step into security webinar - planning for security technology upgrades

42
Planning For Security Technology Upgrades

Upload: keith-harris

Post on 10-Feb-2017

63 views

Category:

Technology


4 download

TRANSCRIPT

Planning For Security Technology Upgrades

Today’s Moderator

David MartinPhysical Security Technical SpecialistLENSEC

Webinar Sponsor

Based in Houston, TX

Since 1998

IP Video Management

System Design

Installation

Project Management

LENSEC is committed to empowering our clients and partners to prevent or mitigate physical security risks. We want to help protect people and assets as well as improve operations through our evolutionary and intuitive technology. We can do this by providing expertise in security and software development.

Our Mission

Webinar Logistics

• Q&A At The End

• Questions For The Panelist

• Audio From Attendees Muted

• Poll Questions

• Survey

Today’s Panelists Jeff Kellick, CSPM

Chief Product Officer LENSEC

Training Goal

Planning for Security Technology Upgrades

Webinar Topics

• Site Assessment – State Of Your System• Market Assessment – Current Technologies,

Standards & Practices• Transitional Planning – Getting From Here To There• Implementation Cycle – Executing On The Plan• Case-in-Point – Entities With Successful Projects

Poll Question

Poll Question #1

What is the state of your physical security system?

Site Assessment Overview• Build Awareness Of

Current Status• Review Current

Vulnerabilities• Triage New Priorities

Site Assessment – Site Audit• Site Audit Points

• Area of Interest • Coverage Field • Buildings, Walls & Enclosures

• New or Modified• Equipment existing

• Technology • Infrastructure

• Human Resources• Guards, Officers, Volunteers & Administrators• System Use & Standard Operating Procedures

• Crime Prevention Through Environmental Design (CPTED)

Site Assessment – Current Vulnerabilities• Vulnerabilities

• Human Protection• Asset Protection• Property Protection

• Areas of Concern• Weak Spots / Faulty Equipment

• Areas of Risk• Risk Assessment• Local Community Reports/Trends• Adjacent Environment

• Any New Risk From Neighbors

Site Assessment – Customer Priorities• Revisit original goals

• Meeting? Exceeding? Deficient?• Priorities (AKA Wish List)

• Shifting Priorities• Considerations

• Functional Integration Designs• Training & Utilization

• Triage Needs Before & During The Budget Process

Market Assessment – Overview

• Current State Of The Market / Professional Industry

• Technologies• Standards• Best Practices

Poll Question

Poll Question #2

Are you familiar with current physical security technology?

Market Assessment – Technologies• Today

• Video Tech • 360• MPX• Compressions• Analytics

• Power Consumption • Solar• Battery

• Integration tools • Unification Of Alerts/Alarms

Market Assessment – Technologies• Future Proof

• Warranty Protection• Resolution & Codec Availability• PC & Server Technology• Bang For The Buck…

Market Assessment – Standards

• Standards Bodies • Affects Technology Choices

Market Assessment – Best Practices• Installation Procedures• Site/Project Commissioning• Monitoring Procedures• Evaluation Routines

Transitional Planning - Overview• Budget & Resource Allocation• Single Or Multi-phase Approach• Communicate Effectively• Improve From Lessons Learned

Transitional Planning – Budget/Resources• Capital Expenditures • Operational Budget• Technology Equipment • Services • Training

Transitional Planning – Budget/Resources• Funding Sources

• Grants & Bonds• Scheduling Vehicles

• TCPN• GSA

• Buy/Lease• Resource allocation

• Preparing Staff • Preparing Facilities

Transitional Planning – Phasing• One & Done • Multi-phase• Predictive Analysis – Think

about where pitfalls may occur and use smart scheduling.

• New Software/Server Phase-in

• Legacy Software/Server Phase-out

Transitional Planning – Collaboration• Communicate

• Talk• Email• Document• Text

• Contractors • GC meet Sub• Sub meet POC

• Departments• Communicate the approach

deadlines, dates, expectations

Transitional Planning – Iterative Improvement• Iterative Improvement – To learn

from and improve upon a repetitive process.

• (LESSONS LEARNED, LEARNING APPLIED)

• Technology• Training• Exercises & Standard Operating

Procedures

Implementation – Overview• Challenges

• Overcoming Obstacles• Execute• Train• Sign-off

Poll Question

Poll Question #3

I’m familiar with the obstacles I’ll experience when implementing a physical security project?

