How to Implement a Unified Security Management Platform:

Size: px
Start display at page:

Download "How to Implement a Unified Security Management Platform:"

Transcription

1 How to Implement a Unified Security Management Platform: A Case Study From the University of Kentucky Nathan Brown University of Kentucky Police Major Tom Sorrell, RCDD BCCLT, Inc.

2 Agenda Introductions Legacy State of UK SMS/VMS System Architecture - RFP New Deployment/Integration Robbery Case Study Lessons Learned Questions

3 UK s Dilemma Who owns security? Who is responsible? How can UK justifiably throw away existing security infrastructure? How can UK manage disparate technological upgrades for student and staff services? How can UK control procurement? How can UK afford reoccurring costs?

4 Legacy Systems Identified over 72 legacy systems on campus

5 Pre-Project Conditions Approximately 1,500 Existing Cameras On Campus Analog and IP mix Many Manufacturers and Models No Central Management: DVR s, NVR s, VCR s, CCTV Monitoring Out of date University Electronic Security Standards No Electronic Security Master Plan No Central Ownership

6 Convergence Events How is this accomplished? Convergence Video + Access Control + Other Devices This Information Is Then Converted Into Events What Triggers An Event? Camera Information Access Control Emergency Call Boxes Contact Closure Devices Audio Detection Devices

7 What Is Being Done In Other Campus Environments? Merging Access Control Systems with: Video Management Systems Audio Analytics Panic Alarms

8 Safety Improvements Threat Deterrent Improved Response Time Situational Awareness and Improved Safety for First Responders Video Forensics Parent Reassurance and Peace of Mind

9 How Do These Features Improve Safety? Threat Deterrent Improved Response Time Situational Awareness and Improved Safety for First Responders Video Forensics Parent Reassurance and Peace of Mind

10 How Is This Accomplished? Convergence Video + Access Control + Other Devices This Information Is Then Converted Into Events What Triggers An Event? Camera Information Access Control Emergency Call Boxes Contact Closure Devices Audio Detection Devices

11 UK Facility Staff UK Police First Responder Status of Local Cameras

12 UK Objectives Form an Executive Security Committee Assess legacy campus security systems Engage users and assess needs Review of current and future needs with UKPD and Administration Evaluate current security technology solutions available industry wide Determine security feature sets desired Issue a RFP for Integrated Security System Select Security Integrator Integrate Video, Access Control and Emergency Notification

13 System Objectives Based on Open Architecture components Smart Pro-Active System Event Driven / Alert Based SMS / VMS to work as one platform Web Based system, no thick or thin clients required Fully Integrated Mobile Devices No on-going License Fees Bandwidth Impacts / Local and Wide Area Distributed rather than Centralized Topology and impacts Integration of Key Legacy Systems without the use of PSIMS

14

15 Hierarchy Objectives Develop Delegated Authority Administration Model Develop Business Units Assign Database Administrator (UKPD) Assign BSA Business Security Authority Assign BSM Business Security Manager Delegated Authority to Local Building Users

16 Business Security Authorities Each building will be required to have a business security authority relationship. Will have capability to manage their own security system with Police backup. Will have knowledge of the building operations and occupants to ensure proper access rights. Approved by the Division Head/Dean

17 Exterior Notification

18 Exterior Notification Talk-A-Phone Driven Events: Camera Emergency Notification Outdoor Speakers Exterior Notification Tower: Talk-A-Phone VOIP Emergency Phone

19

20

21 Interior Notification Alarm system to keep people in buildings. Partnership with UK Fire Marshal and Office of Institutional Equity and Equal Opportunity

22 Wildcard (UK ID)

23 Functions of the Wildcard Identification UK Plus Account Kronos UK Library Card Security Verification Key Not a GPS device

24 Access Control Readers

25 Camera/Video Management

26 Cameras/Video Management Event Driven Video Management Allows visual confirmation for alerts and other calls for service Prepares first responders, building operators, and Business Security Authorities Assists in searching for active situations

27 Photo not to scale, used for concept only.

28

29

30 Gateways What is a Gateway? What does the Gateways do? How does this impact my planning? Who has access to the Gateways?

31 Gateways Functions Analytics: People Counting, Line Crossing, Activity, Face Capture, Dwell Time, Object Taken, Object Moved, Facial Recognition, License Plate Recognition Lock Down: UKPD has the ability to from the Central Operations Center to lock Perimeter Doors of any Access Controlled building or group of Buildings at any time.

