The ideal world of security
Transcription
The ideal world of security
Trend Article The ideal world of security Security expert Ross Bale shares his view on what the ideal world of security would look like in the education sector and what should be taken into consideration to accomplish this. “A security management system needs to be able to adapt to changing educational requirements.” Educational institutions have a wide range of security requirements ranging from fairly basic access control areas such as halls of residence through to sensitive areas such as high risk laboratories. Besides this, universities are under increasing pressure to ensure that buildings and sites are safe which is made more difficult due to the large volumes of people entering and leaving. These factors make the decision for a security management system and judgements of its achievements a critical one. Ross Bale is sharing his view on what the ideal ‘world of security’ looks like and what should be taken into consideration to accomplish this. Security Management Top of the list What specific demands should universities have when selecting a security management system? The desire to have a single card, with a single point of management is increasingly high upon the list of security managers that I talk to within education. Of course, the importance of the ability to cope with different levels of security and an unlimited amount of different users – or buildings for that matter, are seen. However, even more important is what is unforeseen. Universities or colleges change dramatically over the years. They expand when the amount of students increase or they adapt educational models driven by ever changing governmental regulations. These changes are often unforeseen. This is why a security management system needs to be able to adapt and expand over a period of time as requirements change. This will protect the initial investment in the system over a long period of time and will ensure the system doesn’t reach an end of life. An ideal world So, what would the ideal world of security at universities look like? First of all, when choosing a security system, the main priority is to improve security. However, a security system should do much more, such as easing workflow and “When a security system is able to adapt to changes in the educational field, it will protect the initial investment and will ensure it doesn’t reach an end of life.” administration. And because of this it should be able to consolidate multiple systems into a single infrastructure. Not only will this lower the costs, it will also meet the university security policy easily. Besides, when such a system is using open standards, a wide range of third party systems, from CCTV to intercom and intrusion for example, can be added. This enables universities to purchase the best of breed solutions, to integrate with legacy systems and to use the existing network and server infrastructure managed by the IT department, without compromising network or physical security. Reducing admistration What makes reduction in workflow and administration so important? Especially in universities, a lot of different people use the security management system. New students come in every year, who need to receive badges and permission to certain areas within buildings of the university. These permissions will even change if existing students change courses or move to the next year at the end of the summer. This will bring a lot of administration and coordination. A security system should meet this by easing the process. This can be done by utilising advanced features such as ‘data import’ from a University Administration Database to reduce manual data entry and streamline processes such as card issuing or ‘rule engine’ functionality where sets of rules for access can be defined and configured once after which the system will automatically enforce it and change permissions when necessary. Systems and databases are more and more integrated. What are the consequences? Again, increased workflow and decreased administration by automation and process improvement. Integrating student and staff information systems, for example, with the card management solution and access control system has different benefits. A specific example is international students that do not comply with student visas. This has consequences for universities, like financial penalties or withdrawing permission to teach international students leading to negative reputations and reduction in income from international students. “Integrating student and staff information systems with card management and access control ensures increased workflow and decreased administration.” Access control events can be used very easily to produce regular reports for the Border Agency on whether international students are attending the university in line with their Visa. Another example of integration and something that’s often forgotten, is the management of lockers for students. This is essentially access control on a micro level. As lockers appear in an access control system, security access templates and student information already held within the system for access control can be quickly used to secure the contents of the lockers. And this is getting more valuable now as more universities are introducing bring your own device initiatives. So, because of integration with other systems, such as IT systems, security is more than just protection of people and assets. Correctly implemented, security is a business enabler adding value to a university’s processes. Nedap Security Management 1310 Waterside - Arlington Business Park Theale - Reading Berkshire RG7 4SA - United Kingdom “Consider using the security management platform to secure the contents of student lockers. This is access control on a micro level.” T +44 (0)1189 166820 info@nedap-securitymanagement.com www.nedap-securitymanagement.com