According to recent survey results about
business risk mitigation, CIOs view Information Security and Business
Continuity as key priorities, with improved IT Functions and overall expense
reduction falling only slightly further down on that list. What complicates the
issue is that all of these priorities for CIOs are interrelated. So, how do we
begin to make things uncomplicated? We simplify the use and effectiveness of
technology for users at the lowest level of operations, first.
Simplified security automation helps to extend and distribute responsibilities among the entire team. Evolving technologies such as Wireless, Zigbee and 4G, apart from traditional TCP/IP, enables connectivity between field devices and application software, along with choices of smart controlling and operating options like smart phones and tabs, making security automations more effective and more exciting than ever.
Below are 3 steps that may significantly simplify the usages of technology, specifically electronic security automation to increase the effectiveness of IT function among users, along with overall lifecycle cost reduction for the organisation.
Simplified security automation helps to extend and distribute responsibilities among the entire team. Evolving technologies such as Wireless, Zigbee and 4G, apart from traditional TCP/IP, enables connectivity between field devices and application software, along with choices of smart controlling and operating options like smart phones and tabs, making security automations more effective and more exciting than ever.
Below are 3 steps that may significantly simplify the usages of technology, specifically electronic security automation to increase the effectiveness of IT function among users, along with overall lifecycle cost reduction for the organisation.
1. Unification of Security Access Systems
In a fast growing organisation, security
solutions, like those with access control systems for a new facility or
project, are decided by project teams with project managers, consultants and
PMC’s. No wonder that for them, project delivery capability of vendor and
project budgets always have greater importance over the right product
selection, especially when a CIO’s vision for product selection with overall
objectives are missing. By the time the need for a standard is realised and implemented, it’s
already too late and CIO’s or IT teams are left with the challenges of dealing
with separate islands (facilities) using different technologies for cards,
readers, controls, and software.
Solus has been closely connected in the
design and implementation of these unification projects for some very large
customers. Here are some experience excerpts from all those organisations
planning to unify their enterprise security systems at multiple locations in
isolation to a one unified solution.
When we are exercising unification, the, steps
should be in the order of Software >
Controllers > Readers > Cards. Often, organisations jump to take up
less relevant hardware, like cards and reader replacement first, simply because
it’s easier, leaving the unification project until later, which delays many of
the benefits until the full realization of the project.
A well-designed Integrated Security Access
Software, like iSOLUS, can collect data from multiple small purposely-built
software programs implemented at different sites, and can provide meaningful
MIS and alerts as the first step needed for unification. But this limits operations
ability to manage the multiple small software programs, databases, and indirect
control over systems’ controllers; therefore, it’s recommended to replace
application software and system controllers in One go.
Since controllers do support multi-tech
cards, changing readers and then cards will be the final and last step for post
stabilization of software and controller replacement. With unified software and
controllers, the major objective of unification, like common usage practices,
common MIS database are achieved seamlessly. The only challenge left to
overcome is the credential inter-operability access across sites, which is only
important when intra-site travelling of employees is high.
Multi-technology, or combination
technology, readers and cards are the tools for easy migration in the last step
of unification. Here, dual technology readers, those current and those to be
used in the future, are available from most reputable manufacturers like Solus,
and should be used to conveniently replace existing old technology readers.
This approach ensures that there is no disruption for users. Once all readers
are replaced, new technology card reissuance can be initiated. Card reissuance
can be very time consuming and should be done simultaneously with reader
replacements using combicards, which contain both old and new technology,
making reissuance painless and seamless.
When selecting cards & readers, go for
Open Source technologies on ISO Standards like Desfire or Mifare. If you use a proprietary technology controlled
by a card manufacturer, you will most likely pay higher costs without any
significant gain. This is because of the complex nature of changing your cards
and readers during recurring needs.
Unification projects at a live site are far
more different than those at a greenfield project and requires specialization;
hence, experience matters. Data migration from an older system to a new system,
along with a functional audit within a stipulated period (mostly between Friday
to Monday) needs experienced and skilful execution. Small mistakes here can
create an operational mess, hence the need for careful consideration while
selecting a right partner to perform this service.
2. Thoughtful Automations
Information security that also ensures
business continuity is only as strong as the weakest link in the security
implementation chain. Quite often, executors at the ground level, like security
guards, are not trained to be proficient in high end and high budget automation
plans. Unlike the Western world, India has a talented pool of trained security
staff available, and will continue to do so at a reasonable price, often far
less than complex or large size automation implementations; hence, the
automation and use of guards will continue to coexist.
