Consulting services for BMS

May 2013 Integrated Solutions

What do BMS systems offer South African businesses in terms of a realistic ROI?

Be it high-rise office buildings, libraries, hospitals and clinics, financial institutions or shopping centres, each of these commercial properties require an unique approach to ensure that peculiar security challenges, threats and vulnerabilities are managed in such a way to contribute toward effective property management.

A building management system (BMS) comprises of:

* Power systems.

* Illumination system.

* Electric power control system.

* Heating, ventilation and air-conditioning (HVAC) system.

* Security and observation system.

* Magnetic card and access system.

* Fire alarm system.

* Lifts, elevators etc.

* Plumbing system.

* Burglar alarms, CCTV.

* Trace heating.

* Other engineering systems.

* Home automation system.

* Fire alarm and safety system.

* Manage the sensors of alarm.

A BMS is definitely able to offer businesses meaningful ROI if it is assessed, designed, installed, managed and maintained properly. It is important to be aware that one shoe does not fit all. Businesses need to understand (assess) which security modules of BMS would benefit their business and only invest in those.

To extract the optimum ROI businesses need to approach the purchase and installation of a BMS as a fully-fledged project in which the parameters and critical path is clearly defined and constantly measured as the project progresses. As with any enabling technology system, the security systems installed as part of a BMS need to be properly specified to ensure that components such as surveillance cameras see what they are required to see, that data storage capacity is sufficient to cope with the data load generated, that visitor processing is managed in sync with the businesses’ need, while effectively preventing unauthorised visitor access, amongst others.

A comprehensive maintenance schedule that covers all components of each security system plugged into the BMS would optimise the lifespan of components and the BMS as a solution and it reduces the monthly cost of emergency call-outs or unplanned component replacements. It is well worthwhile to include maintenance as key success factor.

When it comes to the preservation of life and protection of property it is particularly difficult to determine a value to ensuring that optimal measures are taken to mitigate any form of loss. We are of the opinion that businesses should employ the same methodology when selecting and installing a BMS as it would selecting and installing a hi-tech integrated security system, as follows:.

* Step one: Assess the needs of the building and its stakeholders.

* Step two: Design a system that meets and exceeds the requirements.

* Step three: Implement the design by methodical installation.

* Step four: Measure the implementation process to ensure that user expectations are met.

* Step Five: Maintain the entire BMS as it is commissioned to ensure optimal use of warranties and component lifespan.

What skills do consultants offering services in the BMS market need as opposed to traditional security consultants?

A security management consultant (SMC) should be equipped with the following knowledge and skills:

* Knowledge of the various types and specific security and safety applications of BMS available in the market.

* Knowledge of the integration of various enabling technical security systems, which make up and or to create a BMS.

* Security risk assessment expertise to assist businesses in determining which modules of a BMS would be required to best serve their particular needs.

* System design skills and the development of technical specifications, which should include security process development. Security personnel should have clear standard operating and emergency procedures available.

* Project management skills.

* Development and implementation of a comprehensive maintenance schedule.

Does the consulting process differ when dealing with BMS systems?

In our opinion the consultation process would remain the same as with any other system, as in Figure 1.

Figure 1
Figure 1

What steps should a potential customer go through when deciding if a BMS is the right solution?

Once the assessment has been completed by a vendor neutral consultant and all current enabling systems have been assessed. The consultant shall provide, as part of the engagement process described above, a selection of suitable BMS products that can be integrated with current systems. Again it is imperative that the consultant designs for risk, scalability, robustness and within an agreed budget, the aforementioned are all skills relevant to effective project management.

System demonstrations by various suppliers is always a good idea and should be managed by the consultant with the aim of the client being able to experience different types of systems within different conditions.

Once the product specifications have been agreed upon the consultant can proceed to draw up a Bill of Quantities (BOQ) which will be utilised within the request for proposal (RFP) or process or preferred vendor procurement process.

A thorough and comprehensive procurement process with a detailed installation specification will ensure that the right installation company is selected who can successfully install the system within the agreed time frame and budget guidelines.

An important consideration is to determine the available budget for post-installation preventative maintenance, planned component replacement and system upgrades over the lifespan of the BMS.

For more information contact Physical Risk, +27 (0)21 851 2963, [email protected], www.physicalrisk.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Digitising security solutions with AI and smart integration
Regal Security Distributors SA Technews Publishing Integrated Solutions
The Regal Projects Team’s decades of experience and commitment to integration have brought the digital security guard to life as a trusted force for safer, smarter living.

Read more...
Smart cities and the role of video security
Surveillance Integrated Solutions
As cities around the world continue to embrace smart technology, including IoT that not only connects to people, but also the surrounding activity, the integration of advanced video security systems is crucial to ensure safety and efficiency in environments.

Read more...
Surveillance to unjam the traffic
Integrated Solutions Transport (Industry)
Traffic is a challenge that affects urban areas across Africa. The city of Johannesburg, South Africa’s most populous city, experiences severe traffic resulting from a confluence of issues, including power outages, faulty traffic lights, and infrastructure theft.

Read more...
The benefits of offsite control rooms
Astrosec Surveillance Integrated Solutions
As the security landscape grows more intricate, control rooms – the crucial hub of security operations – need to adapt. With escalating costs, mounting threats, and a heightened demand for immediate responses, many organisations are reassessing the operations of their control rooms.

Read more...
edgE:Tower video analytics integrated with SEON
Surveillance Integrated Solutions AI & Data Analytics
Sentronics has announced a new integration between its edgE:Tower advanced AI-driven video analytics solution and SEON, a Central Monitoring Software (CMS) platform. This integration enhances real-time situational awareness and automated threat detection for control rooms.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
The power of knowing your client
Ideco Biometrics Access Control & Identity Management Integrated Solutions
One of the most effective ways to combat the threat of fraud, identity theft, and financial crime threats is through a robust Know Your Client (KYC) process, which safeguards both businesses and clients.

Read more...
Managing identities for 20 years
Ideco Biometrics Technews Publishing SMART Security Solutions Access Control & Identity Management Integrated Solutions IoT & Automation
Many companies are now more aware of the risks associated with unauthorised access to locations and sensitive data and are investing in advanced identity authentication technologies to mitigate these threats.

Read more...
Cost-effective and reliable remote connectivity
Agriculture (Industry) Integrated Solutions Infrastructure
Companies that operate in hard-to-connect areas now have access to reliable connectivity due to a collaboration between MTN South Africa, Vox and Tarana technology.

Read more...