32 Integration Team UK Police UK CPMD UK IT BCCLT Consulting Engineers Next Level Security Systems University of Kentucky Community

33 Robbery 1st ( ) Victim walking south on S. Limestone under pedway approached by three subjects brandishing firearm Victim refused to give money or property Victim fled from the three subjects and immediately called 9-1-1

34 Officers Response One officer immediately dispatched to interview victim and obtain description Subjects matching description observed at S. Upper and Boliver and interviewed by two other officers Victim identified suspects who are transported to UKPD for questioning

35 Security System Enhancements Video Evidence Captured on 10 Cameras

36 Investigation As the suspects were being interviewed the video footage was reviewed It became apparent that one of the subjects in the recordings was not presently detained This allowed officers to better interrogate and determine the missing person subject Officers worked with LPD and to coordinate a traffic stop and make arrest, recover weapon

37 All Systems Deployed Exterior Notification (Talk-a-Phone) UK Alert ( , phone, text) Automatic locks confirmed secure facilities Main, Student Ctr, POT, Whitehall Cats Path cameras utilized to observe subjects, gather evidence, and enhance interrogations Well trained, certified Police officers

38 Lessons Learned ID Card central focus of security system Stakeholders provide input not decisions Develop an integration team and an expansion team Create the security standard immediately Educate capital project management Respond to concerned community

39 Questions

40 Contact Information Major Nathan Brown Tom Sorrell

Alert Technology Group 46 Empey St, Brantford ON Office 519.750.1516 Toll Free 1.888.750.1516 www.alerttechnologygroup.ca

Alert Technology Group 46 Empey St, Brantford ON Office 519.750.1516 Toll Free 1.888.750.1516 www.alerttechnologygroup.ca Alert Technology Group 46 Empey St, Brantford ON Office 519.750.1516 Toll Free 1.888.750.1516 www.alerttechnologygroup.ca Alert Technology Group is the leader in providing technologically advanced security

More information

Conducting Security System Site Surveys

Conducting Security System Site Surveys Conducting Security System Site Surveys Written By: Harold C. Gillens, PSP, CFC, CHS-III Quintech Security Consultants, Inc. 102 Sangaree Park Court Suite 4 Summerville, SC 29483 CONDUCTING SECURITY SYSTEM

More information

Integrated Physical Security and Incident Management

Integrated Physical Security and Incident Management IT Enterprise Services Integrated Physical Security and Incident Management Every organisation needs to be confident about its physical security and its ability to respond to unexpected incidents. Protecting

More information

CCTV Security Cameras: 5 Tips for choosing what s best for your business

CCTV Security Cameras: 5 Tips for choosing what s best for your business CCTV Security Cameras: 5 Tips for choosing what s best for your business Choosing closed-circuit television (CCTV) security cameras requires research into functionality and budget. What do you want to

More information

Remote Managed Services

Remote Managed Services Remote Managed Services A Model for Growth and Efficiency in Security IFSEC 2011 Honeywell at a Glance $38B Fortune 100 company with a 120-year legacy of innovation 120,000 employees in 100 countries World-class

More information

Setting the Standard for Safe City Projects in the United States

Setting the Standard for Safe City Projects in the United States Leading Safe Cities Setting the Standard for Safe City Projects in the United States Edge360 is a provider of Safe City solutions to State & Local governments, helping our clients ensure they have a secure,

More information

Remote Monitoring offers a comprehensive range of services, which are continually

Remote Monitoring offers a comprehensive range of services, which are continually Remote Monitoring Since the early 1990 s commercial remote monitoring has provided security solutions across a broad spectrum of industries. As the threat of crime and the cost of manned guarding have

More information

28000S04 Main Campus and UK Healthcare Security System Standard

28000S04 Main Campus and UK Healthcare Security System Standard UK 28000S04 Main Campus and UK Healthcare Security System Standard 28000S04- ELECTRONIC SAFETY & SECURITY-Security System Standard University of Kentucky A n E q u a l O p p o r t u n i t y U n i v e r

More information

Game Changing Analytics to the Explosion of Video

Game Changing Analytics to the Explosion of Video Game Changing Analytics to the Explosion of Video What is the next level of Video and Data Analytics? Smarter Safer Communities Impact of Social Media End-to End Solution Objective: Safer, Smarter, More

More information

Wantagh s Smart Schools Plan for Technology & Security

Wantagh s Smart Schools Plan for Technology & Security Wantagh s Smart Schools Plan for Technology & Security 1 How Can We Use Smart Schools Funds? The SMART SCHOOLS Act of 2014, as set forth in section one of part B of chapter 56 of the laws of 2014, authorizes

More information

Training Courses 2015 What our delegates say about ADI training courses

Training Courses 2015 What our delegates say about ADI training courses Training Courses 2015 What our delegates say about ADI training courses Very informative and clearly delivered. Good practical exercises, very knowledgeable tutor. It has given me the knowledge and confidence

More information

Write up on PSIM PHYSICAL SECURITY INFORMATION MANAGEMENT

Write up on PSIM PHYSICAL SECURITY INFORMATION MANAGEMENT Write up on PSIM PHYSICAL SECURITY INFORMATION MANAGEMENT Physical security information management (PSIM) is a technology solution that provides a platform and applications created to integrate multiple

More information

Introduction. Industry Changes

Introduction. Industry Changes Introduction The Electronic Safety and Security Design Reference Manual (ESSDRM) is designed to educate and inform professionals in the safety and security arena. The ESSDRM discusses trends and expertise

More information

Security Lessons Learned November 1, 2013. Los Angeles International Airport BUSINESS INFORMATION TECHNOLOGY 2015 VANCOUVER

