Escape the technology disconnect

January 2009 Integrated Solutions

Successful enterprise security must be built on the convergence of information technology (IT) and building automation systems (BAS).

Logical security is that which governs access to the information networks, data storage and business applications. Physical security governs who has the right to access the enterprise campus and its facilities, and is a key application facilitated by the intelligent buildings’ backbone that is a key component of BAS.

While these systems are mutually dependent they are seldom integrated, although South Africa’s financial services industry is starting to take a keen interest in doing so. But predominately, physical and logical security systems in most enterprises operate in silos. The starting point for the integration is the Internet Protocol (IP) communications platform networking all electronic devices throughout the enterprise – from emergency door control and airconditioning through to CCTV and local area networks and data centres.

The multiple networks supporting these applications can easily share a single intelligent infrastructure if sufficient forethought is given to the economies of scale and potential efficiencies at the planning stages of a new building. In existing buildings, when the time for communication network technology refresh or addition of a new application is considered, this would be an ideal time to implement appropriate integration strategies.

The simplest example of why the integration of the systems is necessary is when an employee is dismissed and access to the enterprises premises and facilities must be denied. Through linking the human resources application to the building’s access control system, that person’s access card is electronically revoked, preventing entry to the building and use of facilities.

Currently this is done mainly by an e-mail or phone call to the building’s facilities manager requesting that person’s physical access rights being blocked and that security personnel be alerted to the changed status. A similar call needs to be made to the IT manager.

Having an integrated system enables management to immediately add or remove people from its database, or update their permissions and have that information immediately sent to all the enterprises’ applications. Using the enterprise wide area network (WAN) for centrally managed CCTV systems gives security personnel realtime monitoring of access points. This, together with security system software whose new algorithms can now identify suspicious behaviour, alerts security personnel to be proactive in preventing incidents.

Integrating access control with facilities management systems is another example of the advantages of integrating physical and logical security. Booking meeting rooms and the use of the equipment inside these rooms can be done from the organiser’s desktop and only those with appropriate access privileges will be able to gain entry to the room and use those facilities.

Having these systems integrated across the enterprises’ different campuses means that employees can more easily move between regional and branch offices if their access cards give them permission. Managing contractors’ or service providers’ access to pre-determined areas can also be managed by the division employing those people. Their access cards will ensure they can only enter prescribed areas and provides management with records of their movements and the times they entered and left these areas, and what facilities they used.

The goal of an enterprise security system is to protect employees and assets. Integrating the different components of the system helps lower the cost of security efficiency without adding aggravation to employees through too much physical and logical red tape.

For more information contact Bradley Hemphill, CEO, Electrical Engineering Solutions, +27 (0)21 702 8345, [email protected], www.eeslive.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Digitising security solutions with AI and smart integration
Regal Security Distributors SA Technews Publishing Integrated Solutions
The Regal Projects Team’s decades of experience and commitment to integration have brought the digital security guard to life as a trusted force for safer, smarter living.

Read more...
Smart cities and the role of video security
Surveillance Integrated Solutions
As cities around the world continue to embrace smart technology, including IoT that not only connects to people, but also the surrounding activity, the integration of advanced video security systems is crucial to ensure safety and efficiency in environments.

Read more...
Surveillance to unjam the traffic
Integrated Solutions Transport (Industry)
Traffic is a challenge that affects urban areas across Africa. The city of Johannesburg, South Africa’s most populous city, experiences severe traffic resulting from a confluence of issues, including power outages, faulty traffic lights, and infrastructure theft.

Read more...
The benefits of offsite control rooms
Astrosec Surveillance Integrated Solutions
As the security landscape grows more intricate, control rooms – the crucial hub of security operations – need to adapt. With escalating costs, mounting threats, and a heightened demand for immediate responses, many organisations are reassessing the operations of their control rooms.

Read more...
edgE:Tower video analytics integrated with SEON
Surveillance Integrated Solutions AI & Data Analytics
Sentronics has announced a new integration between its edgE:Tower advanced AI-driven video analytics solution and SEON, a Central Monitoring Software (CMS) platform. This integration enhances real-time situational awareness and automated threat detection for control rooms.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
The power of knowing your client
Ideco Biometrics Access Control & Identity Management Integrated Solutions
One of the most effective ways to combat the threat of fraud, identity theft, and financial crime threats is through a robust Know Your Client (KYC) process, which safeguards both businesses and clients.

Read more...
Managing identities for 20 years
Ideco Biometrics Technews Publishing SMART Security Solutions Access Control & Identity Management Integrated Solutions IoT & Automation
Many companies are now more aware of the risks associated with unauthorised access to locations and sensitive data and are investing in advanced identity authentication technologies to mitigate these threats.

Read more...
Cost-effective and reliable remote connectivity
Agriculture (Industry) Integrated Solutions Infrastructure
Companies that operate in hard-to-connect areas now have access to reliable connectivity due to a collaboration between MTN South Africa, Vox and Tarana technology.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.