can demonstrate a commitment to the manufacturer ’ s accreditation programme . It sounds obvious but they should absolutely be licensed or certified by the original equipment manufacturer ( OEM ) to provide reassurance of the design and installation proposed , through to the ongoing service and maintenance of the installed systems . Today especially , we also lean heavily on our relationships with distribution and channel partners to help offer timely delivery . The integrator themselves should have a commitment to an independent quality management system to give confidence in their processes and systems , through the complete life cycle of services – from account management , design development , to installation , commissioning and maintenance services .
• Experience – Particularly in construction projects , having a partner that is experienced and flexible to work within demanding time frames and can demonstrate staff with the appropriate clearances gives confidence and trust .
• Breadth – Put simply , the broader the security portfolio across systems support , the simpler the supply chain and the greater the accountability . So , whether it is the access control system , CCTV , provision of permanent site guarding or urgent mobile site response , partnering with an organisation that can deliver across products and services can be a real advantage .
• Continuous improvement – Being able to offer continuous improvement abreast of a constantly evolving threat landscape can also be considered invaluable . This may be through the introduction of nextgeneration technologies such as drones or AI within CCTV and Video Management Systems ( VMS ).
For any security system , resilience in design is paramount . Availability is not a nice-to-have in the data centre environment , it ’ s a necessity .
While capacity is also important , any system should be designed with the capability to grow with you across multiple sites or geographies but also be able to offer integrations to third-party systems to ensure multi-tenant facilities retain security integrity .
What to look for in system design ?
More recently we ’ ve seen the emergence of hyperscale data centre projects . These can be huge , complex and time-sensitive projects where staged completion is often required , with the security system being just one part of a larger overall project .
Therefore , one should expect the contractor to provide a qualified project manager to take charge of the works at all times and to attend the job site during installation , testing and commissioning of the works to ensure the design ‘ layers ’ are adhered to before stage handovers , equipment is fully operational and users are trained well before go live .
Once the systems are in situ , they become a key part of the overall security plan that should be regularly tested , challenged and developed .
What about project management for technology installations ?
Our engineers and project management teams are used to working within high security environments and often work on demanding , time sensitive projects with limited or demanding access constraints .
G4S is a specialist integrator of best-inclass products – what this means is that having gained a detailed understanding of the client ’ s requirements , we take what we believe are the best products in the marketplace and blend these into a bespoke solution that meets the client ’ s security needs . We can provide a full end to end solution from the initial design , procurement , installation , ongoing maintenance and management and monitoring of all the services and products . All provided by G4S in house using highly trained , experienced , qualified employees . Together with our Academy and People Services we ’ re able to deliver unique value through a truly integrated effects-based security design .
What innovation should you be considering ?
Any new security systems should be making use of Artificial Intelligence and its Deep Learning analytics to create proactive security by driving attention to unusual or suspicious activity – whether that be unusual motion identified via the Video Management Systems , or recurring unauthorised or failed access credentials via Access Control Systems .
The key is to operate with connected security systems that alert personnel through their mobility solutions . For security , it ’ s a critical enabler by allowing personnel to take action as an event is unfolding , collecting credible evidence along the way and reducing the “ delay ” time required to reach a satisfactory event conclusion .
Within access control , we see the emergence of advanced biometric readers which can be recommended for highly restricted spaces and incorporates PIN or card reader functionality with fingerprint , retinal scan or full-facial reading . This provides heightened two factor credentials with both technologies requiring valid reads before transit is authorised .
With new installations and infrastructure upgrades or changes , Operational Technology ( OT ) cybersecurity should be reviewed . New IIOT connected devices or systems potentially bypass traditional firewall deployment strategies and exclude endpoint security protection .
The connectivity of OT devices presents the opportunity for a threat actor to exploit weaknesses of the device from the outside . With this change comes many new cybersecurity challenges for OT departments and a host of new OT security vendors that can help resolve .
But first , OT departments must recognise this emerging threat and take appropriate action . And while the threat is virtual , physical security has a key role to play . �
74 www . intelligentdatacentres . com