Security Lessons Learned November 1, 2013. Los Angeles International Airport BUSINESS INFORMATION TECHNOLOGY 2015 VANCOUVER Security Lessons Learned November 1, 2013 Los Angeles International Airport BUSINESS INFORMATION TECHNOLOGY 2015 VANCOUVER All airports should carefully evaluate their security measures against a wide

More information

Unequalled Physical Security Information Management Software

Unequalled Physical Security Information Management Software Unequalled Physical Security Information Management Software Are you in control? Organizational threats and risks are growing and changing all the time. Your business reality means managing these increasing

More information

Safety & Security October 2015

Safety & Security October 2015 Safety & Security October 2015 Intro PCC Facilities and College Police constantly monitor and strive to improve security and safety at the college. This presentation will cover improvement projects that

More information

Complete IP Video Security Solutions

Complete IP Video Security Solutions Complete IP Video Security Solutions www.indigovision.com About Us First security project World s first NVR The IndigoVision Network Video Recorder (NVR) is introduced to the Security Market. World s first

More information

White paper. Axis Video Analytics. Enhancing video surveillance efficiency

White paper. Axis Video Analytics. Enhancing video surveillance efficiency White paper Axis Video Analytics Enhancing video surveillance efficiency Table of contents 1. What is video analytics? 3 2. Why use video analytics? 3 2.1 Efficient use of manpower 3 2.2 Reduced network

More information

Louis A. Noriega Automated Port Solutions Physical Security and Operations Technology Consultant louis.noriega@aportsolutions.com

Louis A. Noriega Automated Port Solutions Physical Security and Operations Technology Consultant louis.noriega@aportsolutions.com Systems integration, collaboration, and partnerships to leverage existing systems and to eliminate redundant regional information technology initiatives, information sharing Louis A. Noriega Automated

More information

Comprehensive Video Solutions & Services. Industry-leading video solutions for your business

Comprehensive Video Solutions & Services. Industry-leading video solutions for your business Comprehensive Video Solutions & Services Industry-leading video solutions for your business STANLEY VIDEO SURVEILLANCE & SERVICES Gaining visibility and insight into your business can be a challenge. Whether

More information

Security Service de Services sécurité. Security Alarm Monitoring Protocol

Security Service de Services sécurité. Security Alarm Monitoring Protocol Security Service de Services sécurité TABLE OF CONTENTS 1.0 PURPOSE. Page 1 2.0 SCOPE.. Page 1 3.0 DEFINITIONS Page 1 4.0 PROTOCOL 4.1 General.. Page 4 4.2 of Buildings Perimeter Page 5 4.3 of Buildings

More information

POLICY TEMPLATE. Date initially approved: November 5, 2013 Date of last revision: same

POLICY TEMPLATE. Date initially approved: November 5, 2013 Date of last revision: same POLICY TEMPLATE Video Surveillance Category: Approval: Responsibility: Date: Operations PVP VP Finance and Administration Date initially approved: November 5, 2013 Date of last revision: same Definitions:

More information

Rapid Visualization with Big Data Analytics. Ravi Chalaka VP, Solution and Social Innovation Marketing

Rapid Visualization with Big Data Analytics. Ravi Chalaka VP, Solution and Social Innovation Marketing Rapid Visualization with Big Data Analytics Ravi Chalaka VP, Solution and Social Innovation Marketing Imagine the Future Innovative cities that dramatically enhance the wellbeing of its citizens Safer

More information

IP Surveillance. Presentation for BICSI Regional Conference Troy, Michigan March 15, 2011. Tom Jones, PE, RCDD / NTS Field Sales Engineer, D-Link

IP Surveillance. Presentation for BICSI Regional Conference Troy, Michigan March 15, 2011. Tom Jones, PE, RCDD / NTS Field Sales Engineer, D-Link IP Surveillance Presentation for BICSI Regional Conference Troy, Michigan March 15, 2011 Tom Jones, PE, RCDD / NTS Field Sales Engineer, D-Link Agenda Analog or IP Security Cameras VGA or Megapixel Resolution

More information

Security Alarm Monitoring Protocol

Security Alarm Monitoring Protocol Security Protocol TABLE OF CONTENTS 1.0 PURPOSE. Page 1 2.0 SCOPE.. Page 1 3.0 DEFINITIONS... Page 1 4.0 PROTOCOL 4.1 General.. Page 4 4.2 of Buildings Perimeter Page 5 4.3 of Buildings Interior Room or

More information

Beyond security: ATEC s contribution to Birmingham Airport s management systems

Beyond security: ATEC s contribution to Birmingham Airport s management systems Critical infrastructure / transportation Airports Beyond security: ATEC s contribution to Birmingham Airport s management systems As progressive transport hubs such as Birmingham Airport (BAL) invest in

More information

Business Owner s. Security Buyers. Guide. Everything you need to know before purchasing a security system. Safer. Smarter. Tyco.

