FEATURE: THREAT ASSESSMENT
//////////////////////////////////////////////////////////////////////////
S
ecurity threats can come from
anywhere, be it cybercriminals
looking to attack your business’
data, intruders targeting physical hardware
or even internal employees haplessly
giving away company secrets or letting
unauthorised people into your environment. of the current security landscape at any
given moment.
While security technologies are evolving
rapidly, traditional intruder detection
systems, alarm panels and access control
technologies can no longer operate
independently of each other to provide
effective security; they need to be able to
integrate to provide a true, preventative
and dynamic security solution. However, Zollner says that these cannot offer
real peace of mind on their own.
“Organisations should have a multi-layer
security strategy in place, with each layer
integrating with the next and controlled
from a single platform,” said Eckart
Zollner, Head of Business Development for
NewTelco SA.
“When various security technologies work
together, background technologies such as
artificial intelligence (AI) and machine learning
(ML) can come into play, allowing for pattern
identification which can give advanced
warning of a security breach. Businesses are
then better able to prevent, manage and even
recover from security breaches.”
The advancements in connectivity coupled
with most security technologies being IP
based brings about the ability to easily
interconnect them.
High speed fibre and wireless devices allow
for a network of security systems across
multiple branches to communicate with
each other, and with a control platform, in
almost real time, giving an instant overview
Many intrusion systems, alarm panels,
cameras and biometrics systems come with
built in features such as AI, high resolution
imaging and early warning alarm triggers.
An effective centrally managed control
platform should