Driving security into operations

October 2012 Integrated Solutions, Financial (Industry)

Security at financial services organisations is a priority so stringent policies and procedures ensure high standards and careful management.

Banking sector security systems include a mixture of CCTV, alarm systems, access control, ATM protection, off site monitoring and physical security (guarding). These various systems are usually linked back to a central control room using a variety of different forms of communication – eg, analogue telephone lines, TCP/IP or GSM - ensuring that there is always communication between the control room and the various security devices installed in the field.

The control side of the systems have been designed for ease of use and understanding by the operators. Detailed reports can be drawn for post mortem purposes after an incident. Constant checks and balances are in place to ensure that the correct procedures are followed and there is speedy and appropriate action at the time of an incident.

During working hours the systems are able to send panic signals in times of duress so that physical reaction can be deployed. Remote sites are constantly monitored for any abnormalities. After hours, these systems are the eyes and ears of control room personnel.

Adding value

New technology enhances security. Megapixel technology in CCTV cameras, for instance, mean facial recognition, even at considerable distances, is a reality. So is identification of potentially fraudulent activity by staff or criminal elements. Beyond basic security functions, however, there is a lot of value that can be driven from these systems.

As financial services organisations become more familiar with the sophisticated capabilities of the solutions, they are increasingly exploiting them to drive efficiencies in daily operations. Intelligent algorithms and analytics capabilities built into the software that drives CCTV solutions, for example, can today identify changes in the environment. Thus, banks apply these systems to monitor queuing – when a threshold is reached (say 10 people in the queue), floor staff are prompted to open up new counters to improve service levels.

Security solutions are also increasingly able to identify and take care of key vulnerabilities within security systems. This is thanks to a combination of best practices introduced by experienced service providers as well as intelligence built into security devices and the solutions themselves.

Identifying and dealing with vulnerabilities

Integration takes place between the various security devices and the central control room. The control room, in turn, is in direct contact with physical security, namely police or armed reaction personnel on the ground.

However, there are weaknesses in the system. Once such area of weakness can be inadequate training or a lack of correct operational procedures. For example, gaps appear in security systems when personnel do not arm, disarm or use security systems correctly; when insufficient preventative maintenance checks are carried out on installed hardware; or if standard operational procedures are not conveyed to key personnel responsible for the correct operation of the systems.

These vulnerabilities can be managed in a number of ways. Designing, manufacturing and installing self-managed security devices can eliminate human error from the equation. In terms of ensuring systems are in good operational order, service providers can be tied to SLAs and held responsible for the maintenance and good standing of the systems. For example, ATM security systems are set on timers and will auto-arm once personnel have exited the site. The same applies for branches.

The bank of the future

The successful bank of the future will exploit advances in technology and communications on all fronts. To improve alarm handling and reporting, self-managed security systems will increasingly be installed. In addition, systems must be able to report faults and abnormalities automatically to service providers tied to an SLA and reaction times.

Security systems within the banking environment will be fully integrated with offsite control rooms. These control centres will, in time, be able to control the entire branch, managing everything from remote unlocking, to switching on the lights to facilitate verification during remote monitoring.

As the evolution of security systems continues – smart financial organisations will keep up with the changes, employing service providers that not only understand and can deploy systems to meet new threats, but are able to introduce advanced functionality into banking operations to improve efficiency – and the bottom line.

For more information contact Jasco Security Solutions, +27 (0)11 266 1500, [email protected], www.jasco.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

SABRIC appoints Andre Wentzel as interim CEO
News & Events Financial (Industry) Associations
The South African Banking Risk Information Centre (SABRIC) has announced the appointment of Andre Wentzel as interim chief executive officer, effective immediately.

Read more...
Acronis and Metrofile Cloud announce partnership
Infrastructure Integrated Solutions
Acronis has appointed Metrofile Cloud as its premier disaster recovery (DR) partner in southern Africa, combining Acronis' technologies with Metrofile Cloud's local expertise to deliver secure and adaptable disaster recovery solutions for businesses across the region.

Read more...
The real cost of DHA’s verification fee
Ideco Biometrics Integrated Solutions
South Africa’s Department of Home Affairs has proposed a significant increase in its online ID-verification fee, which could have severe unintended consequences, potentially undermining the progress made in anti-money laundering initiatives and exposing individuals to greater risk of identity fraud.

Read more...
Continuous AML risk monitoring
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
AU10TIX, launched continuous risk monitoring as part of its advanced anti-money laundering (AML) solution, empowering businesses to detect behavioural anomalies and emerging threats as they arise.

Read more...
Digitising security solutions with AI and smart integration
Regal Security Distributors SA Technews Publishing Integrated Solutions
The Regal Projects Team’s decades of experience and commitment to integration have brought the digital security guard to life as a trusted force for safer, smarter living.

Read more...
Smart cities and the role of video security
Surveillance Integrated Solutions
As cities around the world continue to embrace smart technology, including IoT that not only connects to people, but also the surrounding activity, the integration of advanced video security systems is crucial to ensure safety and efficiency in environments.

Read more...
Surveillance to unjam the traffic
Integrated Solutions Transport (Industry)
Traffic is a challenge that affects urban areas across Africa. The city of Johannesburg, South Africa’s most populous city, experiences severe traffic resulting from a confluence of issues, including power outages, faulty traffic lights, and infrastructure theft.

Read more...
The benefits of offsite control rooms
Astrosec Surveillance Integrated Solutions
As the security landscape grows more intricate, control rooms – the crucial hub of security operations – need to adapt. With escalating costs, mounting threats, and a heightened demand for immediate responses, many organisations are reassessing the operations of their control rooms.

Read more...
edgE:Tower video analytics integrated with SEON
Surveillance Integrated Solutions AI & Data Analytics
Sentronics has announced a new integration between its edgE:Tower advanced AI-driven video analytics solution and SEON, a Central Monitoring Software (CMS) platform. This integration enhances real-time situational awareness and automated threat detection for control rooms.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.