Balancing cost with performance

September 2016 Editor's Choice, Security Services & Risk Management, Industrial (Industry)

Many industrial facilities are characterised by large sites and numerous buildings. These two factors not only increase the cost to reduce risks, but also increase the complexity of managing the risk. Hi-Tech Security Solutions spoke to Pieter Fourie, senior manager – corporate risk – at Nissan South Africa about the challenges faced when securing an industrial facility.

Pieter Fourie, senior manager – corporate risk – Nissan South Africa.
Pieter Fourie, senior manager – corporate risk – Nissan South Africa.

Fourie says that one of the biggest challenges Nissan South Africa faces is the extremely high annual capital investment required to ensure all security measures are fully maintained and, in the case of technology, to ensure this stays up to date as technology develops.

When systems are not updated regularly, the older technology becomes outdated, with the result that spares and components are no longer readily available. To replace complete systems will then require huge capital expenditure to get the security back on track. The four most important initial deterrent measures for securing any site, he believes, are excellent perimeter protection, a reputable access control system and CCTV, together with manpower for visible policing.

In addition to other security issues, cyber security has become a worldwide concern and if businesses do not take this issue seriously they render themselves vulnerable to cyber attacks. It is therefore paramount that organisations take the necessary measures to protect their IT and IS infrastructures. To ensure this level of security, Nissan South Africa employs the services of specialists to prevent any such attempt to attack the IT and IS systems and to track all attempts of these attacks.

Technology, according to Fourie, is one of the most important aspects in securing any site, from access control systems to CCTV through to alarm systems, including beams and sensors on the perimeter fence, with excellent communication to a control room for immediate action. Communication links via either radio link or SIM card is of the utmost importance, as any system is only effective if managed properly.

Nissan South Africa’s facility is protected by an excellent perimeter fence with superior access control system. The facility has a total lock-down capability and once this is in operation, a specific vehicle gate can only be unlocked by following a specified procedure, with the unlocking effected remotely from a secured control room.

The vulnerability and activities of each individual site or building determines the level of security measures necessary to secure each facility. This varies from extensive CCTV coverage, which includes external domes, static as well as internal cameras, alarm systems, as well as access limitation to facilities. All systems throughout the facility are monitored in real time, recorded and managed around the clock by a comprehensive surveillance centre.

Fourie emphasises that all the necessary products should be readily available for each individual company’s requirement to effectively secure their people and assets. The major concern faced by client companies is the availability of spares for imported products. This, he says, can cause unnecessarily long delays and downtime. He adds that it would be beneficial for South Africa to invest in the development of various businesses to design and manufacture a greater variety of electronic security systems for the local South African market, tried and tested in a South African environment for the demanding local conditions.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Cybersecurity a challenge in digitalising OT
Kaspersky Information Security Industrial (Industry)
According to a study by Kaspersky and VDC Research on securing operational technology environments, the primary risks are inadequate security measures, insufficient resources allocated to OT cybersecurity, challenges surrounding regulatory compliance, and the complexities of IT/OT integration.

Read more...
Security and privacy: Is one without the other possible?
IoT & Automation Industrial (Industry)
OEMs have a duty to protect privacy as much as security. If security protection is about keeping people out of an embedded device, privacy protection safeguards the data inside the device.

Read more...
Deepfakes and digital trust
Editor's Choice
By securing the video right from the specific camera that captured it, there is no need to prove the chain of custody for the video, you can verify the authenticity at every step.

Read more...
A new generational framework
Editor's Choice Training & Education
Beyond Generation X, and Millennials, Dr Chris Blair discusses the seven decades of technological evolution and the generations they defined, from the 1960’s Mainframe Cohort, to the 2020’s AI Navigators.

Read more...
Chubbsafes celebrates 190 years
Gunnebo Safe Storage Africa News & Events Security Services & Risk Management
Chubbsafes marks its 190th anniversary in 2025 and as a highlight of the anniversary celebrations it is launching the Chubbsafes 1835, a limited edition 190th-anniversary collector’s safe.

Read more...
New law enforcement request portal
News & Events Security Services & Risk Management
inDrive launches law enforcement request portal in South Africa to support safety investigations. New portal allows authorised South African law enforcement officials to securely request user data related to safety incidents.

Read more...
Continuous AML risk monitoring
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
AU10TIX, launched continuous risk monitoring as part of its advanced anti-money laundering (AML) solution, empowering businesses to detect behavioural anomalies and emerging threats as they arise.

Read more...
Back-up securely and restore in seconds
Betatrac Telematic Solutions Editor's Choice Information Security Infrastructure
Betatrac has a solution that enables companies to back-up up to 8 TB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Read more...
Key design considerations for a control room
Leaderware Editor's Choice Surveillance Training & Education
If you are designing or upgrading a control room, or even reviewing or auditing an existing control room, there are a number of design factors that one would need to consider.

Read more...
How intrusion protection helps secure O&G operations
Surveillance Perimeter Security, Alarms & Intruder Detection Industrial (Industry)
For O&G operators in Africa, physical security remains one of the biggest considerations, particularly when it comes to perimeter protection and the ability to mitigate intruder-related incidents.

Read more...