Security for the digital age

May 2010 Access Control & Identity Management

Developing and implementing of security systems has become a complicated, daunting and expensive exercise for users of security systems and consultant engineers that have to design security systems in today’s world of the digital age.

Access control systems are no longer just a lock on a door with a key to control the locking and unlocking of the door, it has evolved into radio frequency identification (RFID) card reader technology that can be passive or active and allows users to monitor and track the movement of all visitors, staff and contractors on their premises or through their entire organisations no matter where the organisations are located in the world.

With the world being locked into the digital age, security systems have evolved, making the design and implementation of security systems more challenging.

To simplify today’s security systems, consultants and system integrators need to follow a standard procedure when designing and implementing security systems. Below are four basic principles to follow when developing a successful security solution for your organisation’s security needs.

The first key to designing a successful security system is to understand and define the word 'security' and what it means to you and your organisation:

The second key is to define the client’s existing operations and a detailed risk analysis is to be carried out based on the client’s existing operations.

1. What are the external threats?

2. What are the internal threats?

The third key is to develop an operational document that defines the basic security principles to be adopted within the client’s organisation and then get buy-in from all stakeholders within the organisation. This is the most important factor in the entire process as the concept of ownership of security is the responsibility of every single individual within the entire organisation, from the chairperson to the cleaner.

Basic operational criteria that needs to be considered when developing the operational plan:

1. Access control operational principles.

2. Surveillance operational principles.

3. Asset management and tracking operational principles.

4. Fire and safety operational principles.

5. System maintenance operational principles.

6. Security guards operational principles.

The fourth key to the process is to select the technology that will best fit the operational document as the security technology to be utilised must adhere to the basic principles as set out in the operational plan where the basic security principles have been agreed upon by all stakeholders within the organisation.

As described above, security technology has not been discussed in points 1; 2 and 3 and is the last consideration in the entire process of designing a successful and workable security solution that benefits the clients.

The four-step philosophy has been successfully implemented within many government and commercial organisations and is a very simple process to carry out with extremely effective results!

For more information contact JRJ Consultants, +27 (0)82 776 9990, sj@jrjconsultants.co.za, www.jrjconsultants.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

You cannot bribe a computer
Access Control & Identity Management Security Services & Risk Management
Corruption is a cancer that destroys the prospects and stability of countries and businesses. It widens wealth gaps and punishes the poor. It costs countries many billions in lost revenue.

Read more...
Heightening physical security at military base
Turnstar Systems Access Control & Identity Management Government and Parastatal (Industry) Products
Turnstar Systems recently installed two 3-metre Velocity Raptor traffic spikes at the South African National Defence Force (SANDF) Randfontein military base on Gauteng’s West Rand.

Read more...
Zero Trust to dominate 2023
Cyber Security Access Control & Identity Management
Traditional ways of safeguarding data are no longer sufficient in 2023. Zero Trust has emerged as a more proactive way for businesses to keep their systems, data, and networks protected against compromise.

Read more...
Turnstar opens an office in the UK
Turnstar Systems News Access Control & Identity Management
Turnstar Systems recently established an office in the Greater Manchester borough in the North East of England, as part of the company’s ongoing expansion strategy.

Read more...
Enkulu Technologies to distribute Brazil’s Control iD
News Access Control & Identity Management Products
Enkulu Technologies has been appointed as the first South African distributor of Control iD products; a Brazilian company offering a T&A range of solutions based on its range of biometric products.

Read more...
HID Technology Seminar
Technews Publishing HID Global News Access Control & Identity Management Products
HID Global’s technology seminar introduced partners and distributors to the company’s new Signo range of readers and highlighted the benefits and global growth of mobile access credentials.

Read more...
Celebrating a successful year
Gallagher Technews Publishing News Access Control & Identity Management Products
Gallagher Security hosted an end-of year event at the Steyn City Equestrian Centre in which it thanked its partners for another successful year and provided a glimpse into what the company will be releasing in 2023.

Read more...
Innovation and service, 37 years and counting
Technews Publishing Impro Technologies Access Control & Identity Management Integrated Solutions
Innovation, simplicity and trust underpin the nearly 40 years of success of local access control brand, Impro Technologies, which is still run as an independent entity despite being acquired by ASSA ABLOY in 2016.

Read more...
Access control for one of Britain’s oldest boarding schools
Access Control & Identity Management Education (Industry) Products
In 2022, Christ’s Hospital School, which hosts 18 boarding houses on site, needed to replace its access control security system with a new solution that would be simple to manage and maintain.

Read more...
Improving safety and security
Gallagher Education (Industry) Access Control & Identity Management Integrated Solutions
Education facilities have more than enough to deal with when it comes to allocating budget. Security often seems to be the last item on the agenda but is more important than ever.

Read more...