A BMS remains essential, but is it secure?

1 May 2017 Surveillance, Integrated Solutions

Building management systems (BMS) have come a long way. They don’t just manage the physical environment of facilities, these platforms now enable the integration, and centralise the control of multiple building systems. Their role is becoming more, not less, important as these systems begin to converge with IT and enterprise systems. However, increased integration creates security loopholes. Is the BMS a weak link?

With more integration and distribution of information between systems, there is greater opportunity to hack into sensitive enterprise systems. It’s a very real risk. The challenge is that it’s difficult to share and keep systems secure, especially when the core functionality of systems is different. Security systems are built to protect people and assets. BMS functionality, because it is focused on managing an internal environment, is not usually security-oriented. Care thus needs to be taken with regard to how systems share information, as well as how much and what information they share.

For example, it may be effective to share basic occupancy information, such as how many people are working in which parts of the facility, to assist the BMS to make decisions about where lighting and ventilation may be switched off; it may be a security risk to also share detailed personal information about who these people are.

Security standards – let’s shake on it

The standards and the technology each system uses will also differ. BMS’s make use of open systems which make it easier to share non-critical information, such as temperatures within the facility, the performance of HVAC equipment and energy usage. Enterprise systems containing sensitive information generally require authentication before granting access.

To get around this, Johnson Controls has found that cybercriminals will make use of systems with low-level security to get into more critical enterprise systems – for a hacker, for instance, it may be just a hop and a skip to the company’s HR database via a controller that is part of a company’s access control system which is being fed information about which areas of a facility a card holder may access. And once inside the enterprise system, access to sensitive customer data is within reach.

To combat this, Johnson Controls has built additional Dark Node security into its Metasys BMS solution that ensures secure handshakes between devices. This capability makes it difficult for hackers to simulate different devices and hack into a system. It’s something that has become increasingly important to be aware of as the computing capacity and the intelligence of controllers – the basic hardware components that make access control systems work, opening and closing doors and turn on the sprinklers when the smoke alarms go off– continue to grow, opening security loopholes that heighten threat risks.

Secure BMS’s are here to stay

Will BMS’s be replaced by, or converge with other solutions like physical security information management (PSIM) software? The short answer is no, the functionality of the BMS is too advanced, too specific and valuable to be easily replaced. What users can expect is greater interoperability between BMS and other systems along with a stronger focus on what is shared, how it is shared, and what information is stored. In other words, security awareness and implementation of security measures within BMS systems will become non-negotiable.

The strategic roadmap for BMS platforms will see them continue to advance, becoming easier to install and operate. Users can expect more interoperability with a lot more plug-and-play integration and wireless information sharing. The winners, however, will be those platforms that put the right security and sharing processes in place to ensure the enterprise, its assets, people and customers are secure.

For more information contact Johnson Controls, +27 (0)11 921 7141, [email protected], www.johnsoncontrols.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Vumacam highlights concerns with proposed Johannesburg CCTV by-laws
Vumacam News & Events Surveillance
Vumacam has raised objections to critical provisions of the by-laws governing privately owned CCTV cameras with a view of public spaces in the city, which were promulgated on Friday, 28 February 2025.

Read more...
Milestone announces a platform to enable access to data and train AI models
Surveillance AI & Data Analytics
Milestone Systems has announced Project Hafnia to build services and democratise AI-model training with high-quality, compliant video data leveraging NVIDIA Cosmos Curator and AI model, fine-tuning microservices.

Read more...
Benchmark in long-range surveillance
Duxbury Networking Surveillance Products & Solutions
Duxbury Networking says the long-range, high-resolution monitoring AXIS Q1809-LE bullet camera has been enhanced further with integration into Milestone XProtect to set a new standard for forensic-level image clarity, intelligent event detection, and enhanced security management.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
AI for retail risk management
Surveillance Retail (Industry) AI & Data Analytics
As businesses face mounting challenges in a volatile economic environment, Ares-i remains an essential tool for proactively identifying, assessing, and mitigating risks that threaten operational stability and customer satisfaction.

Read more...
The need for integrated control room displays
Leaderware Editor's Choice Surveillance Training & Education
Display walls provide a coordinated perspective that facilitates the ongoing feel for situations, assists in the coordination of resources to deal with the situation, and facilitates follow up by response personnel.

Read more...
Six key security technology trends in 2025
Axis Communications SA Surveillance
Axis Communications examines some new trends for the security sector in 2025, as well as some new, old trends that are once again highlighted because of their benefit to the end user in the race to obtain optimal value from technology installations.

Read more...
edgE:Tower video analytics integrated with SEON
Surveillance Integrated Solutions AI & Data Analytics
Sentronics has announced a new integration between its edgE:Tower advanced AI-driven video analytics solution and SEON, a Central Monitoring Software (CMS) platform. This integration enhances real-time situational awareness and automated threat detection for control rooms.

Read more...
The impact of video analytics on business security
AI & Data Analytics Surveillance
As more enterprises work to integrate AI-enabled solutions into their networks, enterprises must not lose sight of the implications of these integrations and the added value they are working to unlock.

Read more...
The need for integrated control room displays
Editor's Choice Surveillance Training & Education
Display walls provide a coordinated perspective that facilitates the ongoing feel for situations, assists in the coordination of resources to deal with the situation, and facilitates follow up by response personnel.

Read more...