A BMS remains essential, but is it secure?

1 May 2017 Surveillance, Integrated Solutions

Building management systems (BMS) have come a long way. They don’t just manage the physical environment of facilities, these platforms now enable the integration, and centralise the control of multiple building systems. Their role is becoming more, not less, important as these systems begin to converge with IT and enterprise systems. However, increased integration creates security loopholes. Is the BMS a weak link?

With more integration and distribution of information between systems, there is greater opportunity to hack into sensitive enterprise systems. It’s a very real risk. The challenge is that it’s difficult to share and keep systems secure, especially when the core functionality of systems is different. Security systems are built to protect people and assets. BMS functionality, because it is focused on managing an internal environment, is not usually security-oriented. Care thus needs to be taken with regard to how systems share information, as well as how much and what information they share.

For example, it may be effective to share basic occupancy information, such as how many people are working in which parts of the facility, to assist the BMS to make decisions about where lighting and ventilation may be switched off; it may be a security risk to also share detailed personal information about who these people are.

Security standards – let’s shake on it

The standards and the technology each system uses will also differ. BMS’s make use of open systems which make it easier to share non-critical information, such as temperatures within the facility, the performance of HVAC equipment and energy usage. Enterprise systems containing sensitive information generally require authentication before granting access.

To get around this, Johnson Controls has found that cybercriminals will make use of systems with low-level security to get into more critical enterprise systems – for a hacker, for instance, it may be just a hop and a skip to the company’s HR database via a controller that is part of a company’s access control system which is being fed information about which areas of a facility a card holder may access. And once inside the enterprise system, access to sensitive customer data is within reach.

To combat this, Johnson Controls has built additional Dark Node security into its Metasys BMS solution that ensures secure handshakes between devices. This capability makes it difficult for hackers to simulate different devices and hack into a system. It’s something that has become increasingly important to be aware of as the computing capacity and the intelligence of controllers – the basic hardware components that make access control systems work, opening and closing doors and turn on the sprinklers when the smoke alarms go off– continue to grow, opening security loopholes that heighten threat risks.

Secure BMS’s are here to stay

Will BMS’s be replaced by, or converge with other solutions like physical security information management (PSIM) software? The short answer is no, the functionality of the BMS is too advanced, too specific and valuable to be easily replaced. What users can expect is greater interoperability between BMS and other systems along with a stronger focus on what is shared, how it is shared, and what information is stored. In other words, security awareness and implementation of security measures within BMS systems will become non-negotiable.

The strategic roadmap for BMS platforms will see them continue to advance, becoming easier to install and operate. Users can expect more interoperability with a lot more plug-and-play integration and wireless information sharing. The winners, however, will be those platforms that put the right security and sharing processes in place to ensure the enterprise, its assets, people and customers are secure.

For more information contact Johnson Controls, +27 (0)11 921 7141, [email protected], www.johnsoncontrols.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

ArxTech: Over 30 years of evolving security solutions for South Africa’s toughest challenges
Security Services & Risk Management Integrated Solutions
[Sponsored] For over 30 years, a Centurion-based company has helped shape how security technology is designed, deployed, and supported in South Africa. Originally known as CellSecure, it now operates as ArxTech.

Read more...
Drones and a hint of access control
Surveillance Products & Solutions
Drones are an indispensable tool for security operations, with more functionality and capabilities than ever. Securex Cape Town 2025 will naturally have drone service providers available to light the way for interested parties.

Read more...
Innovations in video management
Arteco Global Africa Surveillance
Visitors to Securex Cape Town this year will have the opportunity to experience Arteco’s latest innovations in video management and integrated security technology, including uSee VMS, Arteco’s hybrid-cloud video management platform.

Read more...
Human-centric control rooms
Iritron Integrated Solutions Surveillance Residential Estate (Industry)
Iritron and Oculus show that when it comes to control rooms, people, not just technology, are at the centre of the most significant performance differentiators today, not just how efficiently the technology works.

Read more...
Cape Town estates gain access to advanced security technology at Securex
Securex South Africa News & Events Integrated Solutions
For the first time, estate and complex security decision-makers in the Western Cape will have direct access to the breadth of solutions and expertise these shows are synonymous with.

Read more...
Smarter security for safer estate living
neaMetrics Suprema Integrated Solutions Surveillance Access Control & Identity Management Residential Estate (Industry)
The expansion of residential estates has led to many communities being constructed with security as an afterthought. Unfortunately, fencing, cameras, and a guard at the gate only create a false sense of safety, which vanishes after the first incident.

Read more...
Making drone security more accessible
Editor's Choice Integrated Solutions Residential Estate (Industry) AI & Data Analytics IoT & Automation
Michael Lever discusses advances in drone technology, focusing on cost reductions and the implementation of automated services, including beyond line of sight capabilities, for residential estates with SMART Security Solutions.

Read more...
View from the trenches
Technews Publishing SMART Security Solutions Editor's Choice Integrated Solutions Security Services & Risk Management Residential Estate (Industry)
There are many great options available to estates for effectively managing their security and operations, but those in the trenches are often limited by body corporate/HOA budget restrictions and misunderstandings.

Read more...
Secure, long-distance thermal from Keenfinity
Products & Solutions Surveillance Residential Estate (Industry)
The DINION thermal 8100i camera is a bullet thermal camera built for mission-critical applications, prioritising long-distance monitoring and reliable perimeter intrusion detection with built-in Intelligent Video Analytics (IVA) Pro Perimeter video analytics.

Read more...
IVA AI Pro Visual Gun Detection
Products & Solutions Surveillance Security Services & Risk Management Residential Estate (Industry)
Bosch has announced the launch of the IVA AI Pro Visual Gun Detection analytics based on deep learning. It is designed for automatic detection and classification of people and brandished firearms.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.