classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn

Hi-Tech Security Solutions Business Directory

Changing responsibilities
March 2011, Enterprise Solutions

Security policies primarily define physical access to areas and assets, and protect the interests of an organisation, its staff, partners and clients. Risk has changed significantly in the past decade, however as the business environment has adapted to new data, technology, communication and work trends, and the priorities of shareholders has shifted to drive a greater focus – and greater responsibility – at board and executive level for managing risk. Happily, security systems like access control and CCTV cameras have also evolved to meet these requirements.

Says Neil Cameron of Johnson Controls South Africa: “Business environments – both corporate and industrial – have changed subtly as technology and its use in business has matured. Systems have become more integrated and there is more information about everything available to more people. Line and executive management’s roles and responsibilities with regard to risk and security are thus beginning to overlap. It is an area of transition that needs to be carefully managed. As basic security systems advance, they are providing a safety net of sorts.”

Benefits of integration

A good example exists in the mining industry. Here, physical access to potentially dangerous areas is controlled according to the status of staff. For instance, if a miner has worked the maximum allowable overtime or has not completed a health and safety refresher course, he may not be allowed down a shaft or into a particular area. It takes an intelligent access control solution that is integrated into an HR database, the organisation’s health and safety regulations, time and attendance, and other records, to identify such an anomaly – then schedule the worker to meet these obligations.”

Says Cameron: “In the corporate environment, similar changes are occurring. Co-operation between line managers is essential to define, implement and action security policies. For instance, as ICT systems standardise, it has become easier to integrate data from disparate systems – but also easier to access data. If the status of a staff member changes, particularly if they leave an organisation, access to data often needs to be immediately removed. HR, IT and access control solutions thus need to work in tandem to meet that security requirement – as effortlessly as possible.”

Access control solutions are advancing in a number of ways to meet more complex requirements. Built on open platforms they can integrate to lighting and HVAC systems as easily as to HR databases. “They can easily be configured to make complex decisions, better managing the environment and saving utility costs by turning off lights when the last person has left the office, or switching on an air conditioner in time for a meeting in the boardroom; or changing access and exit routes depending on changing environmental conditions – say a fire in the server room,” says Cameron.

Open, more modular systems also make it easier for organisations to customise their security solutions. “Organisations today do not want to rely on off-the-shelf solutions – with open systems it is fairly easy to create a unique solution, integrated into legacy systems or proprietary third-party systems as needed.”

Changing organisational roles

And with technology advances, it is inevitable that the role of the security guard will change. “CCTV and access control solutions today use intelligent algorithms to identify potentially dangerous situations, like the flow of traffic in the wrong direction, or a bomb-sized package left behind, or a valuable asset being moved at an unscheduled time,” says Cameron. “The security officers do not have to spot the anomaly themselves via monitors. Instead, these alerts will be sent to them. Security staff can now monitor dangerous situations out in the field with images and communications of say, a fire, being sent to them on their smartphones or PDAs.”

Intelligent decision-making by security systems is assisted by new business trends. “Roles and responsibilities are today better defined as people become more specialised,” notes Cameron. “And with less multi-=tasking and more best practices integrated into security policies, it is easier to configure security systems since access time and zone permissions, among others, are assigned to a role rather than the person.”

Concludes Cameron: “Risk to the business and its broader stakeholders continues to change and it is this risk that ultimately determines security measures. Richer functionality, ease of configuration, automation, intelligent decision-making, greater integration into back-end systems – all of these characteristics combined in modern security systems, to make security easier to implement. It is co-operation and co-ordination between line functions and at board and executive level to determine how risks may best be mitigated for that particular business (at various levels), that ultimately makes for a successful security system.”

For more information contact Johnson Controls, +27 (0)11 921 7141,,

  Share via Twitter   Share via LinkedIn      

Further reading:

  • Why integrate physical and logical security?
    November 2015, Access Control & Identity Management, Enterprise Solutions
    Despite the fact that physical and logical security depend on each other, it is surprising to find that a number of companies still treat them as separate systems.
  • Online control offline
    November 2015, Johnson Controls, Access Control & Identity Management, Enterprise Solutions
    Adding offline control to cloud-based and hosted access control. Johnson Controls’ P2000 provides seamless ID management, online and offline.
  • Gatwick Airport upgrades access
    November 2015, Tyco Security Products, Access Control & Identity Management, Enterprise Solutions, Case Studies
    The CEM AC2000 Airport system at Gatwick has been expanded to include an ­additional 260 CEM S600 card readers to provide access control and monitoring at Pier 6 including control of common use passenger lifts.
  • Top 10 tips to ensure success with enterprise facilities management
    November 2015, Security Services & Risk Management, Enterprise Solutions
    The decision to outsource enterprise facilities management (EFM) must be deliberate and business-focused. There’s a lot riding on it, whether it’s for the first, second, third, or even eighth time around.
  • Biometric logistics controls
    November 2015, Morpho South Africa, Access Control & Identity Management, Enterprise Solutions
    Morpho has a range of products which can be used in different sections of the warehousing environment as well as in logistics.
  • 360° thermal radar
    November 2015, Perimeter Security, Alarms & Intruder Detection, CCTV, Surveillance, Enterprise Solutions, Remote Monitoring
    Thermal Imaging Radar is a 360-degree camera solution combining a high-performance thermal camera with an intelligent geospatial platform that provides for a state-of-the-art observation and detection solution.
  • Telephone training courses and ­opportunities for TSCM ­practitioners
    November 2015, Eavesdropping Detection Solutions (EDS), Security Services & Risk Management, Enterprise Solutions, Training, Conferences & Events
    Eavesdropping Detection Solutions (EDS) has a dedicated TSCM training facility in Centurion. The 180 m2 facility includes a telephone testing training room with eight individual testing stations.
  • Five-star security for a five-star ­hotel
    November 2015, Bosch Security Systems, Fire & Safety, Enterprise Solutions
    The Sheraton Warsaw Hotel has replaced an existing third-party fire alarm system by a Bosch fire safety solution.
  • Enterprise video management solution
    November 2015, Tyco Security Products, Products, CCTV, Surveillance, Enterprise Solutions, System Integration
    Cedric Greeves, sales leader: Tyco Integrated Fire & Security South Africa, expands on the capabilities of the Victor Unified Management System.
  • Banking malware grows
    November 2015, Information Security, Enterprise Solutions
    South Africa is well known for its concentration of financial resources and any region that transacts using the English language or deemed as affluent is always high on the target list for the adversaries.
  • Retail Risk 2015
    October 2015, Verifier, Leaderware, Cathexis Technologies, Crest Advisory Africa, Axis Communications SA, This Week's Editor's Pick, Enterprise Solutions, Security Services & Risk Management, Training, Conferences & Events
    September saw Hi-Tech Security Solutions and the Consumer Goods Crime Risk Initiative hosting Retail Risk 2015 at the Radisson Blu Gautrain Hotel in Sandton. The conference focused on securing retail locations, specifically shopping centres where crime is at an all-time high.
  • Long-term security system sustainability
    October 2015, This Week's Editor's Pick, CCTV, Surveillance, Access Control & Identity Management, Perimeter Security, Alarms & Intruder Detection, Enterprise Solutions
    Maintenance is definitely a hard sell, but without a maintenance contract in place, customers are opening themselves up to a myriad problems.

Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Terms & conditions of use, including privacy policy
PAIA Manual
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.