Business Owner s. Security Buyers. Guide. Everything you need to know before purchasing a security system. Safer. Smarter. Tyco. Business Owner s Security Buyers Guide Everything you need to know before purchasing a security system Business Owners Security Buyer s Guide You re a business owner. That means you wear a lot of hats

More information

White paper. Axis Video Analytics. Enhancing video surveillance efficiency

White paper. Axis Video Analytics. Enhancing video surveillance efficiency White paper Axis Video Analytics Enhancing video surveillance efficiency Table of contents 1. What is video analytics? 3 2. Why use video analytics? 3 2.1 Efficient use of manpower 3 2.2 Reduced network

More information

How To Design A School Communication System

How To Design A School Communication System Integrated School Communications Curt Brautigan East Region Manager, Calypso Systems Seminar Agenda A bit about me (Who is this person talking and where is he from?) Changing dynamics / requirements in

More information

VIDEO MONITORING & ALARM VERIFICATION NASKAM SECURITY SERVICES PTY LTD

VIDEO MONITORING & ALARM VERIFICATION NASKAM SECURITY SERVICES PTY LTD VIDEO MONITORING & ALARM VERIFICATION VIDEO MONITORING What is Video Monitoring Video or CCTV Monitoring as a service has been around for many years particularly in the Mining and Access Control Industries

More information

solutions Deter Criminal Activity

solutions Deter Criminal Activity SCHOOL security & Campus surveillance solutions Protect Students and Staff Deter Criminal Activity Capture Forensic Evidence School Security & Campus Safe and nurturing environments are the necessary foundation

More information

NLSS Gateway Video Management Access Control Video Analytics Intrusion Remote Monitoring Cloud-Based Security

NLSS Gateway Video Management Access Control Video Analytics Intrusion Remote Monitoring Cloud-Based Security NLSS Gateway Access Control Analytics Intrusion Remote Monitoring Cloud-Based Security Introducing the NLSS Gateway The Integrated Solution The Next Generation of Security is here Access Control & Intrusion

More information

AGENDA REPORT. Honorable Mayor and Members of the City Council SUBJECT: CHARTER INTERNET SERVICE FOR CITY HALL

AGENDA REPORT. Honorable Mayor and Members of the City Council SUBJECT: CHARTER INTERNET SERVICE FOR CITY HALL AGENDA REPORT Meeting Date: August 6, 2013 Agenda Item # City Manager Approval: TO: Honorable Mayor and Members of the City Council FROM: Sandy Ryan, Finance Department SUBJECT: CHARTER INTERNET SERVICE

More information

Video Analytics and Security

Video Analytics and Security Video Analytics and Security Video Analytics and Security Using video data to improve both safety and ROI TABLE OF CONTENTS I. Executive Summary... 1 II. Captured on Video. Now What?... 2 III. Start Where

More information

EVERY PICTURE SAVES A THOUSAND WORDS

EVERY PICTURE SAVES A THOUSAND WORDS EVERY PICTURE SAVES A THOUSAND WORDS Cloudview Visual Verification & Remote Access Effective verification before expensive escalation Camera 3G Fixed Network {Wifi Cloudview Alarm System Digital Communicator

More information

URBAN. Security Solution. Urban Security Solution Military Security Solution SOC Security Solution

URBAN. Security Solution. Urban Security Solution Military Security Solution SOC Security Solution URBAN Security Solution Urban Security Solution Military Security Solution SOC Security Solution Samsung Security Solution Peace of mind at all times with Samsung Techwin's innovative security solutions...

More information

AGENDA REPORT. Honorable Mayor and Members of the City Council. Sandy Ryan, Finance Department SUBJECT: CHARTER INTERNET SERVICE FOR CITY HALL

AGENDA REPORT. Honorable Mayor and Members of the City Council. Sandy Ryan, Finance Department SUBJECT: CHARTER INTERNET SERVICE FOR CITY HALL AGENDA REPORT Meeting Date: August 6, 2013 Agenda Item # City Manager Approval: TO: FROM: Honorable Mayor and Members of the City Council Sandy Ryan, Finance Department SUBJECT: CHARTER INTERNET SERVICE

More information

Identifying the Future. Physical Security Information Management (PSIM) The Transformation of Gaming Security and Surveillance

Identifying the Future. Physical Security Information Management (PSIM) The Transformation of Gaming Security and Surveillance Identifying the Future Physical Security Information Management (PSIM) The Transformation of Gaming Security and Surveillance April 20 th, 2011 The application of advanced technologies over the past decade

More information

is here The Next Generation of Security The Next Generation of Integrated Solutions The NLSS Gateway A world of security in one package

is here The Next Generation of Security The Next Generation of Integrated Solutions The NLSS Gateway A world of security in one package NLSS Gateway Video Management Video Analytics Audio Analytics Facial Recognition Intrusion Remote Monitoring Mobile Applications Cloud-Based Security The Next Generation of Integrated Solutions The NLSS

More information

Cloud Computing: Transformative Technology

Cloud Computing: Transformative Technology Cloud Computing: Physical and Cyber Security s Transformative Technology Cloud Computing: Evolution, not Conventional thinking Innovation Each organization maintains its own Kingdom of IT Keep an expensive

More information

Appropriate response: A guide to security system integration, monitoring and verification

