Where safety, security and Industry 4.0 meet

July 2018 Editor's Choice, Integrated Solutions, Industrial (Industry)

Manufacturing plants and other industrial facilities are subject to a broader risk profile than almost any other type of business. Over and above the usual security concerns, they are often inherently hazardous environments with heavy machinery, high voltages and in some cases materials at extremely high temperatures.

The Internet of Things allows more and more data to be gathered from connected devices, but this is a double-edged sword. On the one hand, it poses a risk in and of itself in the form of data security. Industrial plants have been particularly victimised by cyberattacks in recent years, with some having had to cough up small fortunes to be released from ransomware and others having their operations meddled with or even shut down entirely.

The upside is that, if done smart, this data can be used to improve operations in numerous areas, as we found out by talking to Brendon Cowley, business development director at C3 Shared Services; Rivash Raghubir, general manager at RR Electronic Security Solutions (RRESS); and Ernest Mallett, regional sales director at Tyco Security Products.

Safety first?

According to Raghubir, security is taking a backseat to safety as the main driver when it comes to the innovative application of available technologies. “Companies are faced with the situation that there is a higher risk penalty for a person getting injured on their site than protecting the site itself from intrusion. Don’t get me wrong, security is still a core function, but the reality is that when companies are looking to tighten the purse strings, security is often the first budget to get cut, whereas the safety budget takes priority,” he says.

An example he gives of how technology is being multitasked comes in the form of a symbiosis between access control and time and attendance. When entering or leaving a site, facial recognition can be used to clock people in and out, which gets around the issue of people swiping someone else’s card to fool the system into believing they were at work when they actually weren’t.

It goes far beyond this though. “What we’re currently doing is taking analytics to the next level,” says Raghubir. “People are boasting about analytics like line crossing and presence sensing and licence plate recognition, but what we’re taking a step forward in doing now is monitoring people for a hardhat and eye goggles in a particular area, and using those analytics as a safety measure to not open an entrance door for someone without the correct PPE (personal protective equipment).”

Similarly, Tyco has enjoyed much success with large multinational manufacturers in providing enterprise class access control, says Mallett: “We’re not talking about your general everyday access control where the only thing a person needs is to scan a tag at a reader to gain access to a building. Our customers are worried about a lot more and they’re also using our access control systems to make their businesses better. The distinction between physical and logical access control comes into play here, so for example a company’s ERP system might not allow an employee to do anything unless it knows they’re physically at work.”

Cowley believes a shift is happening in the industrial sector when it comes to addressing health and safety issues. “Due to the nature of their operations, some industrial sites require workers to be subjected to health and safety validations such as medicals, polygraphs and alcohol tests. There has long been a shortcoming in the industrial market in this regard, but systems are now becoming sophisticated enough to start addressing those corporate governance needs.”

Integration matters

The key to addressing those needs, Cowley continues, lies in bringing disparate systems together into a seamless whole. “The push nowadays is to have an intelligent layer above all the different subsystems like access control, perimeter surveillance, intruder detection, etc., and making sure the correct information gets to the operators so the correct decisions can be made. The challenge in bringing all these systems together into a single command centre is that there is no standardisation of SOPs (standard operating procedures) and there are multiple interfaces.

“What is more, system integrators are often faced with the problem that a client has products and systems from different OEMs, and it can be very challenging to integrate them all together. Displaying information from a system is basic, but full bidirectional control and monitoring, from one command centre is a different story. The security industry is moving a bit closer to open platforms with the likes of ONVIF but that’s just the video part – what about all the thousands of commands you get from access control, intrusion and fire systems, for example?” he poses.

Integration is also a key element of the work RRESS does for its clients. “There is a strong focus in terms of integrated solutions,” Raghubir says, “and spending once to get two functions – safety and security – is definitely desirable. Features demanded by clients in terms of this integration include biometrics, access control, facial recognition, thermal and perimeter protection.

“Where a client has an existing system, instead of replacing the entire thing we look at different ways of using technology to fit the profiles in terms of safety as well as site monitoring of staff. There’s no reason why a camera or access point that monitors for the correct PPE can’t also be used to restrict access to an area by unauthorised people.”

Mallett believes that Tyco offers benefits on the integration front in terms of cost as well as reliability. “We own brands covering the spectrum of applications across access control, CCTV and intrusion detection. Those brands work hand-in-glove from a development point of view, meaning that there is no cost to companies in terms of integration. In fact we consider our solution to be more than just integrated – it is truly unified,” he states.

That obviates the risk of systems failing when system integrators do not follow the correct upgrade path, for instance if a VMS is updated to a newer version and the access control system can no longer communicate with it. Tyco has also put much effort into ensuring its products are secure from a cyber perspective, and making sure they’re ready for PoPI compliance, according to Mallett.

Powering Industry 4.0

The push towards smart manufacturing, commonly referred to as Industry 4.0, is seeing not only an ever expanding proliferation of IoT-enabled devices, but also innovation in terms of applying technologies. “It is absolutely the case that traditionally security-only systems like CCTV cameras are being utilised more and more to fulfil a productivity role,” Cowley states. We’re doing quite a few nice things where we give certain people certain user rights to monitor certain things, and you can have specific analytics just for production purposes, for fire purposes, for security, etc.

“Then you can also start applying certain layers of intelligence, so we can do things like pattern recognition, e.g. if something goes off and ten people walk there and this happens and that happens then it represents a security issue. The same can be done for production purposes, where you can identify certain trends and statistics, and can also extend to inventory management, where character recognition can confirm that a product has arrived at its destination.”

Another example offered by both Raghubir and Mallett is the use of a camera to monitor a production line, so that if there is a bottleneck or other problem, an alarm can be raised. Yet another example is monitoring a machine’s temperature to ensure it doesn’t go above a certain level, thereby performing a dual safety and preventative maintenance function.

There is no doubt that concepts like Industry 4.0, the Internet of Things, and big data are game changers for the industrial sector, and are increasingly being put into practice. As innovative ways of applying them continue to be developed, manufacturing companies will continue to reap the rewards of better efficiencies and ultimately lower operating costs.

For more information contact:

• C3 Shared Services, +27 11 312 2041, bcowley@c3ss.com, www.c3ss.com

• RR Electronic Security Solutions, +27 11 794 2825, rivash@rress.co.za, www.rress.co.za

• Tyco Security Products, +27 11 026 9476, ernest.mallett@jci.com, www.tycosecurityproducts.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

SMARTpod talks about HomeSec Expo 2026
SMART Security Solutions Technews Publishing News & Events Residential Estate (Industry) Videos
SMARTpod, the podcast from SMART Security Solutions, finds out more about the upcoming HomeSec Expo happening at Gallagher Estate on 4 & 5 March 2026.

Read more...
Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
From the editor's desk: It’s all about data
Technews Publishing News & Events
      Welcome to the SMART Access and Identity Handbook 2026. We have slightly changed the handbook this year, specifically the selection guides, but there is still a lot of industry information inside, and ...

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.