Creating Safe Campuses with Integrated Security Solutions

Size: px
Start display at page:

Download "Creating Safe Campuses with Integrated Security Solutions"

Transcription

1 Creating Safe Campuses with Integrated Security Solutions Providing security for colleges universities involves more than the best choice of products features. Learn how security systems such as access control, intrusion detection, digital video surveillance can be integrated into a building automation system to protect students, staff, property, information. September 2006 / White Paper Make the most of your energy

2 Summary I. Executive Summary... 3 II. Campus Security Issues Today... 4 III. Moving Beyond Basic Security Technology... 5 Intrusion Detection... 5 Access Control... 5 Video Surveillance Technologies... 6 Video Analytics Help Spot Incidents... 7 Integrating Intrusion Detection, Access Control, Video Surveillance... 8 IV. Benefits of Integration... 9 Integrated Security Lighting Control... 9 Convergence: The Future is Here...10 V. Examples of TAC Customer Solutions...11 The Georgia Institute of Technology...11 The University of Wales...11 VI. Conclusion...12

3 I. Executive Summary Campus security safety are important issues at universities today. Providing students nationwide with a safe environment in which to learn, keeping students, parents employees well informed about campus security are goals that have been voiced by many groups. These goals were advanced in 1990 by the Clery Act, which requires all colleges universities that participate in federal financial aid programs to keep disclose information about crime on near their respective campuses. Theft on campus, property crime information security are major concerns today. Universities invest millions of dollars in security technology with the intention of increasing security, protecting students staff, solving security issues. This technology includes burglar alarms, fire protection systems, video surveillance, access control systems, intrusion detection devices. Technology, in the hs of competent capable security officers, can reduce crime, cut material losses, keep people safe. But keeping security staff trained on separate, st-alone systems can be challenging, must be addressed as part of broader campus security objectives. The key systems of security are intrusion detection, access control, video surveillance. If each of these systems is purchased separately, administration training can burden a university s resources. Intrusion alarms occur on one system, access badges are administered in a st-alone database, intelligent digital video technology runs on dedicated computer equipment. Each system requires service, maintenance, administration, training. By integrating these separate security systems under a flexible building automation system (BAS), university management realizes a lower upfront investment for a considerably more powerful security solution. Installation training occur on a single system. Operational costs like administration maintenance are also reduced. Component devices are used in multiple ways to trigger lighting, video capture, pan-tilt-zoom, higher video resolution or frame rate, door locks, other aspects of building control. A single system enables greater flexibility to add security components that can be easily integrated into the overall system, keeping the cost of capital expenditures low, requiring little additional training. An independent study by Strategic ICT Consulting of a 145,000 square foot building shows a system installation cost saving of 24% for an integrated BAS versus separate systems. And after installation, operations life-cycle savings continue. Project analysis by Teng & Associates shows that training is reduced 33%, IT administration is reduced 82%, the cost for changes, upgrades, additions to an integrated system are reduced by 32%. These operational figures are based on experience measurement, clearly demonstrate the value of an integrated BAS. Finally, this paper will show several examples where TAC has effectively applied building automation products related services to provide effective integrated security for its customers. Creating Safe Campuses with Integrated Security Solutions 3

4 II. Campus Security Issues Today The safety of students, staff visitors on college university campuses is the responsibility of security officers who must pay close attention to the places where people spend most of their time, such as residence halls, classrooms, lecture halls offices. But campuses consist of more than these buildings. A school might be home to sensitive research projects that require restricted access closer scrutiny. A campus also might have other facilities that warrant special vigilance: laboratories with valuable data, libraries with rare volumes, museums with valuable historically significant artifacts, walls corridors dotted with athletic trophies, paintings or sculptures. Furthermore, college university campuses are home to thouss of students 24 hours a day. As residential work communities alike, campuses are dynamic environments with constant activity. As a result, an effective campus security program must address the protection of students, faculty, staff, the safeguardinof campus property facilities from damage or loss. 3,700 sexual assaults (including more than 1,800 occurring in residence halls); more than 1,300 arsons (almost half occurring in residence halls). There were also nearly 1,200 arrests for illegal weapons possession on campuses in In such an environment, security remains a critical concern for administrators. Colleges universities are spending money on a variety of technology equipment to increase campus safety protect property. This includes burglar alarms, fire protection systems, digital video recorder (DVR) surveillance video cameras, security lighting, access control, sensors detectors, badging/id card systems. But are these investments the best way to increase security? These separate systems each address a different security need, require training familiarity to be most effective. A system that integrates the functions of many security devices into a single system significantly reduces capital expenditures lowers facility operating costs II. Campus Security Issues Today because component devices are used in multiple According to figures from the United States ways security officers can be trained on one The safety of students, staff visitors on college university campuses is the responsibility of security Department of Education, crime continues to system rather than many. Through integration, officers who must pay close attention to the places where people spend most of their time, such as residence be a problem at public private colleges the whole security system becomes greater than halls, classrooms, lecture halls offices. But campuses consist of more than these buildings. A school might universities (see figure 1). In 2003, the latest year the sum of its separate parts. And security staff be home to sensitive research projects that require restricted access closer scrutiny. A campus also might for which statistics are available, there were more becomes more effective on the job. have other facilities that warrant special vigilance: laboratories with valuable data, libraries with rare volumes, than 40,000 burglaries; 8,000 aggravated assaults; museums with valuable historically significant artifacts, walls corridors dotted with athletic trophies, paintings or sculptures. Figure 1: Furthermore, 2003 US Statistics college at university campuses Colleges are Universities home to thouss 1 of students 24 hours a day. As residential work communities alike, campuses are dynamic environments with constant activity. As a result, an effective campus security program must address the protection of students, faculty, staff, the safeguarding of campus property facilities from damage or loss. FIGURE US Crime Statistics at Colleges Universities 1 According to figures from the United States Department of Education, crime continues to be a problem at public private colleges universities (see figure 1). 1 In 2003, the latest year for which statistics are 1 Reported available, to the there U.S. Department were more of Education. than 40,000 Figures burglaries; from more 8,000 than 6,000 aggravated public assaults; private non-profit, 3,700 sexual private assaults for-profit (including institutions more offering than 1,800 post-secondary occurring educational in residence programs halls); more than 1,300 arsons (almost half occurring in residence halls). There were also nearly 1,200 arrests for illegal weapons possession on campuses in Creating Safe Campuses with Integrated Security Solutions 4 In such an environment, security remains a critical concern for administrators. Colleges universities are spending money on a variety of technology equipment to increase campus safety protect property.

