Physical & logical security and safety
As we look at underlying motivations and drivers, we strongly find that the elements of security and safety cannot but be consolidated and integrated. It is also however true that their emphasis differ from one scenario to another and the secret lies in the detail.
It is also often clear that these elements could make processes more or less complex and hence could negatively affect productivity. However, if done right, integrated security and safety can only achieve better productivity when looking at the big picture.
Our approach to security and safety is a holistic one addressing individual and specific needs and scenarios in order to ensure a comprehensive and optimal coverage.
Whatever the situation is and the technology in use, we make sure that the following concepts are properly studied and covered accordingly:
- Assurance – the level of guarantee that a security/safety system will behave as expected
- Countermeasure – a way to stop a threat from triggering a risk event
- Defence (in depth) – never rely on one single security/safety measure alone
- Exploit – a vulnerability that has been triggered by a threat – a risk of 1.0 (100%)
- Risk – a possible event which could cause a loss
- Threat – a method of triggering a risk event that is dangerous
- Vulnerability – a weakness in a target that can potentially be exploited by a threat security
- Root Cause Analysis – to identify causes of a system failure and correct deficiencies
- What If Analysis – in the event of a threat actually becoming a real problem, what might be the impact or consequences
- Risk Mitigation – the extent of exposure to a risk and/or the likelihood of its occurrence
- Risk Response Planning – what to do in the event a risk becomes and inevitable reality
- Manageability – the ability to control, monitor and operate security/safety systems
Technology should always and whenever possible be comprehensive and integrated. Corporate or organizational processes and roles often segregate responsibilities, which seem to be addressing each aspect of the trilogy independently.
For instance, fire alarm systems are increasingly becoming based on Internet Protocol, thus leading to them being accessible via local and wide area networks within organisations. Emergency notification is now a new standard in many industries, as well as Physical Security Information Management (PSIM).
PSIM integrates all physical security systems in a facility, and provides a single and comprehensive means of managing all of these resources. It consequently saves time and cost in the effective management of physical security and enables the integration of such systems with logical counterparts as well as safety elements, especially when these three elements share an equal level of priority and emphasis.
Our range of security and safety solutions is therefore very flexible and dynamic.
The following is a quick list of the major core components:
- Biometrics
- Public key infrastructures
- Identity management systems
- Single sign-on
- Physical information management systems
- Command, control, communication and computers
- Access control
- Personnel, assets and vehicles identity & tracking
- Integrated control & visualization
- Video/audio & sensory surveillance
- Secure printing and identity cards design, production and management