Driving security into operations

October 2012 Integrated Solutions, Financial (Industry)

Security at financial services organisations is a priority so stringent policies and procedures ensure high standards and careful management.

Banking sector security systems include a mixture of CCTV, alarm systems, access control, ATM protection, off site monitoring and physical security (guarding). These various systems are usually linked back to a central control room using a variety of different forms of communication – eg, analogue telephone lines, TCP/IP or GSM - ensuring that there is always communication between the control room and the various security devices installed in the field.

The control side of the systems have been designed for ease of use and understanding by the operators. Detailed reports can be drawn for post mortem purposes after an incident. Constant checks and balances are in place to ensure that the correct procedures are followed and there is speedy and appropriate action at the time of an incident.

During working hours the systems are able to send panic signals in times of duress so that physical reaction can be deployed. Remote sites are constantly monitored for any abnormalities. After hours, these systems are the eyes and ears of control room personnel.

Adding value

New technology enhances security. Megapixel technology in CCTV cameras, for instance, mean facial recognition, even at considerable distances, is a reality. So is identification of potentially fraudulent activity by staff or criminal elements. Beyond basic security functions, however, there is a lot of value that can be driven from these systems.

As financial services organisations become more familiar with the sophisticated capabilities of the solutions, they are increasingly exploiting them to drive efficiencies in daily operations. Intelligent algorithms and analytics capabilities built into the software that drives CCTV solutions, for example, can today identify changes in the environment. Thus, banks apply these systems to monitor queuing – when a threshold is reached (say 10 people in the queue), floor staff are prompted to open up new counters to improve service levels.

Security solutions are also increasingly able to identify and take care of key vulnerabilities within security systems. This is thanks to a combination of best practices introduced by experienced service providers as well as intelligence built into security devices and the solutions themselves.

Identifying and dealing with vulnerabilities

Integration takes place between the various security devices and the central control room. The control room, in turn, is in direct contact with physical security, namely police or armed reaction personnel on the ground.

However, there are weaknesses in the system. Once such area of weakness can be inadequate training or a lack of correct operational procedures. For example, gaps appear in security systems when personnel do not arm, disarm or use security systems correctly; when insufficient preventative maintenance checks are carried out on installed hardware; or if standard operational procedures are not conveyed to key personnel responsible for the correct operation of the systems.

These vulnerabilities can be managed in a number of ways. Designing, manufacturing and installing self-managed security devices can eliminate human error from the equation. In terms of ensuring systems are in good operational order, service providers can be tied to SLAs and held responsible for the maintenance and good standing of the systems. For example, ATM security systems are set on timers and will auto-arm once personnel have exited the site. The same applies for branches.

The bank of the future

The successful bank of the future will exploit advances in technology and communications on all fronts. To improve alarm handling and reporting, self-managed security systems will increasingly be installed. In addition, systems must be able to report faults and abnormalities automatically to service providers tied to an SLA and reaction times.

Security systems within the banking environment will be fully integrated with offsite control rooms. These control centres will, in time, be able to control the entire branch, managing everything from remote unlocking, to switching on the lights to facilitate verification during remote monitoring.

As the evolution of security systems continues – smart financial organisations will keep up with the changes, employing service providers that not only understand and can deploy systems to meet new threats, but are able to introduce advanced functionality into banking operations to improve efficiency – and the bottom line.

For more information contact Jasco Security Solutions, +27 (0)11 266 1500, [email protected], www.jasco.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Continuous AML risk monitoring
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
AU10TIX, launched continuous risk monitoring as part of its advanced anti-money laundering (AML) solution, empowering businesses to detect behavioural anomalies and emerging threats as they arise.

Read more...
Digitising security solutions with AI and smart integration
Regal Security Distributors SA Technews Publishing Integrated Solutions
The Regal Projects Team’s decades of experience and commitment to integration have brought the digital security guard to life as a trusted force for safer, smarter living.

Read more...
Smart cities and the role of video security
Surveillance Integrated Solutions
As cities around the world continue to embrace smart technology, including IoT that not only connects to people, but also the surrounding activity, the integration of advanced video security systems is crucial to ensure safety and efficiency in environments.

Read more...
Surveillance to unjam the traffic
Integrated Solutions Transport (Industry)
Traffic is a challenge that affects urban areas across Africa. The city of Johannesburg, South Africa’s most populous city, experiences severe traffic resulting from a confluence of issues, including power outages, faulty traffic lights, and infrastructure theft.

Read more...
The benefits of offsite control rooms
Astrosec Surveillance Integrated Solutions
As the security landscape grows more intricate, control rooms – the crucial hub of security operations – need to adapt. With escalating costs, mounting threats, and a heightened demand for immediate responses, many organisations are reassessing the operations of their control rooms.

Read more...
edgE:Tower video analytics integrated with SEON
Surveillance Integrated Solutions AI & Data Analytics
Sentronics has announced a new integration between its edgE:Tower advanced AI-driven video analytics solution and SEON, a Central Monitoring Software (CMS) platform. This integration enhances real-time situational awareness and automated threat detection for control rooms.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
The power of knowing your client
Ideco Biometrics Access Control & Identity Management Integrated Solutions
One of the most effective ways to combat the threat of fraud, identity theft, and financial crime threats is through a robust Know Your Client (KYC) process, which safeguards both businesses and clients.

Read more...
Managing identities for 20 years
Ideco Biometrics Technews Publishing SMART Security Solutions Access Control & Identity Management Integrated Solutions IoT & Automation
Many companies are now more aware of the risks associated with unauthorised access to locations and sensitive data and are investing in advanced identity authentication technologies to mitigate these threats.

Read more...