Know your valuable final product

June 2010 Integrated Solutions

When a security manager has to decide on what technology to choose for his or her organisation, he or she normally has to depend on a consultant engineer, a security systems integrator, security trade shows or the Internet and so forth. There is a host of information for him to sift through and hopefully understand, and apply it to the organisation he or she is trying to protect.

I attended the ISC West Security Conference and Show in Las Vegas and I was not wowed by any technology that was being released for the use in security applications. The main focus all manufactures were driving towards was all wonderful new features their products have, developing new acronyms to confuse even the most seasoned consultants and security managers.

In the 20 years that I have been a security consultant nothing has changed from a security perspective as the main objective of security is to protect the valuable final product of the organisation.

Let us define what a valuable final product will be in a bank.

It is the money and the processes involved in making sure it is safe and secure when it is stored, moves and when it is handed to the individual that is withdrawing it.

Casinos around the world have perfected this art of following the valuable final product with up to 10 or 12 cameras on a single poker table, where every movement of the dealer and players are monitored to make sure that the casino never loses. Casinos can do this because their security managers have huge budgets. Not all security managers have the luxury of having this type of budget, so it is vital that security managers select the technology that will best suit their organisation’s security needs and allow the security manager to track and trace her valuable final product, no matter what it may be, through their entire organisation.

The most important consideration is, if the technology is complicated and difficult to understand, take a step back and understand the exact outcomes you need to achieve, based on your user requirements. Next take a decision based on the technology’s functionality, but never compromising your user requirements. The technology must never be retrofitted around its own functionalities.

The simpler the user requirement, the simpler it will be to select technology to be used as a tool for security managers to manage their day to day operations by following their valuable final product.

For more information contact JRJ Consultants, +27 (0)82 776 9990, [email protected], www.jrjconsultants.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
The power of knowing your client
Ideco Biometrics Access Control & Identity Management Integrated Solutions
One of the most effective ways to combat the threat of fraud, identity theft, and financial crime threats is through a robust Know Your Client (KYC) process, which safeguards both businesses and clients.

Read more...
Managing identities for 20 years
Ideco Biometrics Technews Publishing SMART Security Solutions Access Control & Identity Management Integrated Solutions IoT & Automation
Many companies are now more aware of the risks associated with unauthorised access to locations and sensitive data and are investing in advanced identity authentication technologies to mitigate these threats.

Read more...
Cost-effective and reliable remote connectivity
Agriculture (Industry) Integrated Solutions Infrastructure
Companies that operate in hard-to-connect areas now have access to reliable connectivity due to a collaboration between MTN South Africa, Vox and Tarana technology.

Read more...
Advanced Perimeter Intrusion Detection Systems
XtraVision OPTEX Technews Publishing Modular Communications Perimeter Security, Alarms & Intruder Detection Integrated Solutions Products & Solutions
Making full use of fibre installations around the perimeter by adding Perimeter Intrusion Detection Systems means you can easily add another layer of security to existing surveillance and fencing systems.

Read more...
A critical component of perimeter security
Nemtek Electric Fencing Products Gallagher Technews Publishing Stafix Editor's Choice Perimeter Security, Alarms & Intruder Detection Integrated Solutions
Electric fences are standard in South Africa, but today, they also need to be able to integrate with other technologies and become part of a broader perimeter security solution.

Read more...
Using advanced surveillance technology as a smart city enabler
Duxbury Networking Integrated Solutions Surveillance
Smart cities are increasingly becoming a focus area for African governments and companies. However, the transition to these environments does not come without challenges, especially when it comes to security and resource management.

Read more...
SMART Estate Security returns to KZN
Nemtek Electric Fencing Products Technews Publishing Axis Communications SA OneSpace Technologies Editor's Choice News & Events Integrated Solutions IoT & Automation
The second SMART Estate Security Conference of 2024 was held in May in KwaZulu-Natal at the Mount Edgecombe Estate Conference Centre, which is located on the Estate’s pristine golf course.

Read more...
Dynamic Dashboard enhances security and operational efficiency
Suprema neaMetrics Products & Solutions Integrated Solutions Residential Estate (Industry)
In today’s data-driven world, security systems are overwhelmed by an unprecedented volume of data, from video surveillance and access control logs to intrusion alerts and a variety of IoT sensor data.

Read more...
HELLO visitor access management
Products & Solutions Access Control & Identity Management Integrated Solutions Residential Estate (Industry)
HELLO is an on-premises visitor and contractor access management solution designed to be fully integrated and complementary with smart, on-trend technologies, securing estates and businesses alike.

Read more...