Considering this fact, the objective of automation should be restructured towards optimum use of both, rather than replacing one with the other. Small assistance, such as timely intelligent alerts, along with information about the next steps to be taken on the alert, can easily turn deployed guards into the strongest wall rather than the weakest link. Automation can take up routine and mundane activities like surveillance and regular patrols, freeing up guards for more meaningful work such as dealing with alerts & suspects. This makes the guard’s job more interesting, and accountable.
Considering this fact, the objective of automation should be restructured towards optimum use of both, rather than replacing one with the other. Small assistance, such as timely intelligent alerts, along with information about the next steps to be taken on the alert, can easily turn deployed guards into the strongest wall rather than the weakest link. Automation can take up routine and mundane activities like surveillance and regular patrols, freeing up guards for more meaningful work such as dealing with alerts & suspects. This makes the guard’s job more interesting, and accountable.
Below are a few automation examples collected from different users during their experience of managing operations, which resulted in greater benefits through thoughtful automation.
Access Readers with color coding ( Click to Enlarge) |
The Access Control Systems at large
enterprises are designed to automate the process of gaining physical access to
the facility by employees, visitors and others. The system is pre-set with
security sensitivity of different doors, but often it’s known to only the
system software, not to the deployed guards who can really benefit from
prioritizing their attention for such sensitive doors. A reader’s colour coding
concept displaying security sensitivity information of the door, right on the
door itself, may be installed on RFID Readers. This is a simple concept to
implement and does not require complex training, once used uniformly across the
facility. (Courtesy: Solus Labs)
Photo Display System
A Photo Display System is another similar
concept used to verify the identity of cardholders at doors while they gain
access. A display of electronically stored information on an ID card, like
photographs on a common screen, allows a single security guard to take care of
multiple doors in a zone and sense any untoward activity proactively. This
hybrid use of electronic security, along with human intelligence, has proven
very effective on operations and cost. (Courtesy: iGATE Computer Systems Ltd.)
Random Check in a Campus Scenario
Random Check in a campus scenario is a very
useful tool for security guards to control intruders on a company’s campus. The
guards can instantly verify the validity of an access card off of any suspect
on the Random check readers installed across the open campus. (Courtesy: Wipro
Technologies)
Linking Employee's Attendance, with Access Control
By Linking Employee attendance with access
control, this ensures that unless the employees punch in their attendance in
the connected Biometric readers, they can't gain access at any facility doors. This
will enforce a positive discipline among employees. (Courtesy : ZS Associates)
Visitor Management & Guard Tour linked with Access Control
Visitor
Management & Guard Tours linked with access control can approve a limited time access for a third
party visitor, along with biometric authentication, quickly, over a remote
network. (Courtesy: Airtel)Visitor Management & Guard Tour linked with Access Control
These are just a few of the concepts, among several other benefits, that can be derived from unification and security automation investments, which can be added at a later date for free or fractional costs.
Again, choosing a capable and agile partner here is the key. Reliable Security Automations require professionals who can enable such thoughtful innovations, evolving normal business operations, quickly. Normally, such fine-tuning of requirements are learned and evolved over repeated usage with time, and as such, cannot be defined in a project RFP. Unfortunately, such desired solutions bring maximum benefit, but are shown the least interest by large sized MNC security implementation vendors. They either deny it directly or quote discouraging customisation costs.
3. Managed Services Outsourcing
Once systems are unified to a common
software and automated to meet business processes, they can readily be
outsourced for maintenance, bringing in expert services at lower costs. You
need not invest in the retraining of internal people for this specialized and
important job; therefore , managed services offered by a capable OEM should be
a good choice. The option of moving implementation to the cloud can be reviewed,
here. This may help bring about greater support efficiency.
Managed Services Partner selection is
important, as well. Most project sales companies don’t give equal importance to
after-sales like new projects with major revenue streams, as most of the time,
their key resources are engaged in key project executions. This also results in
inadequate training of field engineers who are necessary for efficient
after-sales support. Because of this, it is advisable that companies with a significant
local presence, remote service infrastructure with CRM
and automated ticketing systems with training focused on support engineers, and
a presence at remote locations should be considered with a desired service
level agreement in place for executing automation, as well as the integration
of electronic security systems.
For smarter security automation concepts
and detailed experience sharing and to see
how we can help you by managing operations that result in greater benefits through
thoughtful automation write to us at http://www.solus.co.in/contact or
No comments:
Post a Comment