The 3 W’s (Wares) in Security Management

1. Introduction

1.1 A reputable state-owned Security company in my country advocates the emphasis on the 3 Ms – Man, Methods and Machines, in its security management practice. In my view, another way of putting it is: the 3 Wares – (1) Hard Ware – access control system and CCTV and etc, (2) Soft Ware – the security systems and processes, the policy and procedures and the (3) People Ware, the Management, the employees, the customers and the security force. Together the three W’s form the integral whole of the security management in an organization.

2. Hard Ware -Technology in support of Security

2.1 When we discuss Hardware, we are often fascinated and dazzled by the availability of modern and state-of-art security equipment and machines offering the best in technology. Whichever the case, my view often centers on the real need for technology – not for technology sake – to support security. Below, I would try to elaborate my standpoint on the deployment of Hardware with some examples from my previous jobs as Security Manager.

2.1.1 As early as eight years ago, when I took up the post of Security Manager with a public listed company, we were exploring the subjects of integration and inter-operability of security systems and equipment.

2.1.2 Human Resource (HR) wanted the access control system to be able to support time management and payroll function. There was already study in the security market of integrating security access control system and CCTV system with HR payroll/time management, inventory control and shipping functions.

2.1.3 The problem of re-laying cables whenever we need to re-configure the access control, CCTV and alarm system forced us to look into various other options such as wireless technology, existing telephone and LAN cable systems. Also we chose vendors who were ever willing to customise their security system to make use of whatever existing workable systems to cut down cost in re-wiring and installation of hardwares.

2.1.4 My company was the first among the CD manufacturers to use walk-through metal detector complemented by hand-held scanners. We were looking into embedding RFID chips into our CD to prevent internal pilferage. The use of X-ray machines was also explored.

2.1.5 To prevent the unauthorized replication of Stampers – the master moulds for replicating CDs and DVDs; we came up with a technology to measure the amount of electricity consumed to co-relate it with the number of stampers produced. Security audited the daily submissions from the Stamper room to tally the number of stampers produced or NCMR (Non Conforming Material Rejects) with the power of electricity consumed as recorded in the meter installed at the replicating machines.

2.1.6 We were studying not only implementing the file registering keystrokes in the computers used in the Stamper room but having off-site monitoring so that the tampering of these data in the end-user site could be detected.

2.1.7 Biometrics technology was then considered as cumbersome because it was slow in control access of a large number of employees moving in and out of the restricted areas. But, it was useful in managing access to small premises such as the stamper lab, MIS and WIR storage room, and access to sensitive computer workstations.

Leave a Reply

Your email address will not be published. Required fields are marked *