Appropriate response: A guide to security system integration, monitoring and verification Appropriate response: A guide to security system integration, monitoring and verification The benefits of integrating intruder, fire, access control and audio systems with CCTV for verification of alarm

More information

CCTV on IP Network. How Cisco IT Deploys Closed- Circuit TV Cameras over the Secure IP Network. A Cisco on Cisco Case Study: Inside Cisco IT

CCTV on IP Network. How Cisco IT Deploys Closed- Circuit TV Cameras over the Secure IP Network. A Cisco on Cisco Case Study: Inside Cisco IT CCTV on IP Network How Cisco IT Deploys Closed- Circuit TV Cameras over the Secure IP Network A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge Security transitioned from analog closed-circuit

More information

Cyber Threats in Physical Security Understanding and Mitigating the Risk

Cyber Threats in Physical Security Understanding and Mitigating the Risk Cyber Threats in Physical Security Understanding and Mitigating the Risk Synopsis Over the last few years, many industrial control systems, including security solutions, have adopted digital technology.

More information

(877) 435-4832 (4-ELITE-2) info@eliteisi.com www.eliteisi.com

(877) 435-4832 (4-ELITE-2) info@eliteisi.com www.eliteisi.com (877) 435-4832 (4-ELITE-2) info@eliteisi.com www.eliteisi.com Introducing the Remote Guarding Vendor Comparison Tool. Now, you can compare Elite ISI with competitors and see how we measure up to the task

More information

Security Management Plan

Security Management Plan Effective Date: 03/2015 1 of 10 I. Table of Contents: I Table of Contents II Authority III Purpose & Scope IV Policy Statement V The Joint Commission Standards VI Performance Standards VII DUPD Services

More information

View. Select View Managed Video Services ADT

View. Select View Managed Video Services ADT monitoring Access Control Video Surveillance Intrusion Detection Fire & life safety Commercial Solutions ADT SM Select View Managed Video Services Leverage your existing investment in video surveillance

More information

Safety & Security Intruder Fire Access CCTV VeriSafe Alarms Alarms Systems Systems Keeping people safe & businesses compliant www.veriserv.co.

Safety & Security Intruder Fire Access CCTV VeriSafe Alarms Alarms Systems Systems Keeping people safe & businesses compliant www.veriserv.co. Safety & Security VeriSafe Intruder Alarms Fire Alarms Access Systems CCTV Systems Keeping people safe & businesses compliant www.veriserv.co.uk Security is about more than complying with standards and

More information

City of Sacramento VoIP Deployment Project. Presentation to State of California IP Telephony Working Group

City of Sacramento VoIP Deployment Project. Presentation to State of California IP Telephony Working Group City of Sacramento VoIP Deployment Project Presentation to State of California IP Telephony Working Group Project Scope To Convert 4000+ SBC Centrex analog lines to City owned and operated VoIP Phone System

More information

The evolution of data connectivity

The evolution of data connectivity Leveraging the Benefits of IP and the Cloud in the Security Sector The CCTV and alarm industry has relied on analogue or Integrated Services Digital Network (ISDN) communications to provide data connectivity

More information

Valencia College & the University of Central Florida Partners in Education and Safety Florida higher education turns to complete security installation

Valencia College & the University of Central Florida Partners in Education and Safety Florida higher education turns to complete security installation Valencia College & the University of Central Florida Partners in Education and Safety Florida higher education turns to complete security installation Valencia College serves 71,000 students across 60

More information

Think Remote Monitoring Think Concept Pro Think VXM4B

Think Remote Monitoring Think Concept Pro Think VXM4B The VXM4B Range Digital Video Recorder and Remote Monitoring System Think Remote Monitoring Think Concept Pro Think VXM4B Not much more left to Think about Who watches over your business when you re not

More information

Chapter 1 Introduction

Chapter 1 Introduction Chapter 1 Introduction Chapter 1 provides background information on electronic safety and secuirty (ESS), including the definition and areas of knowledge required for an ESS designer. Information contained

More information

Cisco Incident Response and Workforce Enablement for the Utility

Cisco Incident Response and Workforce Enablement for the Utility Cisco Incident Response and Workforce Enablement for the Utility Over the next ten years, it is predicted that aging energy infrastructure and utility industry workforce will undergo their greatest transition

More information

Western Kentucky University, The Center. The Michael Minger Act Report for 2015 Activity Reported for Calendar Year 2014

Western Kentucky University, The Center. The Michael Minger Act Report for 2015 Activity Reported for Calendar Year 2014 Western Kentucky University, The Center The Michael Minger Act Report for 2015 Activity Reported for Calendar Year 2014 Section 1: Campus Security Authority List campus security authority personnel (definition

More information

A guide to access control for manufacturing sites

A guide to access control for manufacturing sites A guide to access control for manufacturing sites What is access control? Access control provides the ability to control, monitor and restrict the movement of people, assets or vehicles, in, out and round

More information

SmartHome by Acadian Total Security:

SmartHome by Acadian Total Security: PROTECTED LA-F1638 Acadian is known for providing lifesaving services through technology and innovation. From emergency medical response to security, safety and training, our focus remains centered on

More information

Video Analytics and Security

Video Analytics and Security Video Analytics and Security Using video data to improve both safety and ROI March 2008 / White Paper Make the most of your energy Summary I. Executive Summary... 3 II. Captured on Video. Now What?...

