classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2018


Secure your disruption
May 2017, Financial (Industry), Integrated Solutions

Financial institutions are typically large, complex entities. They have one key requirement when it comes to security – the solutions they select have to last the distance. This means they need to be able to evolve rapidly, integrate easily with other systems and be flexible, adapting to the changing needs of the business. In a sector where change and disruption are key factors, and technology and cyber threats are advancing apace, these are critical requirements.

Financial institutions have a substantial footprint with lots of real estate, large distribution networks, a sizeable staff complement and multiple huge data centres, the engine rooms at the core of their business. A high level of digital disruption in this sector has seen new business models emerge, ushering in new, more digital and virtual means of engaging with customers, and a bigger focus on customer experience. This has made securing the business, its assets, people and customers a multifaceted challenge. Are there security solutions that can keep pace with transformation in this sector?

Physical, logical and virtual systems converge

For many financial organisations, operational efficiency, securing cost efficiency and risk management remain a high priority. As physical, logical and virtual systems converge, assets, information and people are under threat. To achieve greater control and lower risk, the consolidation of systems and efforts to achieve standardisation across these organisations have become increasingly important.

The IT environment is far from stable as technology continues to leapfrog ahead. CCTV systems, for example, have evolved from using local storage for footage to using network storage, from running analytics on the server to enabling analytics on the network device, and from providing a single camera view to providing multiple simultaneous views. At the same time, legacy systems must be incorporated. With multiple protocols and formats to accommodate, a standardised environment where, for example, end-to-end encryption is enabled, is vital.

How does consolidation and standardisation drive tighter security? Consider this: whether in a backwater town or major city centre, every branch of a bank presents the same level of risk, in that each provides access to the bank’s core systems. Security thus must be applied in a consistent manner across geographies and facilities, regardless of relative perceptions of risk.

Similarly, banking organisations often have personnel moving between branches and banking divisions. With larger banks employing more than 100 000 staff across hundreds of branches, this can be a security nightmare, especially as banking halls become more ‘open’ to customers and it becomes more difficult to identify staff and manage access to restricted areas. With increased threats to data, assets and people, it is critical that the security systems in place be able to work together to manage identity and access, placing a single consistent layer of protection across the organisation, regardless of facility type or geography.

Such a system would, for example, ensure each employee only needed a single security card (rather than multiple cards for multiple sites) that would grant them access to specific areas based on their security level, for example, to restricted areas but not to strongboxes. It would also work at a logical level, denying network access to someone who tries to sign in from one location while being logged in at another.

It’s clear why leading control and security solutions that have a large research and development component, clear roadmaps, a proven track record and global recognition are gaining favour among financial organisations.

Security smoothes the way

Financial institutions function in a highly competitive environment where customer service and the customer experience is a differentiator. This has seen facilities introduce couches and ticketing systems in banking halls. With security systems sharing the banking network with these systems, it’s not hard to see the synergies. For example, to improve floor operations, CCTV camera footage feeds logistics systems, alerting managers to where service bottlenecks may be forming and driving allocation of more consultants to particular areas.

As physical, logical and virtual systems continue to converge, ensuring a single consistent risk and security policy will be very important. Any new security systems or features will require forethought. Ensuring that their security systems are open, integrate easily with other systems, and constantly evolve, enabling the organisation to make use of new and emerging technologies, will position banks well to secure their people, customers and assets in physical and virtual environments.

As businesses continue to evolve with the help of technology, the goal is to build even smarter, more secure and more sustainable environments. Smart solutions that harness new technologies and emerging approaches will create a firm foundation for growth and competitiveness.

For more information contact Johnson Controls, +27 (0)11 921 7141, neil.cameron@jci.com, www.johnsoncontrols.com


Credit(s)
  Share via Twitter   Share via LinkedIn      

Further reading:

  • Trust but continually verify
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Hi-Tech Security Solutions looks at access and identity management and asks some industry players what ‘zero trust’ and ‘least privilege’ access means.
  • Physical/logical convergence
    November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Integrated Solutions, IT infrastructure
    The convergence between physical and logical (or cyber) security will be a game-changer because it will change the way we do everything, from planning to design and all the way to installation and maintenance.
  • Physical and logical convergence is a fact
    November 2018, This Week's Editor's Pick, Integrated Solutions, IT infrastructure
    Convergence, the next buzzword? A dated buzzword? Is convergence ­merely ­integration on steroids? What is convergence?
  • Taking augmented identity to the world
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    Hi-Tech Security Solutions spoke to Gary Jones, VP Global Channel and Marketing biometric access and time solutions) at IDEMIA (formerly Morpho) about his career with the company and its new vision of Augmented Identity.
  • BIMS set to change identity ­management
    November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Local biometrics integrator, Ideco Biometric Security Solutions, has announced that its Biometric Identity Management System (BIMS) has been launched to market.
  • Tracking biometrics into a brave new digital world
    November 2018, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    The industry is increasingly transitioning from unimodal to more integrated multimodal biometric solutions for more accurate identity verification and faster real-time results.
  • Key components of access control
    November 2018, Paxton Access, Access Control & Identity Management, Integrated Solutions
    Dan Drayton speaks to Hi-Tech Security Solutions about what the key components in modern access control systems are.
  • IP is no stranger to access control
    November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Just as the surveillance market made the move to IP-based communications, the access control market is also moving to IP (or some say it already has).
  • Applying the SaaS model to access control
    November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions
    The software-as-a-service model has proven transformative to many organisations, and even entire industries. The benefits it can offer are undeniable, but in the security sector which is risk-averse by necessity, we wanted to hear the views of some local experts in access control as a service (ACaaS) to find out what some of the pros and cons are.
  • Cloud-based access control
    November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions
    Running your access control through a cloud service has made people nervous in the past, but today’s solutions are hard to beat.
  • Controlling access in the cloud
    November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions
    In the access control arena, hosted or managed services have been around for a few years, and the adoption of cloud-based access control only continues to grow as companies become more and more open to the idea of relying on it to perform such a vital function within their business.
  • They sure don’t make them like they used to
    November 2018, Technews Publishing, Access Control & Identity Management, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
    The latest offerings in the market with respect to doorbells and intercoms, and what functionality they offer.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.