step into security webinar - planning for security technology upgrades
TRANSCRIPT
Webinar Sponsor
Based in Houston, TX
Since 1998
IP Video Management
System Design
Installation
Project Management
LENSEC is committed to empowering our clients and partners to prevent or mitigate physical security risks. We want to help protect people and assets as well as improve operations through our evolutionary and intuitive technology. We can do this by providing expertise in security and software development.
Our Mission
Webinar Logistics
• Q&A At The End
• Questions For The Panelist
• Audio From Attendees Muted
• Poll Questions
• Survey
Training Goal
Planning for Security Technology Upgrades
Webinar Topics
• Site Assessment – State Of Your System• Market Assessment – Current Technologies,
Standards & Practices• Transitional Planning – Getting From Here To There• Implementation Cycle – Executing On The Plan• Case-in-Point – Entities With Successful Projects
Site Assessment Overview• Build Awareness Of
Current Status• Review Current
Vulnerabilities• Triage New Priorities
Site Assessment – Site Audit• Site Audit Points
• Area of Interest • Coverage Field • Buildings, Walls & Enclosures
• New or Modified• Equipment existing
• Technology • Infrastructure
• Human Resources• Guards, Officers, Volunteers & Administrators• System Use & Standard Operating Procedures
• Crime Prevention Through Environmental Design (CPTED)
Site Assessment – Current Vulnerabilities• Vulnerabilities
• Human Protection• Asset Protection• Property Protection
• Areas of Concern• Weak Spots / Faulty Equipment
• Areas of Risk• Risk Assessment• Local Community Reports/Trends• Adjacent Environment
• Any New Risk From Neighbors
Site Assessment – Customer Priorities• Revisit original goals
• Meeting? Exceeding? Deficient?• Priorities (AKA Wish List)
• Shifting Priorities• Considerations
• Functional Integration Designs• Training & Utilization
• Triage Needs Before & During The Budget Process
Market Assessment – Overview
• Current State Of The Market / Professional Industry
• Technologies• Standards• Best Practices
Market Assessment – Technologies• Today
• Video Tech • 360• MPX• Compressions• Analytics
• Power Consumption • Solar• Battery
• Integration tools • Unification Of Alerts/Alarms
Market Assessment – Technologies• Future Proof
• Warranty Protection• Resolution & Codec Availability• PC & Server Technology• Bang For The Buck…
Market Assessment – Best Practices• Installation Procedures• Site/Project Commissioning• Monitoring Procedures• Evaluation Routines
Transitional Planning - Overview• Budget & Resource Allocation• Single Or Multi-phase Approach• Communicate Effectively• Improve From Lessons Learned
Transitional Planning – Budget/Resources• Capital Expenditures • Operational Budget• Technology Equipment • Services • Training
Transitional Planning – Budget/Resources• Funding Sources
• Grants & Bonds• Scheduling Vehicles
• TCPN• GSA
• Buy/Lease• Resource allocation
• Preparing Staff • Preparing Facilities
Transitional Planning – Phasing• One & Done • Multi-phase• Predictive Analysis – Think
about where pitfalls may occur and use smart scheduling.
• New Software/Server Phase-in
• Legacy Software/Server Phase-out
Transitional Planning – Collaboration• Communicate
• Talk• Email• Document• Text
• Contractors • GC meet Sub• Sub meet POC
• Departments• Communicate the approach
deadlines, dates, expectations
Transitional Planning – Iterative Improvement• Iterative Improvement – To learn
from and improve upon a repetitive process.
• (LESSONS LEARNED, LEARNING APPLIED)
• Technology• Training• Exercises & Standard Operating
Procedures
Poll Question
Poll Question #3
I’m familiar with the obstacles I’ll experience when implementing a physical security project?
