Protecting critical infrastructures

September 2014 Industrial (Industry), Products & Solutions

In the wake of the attacks in New York and Washington on 11 September 2001, the Madrid train bombing on 11 March 2004 and the London Underground attacks in July 2005, nations around the globe have developed new strategies to defend themselves against international terrorism.

Homeland security, virtually unknown in the last century, quickly became the prevalent umbrella term for all security efforts towards this goal. Other than national security, which is generally a responsibility of the respective government alone, homeland security is a shared effort of government and the private sector. This is mainly because many critical infrastructures that form the centre of all homeland security strategies are privately owned.

Such infrastructures serve as vital lifelines in today´s societies. We are reliant on the supply of energy and water, information technology and mobility functioning in a dependable manner. Large-scale failures of these systems or other important infrastructures, even for only short periods, can have serious consequences. Critical infrastructures must thus be protected against potential terrorist attacks, but other dangers also need to be addressed. Natural disasters such as earthquakes and floods, for example, can cause substantial destruction, as the recent events in Fukushima have impressively demonstrated.

The Bosch building integration system (BIS) provides a single Web-based control point for monitoring all security, safety and facility management systems. This includes alarm management, fast alarm identification via location maps and follow-up procedures. It seamlessly integrates fire and intrusion alarms, evacuation, access control, video surveillance and building automation systems into a single platform. BIS enables a single operator to monitor and control all Bosch and third-party security systems as well as to respond faster to emergencies and achieve greater overall effectiveness.

Hostile acts or vandalism on the manufacturing or plant areas can be perilous and CCTV systems enable early detection to suspicious behaviour and help to confirm and validate alarms. In combination with intelligent video analysis (IVA) Bosch cameras establish a virtual perimeter fence that if crossed, alerts a security operator. It allows operators to supervise production processes and continuous real-time image analysis allows unplanned or critical events to be detected.

For more information contact Bosch Security Systems – South Africa & Sub-Sahara Africa, +27 (0)11 651 9600, eulene.jones@za.bosch.com, www.boschsecurity.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Inside the RealScan SG10
neaMetrics Access Control & Identity Management Products & Solutions
The SG10 was optimised for speed at every stage, from capture to processing. The result is faster fingerprint acquisition and near-instant response for operators.

Read more...
AI-powered classification across large areas
Axis Communications SA Surveillance Products & Solutions AI & Data Analytics
Axis Communications announced the upcoming launch of two innovative radars. Each device delivers a 180° or 270° horizontal field of detection, with accurate AI-powered classification across large areas, 24/7, in all weather and lighting conditions.

Read more...
Unified, AI-powered security platform
Suprema neaMetrics Access Control & Identity Management Surveillance Products & Solutions
Suprema recently announced the launch of BioStar X, its advanced unified security platform. BioStar X unifies biometric access control and video surveillance into a single, scalable platform.

Read more...
Factories, grids, and finance: Critical infrastructure cyber lessons of 2025
Asset Management Information Security Industrial (Industry)
Africa has seen an accelerated, large-scale digitisation of our overall industrial base, and this rapid convergence of IT and OT is happening on a foundation that, in essence, was not designed to be cybersecure.

Read more...
Identity-led security in banking
Secutel Technologies Access Control & Identity Management Products & Solutions
Traditional keys, cards, and siloed systems are no longer sufficient in a world where security, compliance, and operational efficiency must work together seamlessly. In 2026, the focus is firmly on smart access.

Read more...
Proactively enhancing campus safety
Surveillance Products & Solutions
Strengthening security management and proactive alerting have become priorities for schools. To address risks such as expansive campuses, multiple entry points, blind spots, and potential intrusions.

Read more...
Recording 40 high-resolution channels
Dallmeier Electronic Southern Africa Surveillance Products & Solutions
With the new MK4 revision of the DMS 2400, Dallmeier introduces a more powerful version of its video appliance, enabling the recording of up to 40 high-resolution video streams, and offering significantly increased capacity.

Read more...
Short-range indoor LiDAR sensor
OPTEX Perimeter Security, Alarms & Intruder Detection Infrastructure Products & Solutions
The REDSCAN Lite RLS-1010L has been developed to provide comprehensive coverage and protect high-risk security zones and vulnerable, narrow indoor spaces that are difficult to protect with traditional sensors.

Read more...
Innovations shaping the safety and security landscape
Integrated Solutions Products & Solutions
TMT Services and Supplies is excited to connect with all attendees, share insights, and explore the latest trends and innovations shaping the safety and security landscape.

Read more...
Putting security in gear
Asset Management Products & Solutions
The inaugural Securex Cape Town 2025 will showcase a number of companies focused on vehicle and fleet security on South Africa’s dangerous and often crime-infested roads.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.