Powered by MOMENTUMMEDIA

Powered by MOMENTUMMEDIA

What to consider when selecting a high security solution

What to consider when selecting a high security solution

National High Security Manager for Gallagher, Phill Marr, explains what sites should consider when looking for a high security solution that will serve them now and in the future.

National High Security Manager for Gallagher, Phill Marr, explains what sites should consider when looking for a high security solution that will serve them now and in the future.

When choosing a high security solution, there are a number of key considerations - from understanding your risk profile and how you might layer your security, to the product supply chain and need for an assured integrator.

Measure the risk

Every organisation is different in terms of their level of risk, so it is vital to thoroughly understand likely areas of attack, both from inside and outside the organisation. 

“It’s important for organisations to identify what their key assets are and where their potential vulnerabilities lie. Ask yourself, if this information or asset were to be accessed by an unauthorised person, what kind of damage could it do to you, your organisation, or the people you are contracted to. From there, it’s about taking the appropriate action to minimise the risk,” says Phill Marr, National High Security Manager for Gallagher.

High security solutions should not only be considered by organisations operating within governmental departments; they are also incredibly important commercially for any organisation needing a robust solution that adheres to national standards.

“As much as some organisations feel they don’t fall into the category of what would typically be deemed a ‘high security site’, it’s still important for them to identify what their risk is.

“Consider a technology company who are creating a prototype of a new product, and a competitor picks it up and delivers something faster, and cheaper than they could. This would result in that company, not only losing significant intellectual property, but facing years of revenue recovery.

“This is what we mean by risk-profile; what are you trying to protect, and what will happen if that falls into the wrong hands,” says Phill.

When measuring security risks, both physical and cyber threats need to be considered. Unfortunately, cyber-attacks are a very real threat to all organisations, regardless of size or industry, but are particularly consequential for critical sites.

According to the Office of the Australian Information Commission (OAIC), 539 data breaches were reported by Australian organisations in the second half of 2020 alone.

“Interconnectivity between systems, platforms, and devices has become common practice, but with each new thing connected to your platform or network there is an increased risk of a vulnerability occurring. Government-approved security solutions have a proven track record for meeting global standards, while being fit for purpose, and should be a significant consideration as part of your cyber protection,” says Phill.

Layer your protection

From the fence line right through to the core of your site, when it comes to high security, a robust solution that provides protection across all levels and areas of your site is essential. 

Security layering is an effective way to delay intruders and provides security personnel more time to detect unauthorised entry and respond before assets are compromised. By having a layered security approach, a site will possess increasing levels of security for intruders to get through.

“Not only do you want to make it difficult for people to get into your premise, you also want to ensure you are aware if they do get past a layer; and then have barriers in place before they get to the next one,” says Phill.

“The basis of protection for any high security site is – deter, detect, delay. Deter the intruder so they may choose not to proceed; if they do make an attempt, detect them immediately to initiate your security response; then delay progress as much as possible to enable intervention before significant damage occurs.”

A layered security system will usually be made up of different layering zones that become increasingly difficult. The number of different layers required for a site is determined by what an organisation is trying to protect.

For example, at the initial perimeter layer you might have a boom gate and intercom, which reaches the carpark. The next layer could contain an access control solution, like turnstiles, to ensure only authorised people can enter the workstation environment where sensitive information or assets are held. Then you move into the next layer that requires card + PIN authentication, or biometrics, where high-risk materials or confidential documentation are stored. Beyond that, you have the highest level of protection in place where you’re storing the ‘crown jewels’ of the organisation, that if reached by an unauthorised person, would be highly damaging.

“The concept of layered security is about putting multiple security levels in place and making them increasingly complex as you get closer to the higher risk assets you are trying to protect,” says Phill.

Use an experienced, reputable integrator

When having a high security solution installed within your site, using an experienced and approved system integrator is essential and will pay dividends for the protection of your organisation, both now and in the future.

By working in the high security environment day in and day out, assured integrators are better able to handle the unique needs of critical sites. Their staff have security clearance and are specialists in their field, trained to ensure that they deliver the solutions at the level you need.

“At Gallagher, our approved high security partners undergo specialised training to install our Type 1A and Class 5 solutions. This ensures that as techniques, technology, and requirements evolve, so do the skills of our installers,” says Phill.

Multi-vendor support

A key consideration for sites is the ability to be able to shop around for competitive pricing and support. “With a security solution like Gallagher’s, organisations are able to choose from multiple companies within their region to install their product, or obtain maintenance and support quotes,” says Phill.

“This not only provides customers with competitive pricing but ensures that the best level of service and maintenance is delivered. Our in-market teams are also available to provide customers with advice on their security solutions if required.

“Giving our customers this flexibility and support is a key part of our customer-centric approach and provides them with the opportunity to choose a partnership that works for them,” adds Phill.

Understand your product’s supply chain

Knowing the supply chain of your security products can provide a significant level of reassurance in the quality and design of your system. Partnering with a local, well-known manufacturer, can provide greater transparency and assurance on where and how your security system is put together. 

Our products at Gallagher are designed and manufactured end-to-end on site in New Zealand which allows us to deliver the best quality.

“We’re dedicated to delivering robust solutions to support customers across all facets of their security needs. Our research and development team, and local in-market specialists are committed to providing the highest levels of assured products across the globe, and it is through this commitment that we have continued to meet government compliance standards, particularly across the Five Eyes nations,” says Phill.

For further information about Gallagher’s high security solutions, you can reach Phill Marr on:

Email: This email address is being protected from spambots. You need JavaScript enabled to view it.
LinkedIn: linkedin.com/in/phillip-marr

 

 

You need to be a member to post comments. Become a member for free today!
discover

Latest articles