Search This Blog

Powered By Blogger

Translate

Sunday, April 12, 2009

corporate security -holistic perspective

Corporate Security-Holistic Perspective

In this article I have made an attempt to develop holistic perspective on India Corporate Security Scenario .The Mumbai blasts served a wake up call for the Indian industry …Leaders have rethink on corporate security policies . Industry decided to work with government on security and governance issues rather than dealing with it as another man’s subject. Indian industry was hit by global recession and by image of India as a soft target due to terrorist strikes and now with the Satyam episode as country lacking in good corporate governance policies apart from IP issues . Hence their arose a need for new leadership strategies to overcome and move forward . Foremost concern being safety and security.
India's commercial security woes is more to do with the DNA of the security professionals rather than the prevailing threats at presents. Commercial security is the gap filler between the state, servicing the general public and the corporate requirements to protect, preserve and maximize their vested assets. Mindset transformation is required on the part of corporate security advisors.
Today there is a huge opportunity for security providers .India has a greater divide between the capacity of the government and corporate demands.The problem with the current approach is that it is still very ex-military or ex-police driven. The overall global view of India's security remains below par, and this affects everything from investment to trust and relationships. Corporations want business enablers with sound competent business managers first and security managers second, not professional inhibitors or someone living in the ancient past from their days in the military/police.
Security must be cost effective or mitigation solution based. Despite the oversight and protection mandate of security professionals, very few are actually adequately checked to ensure they meet the corporate needs and technical requirements .In developed countries the escalation of cost for security begins with policy, then technical measures and manpower last. In developed countries, policy, manpower and then technical solutions are the prescribed route for a number of reasons but largely due to the reality that manpower is cheaper than technical measures and therefore dominates the solution options.
VALUE ADD and corporate security debate is gaining importance now .Any investment needs to be validated by VALUE ADD it brings in .Security is viewed as necessary expense. Companies today are making a business case from utilizing security devices and systems to protect life and property (assets), to helping improve productivity, assist with training, and decrease losses.
Companies desire to leverage Security to Maximize Revenue. It must be Vital partner to protect company assets and IP .Attempt to be made to Use security technology to improve business processes and operational efficiencies. End user and integrator ingenuity are merging to bring innovative services eg Video surveillance and access control services . Internet provides realtime, anywhere access to surveillance cameras, activities of employees and visitors via access control logs. Access provides valuable information on security measures . Customer and employee patterns begin to emerge which are valuable data .
Examples of ROI With Security Technology are given below
Is the new line of merchandise displayed prominently in the front of the store? Do I need more lunch staff on Thursdays and Fridays? Are my employees being honest about their hours worked? A security director can view and download footage of an incident online in one city without having to make the roundtrip to pull the incident from the DVR. Remote access can potentially save a business in fleet expenses, travel expenditures, and time and resource management. Be in multiple places at one time. A win-win for all parties anytime, anywhere access. Hence funding for security projects is now coming from the customer’s IT, sales and marketing . Convergence opens new ROI opportunities for security providers, who are investing R&D dollars to position themselves at the forefront of the convergence revolution.
Another aspect neglected till now was Corporate financial fraud Investigation-Satyam Saga Financial investigators role is tosearch for information on the integrity, financial health and reputation of an organization or company . This is done by probing public records and international databases covering patents, corporations, partnerships, contracts, SEC filings, news, business references and Uncovering critical information regarding corporate documents, material contracts and agreements, financial status , litigations, taxation, insurance and liability, or joint venture agreements.
Computer Forensics and Electronic Discovery is another aspect of corporate security.Specialized team of leading experts in information security, focusing on computer forensics, electronic discovery, physical & IT security, and cyber investigations. IT practice supports technology-driven litigation and engagements in the following ways: Computer Forensics/Expert Witness Testimony Physical & IT Security are interlinked in todays e friendly corporate.
There is huge opportunity in Intellectual Property (Brand) Protection .Illegal use of legitimate companies’ brands, trademarks, and product has increased exponentially and become very sophisticated in the process. An MNC was recently penalized for not ensuring adequate action against their counterfeit products
Primary issue is Can enhancement of awareness in corporates prevent terrorist attacks or Can 10 security guards standing outside a mall deter a terrorist. We need to study how Corporates in Srilanka and Israel have been coping with continuous terrorist attacks and yet are able to develop their economy fairly well.
