Know your valuable final product

June 2010 Integrated Solutions

When a security manager has to decide on what technology to choose for his or her organisation, he or she normally has to depend on a consultant engineer, a security systems integrator, security trade shows or the Internet and so forth. There is a host of information for him to sift through and hopefully understand, and apply it to the organisation he or she is trying to protect.

I attended the ISC West Security Conference and Show in Las Vegas and I was not wowed by any technology that was being released for the use in security applications. The main focus all manufactures were driving towards was all wonderful new features their products have, developing new acronyms to confuse even the most seasoned consultants and security managers.

In the 20 years that I have been a security consultant nothing has changed from a security perspective as the main objective of security is to protect the valuable final product of the organisation.

Let us define what a valuable final product will be in a bank.

It is the money and the processes involved in making sure it is safe and secure when it is stored, moves and when it is handed to the individual that is withdrawing it.

Casinos around the world have perfected this art of following the valuable final product with up to 10 or 12 cameras on a single poker table, where every movement of the dealer and players are monitored to make sure that the casino never loses. Casinos can do this because their security managers have huge budgets. Not all security managers have the luxury of having this type of budget, so it is vital that security managers select the technology that will best suit their organisation’s security needs and allow the security manager to track and trace her valuable final product, no matter what it may be, through their entire organisation.

The most important consideration is, if the technology is complicated and difficult to understand, take a step back and understand the exact outcomes you need to achieve, based on your user requirements. Next take a decision based on the technology’s functionality, but never compromising your user requirements. The technology must never be retrofitted around its own functionalities.

The simpler the user requirement, the simpler it will be to select technology to be used as a tool for security managers to manage their day to day operations by following their valuable final product.

For more information contact JRJ Consultants, +27 (0)82 776 9990, sj@jrjconsultants.co.za, www.jrjconsultants.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Future trends for electronic safety and security in mining
Fang Fences & Guards Mining (Industry) Integrated Solutions AI & Data Analytics
The mining industry is ever evolving, driven by technological advancements and the growing need for enhanced safety and security measures, with significant innovation seen in turnkey electronic security for mining operations.

Read more...
Unlocking enhanced security for mining
Mining (Industry) Integrated Solutions
In the dynamic landscape of African mining, security remains of paramount concern as threats evolve and challenges persist, and mining companies seek innovative solutions to safeguard their operations, assets, and personnel.

Read more...
A constant armed struggle
Technews Publishing XtraVision Editor's Choice Integrated Solutions Mining (Industry) IoT & Automation
SMART Security Solutions asked a few people involved in servicing mines to join us for a virtual round table and give us their insights into mine security today. A podcast of the discussion will be released shortly-stay tuned.

Read more...
Access and identity in 2024
Technews Publishing Gallagher HID Global IDEMIA Ideco Biometrics Enkulu Technologies neaMetrics Editor's Choice Access Control & Identity Management Integrated Solutions
SMART Security Solutions hosted a round table discussion with various players in the access and identity market, to find out what they experienced in the last year, as well as their expectations for 2024.

Read more...
Advanced security solution for high-risk areas
Secutel Technologies Surveillance Integrated Solutions
The need for a sophisticated intrusion detection system is paramount when faced with persistent security challenges, particularly in isolated battery rooms or high-risk areas prone to vandalism, cable theft, and battery theft.

Read more...
Vumacam and NAVIC enhance SafeCity initiative
Integrated Solutions Risk Management & Resilience
Vumacam and NAVIC, two of South Africa's most respected surveillance technology and vehicle intelligence providers, are proud to announce an alliance that will greatly expand the coverage and impact of the SafeCity initiative across the country.

Read more...
Gallagher Security’s achieves SOC2 Type 2 recertification
Gallagher News & Events Integrated Solutions Infrastructure
Gallagher has achieved System and Organization Controls (SOC2 Type 2) recertification after a fresh audit of the cloud-hosted services of its integrated security solution, Command Centre. The recertification was achieved on 21 December 2023.

Read more...
Integrated transportation security
Guardian Eye AI & Data Analytics Integrated Solutions Logistics (Industry)
HG Travel installs an AI-powered camera system integrated across 115 vehicles throughout a fleet comprising 160 vehicles of different sizes, along with predictive and self-monitoring tools to track tyre condition, fuel consumption and theft, and overall vehicle maintenance.

Read more...
Embracing next-generation surveillance for safer cities
Surveillance Integrated Solutions AI & Data Analytics
With the South African government highlighting the importance of building smart cities by integrating advanced technologies to make them more resilient and liveable, the role of next-generation network video and surveillance technologies cannot be ignored.

Read more...
Gallagher Security releases Command Centre v9
Gallagher News & Events Access Control & Identity Management Integrated Solutions
Richer features, greater integrations, with the release of Gallagher Security’s Command Centre v9 security site management software designed to integrate seamlessly with various systems and hardware.

Read more...