classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2018


Delivering more than security
July 2017, This Week's Editor's Pick, Integrated Solutions, Industrial (Industry)

With so many moving parts, industrial and manufacturing concerns have a broader risk profile. This means their security solutions need to work harder – the safety of people and assets is at stake, but so is productivity. Smart organisations are making use of intelligent security solutions with open systems that can communicate with scada and operational systems to drive complex processes related to optimising operations, production and profitability.

Data collected by security systems can help address numerous issues and drive key processes. For example, smart algorithms within CCTV systems could work together with sensors in equipment and scada solutions to identify and address bottlenecks within manufacturing processes, or to identify anomalies (e.g., aggregate that has dropped off a conveyer belt and now poses a hazard) that require attention. Similarly, if key areas are out of bounds within a facility, a security system can help identify unauthorised personnel movements, helping to initiate processes to have the person quickly removed from the area or to shut dangerous equipment down.

Productivity and safety

In terms of enhancing productivity, a security system could relay key data relating to efficiency, for example, how many people are on a production line at a specific time. In conjunction with other information, this could help the organisation identify how many people are needed on a line to optimise outputs. The counting of people would in the past have been done by specialised equipment, now the advanced features of cameras make them capable of these functions and of communicating to operational equipment – it’s convenient to use them, and cost effective.

A more sophisticated, platform-based security system can also drive more than basic safety features. Low capability security solutions may simply grant access to specific personnel, based on their profiles. A more sophisticated access control system may be able to consult HR records to ensure the person seeking access has received the necessary training within the required period, and has not illegally signed in for a double shift, potentially compromising the safety of others and breaking health and safety codes.

In addition, by sending access information to payroll, a complete digital record can be created, automating some of this function too. Clearly, being able to integrate complex rules into these systems is of enormous benefit to organisations.

Privacy and control

Sharing too much data from security systems within the organisation’s scada and other systems can be problematic, however. Security threats come from everywhere – and scada systems present an easy target. So, for instance, while knowing how many people are in the building at any time will help ensure heating, ventilation and air conditioning (HVAC) outputs meet needs, attaching people’s names and designations to those numbers could be an invasion of their privacy. In addition, putting this kind of sensitive information into an operational system that typically does not have the protection that corporate systems do, is just asking for trouble.

The good news is that advanced systems will not only use standard communication protocols like OPC and BACnet, XML and APIs to communicate or feed information to scada and ops systems, they will only share very specific information, thus limiting risk and adhering to the POPI act.

One golden rule when it comes to integrating security with any other systems is that master central control must be vested in the security system. You don’t want the scada system controlling information or the distribution of information.

An automated, AI-driven future?

Beyond privacy, control and productivity, there’s one other reason manufacturing and industrial organisations need to be looking at making use of more sophisticated security systems: automation. As the fourth industrial revolution kicks in, automation, robotics and AI will begin to replace and augment human roles. Security needs will change, but use of an advanced security solution with open systems and the ability to communicate with scada and operational systems will be non-negotiable.

A vast range of intelligent security systems are currently available. Johnson Controls’ newly acquired Tyco range, for example, offers solutions tailored for specific environments and functions. These solutions are well worth exploring; the returns can be significant and clearly reach far beyond traditional security benefits.

For more information contact Johnson Controls, +27 (0)11 921 7141, neil.cameron@jci.com, www.johnsoncontrols.com


Credit(s)
  Share via Twitter   Share via LinkedIn      

Further reading:

  • Trust but continually verify
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Hi-Tech Security Solutions looks at access and identity management and asks some industry players what ‘zero trust’ and ‘least privilege’ access means.
  • Managing who, what and why
    November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security
    Today’s access control isn’t only concerned with who has access, but also what has access, why they need it and what they are doing with it.
  • Physical/logical convergence
    November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Integrated Solutions, IT infrastructure
    The convergence between physical and logical (or cyber) security will be a game-changer because it will change the way we do everything, from planning to design and all the way to installation and maintenance.
  • Physical and logical convergence is a fact
    November 2018, This Week's Editor's Pick, Integrated Solutions, IT infrastructure
    Convergence, the next buzzword? A dated buzzword? Is convergence ­merely ­integration on steroids? What is convergence?
  • The expanding role of IT in access control
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, IT infrastructure
    What role is IT playing in the world of physical access control and how far will its role expand in future?
  • Taking augmented identity to the world
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    Hi-Tech Security Solutions spoke to Gary Jones, VP Global Channel and Marketing biometric access and time solutions) at IDEMIA (formerly Morpho) about his career with the company and its new vision of Augmented Identity.
  • BIMS set to change identity ­management
    November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Local biometrics integrator, Ideco Biometric Security Solutions, has announced that its Biometric Identity Management System (BIMS) has been launched to market.
  • Tracking biometrics into a brave new digital world
    November 2018, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    The industry is increasingly transitioning from unimodal to more integrated multimodal biometric solutions for more accurate identity verification and faster real-time results.
  • A better approach to fingerprint biometrics
    November 2018, This Week's Editor's Pick, Access Control & Identity Management
    Not all optical biometric fingerprint scanners are created equal. The type of sensor used has a powerful impact on speed, accuracy, reliability and portability.
  • Key components of access control
    November 2018, Paxton Access, Access Control & Identity Management, Integrated Solutions
    Dan Drayton speaks to Hi-Tech Security Solutions about what the key components in modern access control systems are.
  • The right access decisions
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management
    Making the right access control decision depends on what you want secured and how secure it should be.
  • IP is no stranger to access control
    November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Just as the surveillance market made the move to IP-based communications, the access control market is also moving to IP (or some say it already has).

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.