classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2017


How to implement physical security
November 2017, Government and Parastatal (Industry), CCTV, Surveillance & Remote Monitoring

Managers of both suburban and rural power substations are faced with many challenges today, including safety, power density, right-of-way issues and cost. One of the key factors attributed to these challenges is the increasing migration activity of people from rural areas to urban homes and workplaces, which in turn, drives up the demand for municipal power distribution systems.

Brent Cary.
Brent Cary.

In essence, city dwellers – or those who have maintained residence in an urbanised setting – are recognised as higher per-capita energy consumers, which consolidates the premise of ‘more users equals more power needed’. In order to address these challenges, a new strategy should be developed and implemented, which can be enacted upon after conducting a thorough and comprehensive risk assessment process.

One key concern with respect to the maintenance of control centres and substations is security. Power utility facilities have to deal with situations like theft, vandalism and the need to comply with set international security standards. In fact, a potential attack or emergency situation on these facilities underscores the risks associated with physical security breaches and their possibly disastrous effects.

Across the region, control centres and substations utilise basic technologies like perimeter fencing, outdoor lighting and CCTV surveillance. Some are still known to be using key-based access control and previous generation analogue video systems – hindering immediate intervention or quick action should a situation come to light. The grainy analogue video feeds will possibly be able to catch an intruder on camera, but will lack the sophistication that today’s high definition (HD) IP cameras can offer, that can result in an image for positive identification.

The emergence of these challenges, combined with the need to integrate newer technologies to help further enhance security measures should prompt the utilities industry to make a transformational shift towards more modern, advanced and highly-efficient Internet protocol (IP) solutions. Regulators should implement stronger security mandates and urge power providers and operators to make the bold move of upgrading their present security systems – especially across mission critical areas.

However, operators and providers must first conduct a review and assessment of security risks and vulnerabilities of their facilities, which will give them an idea on how to execute a security strategy should any situation arise. At the same time, these companies and organisations should put their own security standards in place – effective and efficient measures designed to address physical attacks, cyber attacks and the occurrence of natural disasters.

Utility providers and operators will now have to upgrade better security systems to help tighten security. Industry experts have recommended the use of specific system features to ensure a successful upgrading of equipment and have suggested the following;

• Implementation of network connected systems: Having all devices connected to a singular network presents many advantages and benefits, like real-time information, the immediate detection of potential threats, on-site modification and configuration and the easy management of the system itself.

• Utilisation of a strategic unified platform: With multiple security systems like CCTV video surveillance, access control, automatic licence plate recognition (ALPR) and perimeter detection running at each site, it is essential to utilise an open-architecture platform that can accommodate easy customisation and integration across a diverse range of security and business systems.

• Control and access to one central station: If there are multiple sites and substations to secure, centralising security operations becomes highly beneficial and cost-effective. The creation of a federated architecture will give operators and providers the ability to manage all sites and systems as one global operation. All video and data is sent back to a central location, where alarms and events from various sites can be received and acknowledged.

• Shift to open architecture: The move towards newer and more advanced systems will need a key feature like open architecture – which can facilitate the integration with other systems and provide complete freedom in the device selection process.

• Mapping and mobility: Using a map-based interface simplifies system navigation, which in turn can help effect quicker responses to arising situations. Meanwhile, mobile connectivity gives essential personnel the capability to access the facility’s systems though their phones, tablets or any mobile device – a pivotal advantage especially during critical situations that happen at odd hours of the day.

In conclusion, power utility providers and operators should develop and implement a comprehensive set of security strategies to aid them in their efforts to upgrade security systems that are also in compliance with international standards and guidelines. These utility facilities should understand the need to be up to speed with today’s technological advancements, particularly across the safety and security segment, thereby guaranteeing the safety and the security of these very essential utilities’ control centres and substations.

For more information contact Brent Cary, Genetec, bcary@genetec.com, www.genetec.com


Credit(s)
Supplied By: Genetec
Tel:
Fax:
Email: bcary@genetec.com
www: www.genetec.com
  Share via Twitter   Share via LinkedIn      

Further reading:

  • Aggregation, automation and augmentation
    April 2018, Milestone Systems, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring
    Memoori Market Research interviewed Milestone CTO Bjorn Eilertsen, who spoke about future trends in the video surveillance Industry.
  • How deep learning benefits the security industry
    April 2018, Hikvision South Africa, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring
    Artificial intelligence and deep learning are taking video analytics into a new era of improved recognition and potentially creating a revolution in pre-event alerts.
  • The question of value
    April 2018, Technews Publishing, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Cyber Security, Integrated Solutions
    How do you know your surveillance installation is delivering value? Do your service providers deliver value?
  • Surveillance-friendly storage
    April 2018, Capsule Technologies, Seagate Technology, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, IT infrastructure
    Storage solutions for surveillance must be designed for intense sequential writing to the disk and random reading. Your average desktop hard disk won’t do the job.
  • Beyond the hype: tomorrow’s surveillance, today’s reality
    April 2018, Technews Publishing, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Cyber Security, Integrated Solutions, IT infrastructure, Conferences & Events, Training & Education
    iLegal 2017 once again lived up to its reputation and saw a host of presenters offering insights and advice into a range of aspects related to the surveillance world.
  • Securing your surveillance
    April 2018, Cyber Security, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
    What are the basics your average company can do to secure its surveillance infrastructure from the various threats out there?
  • Feeling vulnerable?
    April 2018, Panasonic South Africa, Axis Communications SA, Cyber Security, CCTV, Surveillance & Remote Monitoring
    One could be forgiven for being sick and tired of hearing about cybersecurity, as it seems to be everywhere, all the time. But the threat is real.
  • Eight things to consider when designing a camera perimeter
    April 2018, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Perimeter Security, Alarms & Intruder Detection, Integrated Solutions
    PureTech Systems offers eight practical tips to remember when designing a camera-based perimeter security solution.
  • Picture this: your perimeter
    April 2018, Arecont Vision, Bosch Security and Safety Systems, Perimeter Security, Alarms & Intruder Detection, CCTV, Surveillance & Remote Monitoring
    Surveillance technologies play an important role in protecting your perimeter if the solution is planned and designed correctly.
  • Secure communication technology
    April 2018, Panasonic South Africa, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Cyber Security
    Cyber-attacks on IoT devices are on the rise, with video surveillance systems connected to the Internet also becoming a popular target.
  • Securing a retirement village
    April 2018, Axis Communications SA, Residential Estate (Industry), CCTV, Surveillance & Remote Monitoring
    Perimeter protection and thermal imaging provide safety and security for private retirement estate residents at Renishaw Hills.
  • Personalised service through facial recognition
    April 2018, Access Control & Identity Management, CCTV, Surveillance & Remote Monitoring
    Singapore bank delivers a personalised welcome with NeoFace facial recognition solution.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.