Welcome to this, the first Access Control Handbook.
An idea brought to us at Hi-Tech Security Solutions by industry specialists in access control, this Handbook is designed not so much to highlight access control products specifically, but to educate end-users and security professionals about the principles which underpin successful security solutions. We sincerely hope that you find it of value.
As you might appreciate, it is never easy to get end-users to discuss their security systems and solutions, but I have always maintained that one can do so without compromising security, simply by highlighting the principles of success. What to do, what not to do. And why? In this Handbook we have attempted to do just that, with a focus on case studies and best practices, trends and white papers. A special word of thanks to the contributors to this Access Control Handbook. Without their help we would never have got out of the starting blocks. You know who you are. Thank you.
Access out of control?
Do South African business and security professionals need education in access control? We all do. Whilst the principles of success might not change, the technology and integration trends are ensuring we are all in need of continued learning. A case in point, is that as I write this, there is a Saturday newspaper headline trumpeting the breach of security at Johannesburg International Airport by its reporters in the aftermath of a recently botched heist at the airport.
The journalist 'tested' access control measures at Johannesburg International Airport, and according to police, the journalist, in gaining access to certain restricted areas, committed a criminal offence.
Superintendent Eugene Opperman is quoted as saying that, "The Johannesburg International Airport ... is governed by the National Key Points Act. Members of the public, including journalists, who wilfully and illegally access certain areas without clear authority commit a criminal offence. If found guilty, such a person could be sentenced to a heavy fine or even imprisonment."
Surely the question should rather be 'how on earth did this journalist gain illegal access to a National Key Point'!
After all, that is what access control is all about. Restricting unauthorised people from entering areas out of their jurisdiction. It seems to me that the authorities should rather be taking a much closer look at the security technology, processes and people staffing security at these National Key Points, than threatening the layman with arrest. Any high-risk environment (such as an airport) should constantly evaluate itself for security breaches. These regular checks, much like a quality management system, will allow professionals to actively see how easily their systems can be breached, and where. One has to question whether such audits are taking place as regularly and systematically as they should be.
Have we covered it all?
Have we covered everything we would like to in this Access Control Handbook. No, not at all. We have barely scraped the surface. But there are gems of value in the case studies, opinion pieces, and white papers we have published, and I would encourage you to look beyond the pages of this Handbook. Securitysa.com will archive Standards, Legal Guides, Case Studies and White Papers related to the Access Control Handbook, which will bring you the depth that this 80-page publication cannot.
And if you feel we have missed something, or even missed it all, let me know. We will take your kudos and brickbats to heart.
Sincerely
Darren Smith
© Technews Publishing (Pty) Ltd. | All Rights Reserved.