A seamless approach to security and building management

July 2006 Integrated Solutions

Traditionally, security and building management systems have been regarded as two separate disciplines and have been kept operationally distinct.

However, it is becoming increasingly clear that integrating aspects of these two processes - and access control as well - offers the site owner or operator a much more powerful means of operational control.

Keeping track of the people coming onto a site, when they arrive and when they leave, is not just of interest to the security manager: today, it is of increasing interest to the facilities manager who is trying to ensure that the right services - whether heating, lighting or cooling - are supplied to the people that need them, when and where they need them.

While linking the security and building management systems can be of benefit to the building manager, does it offer anything to the security systems manager? Actually, it does. Rapid changes in the internal building environment, such as a sharp rise in temperature, would register quickly on a building management system - it might be the first indication of a fire. Occupancy-switched lighting would alert the security systems to a person's presence in a particular location. Closer integration offers benefits both ways.

Security, access and building management systems monitor different aspects of overall activity on a site. While they run separately, the synergies cannot easily develop. As an example of what is already possible, we are using building management systems (BMS) as aids to fire control on a number of our contracts. If a fire breaks out, we can use the airconditioning controls to stop or even reverse the fans, reducing the air feeding the fire and helping to bring it under control.

Convergence

The way technology is developing is also making convergence and integration possible. The architecture, for example, of the systems is becoming more alike. Distributed intelligence means that more functionality is actually stored by the control devices that are physically connected to individual items of equipment. These are linked back to the head-end PCs via a local network. Should the network fail, the controllers will still work on a standalone basis until the network links are restored. This adds to 'system security', but also reduces the need for duplicate cabling and redundancy strategies.

Putting all the systems on a single network means they can all be monitored on the same PCs in the control room. As systems have become more 'user-friendly' - and this applies equally to security, access and BMS - so developers have adopted common presentation protocols for the operator. From the user's point of view, the displays on the computer screen will look fairly similar. In addition, the responses required to exception reports and alarms are also clearly outlined: a BMS alert will require confirmation of the fault, possibly an attempt to reset the control and, if that does not work, a call to an external engineer. For the security systems, the steps would be similar with perhaps a visual check on the problem before security staff (either on-site or external) are dispatched to tackle the problem.

That is not to say that everyone has equal access to all parts of all the systems. Password protection of different security levels is standard practice on every type of system today. Levels of admittance to different parts of any system are easy to police and robust enough to make bypassing very difficult.

Health and safety legislation will still, of course, mean that some items - such as fire alarms - have to remain independent, but these are the exception rather than the rule today.

Different priorities?

In the past, the philosophies underpinning security systems and building control differed: security systems were largely about managing risk, while building controls were concerned with maintaining a comfortable working environment. Yet, here again, philosophies are converging.

A security review of a site will grade the risks to the various functions and facilities. So, a large computer room processing credit card transactions, for example, will clearly have a higher risk rating than a storeroom. The BMS and access systems can be used to reduce that risk, though. Keycards or smartcards can log entry and exit. Passive infra red (PIR) presence detectors routed to the BMS for lighting control will also alert control room staff to movement. The BMS environmental controls will help to make sure that the environment stays within acceptable limits and - as mentioned earlier - in the event of a problem like a fire the BMS can also help to contain the problem. So, risk can be reduced by optimising the interface between all three of these systems.

Value for money

It also has to be remembered that fire, security, access and building management systems all come with a price tag. By making the most of the available synergies, not only can overall site management be improved, duplication can be eliminated with a resultant saving on both capital investment and running costs.

Integration has been discussed a great deal over the last decade. A number of factors are now conspiring to make it more achievable, more economic and therefore much more attractive.

For more information contact Neil Cameron, divisional manager, Johnson Controls, 011 438 1600,

[email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Digitising security solutions with AI and smart integration
Regal Security Distributors SA Technews Publishing Integrated Solutions
The Regal Projects Team’s decades of experience and commitment to integration have brought the digital security guard to life as a trusted force for safer, smarter living.

Read more...
Smart cities and the role of video security
Surveillance Integrated Solutions
As cities around the world continue to embrace smart technology, including IoT that not only connects to people, but also the surrounding activity, the integration of advanced video security systems is crucial to ensure safety and efficiency in environments.

Read more...
Surveillance to unjam the traffic
Integrated Solutions Transport (Industry)
Traffic is a challenge that affects urban areas across Africa. The city of Johannesburg, South Africa’s most populous city, experiences severe traffic resulting from a confluence of issues, including power outages, faulty traffic lights, and infrastructure theft.

Read more...
The benefits of offsite control rooms
Astrosec Surveillance Integrated Solutions
As the security landscape grows more intricate, control rooms – the crucial hub of security operations – need to adapt. With escalating costs, mounting threats, and a heightened demand for immediate responses, many organisations are reassessing the operations of their control rooms.

Read more...
edgE:Tower video analytics integrated with SEON
Surveillance Integrated Solutions AI & Data Analytics
Sentronics has announced a new integration between its edgE:Tower advanced AI-driven video analytics solution and SEON, a Central Monitoring Software (CMS) platform. This integration enhances real-time situational awareness and automated threat detection for control rooms.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
The power of knowing your client
Ideco Biometrics Access Control & Identity Management Integrated Solutions
One of the most effective ways to combat the threat of fraud, identity theft, and financial crime threats is through a robust Know Your Client (KYC) process, which safeguards both businesses and clients.

Read more...
Managing identities for 20 years
Ideco Biometrics Technews Publishing SMART Security Solutions Access Control & Identity Management Integrated Solutions IoT & Automation
Many companies are now more aware of the risks associated with unauthorised access to locations and sensitive data and are investing in advanced identity authentication technologies to mitigate these threats.

Read more...
Cost-effective and reliable remote connectivity
Agriculture (Industry) Integrated Solutions Infrastructure
Companies that operate in hard-to-connect areas now have access to reliable connectivity due to a collaboration between MTN South Africa, Vox and Tarana technology.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.