Drilling deeper into essential building management systems

1 February 2020 Security Services & Risk Management

Recent technological advancements in the building and construction industry, as well as the growing use of Internet of Things (IoT) technology in building automation systems, added to increasing demand for energy-efficient systems and the growing penetration of smartphones in building automation, are all playing a role in fuelling the growth of the BMS industry across the globe.

So says Glenn Noome, director at Smart Integration, an Ulwembu Business Services organisation. He explains, “A recent survey by Radiant Insights, ‘Global Building Management System Market Size, Status and Forecast 2025’, stated that there are several additional factors influencing the ongoing BMS market growth.

“These include cost efficiencies, the increasing adoption of building management systems within both the commercial and residential spaces, simplified building operations, and lower maintenance. Furthermore, favourable government initiatives and schemes to promote energy-efficient and eco-friendly buildings are expected to offer numerous growth opportunities for industry players and vendors across the globe, says the study.

“In South Africa in particular, load shedding has meant that both companies and individuals are more focused on energy efficiency than ever before. Thus there is a growing demand for a method of managing heating, ventilation, and air conditioning (HVAC) and lighting systems in particular – due to their power hungry nature – more effectively, and BMS can offer just this.”

A significant focus area for Smart Integration, the organisation has drilled down into the holistic requirements of BMS, outlining five vital areas, namely: data and fibre installations, utility solutions, security, access control, lighting and CCTV, control centres and fire protection.

Data and fibre installations

Data and fibre installations are the cornerstone of BMS, says Noome. “The IP-based network forms the base infrastructure for most other BMS sub-systems. These include CCTV, access and lighting control, telephone and alarm systems, as well as boardroom solutions, which are all IP-based systems that need to run on a stable, cabled backbone such as fibre or copper.”

Utility solutions

Companies minimise and manage their utility (water and energy) consumption for two reasons and these are to reduce costs, and to support their corporate sustainability and environmental responsibility initiatives. These boxes can easily be checked by utilising smart water and electricity meters, alternate energy solutions, controlled lighting systems – and even blind control to minimise heat from the sun in the office or working environment.

Security, access control, lighting and CCTV

For local businesses, security is obviously a top priority. A CCTV surveillance system can deter, monitor and record activities within the premises that may include theft, intrusion and harm to persons. The system is able to raise early alerts to enable the correct response. In addition, footage can be used in criminal cases that may result from these activities, and used to identify the perpetrators.

Monitor and control centre

Noome clarifies that remote monitoring and reporting capabilities should be used to support the centralised management and control of the building and the related activities within the physical environment. “Data gathered and analysed can provide useful information for clients to identify trends, reduce false alarms, monitor and manage consumption of energy and water, and make prudent management decisions that support optimal security and effective building management,” he says.


Glenn Noome

Fire protection

Fire prevention, detection and suppression are a must in any populated environment. Fire protection systems must be designed, tested and inspected according to the applicable regulations, codes and standards to ensure safe working and operational conditions, even in harsh environments.

“Building management systems are installed with the aim of creating secure, reliable buildings by giving access to the control and monitoring of activities such as ventilation, lighting, power control, data and fibre installation, data centre management and control, fire and security systems, lifts, plumbing systems and so on,” says Noome.

“The greatest advantages of BMS include efficient management and controlling of energy consumption, central and remote monitoring of the building, facilitating the safety and security of data, the stimulation of internal comfort conditions for the occupants of a building, and facilitating a longer life span for the building in general. At Smart Integration, we note the recent technological advances in the building and construction industry and anticipate a growth in the BMS arena moving forward,” concludes Noome.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...
Security ready to move out of the basement
AI & Data Analytics Security Services & Risk Management
Panaseer believes that in 2026, a board member at a major corporation will lose their job amid rising breaches and legal scrutiny, as organisations recognise that cyber risk is a business risk that CISOs cannot shoulder alone.

Read more...
Cyber remains top business risk, but AI fastest riser at #2
News & Events Security Services & Risk Management
The Allianz Risk Barometer 2026 ranks cybersecurity, especially ransomware attacks, as the #1 risk, while AI is the biggest riser and jumps from #10 to #2, highlighting the emerging risks for companies in almost all industry sectors.

Read more...
OT calculator to align cyber investments with business goals
Industrial (Industry) Information Security Security Services & Risk Management
The OT Calculator has been developed specifically for industrial organisations to assess the potential costs of insufficient operational technology (OT) security. By offering detailed financial forecasts, the calculator empowers senior management to make well-informed decisions.

Read more...
From digital transformation to digital sovereignty
Security Services & Risk Management IoT & Automation
As cyberthreats grow, data regulations tighten, and AI becomes central to economic competitiveness, countries are recognising the need to control and protect their own digital assets.

Read more...
The age of Lean 4.0: Orchestrating intelligence and efficiency
Security Services & Risk Management
The convergence of Lean principles and AI (what we now call Lean 4.0) is no longer a theoretical exercise; it is the defining operational paradigm for survival and growth in a complex, data-intensive economy.

Read more...
Risks of open-source intelligence escalating in crime
Security Services & Risk Management Residential Estate (Industry) Smart Home Automation
CMS estimates that open-source intelligence has played a role in 20 - 30% of robberies over the past 12 months. In cybercrime, global research consistently shows that many offences rely on some form of open-source data exploitation.

Read more...
Seeing is no longer believing
Security Services & Risk Management
Fraud has shifted. It is no longer just about financial theft; it is about identity theft in the most visceral sense. The most effective control is often completely non-technical: the ‘pause and verify’ rule.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.