Adapt, advance or fail

1 May 2017 Editor's Choice, Integrated Solutions

Many commercial facilities in South Africa have a number of different security solutions in place. As technologies continue to advance and prices drop, the enormous benefits they bring are making it a risky proposition not to upgrade to digital, analytics and open systems, and integrate these disparate systems for better control.

Peter Stutz, portfolio manager: security, at Jasco Enterprise.
Peter Stutz, portfolio manager: security, at Jasco Enterprise.

At present, many organisations still make use of stand-alone analogue solutions, sweating their investments by doing piecemeal integrations (e.g., integrating surveillance and access control solutions) and upgrades to address changing risk profiles. Often, security still falls outside of information technology with budgets and management usually being separate. These tactics start to look less attractive, however, as technology advances begin to fundamentally change the way security solutions can be applied, reaching into new segments of the business to add value.

Future tech wave

In five years’ time, security solutions as we know them will have converged with IT infrastructure, enterprise applications and external systems (e.g., IoT) to deliver way more than perimeter surveillance, authentication and protection of assets and people. Intelligent algorithms and analytics in CCTV and surveillance systems can, for example, be used within retail and service segments. They can assist companies to better understand how to optimise traffic, store layout and merchandising, and even prompt staff placement, shifting staff dynamically to improve management of service segments. This is only the beginning.

Consider the potential of tying together a personal cloud with a building system that reaches into enterprise systems. This could create a reality in which an individual, on authentication at the entrance of a building, becomes the catalyst for a whole series of automated events that link together the individual, people within the facility and the functional spaces within the building to drive efficiencies and productivity to a new level.

For example, as a visitor enters a building to attend a meeting, all attendees are alerted, boardroom sensors are activated and heating, ventilation and air conditioning (HVAC) are adjusted, catering requirements are communicated, and personal diaries are updated with attendee information.

Other advancements, once the networks are in place, will include rapid automated deployment of security and devices on networks. Instead of manual system integration, system advances will allow for auto provisioning using specific policies for deployment of devices such as cameras, and their integration into larger systems.

Moving forward

The first step toward modern systems is migrating to IP-based infrastructure and wireless technologies. This provides the organisation with greater flexibility. With the addition of advanced features, traditional challenges can be alleviated. Introducing intelligence and analytics provides better ways to analyse inputs at national operations centres, and offers new ways to present alerting and notification, improving compliance.

As security solutions and features begin to add value to the business on more fronts than just protecting assets and people, the business case for implementation and for converging business, IT and security budgets will begin to make sense. However, with multiple systems to integrate, it’s critical that organisations select a system integrator with a keen understanding of the security challenges integration presents.

If organisations are to integrate HVAC, enterprise and security systems and devices, as well as the new hosted applications with their built-in APIs that are emerging, an integration layer is required. Many organisations are currently grappling with this challenge. It needs to be done correctly, with consideration for future impacts.

Think ahead

As organisations begin to migrate to IP and advanced solutions, their first, most urgent task will be to think ahead. To activate the benefits of technology advances, they need to be asking questions like:

• What do we want to be monitoring?

• How do we want to control information?

• Can we outsource physical management?

• What can we feed into our building management system?

This is an important part of the journey to digitisation which drives competitiveness and security within a digital environment. The investment is essential but, with some innovation and ingenuity, the returns can be exponential.

For more information contact Jasco, +27 (0)11 266 1547, [email protected], www.jasco.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

AI-enabled tools reducing time to value and enhancing application security
Editor's Choice
Next-generation AI tools are adding new layers of intelligent testing, audit, security, and assurance to the application development lifecycle, reducing risk, and improving time to value while augmenting the overall security posture.

Read more...
2024 State of Security Report
Editor's Choice
Mobile IDs, MFA and sustainability emerge as top trends in HID Global’s 2024 State of Security Report, with artificial intelligence appearing in the conversation for the first time.

Read more...
Cyberthreats facing SMBs
Editor's Choice
Data and credential theft malware were the top two threats against SMBs in 2023, accounting for nearly 50% of all malware targeting this market segment. Ransomware is still the biggest threat.

Read more...
Are we our own worst enemy?
Editor's Choice
Sonja de Klerk believes the day-to-day issues we face can serve as opportunities for personal growth and empowerment, enabling us to contribute to creating a better and safer environment for ourselves and South Africa.

Read more...
How to spot a cyberattack if you are not a security pro
Editor's Choice
Cybersecurity awareness is straightforward if you know what to look for; vigilance and knowledge are our most potent weapons and the good news is that anyone can grasp the basics and spot suspicious activities.

Read more...
Protecting IP and secret data in the age of AI
Editor's Choice
The promise of artificial intelligence (AI) is a source of near-continuous hype for South Africans. However, for enterprises implementing AI solutions, there are some important considerations regarding their intellectual property (IP) and secret data.

Read more...
Super election year increases risks of political violence
Editor's Choice
Widening polarisation is expected in many elections, with terrorism, civil unrest, and environmental activism risks intensifying in a volatile geopolitical environment. Multinational businesses show an increasing interest in political violence insurance coverage in mitigation.

Read more...
Enhance control rooms with surveillance and intelligence
Leaderware Editor's Choice Surveillance Mining (Industry)
Dr Craig Donald advocates the use of intelligence and smart surveillance to assist control rooms in dealing with the challenges of the size and dispersed nature common in all mining environments.

Read more...
A long career in mining security
Technews Publishing Editor's Choice Security Services & Risk Management Mining (Industry)
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.

Read more...
Future trends for electronic safety and security in mining
Fang Fences & Guards Mining (Industry) Integrated Solutions AI & Data Analytics
The mining industry is ever evolving, driven by technological advancements and the growing need for enhanced safety and security measures, with significant innovation seen in turnkey electronic security for mining operations.

Read more...