classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2018


Where safety, security and Industry 4.0 meet
July 2018, This Week's Editor's Pick, Integrated Solutions, Industrial (Industry)

Manufacturing plants and other industrial facilities are subject to a broader risk profile than almost any other type of business. Over and above the usual security concerns, they are often inherently hazardous environments with heavy machinery, high voltages and in some cases materials at extremely high temperatures.

The Internet of Things allows more and more data to be gathered from connected devices, but this is a double-edged sword. On the one hand, it poses a risk in and of itself in the form of data security. Industrial plants have been particularly victimised by cyberattacks in recent years, with some having had to cough up small fortunes to be released from ransomware and others having their operations meddled with or even shut down entirely.

The upside is that, if done smart, this data can be used to improve operations in numerous areas, as we found out by talking to Brendon Cowley, business development director at C3 Shared Services; Rivash Raghubir, general manager at RR Electronic Security Solutions (RRESS); and Ernest Mallett, regional sales director at Tyco Security Products.

Safety first?

According to Raghubir, security is taking a backseat to safety as the main driver when it comes to the innovative application of available technologies. “Companies are faced with the situation that there is a higher risk penalty for a person getting injured on their site than protecting the site itself from intrusion. Don’t get me wrong, security is still a core function, but the reality is that when companies are looking to tighten the purse strings, security is often the first budget to get cut, whereas the safety budget takes priority,” he says.

An example he gives of how technology is being multitasked comes in the form of a symbiosis between access control and time and attendance. When entering or leaving a site, facial recognition can be used to clock people in and out, which gets around the issue of people swiping someone else’s card to fool the system into believing they were at work when they actually weren’t.

It goes far beyond this though. “What we’re currently doing is taking analytics to the next level,” says Raghubir. “People are boasting about analytics like line crossing and presence sensing and licence plate recognition, but what we’re taking a step forward in doing now is monitoring people for a hardhat and eye goggles in a particular area, and using those analytics as a safety measure to not open an entrance door for someone without the correct PPE (personal protective equipment).”

Similarly, Tyco has enjoyed much success with large multinational manufacturers in providing enterprise class access control, says Mallett: “We’re not talking about your general everyday access control where the only thing a person needs is to scan a tag at a reader to gain access to a building. Our customers are worried about a lot more and they’re also using our access control systems to make their businesses better. The distinction between physical and logical access control comes into play here, so for example a company’s ERP system might not allow an employee to do anything unless it knows they’re physically at work.”

Cowley believes a shift is happening in the industrial sector when it comes to addressing health and safety issues. “Due to the nature of their operations, some industrial sites require workers to be subjected to health and safety validations such as medicals, polygraphs and alcohol tests. There has long been a shortcoming in the industrial market in this regard, but systems are now becoming sophisticated enough to start addressing those corporate governance needs.”

Integration matters

The key to addressing those needs, Cowley continues, lies in bringing disparate systems together into a seamless whole. “The push nowadays is to have an intelligent layer above all the different subsystems like access control, perimeter surveillance, intruder detection, etc., and making sure the correct information gets to the operators so the correct decisions can be made. The challenge in bringing all these systems together into a single command centre is that there is no standardisation of SOPs (standard operating procedures) and there are multiple interfaces.

“What is more, system integrators are often faced with the problem that a client has products and systems from different OEMs, and it can be very challenging to integrate them all together. Displaying information from a system is basic, but full bidirectional control and monitoring, from one command centre is a different story. The security industry is moving a bit closer to open platforms with the likes of ONVIF but that’s just the video part – what about all the thousands of commands you get from access control, intrusion and fire systems, for example?” he poses.

Integration is also a key element of the work RRESS does for its clients. “There is a strong focus in terms of integrated solutions,” Raghubir says, “and spending once to get two functions – safety and security – is definitely desirable. Features demanded by clients in terms of this integration include biometrics, access control, facial recognition, thermal and perimeter protection.

“Where a client has an existing system, instead of replacing the entire thing we look at different ways of using technology to fit the profiles in terms of safety as well as site monitoring of staff. There’s no reason why a camera or access point that monitors for the correct PPE can’t also be used to restrict access to an area by unauthorised people.”

Mallett believes that Tyco offers benefits on the integration front in terms of cost as well as reliability. “We own brands covering the spectrum of applications across access control, CCTV and intrusion detection. Those brands work hand-in-glove from a development point of view, meaning that there is no cost to companies in terms of integration. In fact we consider our solution to be more than just integrated – it is truly unified,” he states.

That obviates the risk of systems failing when system integrators do not follow the correct upgrade path, for instance if a VMS is updated to a newer version and the access control system can no longer communicate with it. Tyco has also put much effort into ensuring its products are secure from a cyber perspective, and making sure they’re ready for PoPI compliance, according to Mallett.

