Protecting Premises and People

Integrated security systems also keeps an eye on assets and processes

Today’s utilities sector is facing inevitable changes in economics, demand and customer behavior and, in many countries, new regulations with the potential for higher fines. To ease cost pressures, facility operators must find ways to improve a variety of elements within their buildings, including their security system.

The evolving threat scape for both cyber and physical security continues to expand from facility break-ins to high-profile system breaches. Key security issues facing the utilities sector include protection of physical premises and operational assets (from cybersecurity and physical intrusion and from internal and external theft), as well as protection against health and safety risks. Besides addressing these issues, utility companies must maintain the reliability of their systems, reduce overall risk and responsibly comply with industry regulations.

An integrated, cost-effective security system can play a key role in responding to these challenges.

Protection of Premises
To establish a safer and more secure environment, operators should consider integrated enterprise solutions such as radar and video analytics. Technologies include artificial intelligence-driven (AI) sensors that activate an alarm when an intruder enters a facility, and even gunshot detection that warns of a possible active shooter. These solutions can deter intruders, warn of potential threats and used to protect multiple sites.

Operators can also use enterprise video solutions to monitor remote sites such as power substations and telecom antennas. A central monitoring station can alert operators and store surveillance video on the cloud to help prevent the loss of evidence.

To help deter vandalism, operators can add two-way audio to an integrated security system that enables them to speak directly to potential vandals, who are less likely to cause damage if they knowing they are being monitored and recorded.

Protection of Assets
Utilities are prime cyber targets for activists, terrorists and hostile governments. According to a Cybersecurity Ventures report, cybercrime is projected to cause more than $6 trillion in damages during 2021.

Unauthorized access is a key challenge for many utility sites as it can result in theft, fraud, cybercrime and significant fines from regulation agencies. With an integrated enterprise security system, operators can protect assets through a single, centrally managed system, further preventing disruptions and/or major financial loss.

Sophisticated video analytics can help operators determine whether an apparent threat presents an actual danger or is something harmless like an animal or other object near a site’s perimeter.

Access control technologies are essential in making sure the right people use the right areas at the right time. For some companies, security rights have not been updated, and ex-employees may still have access to buildings. An integrated system, for example, can link security access to HR and payroll, where rights are automatically removed when an employee leaves the company.

This can help remove the potential for hacks – intentional or otherwise – that can come from within the building. For example, a current employee who has access to the facility could insert a thumb drive to upload malware onto the building system or inadvertently open an online portal that allows entry to bad actors.

Protection of People
Monitoring and controlling the movement of employees, visitors and contractors is critical in creating an effective security system. Sensors and cameras are integrated to monitor any lone workers who might need aid in the event of an accident or medical emergency. Cameras can also be supplemented by alarms so that employees have direct access to emergency response teams.

Additionally, utility companies can use an enterprise access-control system to manage compliance with corporate COVID-19 policies, generating compliance reports to understand daily occupancy at sites throughout an organization and determine if employees followed proper protocols to gain access to the sites.

Protection of Processes
Utility companies must continue to develop appropriate security standards considering new threats. Complying to government and regulatory initiatives (i.e., SIP and NERC) is critical, as noncompliance could create negative press, affect stock values, lead to heavy fines or even result in the loss of a business license.

Using tools from a security management solution rapidly provides the data and reports needed for audits to prove compliance. To add, compliance rules are constantly evolving so implementing a security system that continuously updates to meet the latest requirements can help companies stay on track.

From enterprise protection and access control to video technology and risk management — implementing an integrated security system ultimately provides a safer environment so that your premises, assets, people and processes can focus on operating at maximum efficiency.

This article originally appeared in the November / December 2021 issue of Security Today.

Featured

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

  • Survey: 48 Percent of Worshippers Feel Less Safe Attending In-Person Services

    Almost half (48%) of those who attend religious services say they feel less safe attending in-person due to rising acts of violence at places of worship. In fact, 39% report these safety concerns have led them to change how often they attend in-person services, according to new research from Verkada conducted online by The Harris Poll among 1,123 U.S. adults who attend a religious service or event at least once a month. Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.