‘Securing large organizations involves a multifaceted approach, from the initial discovery of security objectives to the development and implementation of solutions’
KK Dakhara (Author, ELV Tech Advisor at KK Dakhara Advisory and Managing Partner at Bapa Sitaram Group) dwells on his various initiatives in the security domain and how the use of technology benefits the key stakeholders…
1. Please tell us about yourself and the work you are currently doing in the security domain.
As per Retail Association of India, I am a Technology Mastermind and happy to update that I am India's first person to focused for develop and promote solutions especially for Gems & Jewellery Industry to cater their business challenges on their security and operations. One incident in my life propelled me to work towards security industry and ignited deep passion for security and automation solutions. Passion has been guiding force as I traversed the reals of Security, Fire, Safety, AI, ML, RFID, other ELV technology and Robotic Industry for over 18 years all the while blissfully unaware of passing time.
In 2014, I closed my profitable women apparel online part-time business to focus more on innovative ideas and develop new various new solutions by taking support from OEM in security and automation industry. With an impressive portfolio boasting over 30 Solutions or milestones and its promotion to make awareness in vertical wise business development, my journey showcases not only technical prowess but also keen understanding of market dynamics and commitment to delivering tangible results. My coming soon or upcoming book on “Unleashing Business Potential” has dived deep into everything from securing valuable to maximise business and unlock the potential of hidden business growth opportunities with Support of Integrated Security and Automation Technology.
In Security Domain, currently I am working almost 22 different technologies mainly into ELV and Automation solutions for M/s. Dharmanandan Diamond Pvt. Ltd. which is one of the largest diamond manufacturing into the world and Sight holder of DeBeers Group. This Project is located at SDB (Surat Diamond Bourse) and SDB officially also declared as the world’s largest office building, surpassing The Pentagon, by the Guinness World Records on 22 August 2023.
My experience in more than 10K companies really helping us to design Specific solutions to cater business challenges and helping them to deploying special solutions like Diamond Assortment light reflection compensation where diamonds need to monitor, Integrated CCTV and Intrusion alarm for video verification during an event, CCTV, Access, Alarm and Fire alarm integration, integrated Solution for Visitor with Hospitality management, Hand movement or facial recognition-based Glass sliding door operations and many other solutions related to security, IT, Networking, RFID, Swing barrier, EPABX, IP Telephony etc. These solutions are designed to secure their valuable, make their life easier, more efficient and more productive.
Our Advisory and Consulting services at Dharmanandan Diamond Pvt. Limited are our handholding support with focused on my 6D Business Efficacy framework where end user get end to end support like discover objective and actual requirement, design appropriate solution, Technology evaluation and selection, Negotiation and Vendor management, optimization and integration of technology and complete project management along with documentation, training and post implementation support as well.
Currently I am providing handloading support which is our level 3 service (i.e. Avail our service with Handholding Support). Soon level 1 and level 2 service will start. In level 1 means “Do it Yourself with support of my book” i.e. end user, SI, Consultants and OEM team can read my book and implement my 6D business Efficacy framework. Level 2 means “Read my book and get free consultancy service” This service mainly for SME where user do not require handholding and dedicated consultancy or advisory service but want to avail benefit of my experience and expertise into their business or have small doubts. Pre Order booking already started to grab the book and free consultancy services.
2. What are the key challenges to security of large organizations?
Securing large organizations involves a multifaceted approach that spans various stages, from the initial discovery of security objectives to the development and implementation of solutions. Challenges arise in each phase, impacting the overall security posture. Some of the key challenges related to discovering security objectives, selecting and developing technology solutions, negotiation, vendor management, and project management.
(1) Discovering Security Objectives:
(i) Alignment with Business Goals: Aligning Security objectives with overarching business goals can be challenging. Ensuring that security measures contribute positively to business strategies requires close collaboration between security and business team.
(ii) Dynamic Theat Landscape: The constantly evolving threat landscape makes it difficult to predict and address all potential risks. Identifying and prioritizing security objectives in face of emerging threats is a persistent challenge.
(2) Selection and Development of Technology Solutions:
(i) Vendor Evaluation: Choosing the right vendor either OEM or SI requires thorough evaluation of their capabilities, reliability, and commitment to security. The challenge lies in selecting vendors whose solutions align with organization’s specific needs.
(ii) Customization and Development: Developing tailored solutions may be necessary, but it introduces challenges in terms of time, resources, and ensuring that the custom-built solutions are secure and scalable.
(3) Negotiation:
(i) Balancing Security and Costs: Negotiating with technology vendors often involves striking a balance between security requirements and budget constraints. Ensuring that the organization gets the best security value within financial limitations is ongoing challenge.
