Securing large commercial facilities

April 2013 Integrated Solutions

How do large commercial facilities secure their premises without hindering the passage of legitimate visitors and employees? What role do the technological and human elements play in the equation? Hi-Tech Security Solutions spoke to a major manufacturing operation’s on-site compliance and risk control investigator and a chief of safety and security within the hospitality sector.

Leo Nardi
Leo Nardi

Leo Nardi, who is based at the manufacturing facility, is the contracts manager and electronics advisor at Justicia. “We believe in providing an holistic, integrated security environment. Points to consider from the outset revolve around the integration design, the effectiveness of the proposed solution and maximising any return on investment. It is also important to understand the practical implementation of additional integration design to ensure that any probable future upgrades to the system are accounted for proactively.”

Within the manufacturing operation where Nardi is based, CCTV is operated on a separate network to the IT function. “This is typical of pre-IP installations. One needs to decide whether to merge the two networks or to retain them as standalone entities.

“One of the major considerations is the large amount of bandwidth and storage capacity required by a high-end IP solution. Often the volumes can exceed those of the other business communication and data requirements. Successful integration of systems is critically important and one needs to employ forward-thinking IT personnel who can see the potential around IP systems and their logistical requirements,” Nardi continued.

Marthinus Baumbach
Marthinus Baumbach

“I manage a safety and security department like a business within a business. All decisions must make sound business sense and most importantly, benefit the sustainability of the business, its customer base, all stakeholders and staff members in one or more ways. Safety and security is an expensive business that does not directly generate profits for a business and therefore it is important to always make well-educated decisions,” said Radisson Blu Hotel’s chief of safety and security, Marthinus Baumbach.

“It is a big responsibility to manage the safety and security of a property worth a staggering amount of money and more importantly, all the lives within it. I do not take anything for granted. I keep my finger on the pulse of the operation; taking shortcuts is not an option and all safety and security systems are continuously tested and meticulously maintained,” he said.

Silositis (the disease of division) versus integration

Nardi said that he has observed many examples in industry where projects are not signed off with the inclusion of a security/integration expert and there is little or no communication between various entities on the ground level. Security is a classical grudge purchase and often an afterthought.

“Justicia employs a philosophy of including security in all aspects of business decisions. When you factor integration into the equation, this is definitely not an afterthought. Factors such as the various service level agreements from different suppliers within the system also need to be carefully considered. Ensuring that systems are integrated wherever possible ensures easier management and flexibility of the entire facility.”

“I manage the safety and security operation in a multi-storey, high-rise building with several other tenants within the complex. The layout poses challenges of its own. A small portion of the safety and security systems are integrated with a management platform but the majority of the systems run independently from each other. No doubt, this is more labour intensive, time consuming and arguably a bit more expensive. I do, however believe that the advantages outweigh the disadvantages,” countered Baumbach.

“CCTV is an ideal starting point for integration to other systems but one must remember that it is only one portion of the whole security, and indeed business system. Another point to remember is that cameras are no longer just used for security purposes. There is an increasing trend to deploy them as part of the manufacturing monitoring process. Because of their analytical value, they can be programmed to concentrate on specific events. For example, certain processes within this manufacturing facility are served by a traffic light (stack light) system. When the red light is displayed, the camera sends an alert to the control room that immediate attention is needed in the process,” explained Nardi.

Integration will become even more prominent in the future. Even large IT systems are becoming more integrated within themselves and are trending towards virtualised machine environments. One need not fear integration. A well-designed system will not over complicate. The integration platform can be viewed as a component attached to many other components. A well thought out design will factor in a high degree of redundancy and eliminate single points of failure. A component that fails will not bring the whole system down. Integrated environments provide many advantages where the sum of the whole is greater than the sum of the individual parts.

“We prefer to look at the entire infrastructure and plan for future expansion and how this would impact on bandwidth and storage. Policies and procedures are paramount to ensure compliance and successful application,” he added.

“Our control room monitors all safety and security systems around the clock and data is processed and analysed in real-time. I prefer to keep the various systems separate from each other, just as in the same way governments and big corporate organisations do not allow people in key positions to travel together in the same car or on the same plane. I actually take this a step further by having a different service provider for the maintenance, repairs and technical support of each system,” said Baumbach.

“If all systems are integrated and there is a problem with the management platform, it will affect each and every system in the operation. If all systems are down simultaneously, it may have far-reaching consequences. It is much easier to implement interim measures if only one system is down instead of several. For this reason I prefer to keep systems separate from each other,” he continued.

Man versus machine

“Technology needs to complement the human element in any security installation,” said Nardi. “I firmly believe that there are three areas of oversell in the security industry when it comes to CCTV. Firstly, video analytics. This is a great tool but it cannot completely replace the human element. Secondly, third-party integration is often sold as first-party integration. This is not the same thing and can end up with the client incurring unforeseen costs and complications. Finally, megapixel cameras have a definite role to play but, by understanding that they also have limitations, they can be deployed more effectively. Their use can also be maximised by assigning them to a specific area as you would a human counterpart.”

“Technology will never replace the decision-making skills and senses of a human being. Being in the hospitality industry, human interaction is invaluable and irreplaceable. The guard force forms the backbone of my security operation, with technology undertaking the supporting role. The key is to have an exceptionally well trained security team capable of using the technology at their disposal effectively,” said Baumbach.

