Innovation and security go hand in hand

August 2024 Facilities & Building Management, Security Services & Risk Management

In a world where the demand for tech innovation is matched only by the acceleration of cybersecurity threats, businesses face the challenge of balancing new product development and robust security measures.

Kevin Halkerd, Risk and Compliance Manager, and Andrea Carr, Head of Research and Development at Proptech specialist e4, say this balance is not just a goal, but the cornerstone of their strategic approach.

How can businesses balance the need for innovation without compromising on security? Part of the answer is stepping outside the dichotomy altogether. “It is so important to have both. You cannot have one without the other. A business that does not innovate will quickly fall behind its competitors, and one without security simply will not survive,” says Carr.

“Fortunately, this perspective is fast becoming the consensus in the industry,” says Halkerd. “At CISO conferences, the prevailing message is clear: Security must be baked into the innovation plan itself. This approach ensures that security considerations are part of the developmental process from the start, and not as an afterthought.”

Striking the right balance early

Early engagement of security teams in the innovation process should form part of the strategy from day one. “To encourage and facilitate the testing of new technologies within our organisation, we invite proposals for new tech and evaluate them alongside other similar technologies. Our goal is to create a safe space for experimentation, exploring specific use cases. Before finalising any technology, we involve e4’s security team to thoroughly investigate and identify any hidden risks. This ensures that any technology we integrate is secure and appropriate for our systems. If security is brought in only at the end of an R&D; process, it is already too late,” Carr explains.

“There are so many benefits to this approach,” agrees Halkerd. “By taking this kind of proactive approach in the past we have been able to shift a selected technology from an open-source technology to a closed source technology within a day. This is not viewed as unusual or problematic; we have had to pivot technologies within 24 hours before, changing an entire production environment to a completely different architecture or service provider due to risk factors. This flexibility in avoiding long-term technology lock-ins makes organisations much stronger and can form part of ordinary security measures as well as the overall approach to innovation.”

Security leading innovation

“In fact, it is possible for security considerations to become the driving force behind innovation,” says Halkerd. Security is often at the bleeding edge of innovation discussions. Successful AI strategies, for instance, frequently emerge from security companies that leverage advanced technologies to enhance their capabilities. This forward-thinking approach not only protects the company, but also sets the stage for new technological advancements.

First to market vs. first to get it right

Balancing the need to be first to market with the imperative to get it right is a nuanced challenge. “Introducing something new is difficult. Customers are understandably cautious about trusting technology to do what humans have done in the past. However, once we have one client signed up and running an enhancement we have developed successfully, with data to prove its effectiveness, others soon follow suit,” notes Carr. “The challenge then shifts to having the resources to implement it across all clients concurrently. The key is to get something 80% implemented and working efficiently, and then quickly finalise the remaining 20% to stay ahead of competitors who might be able to achieve 100%.”

It is about finding a middle ground. VCs are often the first lead market, and their perspective is entirely different from established long-term businesses. When leveraging your existing customer base, especially blue-chip clients, you want to bring them something refined and polished. More mature businesses do not necessarily need to be the first to innovate, but do want to see technologies being integrated into their offering.

Managing emerging technology

Adopting emerging technologies like AI requires careful consideration of data security. Once again, involving security teams early in the process serves as an essential guardrail, ensuring that risks are identified and resolved before implementation. “At the simplest level, before adopting any new technology, ensure you understand how securely it manages data. If you do not know the answer, do not proceed,” says Carr.

As with many emerging technologies, it is not as much about the technology itself as it is about the data behind it. AI is going to be a significant game changer for business. “How do you balance security and the need for innovation in that respect,” asks Halkerd. “The key is data operations. Data needs to be in a clean, usable format. If organisations can focus on that, deliver against that; then it is possible to abstract the data safely and sensitively while keeping in mind regulations in South Africa, like the Protection of Personal Information Act (PoPIA).”

By involving security teams early in the process, maintaining transparency, and fostering a culture of continuous improvement, robust security can enhance, rather than hinder, innovation – whether it is AI or the next big innovation on the horizon.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

From the editor's desk: The beginning of the end
Technews Publishing News & Events
            As we come to the final issue of SMART Security Solutions, we can look back on a tough year: long decision-making cycles, squeezed budgets and the expectation of miracles on a shoestring. SMART Security ...

Read more...
AI and automation are rewriting the cloud security playbook
Technews Publishing AI & Data Analytics
Old-school security relied on rules-based systems that flagged only what was already known. AI flips the script: it analyses massive volumes of data in real-time, spotting anomalies that humans or static rules would miss.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Cybersecurity operations done right
LanDynamix SMART Security Solutions Technews Publishing Information Security
For smaller companies, the costs associated with acquiring the necessary skills and tools can be very high. So, how can these organisations establish and maintain their security profile amid constant attacks and evolving technology?

Read more...
Syndicates exploit insider vulnerabilities in SA
Information Security Security Services & Risk Management
Today’s cyber criminals do not just exploit vulnerabilities in your systems; they exploit your people, turning trusted team members into unwitting accomplices or deliberate collaborators in their schemes.

Read more...
Efficiency first – the reimagined building of tomorrow
Facilities & Building Management
Enough cannot be said about the importance of transforming our existing buildings. Indeed, retrofitting is a truly practical way to achieve energy efficiency, compliance, and long-term competitiveness.

Read more...
Is your entrance security secure?
SMART Security Solutions Centurion Systems Technews Publishing News & Events Access Control & Identity Management Smart Home Automation
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security.

Read more...
The impact of AI on security
Technews Publishing Information Security AI & Data Analytics
Today’s threat actors have moved away from signature-based attacks that legacy antivirus software can detect, to ‘living-off-the-land’ using legitimate system tools to move laterally through networks. This is where AI has a critical role to play.

Read more...
Continuum launches centralised access and identity management
Editor's Choice Access Control & Identity Management Integrated Solutions Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...
Fire and gas safety
Fire & Safety Facilities & Building Management
Fire and gas safety is a critical component of every business’s risk management processes. While sometimes ignored until it is too late, safety solutions abound at Securex Cape Town 2025.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.