classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2018


Unified security management
September 2018, Access Control & Identity Management, Products

Government and related entities are the biggest consumers of security, both physical and electronic forms. It is also a fact that most of this consumption is rather uncoordinated and inefficient at most times due to various reasons that cascades from lack of knowledge about the real as well as potential risks and threats that necessitates such a service or technology, to lack of knowledge of what products, solutions and services are available to address any security challenges that they may face.

A need for comprehensive and well-constructed security strategies for these institutions is more profound now than it has ever been in the past. This is due to security threats that are common knowledge to governments throughout the world. The prevalence of terrorism in any form (more prevalent to some governments than others), cyber related crime, identity theft etc., necessitates a paradigm shift and mind change in how governments and related entities handle security.

It can no longer be business as usual and security can no longer be relegated to the status of a peripheral service. There is a heightened level of awareness to security issues, hence the reclassification of such institutions and the promulgation of what is termed National Key Points strategy and related legislature in South Africa, for example. This is one strategy that was designed to ensure that a certain level of security and protection of classified institutions, information and people is achieved over and above what has been the norm. One must congratulate such efforts from government as indeed we have seen some change in certain instances where prescriptions of the strategy are adhered to.

The reality on the ground is that not a lot has changed. Physical and electronic security solutions are still fragmented, there is little if any coordination between systems and people, basic identity management is ignored, unauthorised movements are still the order of the day and surveillance and perimeter systems are at most as asleep as most guards are on night duty.

Some office buildings still do not have any system or person questioning a visitor’s movement within their premises, no elevator access control system in place etc. From the moment you enter the premises there is no clear indication of what security solutions are being used. The solution to most of these inefficiencies lies in partnerships between security stakeholders within government institutions and the relevant private sector role players.

The security industry is there for a reason and should be given a chance to participate in finding lasting solutions instead of being viewed otherwise. The correct mix and match of solutions must be designed and implemented, but most importantly the relationships that are created at implementation must be maintained post implementation to ensure that strategies deliver what was intended, are maintained and monitored to offer value for money for the client as well as security for valuable assets, which include people, buildings and equipment, as well as information.

For everyday working, offices need a comprehensive, convenient, user-friendly and high security level management solution. With an all-in-one security solution and ZKTeco security devices, ZKBioSecurity 3.1 is the best helper for these cases. As an upgraded version, ZKBioSecurity lets users customise access levels for everyone, including staff and visitors and control all ZKTeco devices from one interface.


Credit(s)
  Share via Twitter   Share via LinkedIn      

Further reading:

  • Visible light facial recognition with deep learning
    February 2019, ZKTeco, Access Control & Identity Management
    ZKTeco has created a unique range of visible light facial recognition products combined with a flexible Android platform.
  • Control via an app
    February 2019, Longse Distribution, CCTV, Surveillance & Remote Monitoring, Integrated Solutions, Products
    Control your home, from anywhere in the world, via the Bitdog remote mobile app.
  • Biometrics streamlines exams
    February 2019, Powell Tronics, Education (Industry), Access Control & Identity Management
    Ingress and egress points at universities are being converted to biometric solutions which provides enhanced security.
  • Centrally managed access
    February 2019, Paxton Access, Access Control & Identity Management, Integrated Solutions
    PaxLock Pro, Net2 and Net2 Entry provide emergency response services with a robust, wireless access control solution.
  • New release of AC2000
    February 2019, Johnson Controls, Access Control & Identity Management, Security Services & Risk Management
    Johnson Controls’ latest CEM Systems’ AC2000 release goes beyond security to help mitigate health and safety risks.
  • Suprema to license BioSign to Qualcomm
    February 2019, Suprema, Access Control & Identity Management, Products
    Suprema to license BioSign under-display fingerprint algorithm to Qualcomm Technologies.
  • Centurion opens doors
    February 2019, Centurion Systems, Access Control & Identity Management, Products
    Centurion Systems has added a range of door automation solutions to its product stable. Blending aesthetics, whisper-quiet operation and innovative technology.
  • Facial recognition terminal
    February 2019, ZKTeco, Products, Access Control & Identity Management
    The SpeedFace -H5 I a facial recognition terminal with a recognition distance of up to 3 m, which significantly improves maximum traffic rate, as well as wide-angle recognition. While most facial biometric ...
  • Uniview protects mosque
    February 2019, CCTV, Surveillance & Remote Monitoring, Products
    Uniview provided a complete video surveillance solution to protect the Hassan II Mosque, located in Casablanca.
  • New high-performance Husky NVRs
    February 2019, Milestone Systems, CCTV, Surveillance & Remote Monitoring, Products
    The Milestone Husky X series is a range of network video recorders that unlocks the full potential of Milestone XProtect video management software.
  • FaceKiosk-V43
    February 2019, ZKTeco, Products, Access Control & Identity Management
    43-inch touchscreen multipurpose facial recognition smart device with Android operating system.
  • Facial biometrics
    February 2019, Regal Distributors SA, Products, Access Control & Identity Management
    The KF460 is a terminal for the management of employee attendance and basic access control functions.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.