March 2011, Integrated Solutions
Security policies primarily define physical access to areas and assets, and protect the interests of an organisation, its staff, partners and clients. Risk has changed significantly in the past decade, however as the business environment has adapted to new data, technology, communication and work trends, and the priorities of shareholders has shifted to drive a greater focus – and greater responsibility – at board and executive level for managing risk. Happily, security systems like access control and CCTV cameras have also evolved to meet these requirements.
Says Neil Cameron of Johnson Controls South Africa: “Business environments – both corporate and industrial – have changed subtly as technology and its use in business has matured. Systems have become more integrated and there is more information about everything available to more people. Line and executive management’s roles and responsibilities with regard to risk and security are thus beginning to overlap. It is an area of transition that needs to be carefully managed. As basic security systems advance, they are providing a safety net of sorts.”
Benefits of integration
A good example exists in the mining industry. Here, physical access to potentially dangerous areas is controlled according to the status of staff. For instance, if a miner has worked the maximum allowable overtime or has not completed a health and safety refresher course, he may not be allowed down a shaft or into a particular area. It takes an intelligent access control solution that is integrated into an HR database, the organisation’s health and safety regulations, time and attendance, and other records, to identify such an anomaly – then schedule the worker to meet these obligations.”
Says Cameron: “In the corporate environment, similar changes are occurring. Co-operation between line managers is essential to define, implement and action security policies. For instance, as ICT systems standardise, it has become easier to integrate data from disparate systems – but also easier to access data. If the status of a staff member changes, particularly if they leave an organisation, access to data often needs to be immediately removed. HR, IT and access control solutions thus need to work in tandem to meet that security requirement – as effortlessly as possible.”
Access control solutions are advancing in a number of ways to meet more complex requirements. Built on open platforms they can integrate to lighting and HVAC systems as easily as to HR databases. “They can easily be configured to make complex decisions, better managing the environment and saving utility costs by turning off lights when the last person has left the office, or switching on an air conditioner in time for a meeting in the boardroom; or changing access and exit routes depending on changing environmental conditions – say a fire in the server room,” says Cameron.
Open, more modular systems also make it easier for organisations to customise their security solutions. “Organisations today do not want to rely on off-the-shelf solutions – with open systems it is fairly easy to create a unique solution, integrated into legacy systems or proprietary third-party systems as needed.”
Changing organisational roles
And with technology advances, it is inevitable that the role of the security guard will change. “CCTV and access control solutions today use intelligent algorithms to identify potentially dangerous situations, like the flow of traffic in the wrong direction, or a bomb-sized package left behind, or a valuable asset being moved at an unscheduled time,” says Cameron. “The security officers do not have to spot the anomaly themselves via monitors. Instead, these alerts will be sent to them. Security staff can now monitor dangerous situations out in the field with images and communications of say, a fire, being sent to them on their smartphones or PDAs.”
Intelligent decision-making by security systems is assisted by new business trends. “Roles and responsibilities are today better defined as people become more specialised,” notes Cameron. “And with less multi-=tasking and more best practices integrated into security policies, it is easier to configure security systems since access time and zone permissions, among others, are assigned to a role rather than the person.”
Concludes Cameron: “Risk to the business and its broader stakeholders continues to change and it is this risk that ultimately determines security measures. Richer functionality, ease of configuration, automation, intelligent decision-making, greater integration into back-end systems – all of these characteristics combined in modern security systems, to make security easier to implement. It is co-operation and co-ordination between line functions and at board and executive level to determine how risks may best be mitigated for that particular business (at various levels), that ultimately makes for a successful security system.”
For more information contact Johnson Controls, +27 (0)11 921 7141, email@example.com, www.johnsoncontrols.com
- Beyond hospitality security
July 2016, Bosch Security Systems, Entertainment and Hospitality (Industry), CCTV, Surveillance & Remote Monitoring, Integrated Solutions, IT infrastructure in security
Hospitality is a very competitive business, and so security systems must not only be functional, but also cost efficient and easy to operate.
- Lethal tech combo to fight crime
July 2016, IT infrastructure in security, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
While CCTV systems are being installed to protect schools, banks and other public facilities, is the answer as simple as just adding more cameras?
- Integrated lock for access control
July 2016, Tyco Security Products, Products, Access Control & Identity Management, Integrated Solutions
Tyco Security Products announced the integration of its C·CURE 9000 security and event management system from Software House with SALTO offline locks for seamless access control of an entire building through a single user interface.
- Suprema BioStation A2
July 2016, Suprema, Products, Access Control & Identity Management, Integrated Solutions
BioStation A2 carries a massive 8 GB memory to store up to 500 000 users, 5 000 000 text logs and 50 000 image logs to accommodate enterprise-class sites with room to spare.
- Access control with IP surveillance
July 2016, MiRO distribution, Access Control & Identity Management, Integrated Solutions, Products
Access control should not only focus on the technology typically associated with visitor management and time and attendance.
- Suprema BioStation L2
July 2016, Suprema, Access Control & Identity Management, Integrated Solutions, Products
An essential IP-based fingerprint terminal that delivers comprehensive access control and time and attendance features.
- 600 Mb/s guaranteed
July 2016, Milestone Systems, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, News, Integrated Solutions, IT infrastructure in security, Products
The Husky M500 Advanced NVR is a 512-camera class NVR with a guaranteed recording performance of 600 Mb/s.
- Untapped potential in government security
June 2016, Technews Publishing, Government and Parastatal (Industry), Integrated Solutions, Security Services & Risk Management
There’s no shortage of potential for advanced security solutions in government, but the awarding and implementation of tenders is an issue.
- You can have a guard, or you can have a guarding solution
June 2016, Enforce Security, This Week's Editor's Pick, Integrated Solutions, Security Services & Risk Management
Manpower is still a crucial aspect of a guarding solution, although technology is changing and improving the process, making both guard and customer safer.
- Building sustainable smart cities
June 2016, Government and Parastatal (Industry), Integrated Solutions, Security Services & Risk Management
Understand, plan and execute. When building sustainable cities, it is vital to first understand the difference between a smart city and a sustainable city.
- SA needs a dedicated IoT network
June 2016, Jasco Enterprise, This Week's Editor's Pick, Integrated Solutions, IT infrastructure in security, Security Services & Risk Management
IoT is coming. South Africa needs a dedicated network, standards and infrastructure, says Eckart Zollner, head of business development at the Jasco Group.
- Effective operators mean effective intelligence
May 2016, CCTV, Surveillance & Remote Monitoring, Integrated Solutions, Training, Conferences & Events, This Week's Editor's Pick
The full potential of surveillance is realised when it incorporates the ability to gather intelligence from footage for proactive prevention of crimes, or at least to mitigation of the damage.