Security for the digital age

May 2010 Access Control & Identity Management

Developing and implementing of security systems has become a complicated, daunting and expensive exercise for users of security systems and consultant engineers that have to design security systems in today’s world of the digital age.

Access control systems are no longer just a lock on a door with a key to control the locking and unlocking of the door, it has evolved into radio frequency identification (RFID) card reader technology that can be passive or active and allows users to monitor and track the movement of all visitors, staff and contractors on their premises or through their entire organisations no matter where the organisations are located in the world.

With the world being locked into the digital age, security systems have evolved, making the design and implementation of security systems more challenging.

To simplify today’s security systems, consultants and system integrators need to follow a standard procedure when designing and implementing security systems. Below are four basic principles to follow when developing a successful security solution for your organisation’s security needs.

The first key to designing a successful security system is to understand and define the word 'security' and what it means to you and your organisation:

The second key is to define the client’s existing operations and a detailed risk analysis is to be carried out based on the client’s existing operations.

1. What are the external threats?

2. What are the internal threats?

The third key is to develop an operational document that defines the basic security principles to be adopted within the client’s organisation and then get buy-in from all stakeholders within the organisation. This is the most important factor in the entire process as the concept of ownership of security is the responsibility of every single individual within the entire organisation, from the chairperson to the cleaner.

Basic operational criteria that needs to be considered when developing the operational plan:

1. Access control operational principles.

2. Surveillance operational principles.

3. Asset management and tracking operational principles.

4. Fire and safety operational principles.

5. System maintenance operational principles.

6. Security guards operational principles.

The fourth key to the process is to select the technology that will best fit the operational document as the security technology to be utilised must adhere to the basic principles as set out in the operational plan where the basic security principles have been agreed upon by all stakeholders within the organisation.

As described above, security technology has not been discussed in points 1; 2 and 3 and is the last consideration in the entire process of designing a successful and workable security solution that benefits the clients.

The four-step philosophy has been successfully implemented within many government and commercial organisations and is a very simple process to carry out with extremely effective results!

For more information contact JRJ Consultants, +27 (0)82 776 9990, [email protected], www.jrjconsultants.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

New State of Physical Access Control Report from HID
HID Global Editor's Choice Access Control & Identity Management News & Events
HID released the 2024 State of Physical Access Control Report, identifying five key trends shaping access control's future and painting a picture of an industry that has been undergoing considerable transformation.

Read more...
Smart intercoms are transforming access control
Access Control & Identity Management Products & Solutions
Smart intercoms have emerged as a pivotal tool in modern access control. They provide a seamless and secure way to manage entry points without the need for traditional security guards to validate visitors before granting them access.

Read more...
Easy, secure access for student apartments
Paxton Access Control & Identity Management Surveillance
Enhancing Security and Convenience at Beau Vie II Student Accommodation, a student apartment block located at Banghoek Road, Stellenbosch, with Paxton's access control and video management solution

Read more...
Invixium acquires Triax Technologies
News & Events Access Control & Identity Management
Invixium has announced it has acquired Triax Technologies to expand its biometric solutions with AI-based RTLS (Real-Time Location Systems) offering for improved safety and productivity at industrial sites and critical infrastructure.

Read more...
ControliD's iDFace receives ICASA certification
Impro Technologies News & Events Access Control & Identity Management
The introduction of Control iD's iDFace facial biometric reader, backed by mandatory ICASA certification, underscores the commitment to quality, compliance, and innovation.

Read more...
The future of workplace access
HID Global Access Control & Identity Management
Mobile credentials are considerably more secure than physical access control, because they eliminate the need for physical cards or badges, support multiple security protocols, and add layers of protection on top of basic card encryption.

Read more...
Integrated, mobile access control
SA Technologies Entry Pro Technews Publishing Access Control & Identity Management
SMART Security Solutions spoke to SA Technologies to learn more about what is happening in the estate access world and what the company offers the residential estate market.

Read more...
Bespoke access for prime office space
Paxton Access Control & Identity Management Residential Estate (Industry)
Nicol Corner is home to a six-star fitness club, prime office space, and an award-winning rooftop restaurant. It is also the first building in South Africa to have its glass façade fully incorporate fritted glazing, saving 35% on energy consumption.

Read more...
Next-generation facial recognition access control system
Enkulu Technologies Products & Solutions Access Control & Identity Management Residential Estate (Industry)
With a modern and innovative design, iDFace is the ideal device for monitoring and controlling people entering and exiting a building using facial recognition technology, including liveness detection, for enhanced security.

Read more...
Long-distance vehicle identification
STid Security Products & Solutions Access Control & Identity Management Residential Estate (Industry)
The STid SPECTRE reader can identify vehicles up to 14 metres away, across four traffic lanes, ensuring secure access to an estate without disrupting the traffic flow.

Read more...