classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2017


Escape the technology disconnect
January 2009, Integrated Solutions

Successful enterprise security must be built on the convergence of information technology (IT) and building automation systems (BAS).

Logical security is that which governs access to the information networks, data storage and business applications. Physical security governs who has the right to access the enterprise campus and its facilities, and is a key application facilitated by the intelligent buildings’ backbone that is a key component of BAS.

While these systems are mutually dependent they are seldom integrated, although South Africa’s financial services industry is starting to take a keen interest in doing so. But predominately, physical and logical security systems in most enterprises operate in silos. The starting point for the integration is the Internet Protocol (IP) communications platform networking all electronic devices throughout the enterprise – from emergency door control and airconditioning through to CCTV and local area networks and data centres.

The multiple networks supporting these applications can easily share a single intelligent infrastructure if sufficient forethought is given to the economies of scale and potential efficiencies at the planning stages of a new building. In existing buildings, when the time for communication network technology refresh or addition of a new application is considered, this would be an ideal time to implement appropriate integration strategies.

The simplest example of why the integration of the systems is necessary is when an employee is dismissed and access to the enterprises premises and facilities must be denied. Through linking the human resources application to the building’s access control system, that person’s access card is electronically revoked, preventing entry to the building and use of facilities.

Currently this is done mainly by an e-mail or phone call to the building’s facilities manager requesting that person’s physical access rights being blocked and that security personnel be alerted to the changed status. A similar call needs to be made to the IT manager.

Having an integrated system enables management to immediately add or remove people from its database, or update their permissions and have that information immediately sent to all the enterprises’ applications. Using the enterprise wide area network (WAN) for centrally managed CCTV systems gives security personnel realtime monitoring of access points. This, together with security system software whose new algorithms can now identify suspicious behaviour, alerts security personnel to be proactive in preventing incidents.

Integrating access control with facilities management systems is another example of the advantages of integrating physical and logical security. Booking meeting rooms and the use of the equipment inside these rooms can be done from the organiser’s desktop and only those with appropriate access privileges will be able to gain entry to the room and use those facilities.

Having these systems integrated across the enterprises’ different campuses means that employees can more easily move between regional and branch offices if their access cards give them permission. Managing contractors’ or service providers’ access to pre-determined areas can also be managed by the division employing those people. Their access cards will ensure they can only enter prescribed areas and provides management with records of their movements and the times they entered and left these areas, and what facilities they used.

The goal of an enterprise security system is to protect employees and assets. Integrating the different components of the system helps lower the cost of security efficiency without adding aggravation to employees through too much physical and logical red tape.

For more information contact Bradley Hemphill, CEO, Electrical Engineering Solutions, +27 (0)21 702 8345, bradley.hemphill@eeslive.com, www.eeslive.com


  Share via Twitter   Share via LinkedIn      

Further reading:

  • People on the move
    November 2017, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Sanjay Dharwadker looks at some of the changes that have been enacted to better manage Europe’s borders.
  • Access and identity: looking ahead
    November 2017, neaMetrics, ZKTeco, Powell Tronics, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    Access and identity is more important than ever with more options than ever for companies looking for solutions that go beyond mere entry and exit.
  • A question of trust and ­accountability
    November 2017, Technews Publishing, Access Control & Identity Management, Integrated Solutions
    Access and identity management is about trust, how you assign it, how much you allow and how you manage it.
  • Trusting your privilege
    November 2017, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    Privileged access management is the starting point for effective enterprise identity and access management, whichever device you're logging in from.
  • Integrating surveillance and access
    November 2017, Cathexis Technologies, Gallagher, Milestone Systems, Paxton Access, Access Control & Identity Management, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
    Integrating access control and surveillance is a good idea, but those who take on this task have their work cut out for them.
  • The access edge
    November 2017, Johnson Controls, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions, Security Services & Risk Management
    With the common denominator of IP networks as their backbone, building automation, security and, in particular, access control systems are increasingly providing opportunities to both security integrators and building managers.
  • Integration and communication
    November 2017, CAME BPT South Africa, Integrated Solutions
    Integration and communication are two essential features when considering security systems and access control in a residential environment for both security and convenience of the residents.
  • Home run for integrated security
    November 2017, Milestone Systems, Integrated Solutions, CCTV, Surveillance & Remote Monitoring, Access Control & Identity Management, IT infrastructure
    Axis Communications, Extreme, Lenel and Milestone team up to secure 2017 Little League Baseball Series.
  • Access on the edge
    November 2017, Suprema, Access Control & Identity Management, Integrated Solutions
    CoreStation handles half a million users with a fingerprint matching speed of up to 400 000 match/second and simultaneous matching speeds of up to 8 devices in 1 second.
  • Automated facial recognition
    November 2017, Access Control & Identity Management, Integrated Solutions
    NEC provides facial recognition system to South Wales Police in the UK, contributes to safe management of Champions League final.
  • Using biometrics to prevent financial crime
    November 2017, Access Control & Identity Management, Integrated Solutions
    Biometrics is about more than the fingerprint or retina terminal itself, it’s about storing data in forensically-signed databases, that is admissible in a court of law.
  • IP intercom for mining
    November 2017, CAME BPT South Africa, Access Control & Identity Management, Integrated Solutions
    Came BPT’s IP360 IP intercom system was installed for a new mining head office in Middelburg.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.