More information

Milestone forms core of IP video upgrade across all Paul Smith retail stores around the world

Milestone forms core of IP video upgrade across all Paul Smith retail stores around the world Milestone forms core of IP video upgrade across all Paul Smith retail stores around the world XProtect Corporate video management software is providing discreet, future-proofed, loss prevention to 45 Paul

More information

Product Characteristics Page 2. Management & Administration Page 2. Real-Time Detections & Alerts Page 4. Video Search Page 6

Product Characteristics Page 2. Management & Administration Page 2. Real-Time Detections & Alerts Page 4. Video Search Page 6 Data Sheet savvi Version 5.3 savvi TM is a unified video analytics software solution that offers a wide variety of analytics functionalities through a single, easy to use platform that integrates with

More information

Middleborough Police Electronic Security Narrative

Middleborough Police Electronic Security Narrative Middleborough Police Electronic Security Narrative 1. PURPOSE The purpose of this document is to define specific security, access control and surveillance requirements for the exterior and interior of

More information

Comprehensive Master Plan. Strategic Security Plan 2010 2015. East Carolina University. December 31, 2009. Prepared by:

Comprehensive Master Plan. Strategic Security Plan 2010 2015. East Carolina University. December 31, 2009. Prepared by: East Carolina University Comprehensive Master Plan Strategic Security Plan 2010 2015 December 31, 2009 Prepared by: 14900 Bogle Drive, Suite 200 Chantilly, VA 20151 Telephone: 703-488-9990 This Page Intentionally

More information

Unified Surveillance Video Analysis and Storage An innovative approach to improve retention, availability, and expand analytic capabilities.

Unified Surveillance Video Analysis and Storage An innovative approach to improve retention, availability, and expand analytic capabilities. Unified Surveillance Video Analysis and Storage An innovative approach to improve retention, availability, and expand analytic capabilities. NFF White Paper December 2014 ...Most current surveillance solutions

More information

Network Design Incorporated

Network Design Incorporated Network Design Incorporated Network Design Incorporated specializes in the design, installation and project management of Information Transport Systems (ITS) and the various technology solutions utilizing

More information

Physical Security. Overview

Physical Security. Overview Physical Security Currently in this Country defence and security including private sector have responded to rising concerns about theft, fraud, and terrorism by sharpening their focus on physical security

More information

FREQUENTLY ASKED QUESTIONS about the ALARM ORDINANCE, ALARM REGISTRATION AND FALSE ALARM FEES

FREQUENTLY ASKED QUESTIONS about the ALARM ORDINANCE, ALARM REGISTRATION AND FALSE ALARM FEES FREQUENTLY ASKED QUESTIONS about the ALARM ORDINANCE, ALARM REGISTRATION AND FALSE ALARM FEES Is there a value to owning an alarm system? Yes, an alarm system can bring you a sense of security and peace

More information

Technology & Security Advances. Presented by: Tommy Thornton Director of Technology

Technology & Security Advances. Presented by: Tommy Thornton Director of Technology Technology & Security Advances Presented by: Tommy Thornton Director of Technology Security Risk in Healthcare Security Risk in Healthcare 2014 International Healthcare Security & Safety Foundation Study

More information

Summary of Current ITMP Projects by Status. Summary of All ITMP Projects by Status (136 current plus 18 new initiatives)

Summary of Current ITMP Projects by Status. Summary of All ITMP Projects by Status (136 current plus 18 new initiatives) Attachment "A" Summary of Current ITMP Projects by Status Percent of Projects by Status Type Abreviation No. of Projects 27% Ongoing O 36 35% Complete Com 47 6% Project Started PS 8 7% Budgeted B 10 15%

More information

What are cloud services?

What are cloud services? Stay Connected: Leveraging the Cloud and Mobile Applications for Enhanced Security Jumbi Edulbehram, Next Level Security Systems Kevin Dailey, Unified Physical Security What are cloud services? Delivery

More information

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee Marquee Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Securing the Workplace Executive Summary OPTIMIZE TODAY S WORKPLACE Protecting

More information

Solution Overview. Smarter Video Surveillance with NETGEAR

Solution Overview. Smarter Video Surveillance with NETGEAR Smarter Video Surveillance with NETGEAR A b s t r a c t a n d A u d i e n c e NETGEAR Solution Overviews provide high-level solutions to common business IT challenges for end users, Value-Added Resellers

More information

Case Study University of South Florida A key factor in determining which IP cameras to use besides video quality is reliability and maintenance,

Case Study University of South Florida A key factor in determining which IP cameras to use besides video quality is reliability and maintenance, Case Study University of South Florida A key factor in determining which IP cameras to use besides video quality is reliability and maintenance, Nate Rice, USF s engineer for video surveillance Solution:

More information

Honeywell Video Analytics

Honeywell Video Analytics INTELLIGENT VIDEO ANALYTICS Honeywell s suite of video analytics products enables enhanced security and surveillance solutions by automatically monitoring video for specific people, vehicles, objects and

More information

Game Changing Trends and Technologies for Video Surveillance

Game Changing Trends and Technologies for Video Surveillance 30 June 2015 Game Changing Trends and Technologies for Video Surveillance Atul Rajput Regional Director, Northern Europe, Axis Communications Game Changers in IP Video Over The Last Decade 2004 2004-2008

More information

UBC Technical Guidelines Section 17900 2015 Edition Secure Access: General Standards Page 1 of 7

UBC Technical Guidelines Section 17900 2015 Edition Secure Access: General Standards Page 1 of 7 Page 1 of 7 1.0 GENERAL 1.1 Related UBC Guidelines.1 Section 17910, 17920 and 17930.2 Section 17100 Cable Infrastructure Overview, sub sections 1.4.9 and 1.5.3 Section 17110 Communication Rooms, sub section

More information

Surveillance and Security for Casinos. Cost-Effective Solutions for Any Size Facility

Surveillance and Security for Casinos. Cost-Effective Solutions for Any Size Facility Surveillance and Security for Casinos Cost-Effective Solutions for Any Size Facility Honeywell Security Technologies Honeywell s video systems protect many of the world s casino properties. But did you

More information

MOTOROLA OPTIMIZED VIDEO SECURITY

MOTOROLA OPTIMIZED VIDEO SECURITY MOTOROLA OPTIMIZED VIDEO SECURITY VIDEO SURVEILLANCE SOLUTIONS Deploying video is an effective way to bring cost-effective security to a neighborhood or a city. A well-executed video solution can help

More information

A Study on Integrated Security Service Control Solution Development about CRETA Security

A Study on Integrated Security Service Control Solution Development about CRETA Security A Study on Integrated Security Service Control Solution Development about CRETA Security Yongwon (Conrad) Cho 1, Jinwon (Frank) Choi 2 1 Director Research Engineer, Virtual Builders Co., Ltd. 2 CEO & Co-Founder,

More information

IMS [Integrated Management System] Surveillance Solution Segment Focus: Gaming Industry

IMS [Integrated Management System] Surveillance Solution Segment Focus: Gaming Industry IMS [Integrated Management System] Surveillance Solution Segment Focus: Gaming Industry Needs analysis Reduce disputes over payouts Eliminate theft Detect misconduct and record it for use as evidence in

More information

CCTV Solution HUS. Sales Rep

CCTV Solution HUS. Sales Rep CCTV Solution HUS Sales Rep Agenda About Honeywell Challenges in Video Surveillance HUS- Honeywell Universal Solution HUS- Solution Architecture, Features & Benefits Why Honeywell Q&A 2 Today s Honeywell

More information

Upgrading Analog Video Surveillance with IP Technology

Upgrading Analog Video Surveillance with IP Technology WHITE PAPER Upgrading Analog Video Surveillance with IP Technology Panasonic Video surveillance systems Table of contents 1. Introduction 3 2. IP technology benefits 3 3. Upgrade strategies 6 4. Step-by-step

More information

Communication Infrastructure Convergence & The need of IS Audit Compliance. Ninad M. Desai

Communication Infrastructure Convergence & The need of IS Audit Compliance. Ninad M. Desai Communication Infrastructure Convergence & The need of IS Audit Compliance. Ninad M. Desai RCDD CISA CFOT Consulting Specialist Communication Cabling. Auditor Information Systems & Technology. Convergence

More information

Cyber Security through Education & Awareness. KSU Police Converged Security: A holistic approach to cyber safety and security. Community Policing

Cyber Security through Education & Awareness. KSU Police Converged Security: A holistic approach to cyber safety and security. Community Policing KSU Police Converged Security: A holistic approach to cyber safety and security Cyber Security through Education & Awareness by Community Policing Community Policing Community Policing Initial meeting

More information

Tyco Integrated Fire & Security Advanced Integration Solutions

Tyco Integrated Fire & Security Advanced Integration Solutions MONITORING ACCESS CONTROL VIDEO SURVEILLANCE IP SOLUTIONS INTRUSION DETECTION INTEGRATED SOLUTIONS Tyco Integrated Fire & Security Advanced Integration Solutions For large-scale security system integration,

More information

The Cisco and Pelco Industrial Wireless Video Surveillance Solution: Real-Time Monitoring of Process Environments for Safety and Security

The Cisco and Pelco Industrial Wireless Video Surveillance Solution: Real-Time Monitoring of Process Environments for Safety and Security The Cisco and Pelco Industrial Wireless Video Surveillance Solution: Real-Time Monitoring of Process Environments for Safety and Security The Cisco and Pelco Industrial Wireless Video Surveillance Solution

More information

PHLOSOPHY OF SCHOOL SAFETY AND SECURITY SYSTEMS INTERDICIPLINARY DECISION MATRIX

PHLOSOPHY OF SCHOOL SAFETY AND SECURITY SYSTEMS INTERDICIPLINARY DECISION MATRIX PHLOSOPHY OF SCHOOL SAFETY AND SECURITY SYSTEMS INTERDICIPLINARY DECISION MATRIX To ensure that policies, procedures, training and physical facilities improvements are implemented in a planned and logical

