Escape the technology disconnect

January 2009 Integrated Solutions

Successful enterprise security must be built on the convergence of information technology (IT) and building automation systems (BAS).

Logical security is that which governs access to the information networks, data storage and business applications. Physical security governs who has the right to access the enterprise campus and its facilities, and is a key application facilitated by the intelligent buildings’ backbone that is a key component of BAS.

While these systems are mutually dependent they are seldom integrated, although South Africa’s financial services industry is starting to take a keen interest in doing so. But predominately, physical and logical security systems in most enterprises operate in silos. The starting point for the integration is the Internet Protocol (IP) communications platform networking all electronic devices throughout the enterprise – from emergency door control and airconditioning through to CCTV and local area networks and data centres.

The multiple networks supporting these applications can easily share a single intelligent infrastructure if sufficient forethought is given to the economies of scale and potential efficiencies at the planning stages of a new building. In existing buildings, when the time for communication network technology refresh or addition of a new application is considered, this would be an ideal time to implement appropriate integration strategies.

The simplest example of why the integration of the systems is necessary is when an employee is dismissed and access to the enterprises premises and facilities must be denied. Through linking the human resources application to the building’s access control system, that person’s access card is electronically revoked, preventing entry to the building and use of facilities.

Currently this is done mainly by an e-mail or phone call to the building’s facilities manager requesting that person’s physical access rights being blocked and that security personnel be alerted to the changed status. A similar call needs to be made to the IT manager.

Having an integrated system enables management to immediately add or remove people from its database, or update their permissions and have that information immediately sent to all the enterprises’ applications. Using the enterprise wide area network (WAN) for centrally managed CCTV systems gives security personnel realtime monitoring of access points. This, together with security system software whose new algorithms can now identify suspicious behaviour, alerts security personnel to be proactive in preventing incidents.

Integrating access control with facilities management systems is another example of the advantages of integrating physical and logical security. Booking meeting rooms and the use of the equipment inside these rooms can be done from the organiser’s desktop and only those with appropriate access privileges will be able to gain entry to the room and use those facilities.

Having these systems integrated across the enterprises’ different campuses means that employees can more easily move between regional and branch offices if their access cards give them permission. Managing contractors’ or service providers’ access to pre-determined areas can also be managed by the division employing those people. Their access cards will ensure they can only enter prescribed areas and provides management with records of their movements and the times they entered and left these areas, and what facilities they used.

The goal of an enterprise security system is to protect employees and assets. Integrating the different components of the system helps lower the cost of security efficiency without adding aggravation to employees through too much physical and logical red tape.

For more information contact Bradley Hemphill, CEO, Electrical Engineering Solutions, +27 (0)21 702 8345, bradley.hemphill@eeslive.com, www.eeslive.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The security debt hidden in residential estates
Security Services & Risk Management Integrated Solutions Residential Estate (Industry)
Many residential estates undermine their own security not through a lack of technology, but through hidden weaknesses in gate design, fragmented systems, recurring software dependence, weak operational ownership, and insufficient estate management input.

Read more...
Proactive estate security in Cape Town
neaMetrics OneSpace Technologies Technews Publishing SMART Security Solutions Fang Fences & Guards ATG Digital Editor's Choice News & Events Integrated Solutions Infrastructure Residential Estate (Industry)
SMART Security Solutions started the year with our annual SMART Estate Security Conference in Cape Town on 26 February 2026. Held at Anna Beulah Farm, the conference saw a number of delegates enjoying the farm’s excellent cuisine, while listening to outstanding presenters.

Read more...
Data privacy best practices for physical security teams
Genetec Surveillance Integrated Solutions IoT & Automation
Physical security systems produce large amounts of information from video footage, access control records, and licence plate data. Recommendations assist organisations in safeguarding sensitive data, while ensuring effective security operations.

Read more...
Gallagher Security strengthens KwaZulu-Natal presence
Gallagher News & Events Integrated Solutions
Gallagher Security has reinforced its commitment to the KwaZulu-Natal region with its Command the Future event. The full-day event welcomed over 100 channel partners, end users, and consultants, marking Gallagher’s third major event in Durban.

Read more...
Surveillance & AI roundtable
DeepAlert Lytehouse Refraime SMART Security Solutions Technews Publishing Editor's Choice Surveillance Integrated Solutions AI & Data Analytics
SMART Security Solutions held an online roundtable with a few surveillance experts to explore the intersection of surveillance and AI, gaining insights into the market and how control rooms are evolving.

Read more...
Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
Gallagher releases Command Centre v9.40
Gallagher Products & Solutions Integrated Solutions
Gallagher Security has released Command Centre v9.40, introducing new capabilities for the Controller 7000 product range and supporting optional licencing expansion to up to 24 doors per controller, more than doubling the previous limit of 10.

Read more...
2026 Industry Trends Report calls out security’s next opportunity
Integrated Solutions Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Gallagher Security has released its 2026 Security Industry Trends Report, drawing on insights from end users, channel partners, consultants, and technology stakeholders; highlighting a growing opportunity for security to play a more strategic, value-driven role across organisations worldwide.

Read more...
Continuum launches centralised access and identity management
Editor's Choice Access Control & Identity Management Integrated Solutions Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...
ArxTech: Over 30 years of evolving security solutions for South Africa’s toughest challenges
Security Services & Risk Management Integrated Solutions
[Sponsored] For over 30 years, a Centurion-based company has helped shape how security technology is designed, deployed, and supported in South Africa. Originally known as CellSecure, it now operates as ArxTech.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.