Delivering more than security

July 2017 Editor's Choice, Integrated Solutions, Industrial (Industry)

With so many moving parts, industrial and manufacturing concerns have a broader risk profile. This means their security solutions need to work harder – the safety of people and assets is at stake, but so is productivity. Smart organisations are making use of intelligent security solutions with open systems that can communicate with scada and operational systems to drive complex processes related to optimising operations, production and profitability.

Data collected by security systems can help address numerous issues and drive key processes. For example, smart algorithms within CCTV systems could work together with sensors in equipment and scada solutions to identify and address bottlenecks within manufacturing processes, or to identify anomalies (e.g., aggregate that has dropped off a conveyer belt and now poses a hazard) that require attention. Similarly, if key areas are out of bounds within a facility, a security system can help identify unauthorised personnel movements, helping to initiate processes to have the person quickly removed from the area or to shut dangerous equipment down.

Productivity and safety

In terms of enhancing productivity, a security system could relay key data relating to efficiency, for example, how many people are on a production line at a specific time. In conjunction with other information, this could help the organisation identify how many people are needed on a line to optimise outputs. The counting of people would in the past have been done by specialised equipment, now the advanced features of cameras make them capable of these functions and of communicating to operational equipment – it’s convenient to use them, and cost effective.

A more sophisticated, platform-based security system can also drive more than basic safety features. Low capability security solutions may simply grant access to specific personnel, based on their profiles. A more sophisticated access control system may be able to consult HR records to ensure the person seeking access has received the necessary training within the required period, and has not illegally signed in for a double shift, potentially compromising the safety of others and breaking health and safety codes.

In addition, by sending access information to payroll, a complete digital record can be created, automating some of this function too. Clearly, being able to integrate complex rules into these systems is of enormous benefit to organisations.

Privacy and control

Sharing too much data from security systems within the organisation’s scada and other systems can be problematic, however. Security threats come from everywhere – and scada systems present an easy target. So, for instance, while knowing how many people are in the building at any time will help ensure heating, ventilation and air conditioning (HVAC) outputs meet needs, attaching people’s names and designations to those numbers could be an invasion of their privacy. In addition, putting this kind of sensitive information into an operational system that typically does not have the protection that corporate systems do, is just asking for trouble.

The good news is that advanced systems will not only use standard communication protocols like OPC and BACnet, XML and APIs to communicate or feed information to scada and ops systems, they will only share very specific information, thus limiting risk and adhering to the POPI act.

One golden rule when it comes to integrating security with any other systems is that master central control must be vested in the security system. You don’t want the scada system controlling information or the distribution of information.

An automated, AI-driven future?

Beyond privacy, control and productivity, there’s one other reason manufacturing and industrial organisations need to be looking at making use of more sophisticated security systems: automation. As the fourth industrial revolution kicks in, automation, robotics and AI will begin to replace and augment human roles. Security needs will change, but use of an advanced security solution with open systems and the ability to communicate with scada and operational systems will be non-negotiable.

A vast range of intelligent security systems are currently available. Johnson Controls’ newly acquired Tyco range, for example, offers solutions tailored for specific environments and functions. These solutions are well worth exploring; the returns can be significant and clearly reach far beyond traditional security benefits.

For more information contact Johnson Controls, +27 (0)11 921 7141, [email protected], www.johnsoncontrols.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

AI-enabled tools reducing time to value and enhancing application security
Editor's Choice
Next-generation AI tools are adding new layers of intelligent testing, audit, security, and assurance to the application development lifecycle, reducing risk, and improving time to value while augmenting the overall security posture.

Read more...
2024 State of Security Report
Editor's Choice
Mobile IDs, MFA and sustainability emerge as top trends in HID Global’s 2024 State of Security Report, with artificial intelligence appearing in the conversation for the first time.

Read more...
Cyberthreats facing SMBs
Editor's Choice
Data and credential theft malware were the top two threats against SMBs in 2023, accounting for nearly 50% of all malware targeting this market segment. Ransomware is still the biggest threat.

Read more...
Are we our own worst enemy?
Editor's Choice
Sonja de Klerk believes the day-to-day issues we face can serve as opportunities for personal growth and empowerment, enabling us to contribute to creating a better and safer environment for ourselves and South Africa.

Read more...
How to spot a cyberattack if you are not a security pro
Editor's Choice
Cybersecurity awareness is straightforward if you know what to look for; vigilance and knowledge are our most potent weapons and the good news is that anyone can grasp the basics and spot suspicious activities.

Read more...
Protecting IP and secret data in the age of AI
Editor's Choice
The promise of artificial intelligence (AI) is a source of near-continuous hype for South Africans. However, for enterprises implementing AI solutions, there are some important considerations regarding their intellectual property (IP) and secret data.

Read more...
Super election year increases risks of political violence
Editor's Choice
Widening polarisation is expected in many elections, with terrorism, civil unrest, and environmental activism risks intensifying in a volatile geopolitical environment. Multinational businesses show an increasing interest in political violence insurance coverage in mitigation.

Read more...
Enhance control rooms with surveillance and intelligence
Leaderware Editor's Choice Surveillance Mining (Industry)
Dr Craig Donald advocates the use of intelligence and smart surveillance to assist control rooms in dealing with the challenges of the size and dispersed nature common in all mining environments.

Read more...
A long career in mining security
Technews Publishing Editor's Choice Security Services & Risk Management Mining (Industry)
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.

Read more...
Future trends for electronic safety and security in mining
Fang Fences & Guards Mining (Industry) Integrated Solutions AI & Data Analytics
The mining industry is ever evolving, driven by technological advancements and the growing need for enhanced safety and security measures, with significant innovation seen in turnkey electronic security for mining operations.

Read more...