(ii) Contractual Terms : Negotiating favorable contractual terms, including service level agreements (SLA) and support arrangements, requires expertise to safeguard the organisation’s interests and maintain flexibility.
(4) Vendor Management:
(i) Third-Party Risk Assessment: Managing risks associated with third-party vendors involves continuous assessment. The challenge is to monitor and mitigate potential security vulnerabilities introduces by external partners.
(ii) Dependency management: Large organisations may have dependencies on numerous vendors. Managing these dependencies and having contingency plans in case of vendor-related issues or changes is complex task.
(5) Project Management:
(i) Timeline Adherence: Ensuring that security projects are completed within stipulated timelines is challenging. Delays may expose the organization to vulnerabilities, especially considering the rapidly changing threat landscape.
(ii) Scope Management: Managing the scope of security project is crucial to prevent scope creep, where project objectives expand beyond the original plan. Effective scope management helps avoid budget overruns and timelines extensions.
(6) Design and Development of Solutions:
(i) Holistic Solution Architecture: Designing a comprehensive security architecture involves addressing various aspects as network security, endpoint protection, and data encryption. Ensuring Holistic approach and preventing siloed solutions cab be challenge.
(ii) Scalability and Adaptability: Developing solutions than can be scale with organisation’s growth and adapt to emerging threats is essential. Balancing immediate needs ling-terms scalability requires careful planning.
(iii) Integration of New Technologies: Adopting emerging technologies such as artificial intelligence (AI), machine learning (ML), and the Internet of Things (IoT) introduces new challenges. Ensuring that these technologies enhance rather than compromise security requires careful consideration.
(7) Regulatory Compliance:
(i) Adherence to Regulations: Meeting regulatory requirement is complex challenge, as difficult regions may have district compliance standard. Ensuring that security solutions align with diverse regulatory frameworks is crucial for avoiding consequences.
(ii) Vendor and Supply Chain Oversight: Ensuring that third- party vendors and partners also adhere to regulatory requirements can be challenging. The organization is often responsible for the compliance of its entire supply chain, adding an extra layer of complexity.
(8) Communication and Training:
(i) Stakeholder Communication: Communicating security objectives, progress and potential impacts to stakeholders require effective communications strategies. Ensuring that everyone is on board and informed is crucial for successful security initiatives.
(ii) Training and Awareness: Ongoing Training and awareness programmers are essential for successful implementation of security measures. Educating employees about security protocols and fostering a culture of security awareness is continuous effort.
Addressing these challenges demands coordinated efforts across various organizational departments, including IT, security, legal, and project management teams. Regular assessments, flexibility in adapting to evolving threats, and proactive approach to security are fundamental for large organisations aiming to establish and maintain robust security infrastructure.
3. What new technologies are in focus that help aid security professionals in doing their work ?
Physical security and information technology security remain top priorities for business owners and security professionals overseeing the safe and efficient management of offices, retail stores, factories or any building or commercial premises. Extra-Low Voltage (ELV) and automation technologies play a crucial role in building management. Several new technologies into security and automation were gaining prominence in the field of cybersecurity, assisting security professionals in enhancing their capabilities and addressing emerging threat. Some new technologies are in focus that help aid security professionals in doing their work are:
(1) Internet of Things (IoT) : IoT devices contribute to building automation and security by connecting sensors, actuators, and other devices to a network. This includes smart sensors for environmental monitoring, occupancy, and connected devices. It improves automation, data-driven decision-making, and enhances control over building systems.
(2) Edge Computing: Edge computing involves processing data closer to the source (i.e. at the end of the network) rather than relying solely on centralized cloud servers. This practically relevant for real-time processing in ELV systems. It reduced latency, improved response times, and efficient use of network bandwidth.
(3) Machine Learning (ML) and Artificial Intelligence (AI): Machine leaning (ML) and AI are applied to Extra-Low Voltage systems for predicative analytics, anomaly detection, and optimization of building automation process or business operational process. It enhanced security through intelligent threat detection, predictive maintenance for systems, and improved energy efficiency.
(4) Cyber Security Solutions: Given increasing connectivity and integration in Security or Extra-Low Voltage systems, cyber security solutions are essential to protect against cyber threats. This includes firewalls, intrusion detection systems, and secure communication protocols. It helps for mitigation of cyber risks, protection of sensitive data, and prevention of unauthorized access to security or ELV systems.
(5) 5G Technology: The rollout of 5G network enhances communication capabilities, supporting higher transfer rates and lower latency. This is particularly relevant for applications that require real-time responsibilities. It improved connectivity, support for high-bandwidth applications, and enhanced reliability in communication.
(6) Access Control: Different credentials like multi-dimensional biometric fingerprint, facial recognition, palm print scanners, are increasingly used in access control systems. It enhanced security through accurate identification, reduced reliance on traditional access methods, and improved user experience.