“Technology is only as good as the person monitoring, analysing and interpreting the data, so the two complement each other all the time. To achieve the balance between humans and technology, training remains one of my priorities.

“One must be cautious not to change technology just for the sake of change. I still use an old-fashioned manual system that is incredibly effective and dependable. Having said this, technology enables us to work smarter and has paved the way to process and react to vital, up-to-date information immediately,” added Baumbach.

“Technology empowers my guard force to make accurate assessments and to take correct decisions. It is interesting to see how quickly technology becomes outdated and obsolete. I use a conservative and low-risk approach by using technology that has been tried and tested,” he said.

“Technology can be used to assist and complement the functions of your security personnel. For instance, technology could save time and effort by automatically raising booms or spikes. This frees the security guard up for a more important function. A security guard could also monitor several locations simultaneously by viewing a CCTV console. These are simple examples and an in-depth analysis of more complicated environments is beyond the scope of this discussion. Technology can also be used to provide accountability for the guard’s actions and to minimise the element of human fallibility, which is inherent in all of us. Adequate training of both guards and control room operators is crucial and should never be negotiated,” added Nardi.

Securing information

“Information security has become a priority in recent years, especially for government departments, the military, financial institutions and larger corporate organisations. Information and the access to it, is the lifeline of many organisations,” according to Baumbach.

“To mitigate risk and for insurance purposes, I find it beneficial to outsource to an IT department. That way, a company has recourse should issues arise with the service provider. The use of up-to-date anti-virus, anti-spy and firewall software is vital for any organisation to effectively secure information. Although readily available, but not commonly used yet, the utilisation of encryption and decryption software may become standard practice in the corporate environment in future,” said Baumbach.

“Within the compliance department, reports are correlated to ensure that each event is prioritised. The incident management system provides a chain of evidence that is shared across a common platform. However, to be successful, this needs to be properly managed and protected. One needs to ensure that only those people who have received clearance to access the information, can do so. There are also legal implications to consider when it comes to personal information and the protection thereof,” said Nardi.

“In conclusion, an effective operational security system should not only consider the security elements within the organisation, but should also actively involve other sectors such as occupational health and safety, IT and production departments to provide a successful solution,” Nardi concluded.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Directory of suppliers
Technews Publishing SMART Security Solutions Fire & Safety
The Directory of Product and Solution Suppliers for the fire safety industry includes details of companies that provide security and risk mitigation products, advice, and services within this market.

Read more...
Fire safety in commercial kitchens
Technews Publishing Kestrel Distribution Products & Solutions Fire & Safety Commercial (Industry)
Fire safety in commercial kitchens is becoming increasingly critical. Defender is Europe’s first EN 17446:2021-approved kitchen hood fire suppression system and offers the indispensable safety measures required.

Read more...
From the editor's desk: Regulations, standards and skills, but poor enforcement
Technews Publishing SMART Security Solutions Fire & Safety
South Africa depends on the carrot approach to fire safety; in other words, businesses choosing to do the right thing, as the stick (or enforcement of regulations) is unfortunately lacking.

Read more...
SMARTpod talks to Sophos and Phishield
SMART Security Solutions Technews Publishing Sophos Videos Information Security News & Events
SMARTpod recently spoke with Pieter Nel, Sales Director for SADC at Sophos, and Sarel Lamprecht, MD at Phishield, about ransomware and their new cyber insurance partnership.

Read more...
Acronis and Metrofile Cloud announce partnership
Infrastructure Integrated Solutions
Acronis has appointed Metrofile Cloud as its premier disaster recovery (DR) partner in southern Africa, combining Acronis' technologies with Metrofile Cloud's local expertise to deliver secure and adaptable disaster recovery solutions for businesses across the region.

Read more...
The real cost of DHA’s verification fee
Ideco Biometrics Integrated Solutions
South Africa’s Department of Home Affairs has proposed a significant increase in its online ID-verification fee, which could have severe unintended consequences, potentially undermining the progress made in anti-money laundering initiatives and exposing individuals to greater risk of identity fraud.

Read more...
From the editor's desk: Showtime for Securex
Technews Publishing News & Events
We have once again reached the time of year when the security industry focuses on Securex. This issue includes a short preview, with more coming online and via our special Securex Preview news briefs. ...

Read more...
Digitising security solutions with AI and smart integration
Regal Security Distributors SA Technews Publishing Integrated Solutions
The Regal Projects Team’s decades of experience and commitment to integration have brought the digital security guard to life as a trusted force for safer, smarter living.

Read more...
Smart cities and the role of video security
Surveillance Integrated Solutions
As cities around the world continue to embrace smart technology, including IoT that not only connects to people, but also the surrounding activity, the integration of advanced video security systems is crucial to ensure safety and efficiency in environments.

Read more...
Surveillance to unjam the traffic
Integrated Solutions Transport (Industry)
Traffic is a challenge that affects urban areas across Africa. The city of Johannesburg, South Africa’s most populous city, experiences severe traffic resulting from a confluence of issues, including power outages, faulty traffic lights, and infrastructure theft.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.