FEATURE
management , design development , to installation , commissioning and maintenance services .
• Experience – Particularly in construction projects , having a partner that is experienced and flexible to work within demanding time frames and can demonstrate staff with the appropriate clearances gives confidence and trust .
• Breadth – Put simply , the broader the security portfolio across systems support , the simpler the supply chain and the greater the accountability . So , whether it is the access control system , CCTV , provision of permanent site guarding or urgent mobile site response , partnering with an organisation that can deliver across products and services can be a real advantage .
• Continuous improvement – Being able to offer continuous improvement abreast of a constantly evolving threat landscape can also be considered invaluable . This may be through the introduction of nextgeneration technologies such as drones or AI within CCTV and Video Management Systems ( VMS ).
For any security system , resilience in design is paramount . Availability is not a nice-to-have in the data centre environment , it ’ s a necessity .
While capacity is also important , any system should be designed with the capability to grow with you across multiple sites or geographies but also be able to offer integrations to third-party systems to ensure multi-tenant facilities retain security integrity .
What to look for in system design ?
More recently we ’ ve seen the emergence of hyperscale data centre projects . These can be huge , complex and time-sensitive projects where staged completion is often required , with the security system being just one part of a larger overall project .
Therefore , one should expect the contractor to provide a qualified project manager to take charge of the works at all times and to attend the job site during installation , testing and commissioning of
Any new security systems should be making use of Artificial Intelligence and its Deep Learning analytics to create proactive security .
the works to ensure the design ‘ layers ’ are adhered to before stage handovers , equipment is fully operational and users are trained well before go live .
Once the systems are in situ , they become a key part of the overall security plan that should be regularly tested , challenged and developed .
What about project management for technology installations ?
Our engineers and project management teams are used to working within highsecurity environments and often work on demanding , time-sensitive projects with limited or demanding access constraints .
G4S is a specialist integrator of bestin-class products – which means that having gained a detailed understanding of the client ’ s requirements , we take what we believe are the best products in the marketplace and blend these into a bespoke solution that meets the client ’ s security needs . We can provide a full end-to-end solution from the initial design , procurement , installation , ongoing maintenance and management , and monitoring of all the services and products . This is all provided by G4S inhouse using highly trained , experienced , qualified employees .
Together with our Academy and People Services , we ’ re able to deliver unique value through a truly integrated effectsbased security design .
What innovation should you be considering ?
Any new security systems should be making use of Artificial Intelligence and its Deep Learning analytics to create proactive security by driving attention to unusual or suspicious activity – whether that be unusual motion identified via the Video Management Systems , or recurring unauthorised or failed access credentials via Access Control Systems .
The key is to operate with connected security systems that alert personnel through their mobility solutions . For security , it ’ s a critical enabler by allowing personnel to take action as an event is unfolding , collecting credible evidence along the way and reducing the ‘ delay ’ time required to reach a satisfactory event conclusion .
Within access control , we see the emergence of advanced biometric readers which can be recommended for highly restricted spaces and incorporates PIN or card reader functionality with fingerprint , retinal scan or full-facial reading . This provides heightened two-factor credentials with both technologies requiring valid reads before transit is authorised .
With new installations and infrastructure upgrades or changes , Operational Technology ( OT ) cybersecurity should be reviewed . New IIoT-connected devices or systems potentially bypass traditional firewall deployment strategies and exclude endpoint security protection .
The connectivity of OT devices presents the opportunity for a threat actor to exploit weaknesses of the device from the outside . With this change comes many new cybersecurity challenges for OT departments and a host of new OT security vendors that can help resolve .
But first , OT departments must recognise this emerging threat and take appropriate action . And while the threat is virtual , physical security has a key role to play . u
58 www . intelligentciso . com