This page contains a Flash digital edition of a book.
SECURITY


CREATING VALUE THROUGH INTEGRATION Gert Rohrmann, Technical Manager for the solutions division of


Siemens Building Technologies UK examines how by drawing data from a number of different sources and subsystems, it is possible to move towards a truly smart environment.


Security solutions should be about integration not isolation. Many facilities managers are considering their existing processes and systems and looking at how to leverage further value. Security is part of that focus and is a central component in the move towards a more integrated approach, which results in significant benefits.


For larger systems that can leverage existing IT network infrastructures, integration is an important factor. It makes sense to move away from a single discipline approach, to one that views security in a more holistic way. This applies not only to the integration of different security functions, but also how security and safety can be integrated into general business processes. The facilities market has moved significantly in connectivity terms, particularly with the development of open architecture.


Originally driven by the network video sector, the focus for facilities management has switched to the adoption and development of new physical access control standards. Open architecture continues to develop around the BACnet protocol, particularly in


38 | TOMORROW’S FM


the building management systems environment, with a further drive towards standard protocols in the security arena led by industry forums such as ONVIF (Open Network Video Interface Forum) and PSIA (Physical Security Interoperability Alliance). Supporting customers to move away from proprietary communication protocols and providing software through cross-domain management and command and control solutions, will become an increasing focus as the trend towards integration and standard IT solutions accelerates.


Smart cards have the potential to enhance workplace security through the inclusion of authentication for accessing the IT network and applications, digital signature and email encryption, biometric data, printer access management and other ‘bolt on’ functionality such as cashless vending. Increasingly, standardised and certified interfaces are being established with Enterprise Resource Planning software systems such as SAP and Human Resources, as well as facilities management. This ability to interface with data sources enables an automated process for identity


management, including automatic assignment of access entitlements based on the individual’s role and responsibilities. The operational cost savings, increased data consistency and security that can be achieved is significant.


An important area of integration is to enhance energy efficiency and subsequent cost savings. Security has a vital role to play in this process as the security systems provide the information relating to the occupancy of a building. At its simplest, if the alarm detection or access control system knows that no-one is present in a given room, the heating, ventilating, lighting and air conditioning systems can be automatically adjusted to reflect the situation.


It is also possible to set the conditions based on the person that has entered a building. An example would be lowering the temperature for cleaning staff, whose role is more physically active than that of an office worker.


Another benefit of an integrating security and building management systems is the ability to handle an emergency incident. In the event of an intrusion, the appropriate lighting


twitter.com/TomorrowsFM


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56  |  Page 57  |  Page 58  |  Page 59  |  Page 60  |  Page 61  |  Page 62