(7) Cloud-Based Solutions: Cloud based security or ELV systems allows for centralized management, monitoring, and control of building systems. This includes cloud-based access control, video surveillance and building automation platforms. It is useful for remote access, scalability, and ease of management for security or ELV systems.
(8) Augmented Reality (AR) and Virtual Reality (VR) : AR and VR technologies are used for training, maintenance and troubleshooting in security systems. They provide immersive experience for professional working in complex environments. It improved training efficiency, remote assistance, and enhanced visualization in for system maintenance.
(9) Voice Control Systems: Voice-activated control systems are integrated into building automation, allowing users to control various devices and systems using voice commands. It makes more convenience, hand-free operation, and improved accessibility in smart building or premises.
(10) LiDAR Technology: LiDAR (Light Detection and Ranging) technology is used for 3D mapping and environmental sensing. It finds applications in security systems for accurate detection and monitoring. It improved accuracy in object detection, enhanced surveillance capabilities and effective environmental monitoring.
(11) Building Information Modeling (BIM) : BIM is used for planning, designing and managing building systems including ELV components. It provides digital representation of the building’s physical and functional characteristics. It streamlined design and planning processes, improved collaboration and better management of building assets.
These technologies when integrated strategically can bolster the cybersecurity posture of organizations by providing enhance threat detection, response capabilities and overall resilience against evolving cyber threats. It is important for security professionals to stay updated on these emerging technologies to make informed decisions, implement efficient systems and ensure the security and functionality of modern building environments.
4. What solutions have you implemented within your organization to alleviate the security challenges?
Implement solutions in organization to alleviate the security challenges, instead of our organization here I like to provide details based on my experience and expertise which I am able to gain while contributing in more than 10K companies in last 18 years for their better security, operational efficiency and maximize business. Improving security within an organization involves a combination of technology, policies and employee awareness. Few solutions that can be implemented to alleviate security challenges are:
(1) Surveillance Systems:
- Implemented vertical-specific CCTV solutions involves tailoring surveillance systems to meet unique security needs and challenges of specific industries or sectors. Such as Retail, Logistics, Manufacturing, Residential. Solutions like Perimeter detection, Diamond movement monitoring under high light reflections etc.
- Installation of optimized solutions and objective specific CCTV cameras in strategic locations to monitor premises, critical area or avoid over budget.
- Video analytics or AI based applications for advance features like motion detection, facial recognition, People count, Gender Demographic Analysis or license plate recognition add value to increase operational efficiency.
(2) Access Control Systems:
- Implemented Access control systems to manage and restrict entry to specific areas or entry.
- Credential like Face Recognition, Biometric fingerprint and access card used based on business operations and level of security required in business.
- Integration with HRMS, Visitor Management and Video Surveillance, Fire Alarm, Doors, Turnstiles, Boom Barrier or gates.
(3) Intrusion Detection Systems (IDS):
- Deployed Intrusion Alarm system to detect unauthorized entry or suspicious activities.
- Integration method to verify alarms, such as video verification through CCTV cameras. This helps ensure that response efforts are directed to genuine security threats. Notifications set up through SMS, Email, call or third-party monitoring provided based on user need and ease of operations.
- Install sensor which combine multiple technologies like infrared and microwave or dual tech in a single sensor to reduce false alarms and improved accuracy. Other sensors like door contact, Glass break, vibration, shutter used based on actual requirement for business operation and considering potential theft possibility.
(4) Fire Alarm Systems (FAS):
- Implemented fire alarm system within an organization for protection of property and safety of personnel
- Fire alarms are designed to detect the presence of smoke, heat or flame, and to alert occupants. so that they can evacuate the building in a timely and orderly manner.
- Integrate fire alarm systems with Intrusion detection, access control system, BMS and emergency response plans.
(5) RFID for Inventory Management:
- Implemented Radio-Frequency Identification (RFID) technology for inventory management to improve security, efficiency and accuracy within an organization.
- RFID Tags, inlays, reader, controller and software used for real-time information about location, quantity and status of inventory items.
- RFID used for tracking the movement of high-value assets. This is particularly beneficial in industries where expensive equipment or high valued or critical assets need to be monitored closely.
(6) IT Enabled Products and Services
- Structured cabling for backbone on various technologies and systems that enhance overall security.
- Desing and implementation for IT network infrastructure, CCTV video surveillance, Access Control, Intrusion Alarm, intercom and communication systems, audio-visual systems, integration of security technologies etc.
- Considered physical security measures for cabling infrastructure such as encloser, PVC conduit and keep provision to keep wiring end exact location where security or IT devices need to install and connect.
There are various other technologies deployed at different organizations like Electronic Article Surveillance (EAS), Video door phone, Home Automation, Door Frame metal detector, Baggage scanners, UVSS, Swing Gate, Glass sliding Door, Public Address System, Broadcasting solutions, Transmission and Display, Digital Signage, Rodent Repellant system, Fire Extinguisher, Machine vision and Robotics, etc. We always focus to assess the specific needs and challenges of organization before implementing these solutions. Security is an ongoing process, and organization should stay vigilant adapt to evolving threats and continuously improve their security measures.
5. What are your plans to enhance security of your organization going forward?
In our handholding support to end user, on their behalf, we plan to enhance security of the organizations and provide solutions based on various factors such as short term and long-term objectives, nature of business, operational challenges, Risk assessment and Analysis, technology updates and innovations, fund allocation for security etc. Security systems encompass various technologies mainly ELV systems including security, automation and communication systems. While making plans to enhance security of an organization some of the considerations for enhancing ELV security and automation we do like:
1. Comprehensive Security Assessment: Conduct a thorough assessment of existing ELV security systems, identifying strengths, weakness and areas of improvement.
2. Develop Special Solutions: Develop special solutions with support of different OEM to cater challenge of an organization which can provide better security and increase operational efficiency.
3. Integrate Security Systems: Ensure seamless integration of various security systems, including CCTV cameras, access control, intrusion detection, and fire alarm systems. Integrated systems provide a holistic approach to security.
4. Implement Advanced Access Control: Upgrade access control systems to incorporate Facial recognition, biometric authentication, multi-factor authentication, and smart card technologies for enhanced security.
5. Surveillance Camera: Suggest appropriate types and specific camera based on business operation environment and nature of business activities. Also Upgrade surveillance cameras to high-definition (HD) or IP cameras with advanced features such as analytics, facial recognition, and license plate recognition.
6. Intrusion Detection Systems: Implement advanced intrusion detection systems that can identify and alert on unauthorized access attempts promptly.
7. Fire Alarm System Enhancements: Provide or Upgrade fire alarm systems to incorporate smart detectors, early warning systems, and integration with building automation for improved response times.
8. Building Automation Integration: Integrate ELV systems with building automation to create a unified management platform. This enables centralized control and monitoring of various systems.
9. Energy Management Solution: Implement energy management solutions as part of building automation to optimize energy consumption, reduce costs, and improve sustainability.
10. Centralized Control Centre: Establish a centralized control center for monitoring and managing ELV systems. This can include a Security Operations Center (SOC) for real-time monitoring and response.
11. Remote Monitoring and Management: Enable remote monitoring and management of ELV systems, allowing security personnel to access and control systems from anywhere, enhancing flexibility and responsiveness.
12. Cybersecurity Measures: Implement robust cybersecurity measures to protect ELV systems from cyber threats. This includes regular security audits, software updates, and encryption of communication channels.
13. Regular Training and Awareness: Provide training to staff responsible for managing ELV systems. Ensure that they are well-versed in the operation, troubleshooting, and security best practices for these systems.
14. Scalability and Future-Proofing: Design ELV systems with scalability in mind to accommodate future expansions or upgrades. Consider emerging technologies and standards to future-proof the organization's investments.
15. User-Friendly Interface: Opt for user-friendly interfaces for ELV systems to make it easier for operators to monitor and control various components. Intuitive interfaces enhance efficiency and reduce the risk of errors.
16. Regular Maintenance and Testing: Schedule regular maintenance and testing of ELV systems to ensure their reliability. This includes checking sensors, detectors, communication links, and backup power systems.
17. Compliance with Standards: Ensure that ELV systems comply with industry standards and regulations. Compliance helps in meeting legal requirements and industry best practices.
18. Collaboration with Technology Providers: Collaborate with technology providers and ELV system vendors to stay updated on the latest advancements and to receive support in implementing new features or upgrades.
19. Emergency Response Planning: Develop and regularly test emergency response plans specific to ELV systems. This ensures a coordinated and effective response in the event of security incidents or system failures.
20. Environment Monitoring: Implement environmental monitoring within ELV systems to detect conditions such as temperature, humidity, and air quality. This is particularly important for sensitive equipment and facilities.
21. User Feedback and continuous improvement: Encourage user feedback on ELV systems to identify areas of our improvement. Implement a continuous improvement process to enhance the effectiveness and efficiency of these systems over time.
To enhance ELV security and automation, our plan to provide handhold support to elevate their security are based on need and characteristics of the organization. So they can get benefit of not only our experience and expertise which I earned from more than 10K companies in last 18 years but also from various OEM and technology providers and users. Once they will start our handholding support service, user will get complete end to end support i.e. technical, commercial, installation and service part. So they become free from technology part and can focus more on their core business.