Powering Industry 4.0

The push towards smart manufacturing, commonly referred to as Industry 4.0, is seeing not only an ever expanding proliferation of IoT-enabled devices, but also innovation in terms of applying technologies. “It is absolutely the case that traditionally security-only systems like CCTV cameras are being utilised more and more to fulfil a productivity role,” Cowley states. We’re doing quite a few nice things where we give certain people certain user rights to monitor certain things, and you can have specific analytics just for production purposes, for fire purposes, for security, etc.

“Then you can also start applying certain layers of intelligence, so we can do things like pattern recognition, e.g. if something goes off and ten people walk there and this happens and that happens then it represents a security issue. The same can be done for production purposes, where you can identify certain trends and statistics, and can also extend to inventory management, where character recognition can confirm that a product has arrived at its destination.”

Another example offered by both Raghubir and Mallett is the use of a camera to monitor a production line, so that if there is a bottleneck or other problem, an alarm can be raised. Yet another example is monitoring a machine’s temperature to ensure it doesn’t go above a certain level, thereby performing a dual safety and preventative maintenance function.

There is no doubt that concepts like Industry 4.0, the Internet of Things, and big data are game changers for the industrial sector, and are increasingly being put into practice. As innovative ways of applying them continue to be developed, manufacturing companies will continue to reap the rewards of better efficiencies and ultimately lower operating costs.

For more information contact:

• C3 Shared Services, +27 11 312 2041, bcowley@c3ss.com, www.c3ss.com

• RR Electronic Security Solutions, +27 11 794 2825, rivash@rress.co.za, www.rress.co.za

• Tyco Security Products, +27 11 026 9476, ernest.mallett@jci.com, www.tycosecurityproducts.com


Credit(s)
  Share via Twitter   Share via LinkedIn      

Further reading:

  • From the editor’s desk: Integrate or fail
    October 2018, Technews Publishing, News
    The news earlier this month was that Bloomberg Businessweek published a story about Chinese cyber spies (well, with our media it has to be them or the Russians). Apparently, these devious spies had corrupted ...
  • Letter to the editor
    October 2018, Technews Publishing, Associations, Perimeter Security, Alarms & Intruder Detection
    We refer to an article published in your August 2018 edition, namely “The alarming disadvantages of home security systems”, written by Meraj Hoda, vice president of Ring Inc. The content of this article ...
  • Letter to the editor
    October 2018, Technews Publishing, CCTV, Surveillance & Remote Monitoring
    Dear Technews Publishing,    I read the article “Nice price, but consider the cost” on the Hi-Tech Security Solutions website (https://www.securitysa.com/8432R) and have the following comment. Much of ...
  • Digital banking crime statistics
    October 2018, This Week's Editor's Pick, News
    The South African Banking Risk Information Centre (SABRIC) has released its inaugural digital banking crime statistics.
  • Breaking par for security at ­Woodhill
    October 2018, Technews Publishing, This Week's Editor's Pick, Integrated Solutions, Security Services & Risk Management, Residential Estate (Industry)
    Xone Integrated Security was selected to provide a full security service to the luxurious Woodhill ­residential estate
  • Keeping guarding personnel on mines safe
    October 2018, Betatrac Telematic Solutions, Technews Publishing, Instacom, Active Track, Mining (Industry), Security Services & Risk Management, Products
    They patrol your property in the dead of the night, often risking life and limb, but what can mining companies do to offer their security guards some safety while fulfilling their dangerous duties?
  • A platform for enabling IoT ­solutions
    October 2018, Technews Publishing, This Week's Editor's Pick, Integrated Solutions, IT infrastructure
    Digital Twin is a South African company that has developed a hardware, software and communication platform to enable companies to harness the Internet of Things (IoT) for their own applications.
  • There’s more than one approach to video verification
    October 2018, Technews Publishing, Perimeter Security, Alarms & Intruder Detection, CCTV, Surveillance & Remote Monitoring
    It is no secret that false alarms are one of the biggest headaches presented by electronic security systems, but video verification is emerging as an efficient solution.
  • Multiple cameras, one licence
    October 2018, Technews Publishing, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
    Hi-Tech Security Solutions asks the industry what the benefits of multi-sensor cameras are and where in the market they are finding traction.
  • Thermals with analytics are a ­winning combination
    October 2018, Technews Publishing, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
    Thermal cameras are a must-have in many security installations, and performance improves when enhanced with video analytics.
  • Effective edge security needs to be holistic
    October 2018, Technews Publishing, Cyber Security
    The modern paradigm requires that a holistic and layered approach be adopted to secure networks from breaches at the edge, and everywhere else.
  • Securing edge devices and the data they contain
    October 2018, AVeS Cyber Security, This Week's Editor's Pick, Cyber Security, IT infrastructure
    Charl Ueckermann looks at some best practices to ensure edge devices are not your biggest risk devices in a hyper-connected, perimeter-less world.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.