Protecting critical infrastructures

September 2014 Industrial (Industry), Products & Solutions

In the wake of the attacks in New York and Washington on 11 September 2001, the Madrid train bombing on 11 March 2004 and the London Underground attacks in July 2005, nations around the globe have developed new strategies to defend themselves against international terrorism.

Homeland security, virtually unknown in the last century, quickly became the prevalent umbrella term for all security efforts towards this goal. Other than national security, which is generally a responsibility of the respective government alone, homeland security is a shared effort of government and the private sector. This is mainly because many critical infrastructures that form the centre of all homeland security strategies are privately owned.

Such infrastructures serve as vital lifelines in today´s societies. We are reliant on the supply of energy and water, information technology and mobility functioning in a dependable manner. Large-scale failures of these systems or other important infrastructures, even for only short periods, can have serious consequences. Critical infrastructures must thus be protected against potential terrorist attacks, but other dangers also need to be addressed. Natural disasters such as earthquakes and floods, for example, can cause substantial destruction, as the recent events in Fukushima have impressively demonstrated.

The Bosch building integration system (BIS) provides a single Web-based control point for monitoring all security, safety and facility management systems. This includes alarm management, fast alarm identification via location maps and follow-up procedures. It seamlessly integrates fire and intrusion alarms, evacuation, access control, video surveillance and building automation systems into a single platform. BIS enables a single operator to monitor and control all Bosch and third-party security systems as well as to respond faster to emergencies and achieve greater overall effectiveness.

Hostile acts or vandalism on the manufacturing or plant areas can be perilous and CCTV systems enable early detection to suspicious behaviour and help to confirm and validate alarms. In combination with intelligent video analysis (IVA) Bosch cameras establish a virtual perimeter fence that if crossed, alerts a security operator. It allows operators to supervise production processes and continuous real-time image analysis allows unplanned or critical events to be detected.

For more information contact Bosch Security Systems – South Africa & Sub-Sahara Africa, +27 (0)11 651 9600, [email protected], www.boschsecurity.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Cybersecurity a challenge in digitalising OT
Kaspersky Information Security Industrial (Industry)
According to a study by Kaspersky and VDC Research on securing operational technology environments, the primary risks are inadequate security measures, insufficient resources allocated to OT cybersecurity, challenges surrounding regulatory compliance, and the complexities of IT/OT integration.

Read more...
Security and privacy: Is one without the other possible?
IoT & Automation Industrial (Industry)
OEMs have a duty to protect privacy as much as security. If security protection is about keeping people out of an embedded device, privacy protection safeguards the data inside the device.

Read more...
How intrusion protection helps secure O&G operations
Surveillance Perimeter Security, Alarms & Intruder Detection Industrial (Industry)
For O&G operators in Africa, physical security remains one of the biggest considerations, particularly when it comes to perimeter protection and the ability to mitigate intruder-related incidents.

Read more...
Advanced surveillance storage from ASBIS
Infrastructure Surveillance Products & Solutions
From a video storage solutions perspective, SkyHawk drives, designed for DVRs and NVRs, offer high capacity, optimised firmware, and a reliability workload rating of hundreds of terabytes per year.

Read more...
DoorBell with built-in AI
Ajax Systems Access Control & Identity Management Products & Solutions Smart Home Automation
Ajax Systems has announced the release of Ajax DoorBell, which features built-in AI, an IR sensor, and app control, seamlessly integrating into the Ajax ecosystem to ensure efficiency and security confidence.

Read more...
How intrusion protection helps secure O&G operations
Industrial (Industry)
For O&G operators in Africa, physical security remains one of the biggest considerations, particularly when it comes to perimeter protection and the ability to mitigate intruder-related incidents.

Read more...
Kaspersky KATA 7.0 for targeted attack protection
Information Security Products & Solutions
] Kaspersky has announced a major update to its Kaspersky Anti Targeted Attack (KATA) including enhanced network detection and response (NDR) capabilities with deeper network visibility, internal threats detection and other critical security features.

Read more...
Benchmark in long-range surveillance
Duxbury Networking Surveillance Products & Solutions
Duxbury Networking says the long-range, high-resolution monitoring AXIS Q1809-LE bullet camera has been enhanced further with integration into Milestone XProtect to set a new standard for forensic-level image clarity, intelligent event detection, and enhanced security management.

Read more...
Bosch sells product business to Triton
Bosch Building Technologies News & Events Products & Solutions Facilities & Building Management
Bosch is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. The division is set to focus on systems integration business in the future.

Read more...
New quad is tough enough for security policing
Security Services & Risk Management Products & Solutions
Linhai has introduced its latest full-sized workhorse quad (ATV) to the local market, where it is expected to become a top-rated item in security and policing operations.

Read more...