Implementation – Hurdles And Concerns• Project Management• Standup Meetings• Identify Allies & Build Bridges• Solve & Move On

Implementation – Execution• Hardware

• New Equipment • New Manufacturers

• Software• Users• Devices• Details

• Infrastructure• System Overlap / Redundancy• Cutover

IP Vs. Analog Cameras & Equipment• Proprietary Equipment

• A Word Of Warning• Data Transfer Protocols• Open Source

Implementation – Training• Who

• Users (Day-to-Day)• Users (Infrequent)• Administrators• Responders• Contractors

• How• Classroom-based• Video Tutorial• Documentation

• User Manuals• Quick Reference Guides

Implementation – Commissioning• Sign Off• Service / Maintenance • Monitoring

Case Study – Pflugerville Independent School District• Switching Over Software• Phased Camera Upgrades• Refreshed Network

Infrastructure• Phased Server Upgrades

Case Study – Pflugerville Independent School District• Switch Over Software

Case Study – Pflugerville Independent School District• Phased Camera Upgrades

Case Study – Pflugerville Independent School District• Refreshed Network

Infrastructure

Case Study – Pflugerville Independent School District• Phased Server Upgrades

Summary

• Site Assessment – State of Your System• Market Assessment – Current Technologies, Standards, and Practices• Transitional Planning – Getting from Here to There• Implementation Cycle – Executing on the Plan• Case-in-Point – Entities that Have “Been There and Done That”

Questions

Q&A

Contacts Jeff [email protected](713) 395.7330LENSEC

David [email protected](512) 318-3829LENSEC

Thanks for Attending Today’s Webinar

Planning For Security Technology Upgrades

SIS7-16 Webinar – Security Technology Upgrades Questions & Answers Poll Question #1 What is the state of your physical security system? Most doors default to Fail Safe if you don’t have direction from the specifications or the AHJ.

1) It’s perfect! I wouldn’t change a thing. 2) It needs some improvements. 3) It’s in bad shape and quite antiquated. 4) I don’t know.

Poll Question #2 Are you familiar with current physical security technology? 1. No, I have no idea what’s available today. 2. I know some current technology, but I need an update. 3. I’m very familiar with current physical security technology

Poll Question 3 I’m familiar with the obstacles I’ll experience when implementing a physical security project? 1. I’ve never done this before and I don’t know what to expect. 2. It’s been a while since I’ve put a security project together. 3. This is familiar to me and I know what to expect. 4. I don’t know.

How often should a business plan for an upgrade at their facility? It depends on the type of facility, what their goals are, and what their plans are. On the whole, most entities we’ve seen in the industry average a refreshment cycle every five to seven years. That typically corresponds with the expiration or the failure rate of the infrastructure, whether it’s the cameras or the server itself.

How do I determine what technology I need – whether wireless, wired, megapixel, lower resolution for example? That’s a challenging question. You really have to think through what it is you’re trying to accomplish as a user. You may have a mix of different technologies.

For example, let’s thinking about a hallway. You want to ensure that you see the face of everybody that walks down that hallway because it’s a high traffic area and you know you want to look at it forensically. You’re going to take into account the number of megapixels you’re going to use on those types of cameras.

Similarly, if you’re going to put cameras in a parking lot area or you want to put cameras outside, you’re going to need to think about what it is you’re trying to solve. Do you want to pick up license plates for the vehicles that come and park? If so, you need to ensure that from where that camera is mounted, it has clear field of view – there are no obstacles in the way at the point you expect to capture the license plate. You need to make sure you have high enough megapixel resolution to capture the detail needed. You also need to make sure you are recording at a high enough frame rate to pick up that traffic. Keep in mind the frame rate will also have an impact on the amount of storage you will need.

You’ll also want to think about overall retention time. When you take a look back at incidents at your facility, how long does it take for something to be reported? We’ve seen examples of schools that choose to record at 45 to 60 days because they know it might take a while for a report to be filed.

It really is about understanding the challenges that you’re facing. With that information, we can start to understand the technology pieces that are needed to solve specific problems. The solution you’re needing may not require the latest and greatest technology. You may be able to get better bang for your buck by using a little bit older technology in areas that don’t need the highest resolution and all you require is general coverage. It doesn’t make sense to put a 5 Megapixel camera when all you need in that low priority area is 2 Megapixels.

Are there consultants that can help us decide our vulnerabilities at our site? Absolutely and there are some very good ones out there. A lot of times, you’ll find consultant’s that have a background in law enforcement that may be coming from different police agencies or federal agencies. These consultants will have a good understanding of physical vulnerabilities, area crime rates, environmental factors, and more. All of those play into what makes your facility vulnerable. Having a proper assessment done by a qualified professional will go a long way in ensuring you are meeting the scope required for you or your customer. You can check with the International Association of Professional Security Consultants (IAPSC) to find a list of highly qualified consultants. Other resources include the American Society for Industrial Security (ASIS) and the Security Industry Association (SIA). They will also be able to provide referrals for consultants as well.