Businesses face the challenge of creating a secure working environment that is effective yet not excessively costly.
While a security strategy is usually based on a thorough risk analysis, integrating the variety of `point' solutions that collectively form the security approach is often overlooked. Integrating disparate security systems is key to providing enhanced functionality and a lower total cost of ownership (TCO).
This is according to Neil Cameron, divisional manager at Johnson Controls, a facility management, security and control-focused company.
Cameron explains, "Isolated solutions are effective to a certain point but if they are not integrated to form a cohesive security system they can hinder the overall efficiency of the collective components. All systems must alert security. With isolated solutions, each system duplicates alarms onto a variety of controller workstations."
The types of solutions that are installed under the security 'banner' include perimeter security; intrusion detection; access control; surveillance and monitoring; fire and smoke detection; evacuation systems and building management systems (BMS). Although a BMS may not be considered a security solution in the traditional sense, it is prudent to integrate lighting, temperature control and humidity and carbon dioxide content controls into security solutions. After all, if a fire is detected in a particular area, the BMS can manage damper settings within that particular area to contain a fire. In addition, the BMS can establish occupancy in the building and activate ventilation, extraction and pressure fans to keep smoke out of evacuation areas.
Cameron adds, "Another example of integration enhancing the effectiveness of a security solution is seen in the ability to leverage the cross-functionality between an access control solution and closed circuit television (CCTV) cameras. Access control cards may be swapped or stolen and identity theft has become increasingly problematic in the local market. Activating a CCTV camera positioned at the access control point each time a person swipes their card will record images that will allow security staff to identify perpetrators."
Integration aids these systems to 'multitask' and contains ongoing costs. Notes Cameron, "Disparate security systems may require a unique set of skills to operate and maintain each solution. Integrating these security solutions will provide a more efficient, less complex and leaner environment. A central control consol can handle events and alarms, and manage multiple solutions more efficiently than individual workstations that basically duplicate similar functions."
An example of an 'intelligent' integrated building concept is Hollard's new facility based in Parktown, Johannesburg. Johnson Controls designed a solution that integrates all its electronic systems with a single seat control room. Cameron explains, "The solution integrates airconditioning, heating, chillers, access control interfaces, a CCTV system, evacuating system, panic system and a fire control systems, as well as perimeter security and intrusion detection. The advanced integration capabilities create an environment that lowers the total cost of ownership (TCO). This is particularly relevant when considering approximately 75% of the costs of a building occur after occupation therefore using an intelligent integrated system makes perfect financial sense."
However, not all implementations are 'greenfields' sites and security areas are often implemented at various stages, making it difficult to establish future integration requirements. It is thus important to ensure the following:
* It is wise to employ a system that operates on an 'open platform' such as BACnet. Although these open architecture systems are not necessarily the cheapest, they realise the most impressive cost containment down the line. They also provide scalability, allowing a business to grow without being restricted by inflexible solutions.
* Ensure all systems converge onto an Internet Protocol (IP) network to reduce maintenance on different networks and providing a common interface. Integrated security solutions are particularly suited to multiple sites as the systems operate over the wide area network. Web-enabled solutions also allow access from any point with Internet connectivity.
* Choose a consultant that has an in-depth understanding of information communication technology (ICT). To understand the importance of integration and how it works requires sound ICT knowledge. Opportunities are often over-looked when a consultant does not have the necessary experience and expertise.
* It is prudent to invest a bit more up front to build a control room that can expand without incurring further expenses.
* Be aware of solutions that offer integration capabilities only with their own proprietary systems.
* Ensure integration is built-in at the device level (eg, a controller). This offers more reliability - if the servers crash it impacts the device. Intelligence at the controller level means the systems can still offer basic functionality without reliance on the ICT network.
Making the argument more impressive for integrated security solutions is the lack of security skills available. Integrating these solutions promotes the automation of functions and responses, reducing the need for human management intervention.
Cameron concludes, "A holistic approach to security issues and concerns will automatically lead businesses towards the integration of security solutions. Although this may initially be a slightly costlier investment, companies that have the foresight to allocate the additional spend position themselves to reap the benefits of lowered ongoing costs with far superior features and functionality."
For more information contact Neil Cameron, Johnson Controls, 011 886 8997, [email protected]
Tel: | +27 11 921 7100 |
Email: | [email protected] |
www: | www.johnsoncontrols.co.za |
Articles: | More information and articles about Johnson Controls |
© Technews Publishing (Pty) Ltd. | All Rights Reserved.