Manufacturing and industrial sectors need to improve risk management

July 2007 Integrated Solutions

Despite the growing number and diversity of risks facing South Africa’s manufacturing and industrial sectors, many players do not have the kind of security systems in place needed to effectively manage and protect their interests.

That is the word from Jack Edery, CEO of Elvey Security Technologies, who says the recent findings of Aon Global Risk Consulting’s first global risk management survey could well be extrapolated to the South African environment.

According to Aon managing director Ruth Joplin, the top 10 risk concerns cited by survey respondents included damage to reputation, business interruption, financial risk and physical damage. The survey also reports that America was the only region to cite technology failure and loss of data as major risk concerns. Edery says he finds this alarming since these concerns should be priorities for all enterprises owing to the ever-present and growing security threat to physical and intellectual property in conjunction with rising levels of terrorism. What also concerns him is that, according to the survey, a substantial proportion of senior management admitted to relying heavily on intuition and experience to identify major risks.

Positive growth needs to be protected

Quoting Statistics South Africa, Edery says the estimated total value of sales of manufactured products at current prices for the first quarter of 2007 increased by 6,1% (+R15 729 million), after seasonal adjustment, compared with the fourth quarter of 2006. This positive growth highlights both the future potential of the manufacturing and industrial sectors and concurrently the need to manage risk as effectively as possible if they are to continue to show good growth, he emphasises. “Rising numbers of fraudulent and criminal incidents are wreaking havoc on profits and bottom lines. One of the major risks facing these sectors today is criminal conduct by employees, whether through white collar fraud, shrinkage or fraudulent time-keeping. And this, coupled with the advent of technology and specifically the Internet, means that the opportunities for subterfuge and theft abound, whether in the office, factory or warehouse.”

The solution to managing risk effectively today is through the use of integrated systems, says Edery, whose company works with large parastatals such as Rand Water and Eskom as well as medium and small concerns. While he admits that choosing the right video security system is a daunting task to many, he says the development of complete solutions that provide monitoring and surveillance, digital video capture, realtime viewing, remote monitoring and management, recording, and archival/retrieval, have simplified the process.

Physical perimeter detection

Traditionally, the first point of security on any property has been physical fencing or walling. However, says Elvey sales manager Rudi Kuhn, with the evolution of technology, simple barrier protection has expanded into hi-tech perimeter security systems. “We are talking about intelligent perimeter protection that has detection, delay and deterrent capabilities,” he says. Typically, these are multifaceted systems with outward barriers that include steel barbs or coiled wire. Elvey’s top products have signal control units with a protection range of up to 400 metres that can be extended by connecting additional units together. Other capabilities of these products include point impact discrimination (which recognises and suppresses distributed disturbances due to wind, rain and vibrations) and sensitivity levelling (to automatically compensate for fence variations so as to be able to equalise the entire perimeter). Further, free-format zoning allows zones to be set in software independent of cable length or equipment location.

According to Kuhn, one of the most appealing aspects of today’s technology is its software-based flexibility which makes system design and upgrades both cost-effective and viable. Operators are able to receive intrusion perimeter alarms into a single display with precise information relating to suggested guard response and intrusion detection. Further, top-of-the-range systems are able to transmit alarm signals and data on one cable, from the processors and auxiliary sensors situated along the external barrier. “This has serious cost benefits since the need for extra wiring is eliminated and upgrades are inexpensively done when existing zones need to be matched to new technology,” he explains.

Despite its sophistication, perimeter security technology has a high degree of user-friendliness. Controls are either in the form of a mouse, custom keypad or touch screen and breach locations are pinpointed via colour graphics on highly detailed site maps, he says. The systems offer individual operator log-on, pre-set levels of authorisation for reports, and access and secure zone status. Important data such as alarm times and dates as well as actions by the operator are all automatically logged and saved for viewing in printed report and log files.

This top drawer technology also offers another enormous benefit to users: its low nuisance alarm rate. According to Kuhn, users can now enjoy minimal nuisance alarms owing to the existence of a feature known as sensitivity levelling. “Contrary to the relatively high number of false alarms generated by many other outdoor security products, these fencing systems are able to deal with environmental conditions such as wind, rain or snow,” he says.

Cutting-edge systems also offer mapping software, which Kuhn says is so advanced that it can provide the location of an alarm to within 10 feet. Optimised for perimeter and central security control room applications, it can reside in either a local area network (LAN) or wide area network (WAN). Kuhn is particularly keen on those products that offer map monitoring with graphical user interfaces that manage all functionality related to intrusion detection alarms, events and devices.

Increasingly run on IP (Internet Protocol) architecture, these systems are simply integrated into existing networks. They can be tailored to suit single or multiple site requirements and are available in a variety of language options. Furthermore, says Kuhn, the advanced versions offer benefits such as alarm tagging, log-on authentication and multiple site maps as well as the flexibility of being able to handle changes in site configuration and operators.

Access control using cutting-edge CCTV and IP

High and increasing demand for security has been behind an evolution in closed circuit television (CCTV). Using advanced video compression technology, CCTV is now able to deliver high quality images from remote sites over any telephone or cellular line, says Francois Smuts, Elvey’s CCTV product manager. “It is an easy-to-install, cost-effective and reliable remote video solution that offers video verification at a central station, video e-mail on events and even look-in capabilities. This technology is repeatedly proving its worth in terms of apprehending criminals, saving lives, improving revenue and reducing false alarms,” he continues. “It also reduces on-site guard requirements through automatically scheduled video guard tours that can be viewed by central station operators. As a result, the viewer can see via automatically e-mailed video clips who opens and closes the business, who was with them and if they carried anything away.”

