ranger Acquires Universal Fire & Security In UK Expansion

Ranger Acquires Universal Fire & Security In UK Expansion

Detection Tech Unveils DT2030 Strategy For X-ray Growth

Detection Tech Unveils DT2030 Strategy For X-ray Growth

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Intrusion detection
  4. News
  5. Government & Public Services
About this page

"G4S Offers Diplomatic Security At Jordan’s Foreign Embassies" is one of 4007 in-depth security application and installation case studies featured in this section. Visit regularly for the latest updates on use cases, installations and deployments of security products from G4S Technology Ltd..

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Artificial Intelligence in Security
Artificial Intelligence in Security
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec