classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2017


Foresight and integration
July 2017, Integrated Solutions, Industrial (Industry)

The industrial segment of the South African economy has been under pressure for some time. The challenges faced by the industry are vast and varied, as are the threats of crime and fraud – like every other part of the South Afri-can economy.

In the past, security was something industry could add to the perimeter and perhaps to the access points to working areas, with perhaps a few cameras looking over these areas. Today, however, security is a more pressing concern, but at the same time it’s not something these companies want to spend a lot of money on, primarily due to the lack of return they feel security technology can provide.

Fortunately, as security technologies have advanced and converged into the IP platform, security solutions can today provide better coverage of operations than ever before, but it has also become possible to make use of security technology to assist in other areas of the business, such as health and safety, workforce management and more.

Hi-Tech Security Solutions spoke to two companies about their experience in dealing with the risks industrial concerns face.

• Xone Integrated Security, a South African systems integrator, and

• An industry expert from a global provider of security (and other) technologies and services who requested anonymity, so we call him John.

Risk factors

Is the industrial sector really any different from the rest of the business world when it comes to the security risks these companies have to deal with? It seems everyone is dealing with the same onslaught from seemingly better funded, protected and skilled criminal organisations.

Our industry expert believes the threats the industrial market faces today fall into three primary categories:

• Internal sabotage/ interruption to processes.

• Loss of intellectual property (IP).

• Theft of infrastructure.

Ian Downie, a director of Xone Integrated Security agrees, noting that syndicates are operational both within and external to these companies, looking for ways to cause trouble and/or make a profit. Their plans can include sabotage or industrial espionage, since forcing machinery to come to a standstill means a long recovery process to getting everything up and running safely, causing significant losses to the business.

Downie also raises the spectre of cyber-attacks, a relevant issue considering malware purportedly brought down eastern European power stations recently. Not only can cyber-attacks take a system down and keep it down by corrupting digital processes and data, it can also be used to steal plans and other company secrets.

Sadly, Downie says many companies in this sector are ill-equipped to deal with these threats. “The mindset of these operations is to focus on efficiency of delivery,” says Downie. “People’s primary job is to deliver a certain number of products in a certain time at a specific margin. Everything else takes second place.

“As soon as we deal with customers and they shift their mindset to including security objectives with an integrated focus, we see significant changes in what can be achieved both in terms of risk mitigation as well as efficiency. The effective integration of technology plays a key role here.”

When security and business systems are integrated, it offers the customer a more complete overview of their situation ‘on the floor’, allowing management to more closely track and measure almost every area of their operation. When the integrated systems all report into a management platform, supported by an effective workflow in which processes are automated, it helps the organisation to drive key deliverables and manage by exception – in other words, only get involved when there is an issue that needs attention.

Downie provides the example of a machine breaking and needing repairs, a normal event in every business. If the same equipment breaks down every day and the same people repair it, this would be an exception the platform highlights, allowing management to look into the issue.

Of course, as John notes, it isn’t simply a matter of installing technology and forgetting about it. Firstly, the implementation is of critical importance. The systems must be installed properly and integrated with other systems effectively, without causing more problems. Secondly, one can’t forget the human element.

If any technology is going to deliver benefits, it needs to have buy-in from the people using it. This applies to the people on the floor who may be under surveillance or may be required to use biometrics to track their time or access a machine, as well as those who set and manage the various policies and processes. It takes technology and people working together to make it all run smoothly.

Processes support efficiency and safety

Of all the different parts of a solution, the policies and procedures are perhaps the most important to ensure that in every foreseeable situation, both people and systems have a process to follow. For example, if there is an accident, the systems should automatically shut down in a safe manner (except for safety systems such as fire sprinklers, for example) and employees need to know what to do and where to go.

“Key to industrial environments is always the danger associated with manufacturing and ultimately workforce safety,” notes John. “Being able to muster staff in case of emergencies and track their whereabouts in these situations is a key deliverable that can be done through technology.”

As Downie notes, surveillance cameras can be used to immediately determine how many people are in a particular area, while biometric access controls could be used to know exactly who they are. Similarly, to prevent time wastage, if someone is not supposed to be in an area, they can be denied access or someone can be alerted to their presence.

In the industrial setting, effective policies and procedures allow for the automated monitoring of shifts to ensure that all shifts function at maximum efficiency and safety, even a late shift when the supervisor is not there. Should there be a problem, the right people can almost instantly be notified and the correct action initiated. Moreover, analysing the patterns of movement and activity after a shift provides more insight into how processes can be improved. Using your security technology for this additional value-adding service is not that hard to achieve if everything was planned and set up correctly.

Convergence and more

These solutions are attainable today, but convergence is the route to follow to make it happen and to be able to integrate various systems successfully. Our industry expert says this is more prevalent today than ever, as IT professionals in organisations are more involved and as the IoT (Internet of Things) gains momentum in industry. And although the security industry sees convergence as more systems moving to TCP/IP, John says that, “apart from Ethernet, security systems can now interface with popular field busses like Modbus, BACnet and OPC in order to share alarms and commands with process control equipment like PLCs.”

