Intelligent CIO Africa Issue 18 | Page 38

FEATURE: THREAT ASSESSMENT ////////////////////////////////////////////////////////////////////////// S ecurity threats can come from anywhere, be it cybercriminals looking to attack your business’ data, intruders targeting physical hardware or even internal employees haplessly giving away company secrets or letting unauthorised people into your environment. of the current security landscape at any given moment. While security technologies are evolving rapidly, traditional intruder detection systems, alarm panels and access control technologies can no longer operate independently of each other to provide effective security; they need to be able to integrate to provide a true, preventative and dynamic security solution. However, Zollner says that these cannot offer real peace of mind on their own. “Organisations should have a multi-layer security strategy in place, with each layer integrating with the next and controlled from a single platform,” said Eckart Zollner, Head of Business Development for NewTelco SA. “When various security technologies work together, background technologies such as artificial intelligence (AI) and machine learning (ML) can come into play, allowing for pattern identification which can give advanced warning of a security breach. Businesses are then better able to prevent, manage and even recover from security breaches.” The advancements in connectivity coupled with most security technologies being IP based brings about the ability to easily interconnect them. High speed fibre and wireless devices allow for a network of security systems across multiple branches to communicate with each other, and with a control platform, in almost real time, giving an instant overview Many intrusion systems, alarm panels, cameras and biometrics systems come with built in features such as AI, high resolution imaging and early warning alarm triggers. An effective centrally managed control platform should