Redefining security

Access & Identity Management Handbook 2007 Access Control & Identity Management

The difference between just delivering security and ensuring secure business operations.

The 'current state' enterprise is unprepared for the security ramifications of global changes and must redefine its security posture via a business-centric, holistic risk management approach that spans people, goods and assets as well as information systems. Redefining security in this manner will provide the future foundation by which to manage risk and develop new ways to conduct business.

Today's security challenges for the typical government and corporate enterprise include external environmental factors, internal factors such as achieving the right balance between agility and assurance, and dynamic factors in terms of maintaining the correct level of preparedness to match ever-changing threat conditions.

Governments and businesses are challenged to operate efficiently and effectively in harsh environments while trying to maintain a balance between 'assured' and 'agile' commerce. With threats to business continuity, the need for disaster preparedness and the need for strong risk mitigation and management, it is critical that organisations redefine their security posture if they hope to survive and continue to grow. Given the many challenges within today's enterprises and the current state of enterprise security, it is essential for businesses to adopt and follow principles that will lead to secure business operations.

* Security must be holistic. Enterprise security should no longer be defined as simply IT security plus guards, guns and gates. It must be considered holistically across the entire enterprise, from the business and its goals, identifying people to tracking and tracing goods and assets, to securing IT systems.

Creative strategies and operational plans for prevention, detection and reaction. The need is as fundamental as the presence or absence of an immune system for the human body. Intranet and extranet (Internet) connectivity is almost a business imperative and you simply cannot survive that environment without the appropriate safeguards. It is a question of when the typical enterprise will be confronted with a disruptive event. Organisations must not just plan for prevention but also for detection and reaction to minimise adverse events and maintain business continuity.

* Visibility is critical. Visibility into enterprise processes can enable both 'assured' and 'agile' commerce. An enterprise cannot secure what it cannot see or what it does not know.

* Enhanced public/private collaboration. To protect against rising threat levels, greater public/private collaboration and greater internal collaboration are necessary.

* Take a proactive stance and look beyond compliance for competitive advantage. Compliance requirements are viewed as a cost of doing business, and organisations consequently adopt a minimal approach. Initiatives to support compliance should also be evaluated for opportunities to leverage the investment for innovation and growth. A governance profile of secure business operations is an attractive attribute for customers, suppliers and investors. As a matter of course a proactive approach that is part and parcel of business operations will surface and identify security and privacy concerns before they become 'disruptive events'. In addition investment in compliance can often be leveraged for improved business process insight and operational efficiency. Simply good governance.

Enterprises today need an holistic approach to security - one that is part of everyday business operations and combines management and process expertise based on industry standards with technological skill and business centric operational excellence. An approach that views security policies, procedures, and technology as more than just a way to protect against the occurrence of unwanted events, but also as a means of reducing organisational costs, improving operations and enabling new business opportunities.

Unisys Africa calls this approach 'secure business operations'. Based on the seemingly simple premise that you cannot secure what you cannot see. Yet it requires an in depth understanding of the many facets of security, the business and the industry in which an organisation operates, and the methodologies and tools that can provide the insight needed to make the right security investment decisions.

Whether a business is protecting physical and IT infrastructures; addressing concerns about privacy and identity theft; controlling access to government benefits, physical or logical resources; participating in e-business initiatives; complying with governmental regulations; tracking goods and assets; securing your supply chain - or all of the above - companies need insight and awareness to effectively manage their business and security risks.

This is the crucial difference between delivering security and ensuring secure business operations. The ability to visualise the different elements of your environment, understand the causal relationships and take the appropriate steps to maximise your security investments.

In both public and private sector, organisations around the globe need to focus their attention on operational efficiency and planned profitable growth - rather than constantly worrying about the continuity, integrity, and security of their operations. They need the knowledge and peace of mind gained from secure business operations that enables them to focus on their core activities. After all, how can a business secure what it cannot see? Or expand without worrying about the security implications?





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

New State of Physical Access Control Report from HID
HID Global Editor's Choice Access Control & Identity Management News & Events
HID released the 2024 State of Physical Access Control Report, identifying five key trends shaping access control's future and painting a picture of an industry that has been undergoing considerable transformation.

Read more...
Smart intercoms are transforming access control
Access Control & Identity Management Products & Solutions
Smart intercoms have emerged as a pivotal tool in modern access control. They provide a seamless and secure way to manage entry points without the need for traditional security guards to validate visitors before granting them access.

Read more...
Easy, secure access for student apartments
Paxton Access Control & Identity Management Surveillance
Enhancing Security and Convenience at Beau Vie II Student Accommodation, a student apartment block located at Banghoek Road, Stellenbosch, with Paxton's access control and video management solution

Read more...
Invixium acquires Triax Technologies
News & Events Access Control & Identity Management
Invixium has announced it has acquired Triax Technologies to expand its biometric solutions with AI-based RTLS (Real-Time Location Systems) offering for improved safety and productivity at industrial sites and critical infrastructure.

Read more...
ControliD's iDFace receives ICASA certification
Impro Technologies News & Events Access Control & Identity Management
The introduction of Control iD's iDFace facial biometric reader, backed by mandatory ICASA certification, underscores the commitment to quality, compliance, and innovation.

Read more...
The future of workplace access
HID Global Access Control & Identity Management
Mobile credentials are considerably more secure than physical access control, because they eliminate the need for physical cards or badges, support multiple security protocols, and add layers of protection on top of basic card encryption.

Read more...
Integrated, mobile access control
SA Technologies Entry Pro Technews Publishing Access Control & Identity Management
SMART Security Solutions spoke to SA Technologies to learn more about what is happening in the estate access world and what the company offers the residential estate market.

Read more...
Bespoke access for prime office space
Paxton Access Control & Identity Management Residential Estate (Industry)
Nicol Corner is home to a six-star fitness club, prime office space, and an award-winning rooftop restaurant. It is also the first building in South Africa to have its glass façade fully incorporate fritted glazing, saving 35% on energy consumption.

Read more...
Next-generation facial recognition access control system
Enkulu Technologies Products & Solutions Access Control & Identity Management Residential Estate (Industry)
With a modern and innovative design, iDFace is the ideal device for monitoring and controlling people entering and exiting a building using facial recognition technology, including liveness detection, for enhanced security.

Read more...
Long-distance vehicle identification
STid Security Products & Solutions Access Control & Identity Management Residential Estate (Industry)
The STid SPECTRE reader can identify vehicles up to 14 metres away, across four traffic lanes, ensuring secure access to an estate without disrupting the traffic flow.

Read more...