The power of business intelligence

October 2008 Integrated Solutions

Kevin Buret, MD of SUKEMA Integrated Solutions voices his views on the importance of integrating all your security technology to derive business intelligence.

When picking up literally any security related article or magazine these days, one is immediately faced with a huge amount of information and adverts regarding technology, from CCTV systems, biometrics, access control to virtually any other technological device known to man.

In today's climate of 'out of control crime', the focus seems to be directed at implementing as much technology as budgets can afford in an effort to monitor and respond to potential unwanted situations. This is not only prevalent in security, but also areas such as health and safety, maintenance, environmental and many others. We have enough technology available to meet just about any requirement, and that is just where the problem starts. Many companies and individuals seem to think that throwing technology at a problem is the answer to all their prayers. However, many seem to have forgotten the fundamentals and principles involved in implementing these mechanisms, and overlook the soft issues.

Over the past 25 years in technology, I have witnessed more unsuccessful attempts at deploying systems and technologies than I can remember. And, in most cases, there was nothing wrong with the technology itself. The systems and technologies in general were good, but the processes, buy-in from stakeholders and project management behind these implementations was poor. And then of course there is the proverbial bakkie brigade who are all technology experts who undercut everyone in order to get the contract. Sound familiar?

Needless to say, six months later (if the system ever worked at all) the system does not function as you thought it would, the people who were trained to use the system have long since left the company, nobody knows how to use the system, and before long, you have another white elephant in the corner that has cost you an arm and a leg. And to top it all, the board of directors wants results! Sound familiar too? When are we going to get wise to these pitfalls and stop dealing with the cheapest quote available and implementing systems without a proper vision and strategy as to what it is we are expecting from the system?

One would think it obvious, but the reason we generally implement systems is in order to capture, manage and report on information that is mission critical in our particular field of expertise, and of course, to save us time and money. And yet, how many companies implement systems that are never utilised correctly or near their full potential, and do not analyse the information extracted in hundreds of reports to prevent or resolve issues that occur time and time again? We all make use of some type of financial system to manage cash flow, salaries, expenses and so forth, which we could not cope without. When are we going to realise that any security related system implemented should be viewed in the same light? If it is not assisting you in your everyday functions and inevitably saving you time and money (often not directly evident), then you should not have the system in the first place. Unfortunately, management most often places security at the bottom of the budget spreadsheet, and it is the first item to drop off when budget cuts are implemented. Until something catastrophic happens on site! Suddenly it is a different story, and someone's head will roll.

The security industry in South Africa specifically is lacking clearly defined strategies and process planning around system implementation. Most companies have a plethora of systems including CCTV, access control, fire alarms, financial, maintenance, RFID, biometrics, and health and safety to mention but a few. What is most often missing is a centralised incident management system that integrates all of these disparate systems, giving management an overview of the status during and after an incident has occurred.

Many clients will testify that their IT department has spent 10 hours searching for a 10 second snippet (possibly) captured of an incident. Or even worse, having to contact their CCTV service provider to come in and locate this footage for them. Why not automatically extract and store the footage inside the incident database in realtime, thereby eliminating 10 hours of work? Why not automatically integrate with the access control system to download and store details of personnel that were in the vicinity of an incident when it occurred, in realtime? Imagine, heaven forbid, an explosion occurs on your site. You do not know immediately who was on site at the location, who was off sick for the day, who was away from the vicinity at the time, and you have 20 persons reported missing. Were they present, absent, injured, or even killed? Were there more people in the vicinity that you were not even aware of, such as visitors or contractors? All of these are critical questions requiring quick answers, and yet we do not view this as being important until it happens.

Getting back to system implementation, there are some fundamental best practices to follow when contemplating this. Firstly, why do you want the system? Who are the stakeholders? Who is the champion going to be? Do you have the skilled personnel to maintain and use the system correctly, or should you outsource this function? What are the critical success factors of the system in order to meet the requirements of your management team? Do you have the buy-in from the users, management and, very importantly, your IT department? What about system configuration? Are you going to attempt this yourself, or let the consultants do it for you? What about defining the exact requirements in a BRS according to your company policies and procedures? Have you considered that the successful implementation is reliant upon processes being enforced? And on the list goes.

My advice is to work with a reliable, professional and referred company that is involved in the project with you for the long haul to ensure your system implementation is a success for you and for them. Stay away from the box droppers and build a relationship with your service provider to ensure that the project is delivered and maintained; review processes and system configuration on at least a bi-annual basis to ensure that harmony is maintained between your ever changing requirements and the system. Remember, there are three cornerstones to a successful system: people, process and technology. If any one of these is absent, the system will undoubtedly fail.

