Incorporating security into design

October 2013 Integrated Solutions, Financial (Industry)

Security within facilities – CCTV, access control, alarms, fire detection and suppression, etc – is today increasingly integrated and digital, yet it is often an afterthought when a new building is designed. The result is usually less than optimal, with repercussions in terms of the effectiveness and functionality of the final security solution, as well as high long-term maintenance costs. With two large client security retrofit projects underway and one new build, Jasco Security Solutions has a first-hand perspective of the challenges.

Ideally, the design of the security system in a purpose-built facility will be done together with the owner or prospective occupants, a building consultant who co-ordinates design and construction, and an electrical engineer. The security systems required and the desired functionality needs to be defined, and regulatory issues, such as placement of fire alarms and sensors, need to be taken into consideration. Once routing is decided, the infrastructure needs to be installed, preferably by cabling and security system experts.

As most security systems are now IP-based, the facility owner needs to decide whether the security system will become part of the converged data, video and voice network, or if it will run on a separate network. When security shares the working data or video network, priority conflicts can occur. In addition, as access to this network is greater, security systems are made vulnerable to human error and mischief. The other great challenge, as some Jasco clients have discovered is that when security runs on mission critical networks, those networks can be compromised when security solutions need to be maintained, upgraded or refitted.

Interconnected mess

For a Jasco client in the healthcare sector with a five-building campus in Johannesburg, a complete overhaul of an existing access control and CCTV network became necessary. Using disparate contractors over a number of years to upgrade and expand its CCTV and access control systems, and with no set standards or integrated security strategy to guide implementations, the company ended up with an incomprehensible scramble of network connections.

A large part of the challenge was that new head-end equipment was added to the network without regard for capacity. There was also no documentation of the work done. With a CCTV system that only worked at 50 percent capacity and a need to extend its access control solution, the organisation decided to implement a new all-IP access control solution. It asked Jasco to assist.

Once the Jasco team had done the diagnostics and reconfigured the network, it rolled out a fibre network for the organisation, and placed the CCTV solution on a separate network. For the access control solution, Jasco had to make use of and extend the existing installation. In many instances new conduit had to be placed inside or along walls, an expensive and inconvenient workaround.

For another client in the retail sector, Jasco took on two very different projects. On a new build for a company, an architect rather than a consultant took up the main role and Jasco provided specifications and advice on security technology requirements. The customer also brought in specialist cabling contactors. In particular, there are a number of regulations around fire alarms – their positioning and how they are provisioned.

The benefits of getting it right for this customer are significant. Because it is a bespoke building, security solutions – CCTV cameras, access control, etc. – can be fitted to suit the function and layout of each department. This can be quite important. If, for example, cash will be handled in an area, the camera setup will be very different than the setup for a stock room or reception area.

The process essentials

To sum up, there are a few key practicalities to bear in mind to ensure successful incorporation of security into a building at design phase.

First, understand basic and then specific needs of the facility and the tenants. Ensure the tender proposals incorporate a step-by-step method statement and project plan. Gain input from a consultant and the relevant specialists. Ensure regulations are complied with in terms of fire and other equipment placement and related specifications.

When it comes to implementing the solutions, employing a project manager who is aware of the priority assigned to security, and ensuring weekly status meetings are held between all stakeholders will help keep the project on track. If different subcontractors are used, good communication and collaboration between the teams are essential.

And, in selecting a solution provider, look for an organisation with a good track record, one that has the experience you need, has a good understanding of the capabilities of the latest technology along with a holistic view of how the needs and requirements of your organisation will be met and, possibly most importantly, is conversant with best practices in delivery of the solution.

For more information contact Jasco Security Solutions, +27 (0)11 894 7127, [email protected], www.jasco.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Continuous AML risk monitoring
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
AU10TIX, launched continuous risk monitoring as part of its advanced anti-money laundering (AML) solution, empowering businesses to detect behavioural anomalies and emerging threats as they arise.

Read more...
Digitising security solutions with AI and smart integration
Regal Security Distributors SA Technews Publishing Integrated Solutions
The Regal Projects Team’s decades of experience and commitment to integration have brought the digital security guard to life as a trusted force for safer, smarter living.

Read more...
Smart cities and the role of video security
Surveillance Integrated Solutions
As cities around the world continue to embrace smart technology, including IoT that not only connects to people, but also the surrounding activity, the integration of advanced video security systems is crucial to ensure safety and efficiency in environments.

Read more...
Surveillance to unjam the traffic
Integrated Solutions Transport (Industry)
Traffic is a challenge that affects urban areas across Africa. The city of Johannesburg, South Africa’s most populous city, experiences severe traffic resulting from a confluence of issues, including power outages, faulty traffic lights, and infrastructure theft.

Read more...
The benefits of offsite control rooms
Astrosec Surveillance Integrated Solutions
As the security landscape grows more intricate, control rooms – the crucial hub of security operations – need to adapt. With escalating costs, mounting threats, and a heightened demand for immediate responses, many organisations are reassessing the operations of their control rooms.

Read more...
edgE:Tower video analytics integrated with SEON
Surveillance Integrated Solutions AI & Data Analytics
Sentronics has announced a new integration between its edgE:Tower advanced AI-driven video analytics solution and SEON, a Central Monitoring Software (CMS) platform. This integration enhances real-time situational awareness and automated threat detection for control rooms.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
The power of knowing your client
Ideco Biometrics Access Control & Identity Management Integrated Solutions
One of the most effective ways to combat the threat of fraud, identity theft, and financial crime threats is through a robust Know Your Client (KYC) process, which safeguards both businesses and clients.

Read more...
Managing identities for 20 years
Ideco Biometrics Technews Publishing SMART Security Solutions Access Control & Identity Management Integrated Solutions IoT & Automation
Many companies are now more aware of the risks associated with unauthorised access to locations and sensitive data and are investing in advanced identity authentication technologies to mitigate these threats.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.