Opinion Piece: Integrated security is key

By Eckart Zollner
In today’s world, security threats can come from anywhere, be it cybercriminals looking to attack your business’ data, intruders targeting physical...

In today’s world, security threats can come from anywhere, be it cybercriminals looking to attack your business’ data, intruders targeting physical hardware, or even internal employees haplessly giving away company secrets or letting unauthorised people into your environment.

While security technologies are evolving rapidly, traditional intruder detection systems, alarm panels and access control technologies can no longer operate independently of each other to provide effective security - they need to be able to integrate to provide a true, preventative and dynamic security solution. Eckart Zollner, Head of Business Development for NewTelco SA, takes us through some of the trends and shifting requirements for today’s security landscape.

Integration is key

“Organisations should have a multi-layer security strategy in place, with each layer integrating with the next and controlled from a single platform,” says Zollner. “When various security technologies work together, background technologies such as artificial intelligence (AI) and machine learning (ML) can come into play, allowing for pattern identification which can give advanced warning of a security breach. Businesses are then better able to prevent, manage and even recover from security breaches.”

The advancements in connectivity coupled with most security technologies being IP based, today, brings about the ability to easily interconnect them. High speed fibre and wireless devices allow for a network of security systems across multiple branches to communicate with each other, and with a control platform, in almost real time, giving an instant overview of the current security landscape at any given moment.

Many intrusion systems, alarm panels, cameras and biometrics systems come with built in features such as AI, high resolution imaging and early warning alarm triggers. However, Zollner says that these cannot offer real peace of mind on their own. An effective centrally managed control platform should tie all technologies, both legacy and new, together to provide a holistic view.

“The ability to control, change and act on real time data through a central control platform can mean the difference between life and death. Although cameras may have built in AI to identify patterns and send alerts based on facial recognition or irregular activity, and biometric systems are able to detect and prevent unauthorised access faster than before, connecting these systems to a central managed platform allows the business to tie data from these - and other - sources together to achieve an overall risk picture. This, in turn, allows the business to identify patterns on high risk areas, employee behaviour, and other risks so that the business can react proactively.”

See also:

It’s about more than just technology

Organisations can - and usually do - spend exorbitant amounts of money on cutting edge security systems, however without a proper security policy and processes in place, they are may be a wasted investment.

Zollner says that businesses need to know how to achieve the best from their security technology and can only do so if they understand how to use it, as well as what the parameters are for a safe environment.

“If an alert goes out, sent by an intelligent surveillance camera, the people receiving those alerts need to know how to proceed to ensure the best safety and security for their business, and its people. However, security policies go beyond knowing what to do in the event of a breach, it’s also about enforcing best practices to ensure that breaches are prevented to begin with.”

Zollner adds that these policies need to be reviewed and updated regularly to be effective, ensuring that they are aligned with the changing business environment, as well keeping pace with technology advancements within the organisation and changes in the cybercrime landscape. They should also be tested often, checking that all technologies are working as they should be and that all parties are fully cognisant of their roles.

Feeling safe

Ultimately, good security comes down to how safe employees feel within their environment, and whether or not they are aware of the dangers, processes, protocols and technologies in place.

“A well planned, easily viewable and integrated security solution coupled with a solid security policy helps businesses to build a secure environment, providing peace of mind for the organisation and its people,” concludes Zollner.

Eckart Zollner, Head of Business Development, NewTelco SA


Featured Articles

Robot dining staff on call to help care in the community

Robots are ready to serve seniors as retirement communities struggle with staff shortages, and a new report says pensioners appreciate a metal maître d

BlackBerry drives its QNX technology to the cloud with AWS

BlackBerry has expanded its work with Amazon Web Services, which will see the Canadian security company’s embedded systems and AI available in the cloud

6G: Predictions for the network of the future

With cloud-based technology enabling higher speeds and microsecond latency, experts predict 6G will transform the world. The next generation is coming

Blockchain in space could take tokens and NFTs into orbit

Digital Transformation

ICYMI: Top 10 DevSecOps tools and cut-price animal robots

Digital Transformation

Altered Egos: Digital twins hold up a mirror for machines

Digital Transformation