Qui custodit vigilum?

October 2014 News & Events

It’s amazing to see how the security industry works. It seems so dull and boring (unless you happen to be a security officer, in which case you prefer dull and boring as it gets very dangerous otherwise). In this issue we have another winner of an article from Dr Craig Donald that touches on a pertinent point of who’s protecting the watchers. That’s where the heading to this column comes from in case you were wondering. Now Mrs Harris can rest easy knowing my years of school Latin achieved something, although I wouldn’t put any money on the accuracy of my translation.

A little later in the magazine we have no less than three articles focused on new solutions for the guarding market, changing the traditional approach we’re all used to (and somewhat cynical of) and making it into something more powerful, measurable and even safer for the guards. This is an evolution that has been a long time coming, especially the better use of data to gain intelligent insights. And some of these improvements are in favour of the customer, who can now see exactly what they are paying for.

And talking of data, big data is also becoming big business in the security industry as we note in another article in the same section. We will be delving into the big data concept more in the new year, it promises to be an interesting investigation.

Looking ahead, in future issues we will also be delving into a company that has developed its own security management platform, it’s a PSIM platform with more useful features, and look at how it is being rolled out in Gauteng, even in a safe city project. Arguably, this project is a world leader so stay tuned.

Accessing everything

You will also have noticed that the 2015 version of the Access & Identity Management Handbook was bundled along with this issue of Hi-Tech Security Solutions. The handbook is our annual roundup of what is happening in the world of access control and identity management, containing the latest trends, opinions and a bunch of case studies that show what local and international companies are doing in this field to streamline their businesses. It’s not all about opening and closing doors anymore; integration and custom development is the name of the game and our local enterprises really are taking the lead.

Unfortunately, while there is a lot of information in the handbook itself, there are also a few articles we couldn’t get in because of space, so please watch out for the Access & Identity Management Handbook e-zines we send out, there will be additional information in them as well as on securitysa.com (of course).

And most importantly of all, if you have any comments, criticisms and suggestions, please let me know at andrew@technews.co.za, we know there is always room for improvement and we’d love to know what you’re looking for in Hi-Tech Security Solutions.

Andrew Seldon

Editor



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Pentagon appointed as Milestone distributor
Elvey Security Technologies News & Events Surveillance
Milestone Systems appointed Pentagon Distribution (an Elvey Group company within the Hudaco Group of Companies) as a distributor. XProtect’s open architecture means no lock-in and the ability to customise the connected video solution that will accomplish the job.

Read more...
Digital transformation in mines
NEC XON Technews Publishing Mining (Industry)
Digital transformation has been hyped to death, but is a reality all companies in all industries need to address, including the mining sector. BCX and NEC XON weigh in on the challenges mines face.

Read more...
Fire safety in mining
Technews Publishing Mining (Industry)
Clinton Hodgson, Head of the Industrial Fire & Life Safety Division at FS Systems International, provides SMART Security Solutions with his insights into fire safety risks and solutions as they pertain to the mining industry.

Read more...
Cybersecurity in mining
Technews Publishing Mining (Industry)
One does not usually associate mining with cybersecurity, but as big technology users (including some legacy technology that was not designed for cyber risks), mines are at risk from cyber threats in several areas.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
Mines require proof of performance
Technews Publishing Mining (Industry)
The relatively hostile environment and remote locations of mining establishments mean that any electronic/technical implementations have to be easily installed, require little or no maintenance and, once commissioned, require no adjustment.

Read more...
Sales basics for security installers
News & Events
Being the best security business in South Africa means little if no one uses your services. Your business success is only partly linked to how good you are at security installations.

Read more...
From security technician to salesperson
News & Events
Being great at security sales starts with having the right mindset. How you think informs what you say and how you act; and how you act informs the results you will achieve in your business.

Read more...
From the Editor's Desk: Something old and something new
Technews Publishing News & Events
      Welcome to the 2024 edition of SMART Security Solutions’ Mining Handbook. Mining is a challenging industry for security professionals, although security is a challenge on this continent, no matter your ...

Read more...
A long career in mining security
Technews Publishing Editor's Choice Security Services & Risk Management Mining (Industry)
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.

Read more...