Access control is another vital component of comprehensive risk management, says Smuts, adding that the latest technology allows for access control systems to be integrated with biometric interfaces in order to further enhance security levels.

Security aside, there is also the convenience aspect, which Smuts says should not be underestimated owing to its ability to import data into payroll systems.

In the event that more effective control and monitoring of staff is required, TCP/IP (Internet Protocol) communication is the way to go, according to Michael Brett, Elvey corporate account manager. He says the use of TCP/IP technology enables the owner or security officer of an industrial facility to control and monitor all aspects of security remotely, via the Internet. “It is also good news for companies that, despite having multiple sites, want to be able to do their monitoring via one central control room.”

One of the greatest benefits of TC/PIP technology, however, is its ‘always on’ status, he emphasises. “The connection allows the control panel to communicate with the central station every 90 seconds to ensure that units are actually connected. This in itself is a huge benefit since organisations know that their systems are being regularly polled to ensure they are constantly operational – something that has not been possible in the past.” He also points out the significant savings aspect of this technology, which can be integrated into existing as well as new infrastructures.

Gideon Wheeler, Elvey CCTV technical manager, comments further: “Closed circuit television has been around for many years but its rapid and continued advancement now singles it out as the most effective method of monitoring employees’ misconduct. In conjunction with IP, management can now observe activity in the manufacturing plant at any time of the day or night and from any point in the world.

“The need to feel secure touches all aspects of our lives,” Wheeler continues. “Education, transportation, healthcare, government, enterprise and retail have all been forced to revaluate previous assumptions about security and invest in new technologies. Video has become the foundation for this effort, from recording and aiding in the apprehension of criminals to preventing crime altogether when used as a deterrent.”

The use of IP provides an added feeling of security, he says, and for a number of reasons. “Placing a network video camera on your premises allows you to check on operations via the use of video servers, which link the CCTV and IP markets. These cameras can also be used as security cameras in that they can be monitored and controlled from anywhere at any time through dedicated application software or standard web browsers. All cameras connect to the network via simple, cost-effective Ethernet, utilising an existing LAN (local area network) infrastructure. Adding additional cameras is easy and there is no need for cabling. Servers are fully open to future upgrades with faster processors, larger disk drives and other enhancements,” he concludes.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Partnership addresses fire hazard mitigation
Brigit Fire (a Division of Hudaco Trading) Elvey Security Technologies Fire & Safety Security Services & Risk Management
Brigit Fire has partnered with the Elvey Group. The collaboration will see Brigit Fire distributing both the advanced C-TEC addressable fire detection systems (CAST Technology) and GreenMist lithium extinguishers.

Read more...
From wireless alarms to smart homes
Elvey Security Technologies Perimeter Security, Alarms & Intruder Detection Products & Solutions
The final brand SMART Security Solutions features in its discussions with companies operating in South and southern Africa’s detection and alerting technologies market is DSC, distributed in the region by Elvey Security Technologies.

Read more...
Advanced Perimeter Intrusion Detection Systems
XtraVision OPTEX Technews Publishing Modular Communications Perimeter Security, Alarms & Intruder Detection Integrated Solutions Products & Solutions
Making full use of fibre installations around the perimeter by adding Perimeter Intrusion Detection Systems means you can easily add another layer of security to existing surveillance and fencing systems.

Read more...
A critical component of perimeter security
Nemtek Electric Fencing Products Gallagher Technews Publishing Stafix Editor's Choice Perimeter Security, Alarms & Intruder Detection Integrated Solutions
Electric fences are standard in South Africa, but today, they also need to be able to integrate with other technologies and become part of a broader perimeter security solution.

Read more...
SMART Estate Security returns to KZN
Nemtek Electric Fencing Products Technews Publishing Axis Communications SA OneSpace Technologies Editor's Choice News & Events Integrated Solutions IoT & Automation
The second SMART Estate Security Conference of 2024 was held in May in KwaZulu-Natal at the Mount Edgecombe Estate Conference Centre, which is located on the Estate’s pristine golf course.

Read more...
Dynamic Dashboard enhances security and operational efficiency
Suprema neaMetrics Products & Solutions Integrated Solutions Residential Estate (Industry)
In today’s data-driven world, security systems are overwhelmed by an unprecedented volume of data, from video surveillance and access control logs to intrusion alerts and a variety of IoT sensor data.

Read more...
HELLO visitor access management
Products & Solutions Access Control & Identity Management Integrated Solutions Residential Estate (Industry)
HELLO is an on-premises visitor and contractor access management solution designed to be fully integrated and complementary with smart, on-trend technologies, securing estates and businesses alike.

Read more...
Using KPIs to measure smart city progress
Axis Communications SA Residential Estate (Industry) Integrated Solutions Security Services & Risk Management
United 4 Smart Sustainable Cities is a United Nations Initiative that encourages the use of information and communication technology (including security technology) to support a smooth transition to smart cities.

Read more...
Enhancing estate security, the five-layer approach
Fang Fences & Guards Residential Estate (Industry) Integrated Solutions Security Services & Risk Management
Residential estates are designed to provide a serene and secure living environment enclosed within gated communities, offering residents peace of mind and an elevated standard of living.

Read more...
Creating employment through entrepreneurship
Technews Publishing Editor's Choice Integrated Solutions Residential Estate (Industry)
Eduardo Takacs’s journey is a testament to bona fide entrepreneurial resilience, making him stand out in a country desperate for resilient businesses in the small and medium enterprise space that can create employment opportunities.

Read more...