Security for the digital age

May 2010 Access Control & Identity Management

Developing and implementing of security systems has become a complicated, daunting and expensive exercise for users of security systems and consultant engineers that have to design security systems in today’s world of the digital age.

Access control systems are no longer just a lock on a door with a key to control the locking and unlocking of the door, it has evolved into radio frequency identification (RFID) card reader technology that can be passive or active and allows users to monitor and track the movement of all visitors, staff and contractors on their premises or through their entire organisations no matter where the organisations are located in the world.

With the world being locked into the digital age, security systems have evolved, making the design and implementation of security systems more challenging.

To simplify today’s security systems, consultants and system integrators need to follow a standard procedure when designing and implementing security systems. Below are four basic principles to follow when developing a successful security solution for your organisation’s security needs.

The first key to designing a successful security system is to understand and define the word 'security' and what it means to you and your organisation:

The second key is to define the client’s existing operations and a detailed risk analysis is to be carried out based on the client’s existing operations.

1. What are the external threats?

2. What are the internal threats?

The third key is to develop an operational document that defines the basic security principles to be adopted within the client’s organisation and then get buy-in from all stakeholders within the organisation. This is the most important factor in the entire process as the concept of ownership of security is the responsibility of every single individual within the entire organisation, from the chairperson to the cleaner.

Basic operational criteria that needs to be considered when developing the operational plan:

1. Access control operational principles.

2. Surveillance operational principles.

3. Asset management and tracking operational principles.

4. Fire and safety operational principles.

5. System maintenance operational principles.

6. Security guards operational principles.

The fourth key to the process is to select the technology that will best fit the operational document as the security technology to be utilised must adhere to the basic principles as set out in the operational plan where the basic security principles have been agreed upon by all stakeholders within the organisation.

As described above, security technology has not been discussed in points 1; 2 and 3 and is the last consideration in the entire process of designing a successful and workable security solution that benefits the clients.

The four-step philosophy has been successfully implemented within many government and commercial organisations and is a very simple process to carry out with extremely effective results!

For more information contact JRJ Consultants, +27 (0)82 776 9990, sj@jrjconsultants.co.za, www.jrjconsultants.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Facial access control for ministry
Issue 1 2020, ZKTeco , Access Control & Identity Management
The Ministry of Culture in Saudi Arabia has adopted ZKTeco’s facial recognition technology and fingerprint biometrics to manage access control into its building.

Read more...
New Door Pilot app from dormakaba
Issue 1 2020, dormakaba South Africa , Access Control & Identity Management
With new dormakaba Door Pilot, automated doors can also now be operated on the basis of remote control technologies. The system, comprising the Door Pilot app for smartphones and a Wi-Fi interface for ...

Read more...
Identity lifestyle
Issue 1 2020, Suprema , Access Control & Identity Management
Once the technology of the future, biometrics has quietly snuck into our daily lives through smartphones and access controls into our places of work.

Read more...
Securing BP’s new head office
Issue 1 2020, ISF SFP , Access Control & Identity Management
ISF SFP was awarded the contract to secure the first development phase for Oxford Parks, the new head office for BP South Africa.

Read more...
Combining aesthetics and access control
Issue 1 2020, Turnstar Systems , Access Control & Identity Management
Prestigious law firm Bowman Gilfillan recently upgraded its physical security with the addition of four Turnstar Speedgate Express access control lanes.

Read more...
Video doorbells from Ring
Issue 1 2020 , Access Control & Identity Management
Ring has a number of video doorbells available in South Africa that run off batteries or power and enable users to answer their doors from anywhere.

Read more...
Centurion to unveil new product
Issue 1 2020, Centurion Systems , Access Control & Identity Management
Centurion Systems will be hosting its third Access Automation Expo this year, with dates confirmed for Durban, Johannesburg and Cape Town.

Read more...
Looking ahead with mobile access technologies
Access & Identity Management Handbook 2020, Technews Publishing, HID Global, dormakaba South Africa, Salto Systems Africa, Suprema, Gallagher , Access Control & Identity Management, Integrated Solutions
Given the broad use of smartphones around the world and the numerous technologies packed into these devices, it was only a matter of time before the access control industry developed technology that would ...

Read more...
Mobile access is more secure than card systems
Access & Identity Management Handbook 2020 , Access Control & Identity Management
The ability to use mobile phones as access credentials is one of the biggest trends in a market that historically has been slow in adopting new technology.

Read more...
This is the future. This is what we do.
Access & Identity Management Handbook 2020, ZKTeco , Access Control & Identity Management
ZKTeco has created a unique range of visible light facial recognition products combined with a flexible Android platform.

Read more...