This enables a central management system that can monitor and control, and as Downie mentioned, allow for management by exception instead of having supervisors waste time wandering about peering over people’s shoulders. Unfortunately, many companies have stayed with the silo approach to everything and this limits the efficiencies they can attain from a central management platform.

“It’s a decision based on what people are used to rather than what can be done.” Downie says CCTV and video analytics is a prime example of this as people tend to confine surveillance to camera security feeds rather than integrating the video streams into a process that can assist in monitoring activity and improving productivity.

The cyber question

When dealing with integrated systems and solutions these days, the question of cyber security always takes centre stage. Downie says this is a serious issue, even in the industrial sector. These systems can be protected by firewalls and managed access to the network, but when you allow external access to your systems, as is required in a digitised supply chain, you can open yourself to vulnerabilities.

Of course, not implementing your systems efficiently and not keeping them up to date with the latest security patches is an easy way to place yourself at risk without even trying. The solution is to design your digital infrastructure from a security perspective from the beginning in order to provide for unhindered business data transmission and processing. Some would say it’s impossible to support efficiency and productivity because security is a bottleneck, but proper planning makes it a reality.

John notes that one secure product is not sufficient as the servers and the rest of the infrastructure must be planned and deployed correctly (and maintained) if users want to avoid vulnerabilities .

Taking industry to the next level, or Industry 4.0 as is the popular label these days is a task every company in this field will be dealing with (if they are not already). Digitising industry is not something to be wary of or to avoid as the benefits far outweigh the challenges. However, understanding the challenges and the risks and using the technologies available in both the security and business world (and securely integrating them for greater value) is the key to making more widgets in less time at a higher margin.

For more information, contact Xone Integrated Security, +27 (0)82 906 7600, ian@xone.co.za, www.xone.co.za


Credit(s)
Supplied By: Xone Integrated Security
Tel: 0861 65 65 65
Fax: +27 21 816 1214
Email: ian@xone.co.za
www: www.xone.co.za
  Share via Twitter   Share via LinkedIn      

Further reading:

  • Measurable policies and multi-layered approach hit the mother lode
    October 2017, This Week's Editor's Pick, Integrated Solutions, Mining (Industry)
    Securing mines is often a logistical nightmare as threats from common thieves to illegal miners are added to the inherent safety and security risks synonymous with mine complexes.
  • What’s in a platform?
    October 2017, Milestone Systems, Naxian Systems, Genetec, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
    Hi-Tech Security Solutions looks at what today’s security management platforms offer users from both small and large organisations.
  • Changing the SMB VMS landscape
    October 2017, Pelco by Schneider Electric, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
    Video surveillance innovations have changed the landscape for enterprise security with the ability to provide real-time monitoring, forensic investigations, risk mitigation and business operations management.
  • Beware of PoPI non-compliance
    October 2017, iFacts, Security Services & Risk Management, Integrated Solutions
    Ignorance of the law may not be sufficient to save you from the Act when it comes into operation.
  • Qognify secures global bank
    October 2017, Security Services & Risk Management, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
    Qognify announced that one of the world’s largest banks and financial services companies has selected Qognify Situator and its Operational Intelligence Centre (OIC) module to help manage its global security ...
  • Keeping pace with change
    October 2017, Johnson Controls, This Week's Editor's Pick, Integrated Solutions
    Hospitals need to secure not just their patients but their staff, their high value assets and sensitive areas like pharmacies. It requires an integrated approach.
  • Secure mining with integrated solutions
    October 2017, Forbatt SA, Mining (Industry), Integrated Solutions
    Securing a mine is a vast undertaking requiring one to use almost every security technology and process if you are to get it right.
  • Integrated mining surveillance
    October 2017, Cathexis Technologies, Mining (Industry), CCTV, Surveillance & Remote Monitoring, Integrated Solutions
    Gus Brecher, MD of Cathexis Africa and business development director of Cathexis Technologies, offers some insight into the challenges that securing mining ­operations poses.
  • CNL releases IPSecurityCenter V5.5
    October 2017, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
    CNL Software, a global Physical Security Information Management (PSIM) system software developer, has announced the release of IPSecurityCenter version 5.5.
  • True system collaboration
    October 2017, Naxian Systems, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
    Standalone security systems do not achieve organisational peace of mind, de-risk or optimise efficiencies, rather the value that they offer equates to no more than another begrudgingly checked compliance box.
  • Visualising without seeing
    October 2017, Hikvision South Africa, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
    One of the most exciting technologies in the security arsenal is thermal imaging, which essentially gives cameras the ability to monitor through darkness, fog, rain and other limited or zero visibility environments.
  • IoT enhances intruder detection
    October 2017, Elvey, Perimeter Security, Alarms & Intruder Detection, Integrated Solutions
    There is a definite trend towards making intruder detection equipment smarter, with an increased ability to integrate with other security and home/business management solutions.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.