How to implement physical security

November 2017 Government and Parastatal (Industry), Surveillance

Managers of both suburban and rural power substations are faced with many challenges today, including safety, power density, right-of-way issues and cost. One of the key factors attributed to these challenges is the increasing migration activity of people from rural areas to urban homes and workplaces, which in turn, drives up the demand for municipal power distribution systems.

Brent Cary.
Brent Cary.

In essence, city dwellers – or those who have maintained residence in an urbanised setting – are recognised as higher per-capita energy consumers, which consolidates the premise of ‘more users equals more power needed’. In order to address these challenges, a new strategy should be developed and implemented, which can be enacted upon after conducting a thorough and comprehensive risk assessment process.

One key concern with respect to the maintenance of control centres and substations is security. Power utility facilities have to deal with situations like theft, vandalism and the need to comply with set international security standards. In fact, a potential attack or emergency situation on these facilities underscores the risks associated with physical security breaches and their possibly disastrous effects.

Across the region, control centres and substations utilise basic technologies like perimeter fencing, outdoor lighting and CCTV surveillance. Some are still known to be using key-based access control and previous generation analogue video systems – hindering immediate intervention or quick action should a situation come to light. The grainy analogue video feeds will possibly be able to catch an intruder on camera, but will lack the sophistication that today’s high definition (HD) IP cameras can offer, that can result in an image for positive identification.

The emergence of these challenges, combined with the need to integrate newer technologies to help further enhance security measures should prompt the utilities industry to make a transformational shift towards more modern, advanced and highly-efficient Internet protocol (IP) solutions. Regulators should implement stronger security mandates and urge power providers and operators to make the bold move of upgrading their present security systems – especially across mission critical areas.

However, operators and providers must first conduct a review and assessment of security risks and vulnerabilities of their facilities, which will give them an idea on how to execute a security strategy should any situation arise. At the same time, these companies and organisations should put their own security standards in place – effective and efficient measures designed to address physical attacks, cyber attacks and the occurrence of natural disasters.

Utility providers and operators will now have to upgrade better security systems to help tighten security. Industry experts have recommended the use of specific system features to ensure a successful upgrading of equipment and have suggested the following;

• Implementation of network connected systems: Having all devices connected to a singular network presents many advantages and benefits, like real-time information, the immediate detection of potential threats, on-site modification and configuration and the easy management of the system itself.

• Utilisation of a strategic unified platform: With multiple security systems like CCTV video surveillance, access control, automatic licence plate recognition (ALPR) and perimeter detection running at each site, it is essential to utilise an open-architecture platform that can accommodate easy customisation and integration across a diverse range of security and business systems.

• Control and access to one central station: If there are multiple sites and substations to secure, centralising security operations becomes highly beneficial and cost-effective. The creation of a federated architecture will give operators and providers the ability to manage all sites and systems as one global operation. All video and data is sent back to a central location, where alarms and events from various sites can be received and acknowledged.

• Shift to open architecture: The move towards newer and more advanced systems will need a key feature like open architecture – which can facilitate the integration with other systems and provide complete freedom in the device selection process.

• Mapping and mobility: Using a map-based interface simplifies system navigation, which in turn can help effect quicker responses to arising situations. Meanwhile, mobile connectivity gives essential personnel the capability to access the facility’s systems though their phones, tablets or any mobile device – a pivotal advantage especially during critical situations that happen at odd hours of the day.

In conclusion, power utility providers and operators should develop and implement a comprehensive set of security strategies to aid them in their efforts to upgrade security systems that are also in compliance with international standards and guidelines. These utility facilities should understand the need to be up to speed with today’s technological advancements, particularly across the safety and security segment, thereby guaranteeing the safety and the security of these very essential utilities’ control centres and substations.

For more information contact Brent Cary, Genetec, [email protected], www.genetec.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Cybersecurity must support local by-elections
Government and Parastatal (Industry)
With municipal by-elections taking place across South Africa throughout 2025, attention is once again turning to the strength of local governance, but beyond the campaign posters and voting stations, lies a less visible, yet equally vital, concern – cybersecurity.

Read more...
Next generation of AI-powered video telematics
IoT & Automation Surveillance Transport (Industry)
Webfleet, Bridgestone’s fleet management solution in South Africa, has launched Webfleet Video 2.0, an AI-powered solution designed to enhance fleet safety, security, compliance with local regulations and operational efficiency through real-time video insights.

Read more...
Key design considerations for a control room
Leaderware Editor's Choice Surveillance Training & Education
If you are designing or upgrading a control room, or even reviewing or auditing an existing control room, there are a number of design factors that one would need to consider.

Read more...
Advanced surveillance storage from ASBIS
Infrastructure Surveillance Products & Solutions
From a video storage solutions perspective, SkyHawk drives, designed for DVRs and NVRs, offer high capacity, optimised firmware, and a reliability workload rating of hundreds of terabytes per year.

Read more...
CCTV control room operator job description
Leaderware Editor's Choice Surveillance Training & Education
Control room operators are still critical components of security operations and will remain so for the foreseeable future, despite the advances of AI, which serves as a vital enhancement to the human operator.

Read more...
Platform to access data and train AI models
Milestone Systems AI & Data Analytics Surveillance
Milestone Systems has announced Project Hafnia to build services and democratise AI-model training with high-quality, compliant video data leveraging NVIDIA Cosmos Curator and AI model, fine-tuning microservices.

Read more...
AI means proactive surveillance
DeepAlert Technews Publishing SMART Security Solutions AI & Data Analytics Surveillance
SMART Security Solutionsasked DeepAlert for some insight into how AI is transforming video surveillance, even to the extent of it being taught to protect the privacy of those in the cameras’ view.

Read more...
What’s the difference between a VMS and VSaaS?
Genetec Surveillance
How does a video surveillance or video management system (VMS) compare to video surveillance as a service (VSaaS), and why can a hybrid-cloud deployment be a good long-term choice?

Read more...
Camera Selection Guide 2025
Camera Selection Guide Surveillance
The Camera Selection Guide 2025 includes a range of IP, thermal and speciality cameras aimed at a broad range of surveillance functions.

Read more...
Vumacam highlights concerns with proposed Johannesburg CCTV by-laws
Vumacam News & Events Surveillance
Vumacam has raised objections to critical provisions of the by-laws governing privately owned CCTV cameras with a view of public spaces in the city, which were promulgated on Friday, 28 February 2025.

Read more...