Manage technology and manpower

August 2016 Integrated Solutions

Having worked in the security and facilities arena for over 30 years, I’ve had the privilege of being introduced to many systems, sub-systems and technologies that have been implemented at customers ranging from universities, retail, mining, hospitals, property and government, amongst others, with varying degrees of success.

Kevin Buret, MD of Sukema Integrated Solutions.
Kevin Buret, MD of Sukema Integrated Solutions.

The two common threads in all of these is the fact that every piece of equipment or incident has a XY coordinate on earth, and they all generate data of some form which is stored in a database. These are the two most under-utilised components in security today, largely because many of the advisors in the industry do not have a deep enough understanding of how to extract the value from it.

We have been introduced to every acronym known to mankind – BMS, IMS, GIS, FMS, RFID, GPS, PSIM, scada and the list goes on. One of the more recent terms has been PSIM (Physical Security Information Management) which integrates numerous types of predominantly security systems and technologies into a single interface, providing operators a command and control type environment, yet far from true command and control. Many of these are proprietary systems, meaning they can only function with one particular brand of equipment; if you have any legacy technology that is not part of the brand, you need to replace it to benefit from PSIM.

This, however, is a total misconception as there are a few PSIMs that are open platforms, which can integrate with most mainstream technologies and sub-systems without the need to strip and replace anything. Since 2015, some of the original inventors of PSIM are themselves starting to realise and say that PSIM on its own has its value, but is too loosely thrown around in conversation without a deeper knowledge of what makes these systems function optimally.

One should not view any of these technologies or systems in isolation as they are totally dependent on a number of things:

• Correctly functioning technology is required to feed information into a PSIM.

• Operators need to sit behind the PSIM and manually respond to alerts.

The human factor

Security 101, but is it happening as it should? No, because technology needs to be maintained, inspected, repaired or replaced in order to stay functional, and we most often rely on the human factor to report these failures and monitor the progress of getting it functional again – within a specified SLA timeframe.

The reliance on the human factor to secure, respond, report and make decisions is far too great. Unfortunately, and without trying to generalise or offend anyone, customers spend millions of rand on technology and systems ranging from CCTV, access control, HVAC and more, as well as on control rooms to house the monitoring functions of these investments. Then they place it in the hands of staff who are not adequately trained, qualified or experienced to manage it effectively. We only have ourselves to blame as we all know that if you can’t measure it, you can’t manage it.

Sukema has been speaking about PSIM and CSIM (Converged Security Information Management) for many years already as we understand the importance of bringing physical and electronic security together in line with operational requirements. It is a combination of PSIM, manpower management, technology maintenance, facility management and building management all in one, including the operational issues relevant to the specific customer or sites.

These disciplines mentioned will not be operating in silos within the next two to three years, and are starting to merge into CSIM (or whatever other acronym it might end up as) which is moving towards taking over a large component of BMS and FMS. Customers can already have a fully integrated and converged platform in place, utilising all existing equipment and technology across any number of sites, and manage the manpower behind it all from a single instance of the software.

Properly designed systems work

CSIM ensures that your technology is functioning correctly or is busy being attended to if not in accordance with your SLA, without any human intervention. It also ensures that physical security is correctly in place when and where it should be, monitoring and measuring operational requirements according to KPIs (key performance indicators), in real time.

There is a total disconnect in the market on the rand value between technology hardware (items that come in a box which we can see, touch and feel) and good, properly implemented software management systems that we can’t touch and feel. The value of systems such as PSIM is vastly underestimated and should form approximately 15%-20% of your total security budget.

It is proven that more than 30% of security services conducted by manpower is lost due to varying factors, and there is a general lack of accountability. Many of our medium to large customers spend between R80 million and R120 million on physical security annually, which equates to more than R26 million per annum (at the lower budget figure) being wasted. By investing this in properly designed PSIM and CSIM systems, one will achieve far better results and be able to trim manpower by 30% or more.

Problems are not solved by new information, but by filtering information we already have. Throwing more money and hardware at problems will not solve the issue, nor will more manpower; it is a combination of all of these components in line with operational requirements that will. We need to make better use of the existing technologies that collect data, bringing it together to constantly measure compliance and accountability.

For more information contact Sukema Integrated Solutions, 0861 116103, info@sukema.co.za, www.sukema.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Future trends for electronic safety and security in mining
Fang Fences & Guards Mining (Industry) Integrated Solutions AI & Data Analytics
The mining industry is ever evolving, driven by technological advancements and the growing need for enhanced safety and security measures, with significant innovation seen in turnkey electronic security for mining operations.

Read more...
Unlocking enhanced security for mining
Mining (Industry) Integrated Solutions
In the dynamic landscape of African mining, security remains of paramount concern as threats evolve and challenges persist, and mining companies seek innovative solutions to safeguard their operations, assets, and personnel.

Read more...
A constant armed struggle
Technews Publishing XtraVision Editor's Choice Integrated Solutions Mining (Industry) IoT & Automation
SMART Security Solutions asked a few people involved in servicing mines to join us for a virtual round table and give us their insights into mine security today. A podcast of the discussion will be released shortly-stay tuned.

Read more...
Access and identity in 2024
Technews Publishing Gallagher HID Global IDEMIA Ideco Biometrics Enkulu Technologies neaMetrics Editor's Choice Access Control & Identity Management Integrated Solutions
SMART Security Solutions hosted a round table discussion with various players in the access and identity market, to find out what they experienced in the last year, as well as their expectations for 2024.

Read more...
Advanced security solution for high-risk areas
Secutel Technologies Surveillance Integrated Solutions
The need for a sophisticated intrusion detection system is paramount when faced with persistent security challenges, particularly in isolated battery rooms or high-risk areas prone to vandalism, cable theft, and battery theft.

Read more...
Vumacam and NAVIC enhance SafeCity initiative
Integrated Solutions Risk Management & Resilience
Vumacam and NAVIC, two of South Africa's most respected surveillance technology and vehicle intelligence providers, are proud to announce an alliance that will greatly expand the coverage and impact of the SafeCity initiative across the country.

Read more...
Gallagher Security’s achieves SOC2 Type 2 recertification
Gallagher News & Events Integrated Solutions Infrastructure
Gallagher has achieved System and Organization Controls (SOC2 Type 2) recertification after a fresh audit of the cloud-hosted services of its integrated security solution, Command Centre. The recertification was achieved on 21 December 2023.

Read more...
Integrated transportation security
Guardian Eye AI & Data Analytics Integrated Solutions Logistics (Industry)
HG Travel installs an AI-powered camera system integrated across 115 vehicles throughout a fleet comprising 160 vehicles of different sizes, along with predictive and self-monitoring tools to track tyre condition, fuel consumption and theft, and overall vehicle maintenance.

Read more...
Embracing next-generation surveillance for safer cities
Surveillance Integrated Solutions AI & Data Analytics
With the South African government highlighting the importance of building smart cities by integrating advanced technologies to make them more resilient and liveable, the role of next-generation network video and surveillance technologies cannot be ignored.

Read more...
Gallagher Security releases Command Centre v9
Gallagher News & Events Access Control & Identity Management Integrated Solutions
Richer features, greater integrations, with the release of Gallagher Security’s Command Centre v9 security site management software designed to integrate seamlessly with various systems and hardware.

Read more...