How Recent Technology Developments and Transformations in the Security Area are Impacting your Business Environment?

By Pascal Ellena, Director Risk Management – Asia Pacific, Louis Vuitton

Pascal Ellena, Director Risk Management – Asia Pacific, Louis Vuitton

Challenging environment & transformations in the security area

The world around us is changing rapidly, in a multicultural context facing new threats and new risks on the agenda of the business like protest, leakage of company’s confidential matters and of personal information, improper use of social media, frauds, conflict of interests, new types of theft, cyber-attacks, terrorism, shooting incidents.

New technologies are evolving and need to be taken into consideration when physical security design is implemented. Robbers are agile and are using new technology too, faster than us.

Physical Security area may be defined as interdependent systems integrating electronic systems and mechanical protection systems for the protection of people first and assets. A Global Physical Security system must necessarily include security guards & procedures.

New technology plays a significant role on CCTV, tracking devices (battery life & anti-jamming), e-learning& simulations, access control, web investigations, forensic real-time prediction, analytics, drones, security robots while development is taking a little longer in other areas: electronic anti-theft systems, intrusion systems, mechanical protection systems.

The nature of attacks is evolving

New technology makes new scenario possible: CCTV, intrusion systems are hacked, fake badges are designed, tracking systems are jammed. Everything is possible.

To prevent high-value building attacks, risks assessments were considering 4 sides some years ago, but today 6 side external protections are being implemented: facades but also roof and ground, preventing digging a tunnel to reach the storage or rappel down from the roof in the middle of the shelves (avoiding all detection systems).

Striking the right balance between security interdependent systems & “attackers” This very often lies in details. Here are some examples of real cases:

A well designed main entrance door (frame, glass, locks, cylinders, hinges) was able to resist assaults from the yellow vests offenders without any roller shutter.

Sensitive storage is protected by a cage & fingerprint biometric reader but from outside, you can put your hand through the fence to unlock the door while pressing just on a button inside.

A truck is physically & electronically protected, but the driver is leaving the vehicle with keys in.

A very high-tech e-robot is ensuring the surveillance of a warehouse but was incapacitated by a thief’s jacket planted on his ‘’head’’ and at the end of the break-in was finally stolen.

A simple multi-layer sheet of aluminium foil can stop detection of an electronic article surveillance system.

What are the potential impacts? New technologies allow advances in prediction, face recognition, A.I., analytics (person of interest behavior, vehicle and human detection) including recent progress with issues of particular interest to the marketing forces: business intelligence, customer behavior, frequency of footfall, flow analytics, statistics, people counting, queue management…

Systems are released more and more, are getting more complicated. These developments also lead to problems of maintenance, computer bugs, data protection, and cybersecurity.

This results in an increase in the costs incurred: equipment unit price (CCTV systems for example), maintenance, software upgrade fees.

Each project and asset is unique. Design, procedures, response time and deterrence remain key, making the asset an unattractive target with People playing a central role. This human dimension factor may call into question any tech. system and lead to a loss. Physical Security basics must be ensured keeping the ‘’safe’’ even new technology developments are making the headlines, staying a step ahead, designing the right balance between physical, technological, human & process, being business-oriented.

Check this out: Top Enterprise Security Startups in APAC

Read Also

China Embracing Connected Health

China Embracing Connected Health

Geoff Feakes, Group CIO, Tunstall Healthcare
The Cloud- First Approach

The Cloud- First Approach

Arjun Chopra, Partner, Floodgate
Identity and Access Management: Leave it to the Experts

Identity and Access Management: Leave it to the Experts

Dr. Manu Kumar, Founder and Chief Firestarter, K9 Ventures
Future-Proofing Your Enterprise for the New ICT: Immersive, Cognitive, and Trusted

Future-Proofing Your Enterprise for the New ICT: Immersive, Cognitive, and Trusted

Scott Snyder, Chief Technology and Innovation Officer, Safeguard Scientifics and Senior Fellow, The Wharton School

Weekly Brief