Escape the technology disconnect

January 2009 Integrated Solutions

Successful enterprise security must be built on the convergence of information technology (IT) and building automation systems (BAS).

Logical security is that which governs access to the information networks, data storage and business applications. Physical security governs who has the right to access the enterprise campus and its facilities, and is a key application facilitated by the intelligent buildings’ backbone that is a key component of BAS.

While these systems are mutually dependent they are seldom integrated, although South Africa’s financial services industry is starting to take a keen interest in doing so. But predominately, physical and logical security systems in most enterprises operate in silos. The starting point for the integration is the Internet Protocol (IP) communications platform networking all electronic devices throughout the enterprise – from emergency door control and airconditioning through to CCTV and local area networks and data centres.

The multiple networks supporting these applications can easily share a single intelligent infrastructure if sufficient forethought is given to the economies of scale and potential efficiencies at the planning stages of a new building. In existing buildings, when the time for communication network technology refresh or addition of a new application is considered, this would be an ideal time to implement appropriate integration strategies.

The simplest example of why the integration of the systems is necessary is when an employee is dismissed and access to the enterprises premises and facilities must be denied. Through linking the human resources application to the building’s access control system, that person’s access card is electronically revoked, preventing entry to the building and use of facilities.

Currently this is done mainly by an e-mail or phone call to the building’s facilities manager requesting that person’s physical access rights being blocked and that security personnel be alerted to the changed status. A similar call needs to be made to the IT manager.

Having an integrated system enables management to immediately add or remove people from its database, or update their permissions and have that information immediately sent to all the enterprises’ applications. Using the enterprise wide area network (WAN) for centrally managed CCTV systems gives security personnel realtime monitoring of access points. This, together with security system software whose new algorithms can now identify suspicious behaviour, alerts security personnel to be proactive in preventing incidents.

Integrating access control with facilities management systems is another example of the advantages of integrating physical and logical security. Booking meeting rooms and the use of the equipment inside these rooms can be done from the organiser’s desktop and only those with appropriate access privileges will be able to gain entry to the room and use those facilities.

Having these systems integrated across the enterprises’ different campuses means that employees can more easily move between regional and branch offices if their access cards give them permission. Managing contractors’ or service providers’ access to pre-determined areas can also be managed by the division employing those people. Their access cards will ensure they can only enter prescribed areas and provides management with records of their movements and the times they entered and left these areas, and what facilities they used.

The goal of an enterprise security system is to protect employees and assets. Integrating the different components of the system helps lower the cost of security efficiency without adding aggravation to employees through too much physical and logical red tape.

For more information contact Bradley Hemphill, CEO, Electrical Engineering Solutions, +27 (0)21 702 8345, [email protected], www.eeslive.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Amendments to the Private Security Industry Regulations
Technews Publishing Agriculture (Industry) Surveillance Access Control & Identity Management Fire & Safety Perimeter Security, Alarms & Intruder Detection Information Security Asset Management News & Events Integrated Solutions Infrastructure Security Services & Risk Management Education (Industry) Entertainment and Hospitality (Industry) Financial (Industry) Government and Parastatal (Industry) Healthcare (Industry) Industrial (Industry) Mining (Industry) Residential Estate (Industry) Retail (Industry) Transport (Industry) Conferences & Events Associations Videos Training & Education Smart Home Automation Commercial (Industry) Logistics (Industry) AI & Data Analytics Facilities & Building Management IoT & Automation Power Management
SANSEA, SASA, National Security Forum, CEO, TAPSOSA, and LASA oppose recently published Amendments to the Private Security Industry Regulations regarding firearms.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
edgE:Tower video analytics integrated with SEON
Surveillance Integrated Solutions AI & Data Analytics
Sentronics has announced a new integration between its edgE:Tower advanced AI-driven video analytics solution and SEON, a Central Monitoring Software (CMS) platform. This integration enhances real-time situational awareness and automated threat detection for control rooms.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
The power of knowing your client
Ideco Biometrics Access Control & Identity Management Integrated Solutions
One of the most effective ways to combat the threat of fraud, identity theft, and financial crime threats is through a robust Know Your Client (KYC) process, which safeguards both businesses and clients.

Read more...
Managing identities for 20 years
Ideco Biometrics Technews Publishing SMART Security Solutions Access Control & Identity Management Integrated Solutions IoT & Automation
Many companies are now more aware of the risks associated with unauthorised access to locations and sensitive data and are investing in advanced identity authentication technologies to mitigate these threats.

Read more...
Cost-effective and reliable remote connectivity
Agriculture (Industry) Integrated Solutions Infrastructure
Companies that operate in hard-to-connect areas now have access to reliable connectivity due to a collaboration between MTN South Africa, Vox and Tarana technology.

Read more...
Advanced Perimeter Intrusion Detection Systems
XtraVision OPTEX Technews Publishing Modular Communications Perimeter Security, Alarms & Intruder Detection Integrated Solutions Products & Solutions
Making full use of fibre installations around the perimeter by adding Perimeter Intrusion Detection Systems means you can easily add another layer of security to existing surveillance and fencing systems.

Read more...
A critical component of perimeter security
Nemtek Electric Fencing Products Gallagher Technews Publishing Stafix Editor's Choice Perimeter Security, Alarms & Intruder Detection Integrated Solutions
Electric fences are standard in South Africa, but today, they also need to be able to integrate with other technologies and become part of a broader perimeter security solution.

Read more...
Using advanced surveillance technology as a smart city enabler
Duxbury Networking Integrated Solutions Surveillance
Smart cities are increasingly becoming a focus area for African governments and companies. However, the transition to these environments does not come without challenges, especially when it comes to security and resource management.

Read more...