New security technology for banks

September 2007 Integrated Solutions

Where cash is held, a security risk exists.

With cash-in-transit robberies up by almost 22% and bank robberies more than doubling from 59 to 129 between April 2006 and March 2007, financial institutions need to become more aware of the new security technologies available and how these can be leveraged to extend the reach of their existing security investments - and the safety of their assets and clients.

Says Neil Cameron of Johnson Controls Systems and Service, "Access management, CCTV and building management systems (BMS) incorporate increasingly sophisticated functionality that is designed to meet the growing need for advanced access control, enhanced surveillance and the automation of key systems."

These advances include new intelligent functionality in access control solutions that use data mining and neural technologies to analyse behaviour patterns and detect anomalies in the movement of people in a given space or identify suspicious objects (like a briefcase or box) that have been left behind. In addition, improved integration of building systems, including access, CCTV, heating and lighting systems, fire and intrusion alarms, and more, ensure better control and risk management, as well as improve building cost efficiencies.

"Recorder technologies used in CCTV systems are, for instance, advancing in 18-month cycles," notes Cameron, "while response times in emergencies are diminishing exponentially using integrated systems. In an integrated system, CCTV cameras can pinpoint and monitor a fire while access systems can adjust to ensure a safe exit from the building without unnecessarily opening doors to controlled areas, such as vaults, as might be the case with legacy systems programmed to unlock all access points in an emergency."

Backward compatibility, open platforms and centralised control with strong authorisation and database partitioning are also vital improvements. "Banks have a widely distributed infrastructure that must cater for clients situated all over the country. The extent and modernity of the security systems at these hundreds of physical branch offices depend on the location and size of the branch and the risk to which it is subjected," Cameron explains.

"With multiple sites, financial organisations benefit from access control solutions with direct Ethernet connections that can connect to the corporate WAN and be managed from any facility, so minimising the resources needed to support, maintain and even upgrade these solutions. Johnson Controls even has clients that maintain access systems across continents."

Of course, in a banking environment access needs to be carefully managed.

Explains Cameron: "With database partitioning, bank branches can only gain access to their local systems to manage their own card holders, alarms and other events. A single administrator privilege is only granted for audit and high level management purposes."

In addition, where access solutions traditionally required a serial link - a direct cable link to each controller from the server - Johnson Controls' Cardkey access control system enables centralised control of the software and database from a Pentium processor built into the controllers. This means that even if the server goes down, the information is stored locally on the controller and these systems will continue to function.

With use of security systems stretching to sometimes as much as 15 years, backward compatibility is essential to extend investments.

Notes Cameron: "Our systems allow organisations to continue to upgrade without having to replace expensive items such as readers, for example. With the same system and platforms, the organisation can enhance its systems consistently as needed, while ensuring ongoing interoperability."

Advances in biometrics can also be added as needed. "At present, fingerprint recognition is becoming standard as the price of the technology decreases. Other technologies, such as Iris scanning are also gaining recognition.

"Facial recognition technologies are still in a test phase, however, but should become a reality in about 18 months."

The crime wave in this country makes it imperative that financial organisations stay ahead of technology trends and continue to enhance their systems. Just staying one step ahead may be enough to discourage such an incident and save lives.

For more information contact Johnson Controls, +27 (0)11 921 7100, neil.cameron@jci.com, www.johnsoncontrols.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
The power of knowing your client
Ideco Biometrics Access Control & Identity Management Integrated Solutions
One of the most effective ways to combat the threat of fraud, identity theft, and financial crime threats is through a robust Know Your Client (KYC) process, which safeguards both businesses and clients.

Read more...
Managing identities for 20 years
Ideco Biometrics Technews Publishing SMART Security Solutions Access Control & Identity Management Integrated Solutions IoT & Automation
Many companies are now more aware of the risks associated with unauthorised access to locations and sensitive data and are investing in advanced identity authentication technologies to mitigate these threats.

Read more...
Cost-effective and reliable remote connectivity
Agriculture (Industry) Integrated Solutions Infrastructure
Companies that operate in hard-to-connect areas now have access to reliable connectivity due to a collaboration between MTN South Africa, Vox and Tarana technology.

Read more...
Advanced Perimeter Intrusion Detection Systems
XtraVision OPTEX Technews Publishing Modular Communications Perimeter Security, Alarms & Intruder Detection Integrated Solutions Products & Solutions
Making full use of fibre installations around the perimeter by adding Perimeter Intrusion Detection Systems means you can easily add another layer of security to existing surveillance and fencing systems.

Read more...
A critical component of perimeter security
Nemtek Electric Fencing Products Gallagher Technews Publishing Stafix Editor's Choice Perimeter Security, Alarms & Intruder Detection Integrated Solutions
Electric fences are standard in South Africa, but today, they also need to be able to integrate with other technologies and become part of a broader perimeter security solution.

Read more...
Using advanced surveillance technology as a smart city enabler
Duxbury Networking Integrated Solutions Surveillance
Smart cities are increasingly becoming a focus area for African governments and companies. However, the transition to these environments does not come without challenges, especially when it comes to security and resource management.

Read more...
SMART Estate Security returns to KZN
Nemtek Electric Fencing Products Technews Publishing Axis Communications SA OneSpace Technologies Editor's Choice News & Events Integrated Solutions IoT & Automation
The second SMART Estate Security Conference of 2024 was held in May in KwaZulu-Natal at the Mount Edgecombe Estate Conference Centre, which is located on the Estate’s pristine golf course.

Read more...
Dynamic Dashboard enhances security and operational efficiency
Suprema neaMetrics Products & Solutions Integrated Solutions Residential Estate (Industry)
In today’s data-driven world, security systems are overwhelmed by an unprecedented volume of data, from video surveillance and access control logs to intrusion alerts and a variety of IoT sensor data.

Read more...