Implementation – Hurdles And Concerns• Project Management• Standup Meetings• Identify Allies & Build Bridges• Solve & Move On
Implementation – Execution• Hardware
• New Equipment • New Manufacturers
• Software• Users• Devices• Details
• Infrastructure• System Overlap / Redundancy• Cutover
IP Vs. Analog Cameras & Equipment• Proprietary Equipment
• A Word Of Warning• Data Transfer Protocols• Open Source
Implementation – Training• Who
• Users (Day-to-Day)• Users (Infrequent)• Administrators• Responders• Contractors
• How• Classroom-based• Video Tutorial• Documentation
• User Manuals• Quick Reference Guides
Case Study – Pflugerville Independent School District• Switching Over Software• Phased Camera Upgrades• Refreshed Network
Infrastructure• Phased Server Upgrades
Summary
• Site Assessment – State of Your System• Market Assessment – Current Technologies, Standards, and Practices• Transitional Planning – Getting from Here to There• Implementation Cycle – Executing on the Plan• Case-in-Point – Entities that Have “Been There and Done That”
Contacts Jeff [email protected](713) 395.7330LENSEC
David [email protected](512) 318-3829LENSEC
SIS7-16 Webinar – Security Technology Upgrades Questions & Answers Poll Question #1 What is the state of your physical security system? Most doors default to Fail Safe if you don’t have direction from the specifications or the AHJ.
1) It’s perfect! I wouldn’t change a thing. 2) It needs some improvements. 3) It’s in bad shape and quite antiquated. 4) I don’t know.
Poll Question #2 Are you familiar with current physical security technology? 1. No, I have no idea what’s available today. 2. I know some current technology, but I need an update. 3. I’m very familiar with current physical security technology
Poll Question 3 I’m familiar with the obstacles I’ll experience when implementing a physical security project? 1. I’ve never done this before and I don’t know what to expect. 2. It’s been a while since I’ve put a security project together. 3. This is familiar to me and I know what to expect. 4. I don’t know.
How often should a business plan for an upgrade at their facility? It depends on the type of facility, what their goals are, and what their plans are. On the whole, most entities we’ve seen in the industry average a refreshment cycle every five to seven years. That typically corresponds with the expiration or the failure rate of the infrastructure, whether it’s the cameras or the server itself.
How do I determine what technology I need – whether wireless, wired, megapixel, lower resolution for example? That’s a challenging question. You really have to think through what it is you’re trying to accomplish as a user. You may have a mix of different technologies.
For example, let’s thinking about a hallway. You want to ensure that you see the face of everybody that walks down that hallway because it’s a high traffic area and you know you want to look at it forensically. You’re going to take into account the number of megapixels you’re going to use on those types of cameras.
Similarly, if you’re going to put cameras in a parking lot area or you want to put cameras outside, you’re going to need to think about what it is you’re trying to solve. Do you want to pick up license plates for the vehicles that come and park? If so, you need to ensure that from where that camera is mounted, it has clear field of view – there are no obstacles in the way at the point you expect to capture the license plate. You need to make sure you have high enough megapixel resolution to capture the detail needed. You also need to make sure you are recording at a high enough frame rate to pick up that traffic. Keep in mind the frame rate will also have an impact on the amount of storage you will need.
You’ll also want to think about overall retention time. When you take a look back at incidents at your facility, how long does it take for something to be reported? We’ve seen examples of schools that choose to record at 45 to 60 days because they know it might take a while for a report to be filed.
It really is about understanding the challenges that you’re facing. With that information, we can start to understand the technology pieces that are needed to solve specific problems. The solution you’re needing may not require the latest and greatest technology. You may be able to get better bang for your buck by using a little bit older technology in areas that don’t need the highest resolution and all you require is general coverage. It doesn’t make sense to put a 5 Megapixel camera when all you need in that low priority area is 2 Megapixels.
Are there consultants that can help us decide our vulnerabilities at our site? Absolutely and there are some very good ones out there. A lot of times, you’ll find consultant’s that have a background in law enforcement that may be coming from different police agencies or federal agencies. These consultants will have a good understanding of physical vulnerabilities, area crime rates, environmental factors, and more. All of those play into what makes your facility vulnerable. Having a proper assessment done by a qualified professional will go a long way in ensuring you are meeting the scope required for you or your customer. You can check with the International Association of Professional Security Consultants (IAPSC) to find a list of highly qualified consultants. Other resources include the American Society for Industrial Security (ASIS) and the Security Industry Association (SIA). They will also be able to provide referrals for consultants as well.