More information

SS03: Cloud RMR Opportunities for Integrators

SS03: Cloud RMR Opportunities for Integrators SS03: Cloud RMR Opportunities for Integrators Ray Coulombe SecuritySpecifiers.com April 11, 2013 The Opportunity Worldwide video surveillance market will reach $37.7 billion in 2015 Major video hardware

More information

The Business Argument for Integrating Security Systems

The Business Argument for Integrating Security Systems The Business Argument for Integrating Security Systems Over the past decade security managers and others charged with the protection of an organization s assets have faced the dichotomy of defending against

More information

White Paper: Application and network performance alignment to IT best practices

White Paper: Application and network performance alignment to IT best practices Unpublished White Paper: Application and network performance alignment to IT best practices This white paper briefly describes best practices; highlights IT best practices; and discusses in detail IT business

More information

Newton Public Schools Security Audits Executive Summary

Newton Public Schools Security Audits Executive Summary Newton Public Schools Security Audits Executive Summary February 2013 Security audit process January 3 Email to administrators on school security January 4 Email to all staff on school security January

More information

XProtect Product Overview

XProtect Product Overview Milestone Systems Product Overview 8 cameras 26 cameras 64 cameras 250+ cameras unlimited number of cameras Functionality It s not just video management software. It s. Milestone Systems is the world s

More information

IP Camera Network Installations are More Difficult than Analog Camera Installations? Not So!

IP Camera Network Installations are More Difficult than Analog Camera Installations? Not So! November 2010 IP Camera Network Installations are More Difficult than Analog Camera Installations? Not So! Here Are The Facts. White Paper Table of Contents: Page 1 Overview A Brief History Page 2 A Big

More information

Working Relationship with Local Law Enforcement Authorities. Department of Safety and Security Scope of Authority. How to Report On-Campus Crime

Working Relationship with Local Law Enforcement Authorities. Department of Safety and Security Scope of Authority. How to Report On-Campus Crime Working Relationship with Local Law Enforcement Authorities The working relationship with local police departments is limited to the reporting of crimes and information sharing. The working relationship

More information

How to Conduct a Security Site Survey

How to Conduct a Security Site Survey How to Conduct a Security Site Survey Steve Surfaro Group Manager Enterprise Systems www.panasonic.com/security surfaros@us.panasonic.com Agenda Where does the Security Site Survey sit in the scheme of

More information

NSR TM. Open the Era of Embedded Security Integration Systems. Network Security Recorder. Integrated Security

NSR TM. Open the Era of Embedded Security Integration Systems. Network Security Recorder. Integrated Security Integrated Security Networ k Security Recorder NSR TM Network Security Recorder Open the Era of Embedded Security Integration Systems NSR (Network Security Recorder) is developed by Anson and will be promoted

More information

GMS GRAPHICAL MANAGEMENT SYSTEM

GMS GRAPHICAL MANAGEMENT SYSTEM GMS GRAPHICAL MANAGEMENT SYSTEM 1 GMS The integrated security management system for multi-site organizations. Pacom s Graphical Management System (GMS) is the modular client-server application that integrates

More information

Alarm Systems. The purpose of an intruder alarm system is: Commonly utilised detection devices include:

Alarm Systems. The purpose of an intruder alarm system is: Commonly utilised detection devices include: Alarm Systems An intruder alarm system is designed to detect intruder presence at your premises. When detected, a siren will activate and communicate an alarm signal to one of our highly sophisticated

More information

White paper. Video encoders - brings the benefits of IP surveillance to analog systems

White paper. Video encoders - brings the benefits of IP surveillance to analog systems White paper Video encoders - brings the benefits of IP surveillance to analog systems Table of contents 1. The easy path to network video 3 1.1 Technology shift 3 1.2 Gaining advanced and important functionalities

More information

Products. Technology. Services. Delivered Globally. SECURITY SOLUTIONS

Products. Technology. Services. Delivered Globally. SECURITY SOLUTIONS Products. Technology. Services. Delivered Globally. SECURITY SOLUTIONS THE ANIXTER DIFFERENCE Anixter s network of highly trained security specialists is ready to help you make informed decisions about

More information

Benefits of Standardizing the Video Security System

Benefits of Standardizing the Video Security System SALIENT SYSTEMS WHITE PAPER Benefits of Standardizing the Video Security System Salient Systems Corp. 10801 N. MoPac Exp. Building 3, Suite 700 Austin, TX 78759 Phone: (512) 617-4800 For a variety of reasons

More information

Security 101 For School Safety. Intertech Associates, Inc. Lunch & Learn

Security 101 For School Safety. Intertech Associates, Inc. Lunch & Learn Security 101 For School Safety Intertech Associates, Inc. Lunch & Learn Safe & Secure Educational Environment What type of school is it? What type of security risks do schools see? How can traffic flows,

More information