Intelligence is the key

September 2010 Integrated Solutions

While there are many similarities between the financial services sector and the corporate sector, when it comes to security the two are leagues apart.

Both the financial and corporate sectors have a need to protect themselves from physical security threats, but while simple systems may be enough for most businesses, an organisation in the financial services industry needs something more sophisticated, more intelligent and above all, something integrated to handle the myriad threats that they may face.

Financial institutions are generally multisite, multifacility organisations that are geographically spread throughout the country, with locations in both major cities and remote areas. This means that there are many facilities that need to be secured, which adds to the complexity of any security solution even while it offers opportunities.

Most organisations in the corporate sector would need to look at an off the shelf security solution, because of the cost involved with developing a custom system for just one or a few locations. However, because financial organisations may have many facilities to look after, developing a customised and optimised solution to meet the unique needs of the business becomes feasible, as the development cost per location is almost negligible.

Custom monitoring

A custom designed solution is vital for financial services because of the need to implement enterprise wide security into facilities, to control access of thousands of employees to various areas intelligently. These organisations need to rely on their technology to decide who is allowed to access areas and who is not, at all times, accurately and quickly.

Reliability is a huge issue for financial organisations, which need a system that is always up and running. Incorporating smart access control with intelligence on the actual controllers means that the devices can operate without needing information from servers, reducing duplication of software and enhancing reliability.

CCTV monitoring is also a vital component, however, simply having a camera that records comings and goings is not enough. Proactive CCTV monitoring with intelligent motion detection and neural networks built into the recorder can be programmed with rules and can proactively alert when behaviour considered suspicious occurs, rather than simply allowing for retro-active action to be taken. This suspicious behaviour may be anything from someone accessing a certain floor at an unusual time of day to someone exiting the building at the start of the workday when most people are entering. Once an alert has gone off the behaviour can be investigated, and any threats dealt with.

Another important factor to bear in mind is the need for a dynamic system that can change as technology changes, adapts as necessary and can incorporate new improved systems to increase security on an ongoing basis. Using a customised solution built on open architecture with open protocols enables systems to interface and connect to other systems as needed. As risks and exposures grow, extra securities can be added on without integration issues often seen in proprietary solutions.

Open architecture

An open architecture also allows for customised solutions that can interface with other departments within the enterprise. For example, the security system can talk to the HR system, dynamically updating personnel records and permissions according to the latest HR data. If people resign, the system can automatically remove access or if their role changes access permission can be changed immediately. This also enables employees who have a high-risk profile as a result of background checks conducted on hiring to have more controlled access and for security systems to ensure they keep better track of them.

Operational costs make up a large percentage of expenses for financial institutions and as a result physical security solutions should look at reducing energy consumption and therefore reducing these operational costs. By intelligently integrating security into energy management, energy consumption can be dramatically reduced. Using access control to inform the systems where in the building people are, for example, can inform energy management systems where lights and other facilities should be switched on and off. If areas are unoccupied for specified lengths of time these facilities can be switched off, saving power and money.

Ultimately, financial services organisations need security systems that provide reliability, consistency, automation and integration, and a custom developed solution built on open standards and architecture can deliver this while at the same time offering scalability and adaptability.

For more information contact Johnson Controls, +27 (0)11 921 7141, neil.cameron@jci.com, www.johnsoncontrols.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Building a nervous system for smart cities
Issue 1 2020, Pinnacle Instruments SA , Integrated Solutions
Build a central nervous system for smart cities, by employing real-time situation reporting and analysis that unites the powers of cloud computing, AI, IoT and big data.

Read more...
The secret to 5G security? Turn the network into a sensor
Issue 1 2020 , Integrated Solutions
We are about to make the leap from being a civilisation that uses networks to one that runs on them in a fundamental and inextricable way.

Read more...
The move to services and RMR
Issue 1 2020, Merchant West, G4S South Africa, Technews Publishing , Integrated Solutions
Project work used to be the staple diet for system integrators, but that was before the services model changed the way businesses buy and use their security systems.

Read more...
Global security industry adopts servistisation models
Issue 1 2020 , Integrated Solutions
New as-a-service business models are gaining traction because they reduce capital expenditure and cost of ownership, finds Frost & Sullivan.

Read more...
Looking ahead with mobile access technologies
Access & Identity Management Handbook 2020, Technews Publishing, HID Global, dormakaba South Africa, Salto Systems Africa, Suprema, Gallagher , Access Control & Identity Management, Integrated Solutions
Given the broad use of smartphones around the world and the numerous technologies packed into these devices, it was only a matter of time before the access control industry developed technology that would ...

Read more...
Scalable access solution
Access & Identity Management Handbook 2020 , Access Control & Identity Management, Integrated Solutions
Bosch Building Technologies makes access management simple, scalable and always available with Access Management System 2.0.

Read more...
Securing perimeters of secure locations
November 2019, Axis Communications SA, Modular Communications, Hikvision South Africa, Nemtek Electric Fencing Products, Technews Publishing, Stafix , Government and Parastatal (Industry), Perimeter Security, Alarms & Intruder Detection, Integrated Solutions
Hi-Tech Security Solutions asked a number of companies offering perimeter security solutions for their insights into protecting the boundaries of national key points.

Read more...
The safe city and its need for interoperability
November 2019 , Integrated Solutions, CCTV, Surveillance & Remote Monitoring
Interoperability continues to present one of the greatest challenges, particularly with video management systems, video recording devices and cameras.

Read more...
Analytics-driven solutions for smart infrastructure
November 2019, Bosch Building Technologies , Integrated Solutions
Video analytics technology can bring intelligence to infrastructure by delivering solutions for traffic flow, improved safety, smart parking, and data collection.

Read more...
A platform approach to innovation and value
CCTV Handbook 2019, Technews Publishing , Editor's Choice, CCTV, Surveillance & Remote Monitoring, Integrated Solutions, IT infrastructure
Moving to the platform model of doing business holds tremendous advantages for end users and smaller developers, but also for the whole technology supply chain.

Read more...