The 3 W’s (Wares) in Security Management

  1. Introduction

1.1 A reputable state-owned Security company in my country advocates the stress on the three Ms – Man, Methods and Machines, in its security management practice. In my view, differently of putting it is: the three Wares – (1) Hard Ware – access system and CCTV and etc, (2) Soft Ware – the safety systems and processes, the policy and procedures and therefore the (3) People Ware, the Management, the workers , the purchasers and therefore the private security force . Together the three W’s form the integral whole of the safety management in a corporation .

  1. Hard Ware -Technology in support of Security

2.1 once we discuss Hardware, we are often fascinated and dazzled by the supply of recent and state-of-art security equipment and machines offering the simplest in technology. Whichever the case, my view often centers on the important need for technology – not for technology sake – to support security. Below, i might attempt to elaborate my standpoint on the deployment of Hardware with some examples from my previous jobs as Security Manager.

2.1.1 As early as eight years ago, once I took up the post of Security Manager with a public listed company, we were exploring the themes of integration and inter-operability of security systems and equipment.

2.1.2 Human Resource (HR) wanted the access system to be ready to support time management and payroll function. There was already study within the security market of integrating security access system and CCTV system with HR payroll/time management, internal control and shipping functions.

2.1.3 the matter of re-laying cables whenever we’d like to re-configure the access control, CCTV and alarm forced us to seem into various other options like wireless technology, existing telephone and LAN cable systems. Also we chose vendors who were ever willing to customize their security system to form use of whatever existing workable systems to chop down cost in re-wiring and installation of hardwares.

2.1.4 My company was the primary among the CD manufacturers to use walk-through detector complemented by hand-held scanners. We were looking into embedding RFID chips into our CD to stop internal pilferage. the utilization of X-ray machines was also explored.

2.1.5 to stop the unauthorized replication of Stampers – the master moulds for replicating CDs and DVDs; we came up with a technology to live the quantity of electricity consumed to co-relate it with the amount of stampers produced. Security audited the daily submissions from the Stamper room to tally the amount of stampers produced or NCMR (Non Conforming Material Rejects) with the facility of electricity consumed as recorded within the meter installed at the replicating machines.

2.1.6 We were studying not only implementing the file registering keystrokes within the computers utilized in the Stamper room but having off-site monitoring in order that the tampering of those data within the end-user site might be detected.

2.1.7 Biometrics technology was then considered as cumbersome because it had been slow on top of things access of an outsized number of employees occupation and out of the restricted areas. But, it had been useful in managing access to small premises like the stamper lab, MIS and WIR storeroom , and access to sensitive computer workstations.

2.1.8 to regulate the perennial problem of piggybacking at the central entrance/exit points, we not only use CCTV coverage but also installed turnstile with access control.

2.1.9 We used computing system with the now out-dated Universal Product Code technology to trace the assembly and disposal/destruction of stampers, along side manual recordings.

2.1.10 We made use of the access control readers and perimeter CCTV cameras to exchange the guard clocking system. Not only we cut cost on acquiring and maintaining separate clocking system but the utilization of motion detecting CCTV and access control readers were effective in monitoring the guards on patrol within the premises.

  1. The Soft Ware -Understanding Industrial Needs:

3.1 My exploration of the topic Software is more slanted towards providing the safety audit and consulting services. Neverthless, i’m convinced that it’s also applicable to those security practitioners who manage security within business and commercial organisations. I feel that more proactive approach and ingenuity, and therefore the deep understanding of the economic needs are essential ingredients if we are to achieve this fast changing area of interfacing IT, technology and security. during this respect, it might be best if a security management company has in its stable hands-on practitioners of Security Management who aren’t only resourceful but also realistic and sensitive to the prevailing market needs generally and client requirements in specific. We sell only what our customers want to shop for .

3.2 within the real business sense, even more reputable security management companies in my country Singapore have yet to determine a website for itself as a provider of Total/One Stop security solutions and services. The commonplace impression of some top notched security companies is that they’re organizations that provide uniformed armed and unarmed guards. i’m all for the thought that there should more room to enhance upon the synergy within these organizations. More often than not, there are the nagging suspicions that every internal arm of the safety management companies focus more on its own sectional interest and compete against each other for the scarce internal resources, which often the proper hand doesn’t know what the left is doing.

3.3 i exploit the instance of 1 security Management Company which I had once served. In its set-up, there’s a Security Consulting (SC) Department, which has for years labored under the stigma that it’s a money losing entity. Viewed from a more refreshing perspective, why cannot SC be considered a door opener to other services instead? Through SC, which secures the beachheads, their customers should be made known of other security services available within its parent organisation. it’s commonsensical that a Security Audit would cause recommendation and implementation where other services also are sold. Consultants shouldn’t feel ashamed or feel that they need to be impartial when it involves selling other services provided by their own company, provided these services also are up to the competitive mark vis-à-vis other competitors within the market. Example, SC can help sell the debugging services of its investigation arm in their security consultancy work with their clients. (Vice versus, Investigation outfit in its corporate instigation assignments could also recommend to their Clients to require up security audits offered by SC).

3.4 Security Consultancy by itself should even be highly attuned to the requirements of the purchasers , and avoid giving the impression that they’re guilty of applying industrial templates. In my experience, for instance , some customers – contract manufacturers – are driven by their principals to possess sound and comprehensive security management programme to safeguard their products and services. Microsoft with whom I had dealing in my previous job is one such example where it’s a strict set of security requirement enforced on its contract manufacturers, which also are subject to periodic pre-informed and surprised security audits. Visa, the opposite example, has also a highly professional set of certification programme for its vendors such a lot so it’s become a prestige within the industry to possess a VISA certification (for which a yearly fee of US$45K is chargeable by VISA). In related vein, some customers are using security as a force multiplier in selling its services – especially within the IP related fields to garner more sales from their principals. this is often a further dimension we should always address rather than the normal security preventive and protective approach that’s more slanted towards counter intruders/external threats.

3.5 Another point, which Security Consultancy has got to bear in mind, is that the got to pay some attention to figure or manufacturing processes of the purchasers in reviewing and recommending them security programmes. Here is where oft-used security templates are inadequate to serve the aim . The consultants in their initial threat analysis has got to critically identify, define and prioritize the safety vulnerabilities of their clients’ organizations – whether or not they are from within or without, and recommend and style the safety solutions accordingly. Most of the time, the matter comes from internal – employee thefts, sabotage and other work-related abuses but more often than not the recommendations wrongly specialise in defense against intruders. And in considering the safety protection of the merchandise and services, attention must be clear on at which point of producing process the merchandise assumes a street value and becomes susceptible to be stolen. One example of security recommendation in reference to product cycle or manufacturing process is that the introduction of traveler’s log which monitor the flow of the products from one point to the opposite , documenting and authenticating their proper handing and taking up at each station. the opposite is to offer attention to the handling and disposal of NCMR – non-conformance Material Rejects or wastes.

Please visit here for details https://www.allesklar-sicherheitstechnik.de/


Posted

in

by

Tags:

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *