‘The technology can be easily scaled to adapt to changing security needs’

27/04/2024 | AI

Dr. Abhijit Sarkar, CEO and Board of Director for Megas Group talks about his work in the security domain, key challenges to security of large organisations, new technologies that are in focus to help aid security professionals in doing their work, key solutions they have implemented within their organization to alleviate the security challenges and their plans to enhance security of their organization going forward.

Interviewed by Adeesh Sharma & Sonali Arora

Tell us about yourself and the work you are currently doing in the security domain.

I am Dr. Abhijit Sarkar, CEO and Board of Director for Megas Group, a company involved in Architecture, Engineering, Construction, and Manufacturing of Modular furniture. I come for more than two decades of experience in sadety & security domain and understand the critical importance of security in today's business landscape in depth.

I have always believed in proactive approach to security system, including risk assessment, management, training on security awareness, and implementing security controls, aligns well with the best practices for ensuring the safety of both assets and employees.

As security is a dynamic field with evolving challenges, staying abreast of the latest technologies and methodologies is crucial. Technologies like AI-based surveillance, biometric access control, and cybersecurity measures can enhance the overall security posture of an organization

Businesses have a big responsibility to ensure the safety of their employees while they are on the job there are lot of activity on the security front and a me as a professional who has come from the Corporate Security side to service providers side have since lot of initiative taking place in security domains and some of them are continual process of identifying or assessing the security risk, managing it, conducting training on security awareness and applying security controls.

What are the key challenges to security of large organisations?

Managing and monitoring a vast and complex perimeter is always challenging however coordinating security measures across large areas requires comprehensive planning and robust resources. Its important to assigning competent personal and technology resources however they are always resource intensive. Achieving consistent surveillance coverage across every inch of an expansive perimeter can be difficult. Blind spots may emerge due to terrain, equipment, lighting, structures or other obstacles, offering potential entry points for intruders.Maintaining real-time monitoring capabilities across a large site can be technologically challenging. Delays in identifying and responding to security threats could exacerbate the impact of a breach or future threats.Implementing and maintaining a comprehensive perimeter security system, including personnel, equipment and technology upgrades can often be costly.Striking the right balance between a secure perimeter and the need for convenient access for authorized personnel, visitors and deliveries requires careful management and can be especially challenging at larger sites where the volume is heavy.Overcoming these challenges demands a holistic approach that integrates technology, personnel and processes to ensure a robust and effective perimeter security strategy

What new technologies are in focus that help aid security professionals in doing their work?

There are new trends in security technology and an operational understanding of modern security concepts and principles give businesses of all sizes the tools to protect themselves from novel threats and begin to develop proactive security systems. Some of the modern security systems includes the following.

  • IP based Video Security Cameras
  • Access control Systems.
  • Ai analytics software
  • IOT environmental sensors.
  • On Site alarms systems.
  • Turnstile Gates.

What solutions have you implemented within your organization to alleviate the security challenges?

In some of my organisations in past I have implemented several proactive measures for security in my organizations. The strategies I have such as remote monitoring, real-time communication, touchless technology, and temperature sensing cameras, align with modern security best practices. Here's a brief overview and some considerations for each:

Remote Monitoring:

Benefits: Provides a centralized view of security data, enabling quick response to potential threats in real-time.

Considerations: Ensure the security and reliability of the wireless communication infrastructure. Regularly update and test the monitoring software to address vulnerabilities.

Real-Time Communication:

Benefits: Enables swift communication and coordination among security team members, facilitating quick adjustments in response to changing situations.

Considerations: Implement secure communication channels to prevent eavesdropping. Regularly train staff on the proper use of handheld devices and communication protocols.

Touchless Technology:

Benefits: Enhances access control while minimizing physical contact, especially crucial in the context of the COVID-19 pandemic.

Considerations: Regularly maintain and update touchless systems to ensure reliability. Implement backup access methods in case of technology failures or malfunctions.

Temperature Sensing Cameras:

Benefits: Provides an additional layer of security by detecting individuals with elevated body temperatures, potentially indicating illness.

Considerations: Ensure the accuracy and calibration of temperature sensing cameras. Clearly communicate the purpose and use of such technology to avoid privacy concerns.

It's important to note that while these measures significantly contribute to security, a comprehensive security strategy should also include regular risk assessments, employee training, access control policies, and incident response plans. Additionally, staying informed about emerging security threats and continuously updating security measures is essential to adapt to evolving risks. Regularly reviewing and testing these technologies and protocols will help ensure their effectiveness over time

What are your plans to enhance security of your organization going forward?

I am interested in implementing robotic solutions for security and surveillance purposes, commonly known as Robot and Drone Guarding. This technology has indeed shown promise in enhancing security measures, particularly in areas where traditional security methods may face challenges. Here are some considerations and potential benefits:

Cost-Effective Surveillance:

Robots and drones can cover large areas efficiently, reducing the need for a large number of human security personnel.

They can operate 24/7, providing continuous surveillance without breaks or fatigue.

Enhanced Situational Awareness:

Robots and drones can be equipped with various sensors such as cameras, infrared, and motion detectors, providing real-time data and improving situational awareness.

Quick Response Time:

Automation allows for faster response times to security incidents as robots and drones can quickly navigate through the environment.

Remote Monitoring:

Operators can control robots and drones remotely, enabling security personnel to monitor and respond to events from a centralized location.

Logistics and Accessibility:

In areas with challenging logistics, such as large industrial sites or remote locations, robots and drones can navigate easily, providing security coverage where it might be difficult for humans.

Cost Savings:

While there may be an initial investment, the long-term cost savings can be significant, especially when considering the reduction in manpower requirements and potential prevention of security breaches.

Scalability:

The technology can be easily scaled to adapt to changing security needs by adding more robots or drones as required.

Integration with Other Technologies:

Integration with other security technologies like facial recognition, license plate recognition, and access control systems can further enhance the overall security infrastructure.

Data Analytics and Reporting:

The collected data can be analyzed for patterns and trends, helping in the identification of potential security threats and improving overall security strategy.

Environmental Adaptability:

Some robots and drones are designed to operate in various environmental conditions, providing security coverage in challenging weather or terrain.

It's crucial to thoroughly assess the specific needs and challenges of the location where you plan to implement Robot and Drone Guarding. Additionally, compliance with local regulations, privacy concerns, and potential integration with existing security systems should be considered. Keep in mind that while automation can be a valuable tool, a holistic security approach combining technology and human oversight is often the most effective solution.

Go Back