Facets of security are Protecting Assets and Increasing Effectiveness consists of Virtual security and Physical security ,Financial security IP intellectual property,Detection, Prevention, Monitoring of security and of course guarding at each of the 3 rings of security Perimeter , Entry point and Usage areas
Business SEGMENTS where corporate security is of prime significance are
Travel and Tourism Industry-Hotels Transportation - aviation security , mass transit rail systems ,shipping ,bus,taxi,auto,cycle Critical Infrastructure - The industries and institutions, buildings and distribution networks that are essential to everyday life ,refineries,banks .Ports & Borders -Systems for Customs officers and border protection, including monitoring cross-border cargo and reducing international shipments of contraband, screening for explosives, arms and weapons of mass destruction..Emergency Responders - Enabling emergency response teams to face potential threats with confidence when dealing with a potentially toxic incident, equipped with the most advanced technology.Military - Meeting the requirements of our armed forces and the application of smart science on the battlefield, principally the threat from potentially lethal chemical and biological warfare agents.Diagnostics – eg hospital screening programmes for infectious diseases.
In Security Products Importance of non lethal arms versus lethal arms is increasing today Alongwith good Intelligence collection and analysis and sharing .Innovative products are being developed to counter new threats like Taser --Ideal non lethal weapon for private security guards .Can be used extensively by Aviation personnel –for example to temporarily disable a drunken deranged person in an aircraft .All previous less-lethal weapons have worked on pain compliance that can be overcome by drugs, alcohol, emotionally disturbed persons (EDPs), or by focused, combative individuals. The X26 and M26 ECDs do not solely rely on pain to achieve compliance. They affect the sensory and motor functions of the nervous system and can cause incapacitation.
Leverage Customer IT Investments -New video services are changing the way companies conduct business. Security providers offer online services that allow a customer to access their local video surveillance systems via the Internet for realtime and historical viewing of their cameras, plus control pan/tilt/zoom (p/t/z) units. Customers view, store and retrieve video images from their local DVR unit, while leveraging their existing infrastructure. When a customer requests IP video, to access live and stored video footage using a secure Internet network. build robust IT capabilities to provide services without taxing the customer’s IT infrastructure. These systems allow companies to leverage their existing security and IT investments. Image Content Navigation (ICN ) .In 3D users can plan new camera sites to improve performance of the system. eVideo Audit is a video monitoring service that provides realtime audits, notification and exception reporting of a customer’s business processes.
Investment in open architecture technology and a common IT platform allows a to offer their customer online, realtime alarm data and video that helps a customer improve their security and improve their business operations.” Central station managed access control is ideal. Provides 100 percent of the management and administration of the customer’s local access control system. Provide new employee access cards, photo ID badges, changing of door lock schedules, deleting or modifying access levels, generating activity reports and more for the customer. Eliminates the customer having to purchase, administer or manage access control software on their computer. Customers can pick up the phone or request all changes via an online, realtime Web portal. Has access to realtime reports and other system and activity information without an IT infrastructure investment. Smart organizations are making their security personnel more efficient by integrating video with security control so that video is pushed directly to security guard’s monitor, PDA or cell phone.
Risk assessment is key to moving forward . Each organisation has to assess and manage security across your international operations. Need is to Mitigate the risks and threats facing each of your operating facilities Security consultants have to develop a detailed risk assessment and provide a report with specific, actionable recommendations to reduce and mitigate your risks. Specialized intelligence designed to meet organization’s strategic requirements is to be done . including forecasts for specific countries, risk comparisons of specific locations, and in-depth reports on threats such as terrorism, kidnapping and crime. The corporate security advisor has to Identifies the security risks and steps required to protect organization and assets. Plans must cover physical security, personnel security and emergency response protocols. New exciting technologies and service offerings aside, security providers should never lose sight of primary objective of asset safety. Technology gains have created new opportunities Security needs to continue to grow to become a viable and competent technical skill such as medicine, law, engineering and the like. India is well short of this objective and the companies that sell product or people to suit their revenue projections are an endangered species until more professional security personnel, companies, business skills and vendors come into the market. Risk management is not discretionary spending and business resilience is rapidly becoming a competitive edge. Successful companies will complement their security message with tangible business benefits — a true partnership
firoze zia hussain
firoze_z@toteminfra.com
00919618621234

No comments:

Post a Comment