Directors of companies need to understand that they can be held personally liable in the event of a disaster if due process has not been followed; this means at best case a hefty fine, or a lengthy jail term. This applies not only to security related events, but to health and safety and environmental issues. An incident management system is crucial in ensuring that there is compliancy in all aspects of your business. One should be tracking compliancy or non-compliancy in just about every day-to-day task.

A common example of this would be an organisation that has 100 CCTV cameras installed. Security personnel are expected to conduct a virtual patrol when coming on shift, but seldom do this to the required standards. In your incident management system, every procedure should be logged and managed as a compliancy or non-compliancy. In other words, the controller should log on the system that they have monitored camera #1, and that the camera is functional, pointing in the right direction, in focus, iris open, lens clean and that in terms of safety, security and productivity, there are no deviations from the norm. If there is a deviation, this should be logged as a non-compliancy. This now enables management to determine whether correct procedures were followed, or whether there are areas of incorrect procedures that need to be addressed. The day will come when a serious incident occurs, and lo and behold, you did not capture any CCTV footage of the event because the camera was faulty. This could have been averted had you known from your daily system reports that this was the case. In today's criminal activities, almost 90% of incidents are engineered to happen by individuals or syndicates; they don't just happen randomly as much as we would like to think this is the case.

In closing, and going back to the original point of this article, what is required today is the integration of multiple systems and technologies, strategic planning of the implementation, and driving the business processes around these systems to maximise the benefits of the information extracted. The real benefits lie in the business intelligence extracted from data and trends captured, and doing this in realtime.

For more information contact Kevin Buret, managing director: SUKEMA Integrated Solutions, +27 (0)83 440 4545, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Future trends for electronic safety and security in mining
Fang Fences & Guards Mining (Industry) Integrated Solutions AI & Data Analytics
The mining industry is ever evolving, driven by technological advancements and the growing need for enhanced safety and security measures, with significant innovation seen in turnkey electronic security for mining operations.

Read more...
Unlocking enhanced security for mining
Mining (Industry) Integrated Solutions
In the dynamic landscape of African mining, security remains of paramount concern as threats evolve and challenges persist, and mining companies seek innovative solutions to safeguard their operations, assets, and personnel.

Read more...
A constant armed struggle
Technews Publishing XtraVision Editor's Choice Integrated Solutions Mining (Industry) IoT & Automation
SMART Security Solutions asked a few people involved in servicing mines to join us for a virtual round table and give us their insights into mine security today. A podcast of the discussion will be released shortly-stay tuned.

Read more...
Access and identity in 2024
Technews Publishing Gallagher HID Global IDEMIA Ideco Biometrics Enkulu Technologies neaMetrics Editor's Choice Access Control & Identity Management Integrated Solutions
SMART Security Solutions hosted a round table discussion with various players in the access and identity market, to find out what they experienced in the last year, as well as their expectations for 2024.

Read more...
Advanced security solution for high-risk areas
Secutel Technologies Surveillance Integrated Solutions
The need for a sophisticated intrusion detection system is paramount when faced with persistent security challenges, particularly in isolated battery rooms or high-risk areas prone to vandalism, cable theft, and battery theft.

Read more...
Vumacam and NAVIC enhance SafeCity initiative
Integrated Solutions Security Services & Risk Management
Vumacam and NAVIC, two of South Africa's most respected surveillance technology and vehicle intelligence providers, are proud to announce an alliance that will greatly expand the coverage and impact of the SafeCity initiative across the country.

Read more...
Gallagher Security’s achieves SOC2 Type 2 recertification
Gallagher News & Events Integrated Solutions Infrastructure
Gallagher has achieved System and Organization Controls (SOC2 Type 2) recertification after a fresh audit of the cloud-hosted services of its integrated security solution, Command Centre. The recertification was achieved on 21 December 2023.

Read more...
Integrated transportation security
Guardian Eye AI & Data Analytics Integrated Solutions Logistics (Industry)
HG Travel installs an AI-powered camera system integrated across 115 vehicles throughout a fleet comprising 160 vehicles of different sizes, along with predictive and self-monitoring tools to track tyre condition, fuel consumption and theft, and overall vehicle maintenance.

Read more...
Embracing next-generation surveillance for safer cities
Surveillance Integrated Solutions AI & Data Analytics
With the South African government highlighting the importance of building smart cities by integrating advanced technologies to make them more resilient and liveable, the role of next-generation network video and surveillance technologies cannot be ignored.

Read more...
Gallagher Security releases Command Centre v9
Gallagher News & Events Access Control & Identity Management Integrated Solutions
Richer features, greater integrations, with the release of Gallagher Security’s Command Centre v9 security site management software designed to integrate seamlessly with various systems and hardware.

Read more...