5 III. Moving Beyond Basic Security Technology Regardless of the size of the campus, its location or the level of security risks that need to be addressed, there are essential components of an electronic security system. These include intrusion detection, access control, video surveillance. These three systems, in the hs of competent capable security staff, apply technology effectively to reduce crime protect people property on campus. We will examine each system individually, then in combinations to demonstrate how integrating security into the building automation system leverages these systems in multiple ways, increasing security reducing operating training costs. Intrusion detection Simple intrusion detection is probably the most familiar concept of security to most people. Intrusion detection involves the use of door or window contacts, glass contacts, or motion sensors, in combination with some type of audible alarm that sounds when a person has forced entry into a building or room. An alert is sent to the police or security station to notify authorities of the time location of the incident. Security officers respond in person to evaluate the situation. This method of incident response can be adequate for detecting an event quickly getting to the scene. But the effectiveness of the response at the scene subsequent prosecution is dependent on several things; the proximity of security personnel to the incident; whether witnesses were present; the number of people involved; the seriousness of the incident, other factors. Furthermore, with simple intrusion detection, there is little in place that would deter people from committing a crime the first place. More information would be helpful, such as captured details of the situation that could lead to proper response identification of perpetrators, thereby reducing the likelihood that a similar incident would occur again. Door window contacts, motion sensors, other devices already in use for alarming can be put to better use to help gather this information by triggering other parts of the security system. Access control Access control is the means by which people are granted or denied access to restricted areas, such as residence halls, labs, parking garages, feefor-service areas like cafeterias or laundry. Colleges universities are unique with respect to access control because the needs of the community vary widely depending on who needs to go where. There are day students, night students, athletes, faculty, staff, other personnel with dissimilar requirements for security building access. Some people on campus require varying degrees of temporary access privileges, others need permanent access. With so many different needs, how does management begin to evaluate the many types of access control systems that are available? Furthermore, in a growing changing campus environment, what is the best kind of access control to meet future needs? A flexible form of access control uses cards with magnetic card readers, proximity readers, barcodes, or smart cards with embedded microprocessors. Card access control at colleges universities is common today, there are a variety of systems with different levels of sophistication. There are many advantages to card access control. Students can be coded with access to specific areas depending on their academic major, seniority, class enrollment, team participation, or any number of factors. Individual privileges can expire on a given date if desired. And access can be granted or denied at any time based on the student s status. Cards can also be used as debit cards for meal-plans other Creating Safe Campuses with Integrated Security Solutions 5

6 university fee-based services. In areas where tighter security is required, management can install keypads, keypad/card combinations, or biometric devices that can scan fingerprints or hprints. When used as a st-alone system, card readers other electronic access devices offer a costeffective flexible way for a university to control who has access to the various parts of campus, with the system recording who has gone where, when. The sequence of operations is for the access device to trigger the door lock, entry is granted, the event is recorded by the central system. But if a device can trigger the lock, why not use this inherent ability to trigger other security devices as well? As a st-alone system, access control does its job, but does not fully leverage the connected sensors for broader security objectives. Video surveillance technologies Video surveillance has evolved significantly in the last decade. Older video systems needed banks of video tape for continuous recording, required manual administration to swap tapes periodically during the day. Record keeping was prone to errors finding specific incidents on tape was time-consuming. Digital Video Recorders (DVRs) made significant advances in features functions, taking advantage of fast computer processors high density storage media to digitize, compress record video from analog cameras. Newer cameras today have embedded processors that enable video to be compressed within the device transmitted real-time over IP networks to Network Video Recorders (NVRs) that centrally manage video feeds from many IP cameras. DVRs NVRs have many advantages over older analog recording technology. Streaming video can be continuously recorded discarded in cycles of days, weeks, or months if no security incidents occur. If an incident does occur, disk indexing time-stamping make it simple to find video from a given date time. In addition, because the video is digitized, it can be exported distributed via or backed up on CD, DVD, or other digital media using common computer backup programs that are widely available. Digital video surveillance is cost-effective sold by many vendors in a highly pricecompetitive market. If purchased as a separate system to meet the needs of a security plan or upgrade, a DVR or NVR may be adequate for immediate surveillance objectives. But if this digital video recorder is integrated with an organization s access control intrusion detection system (as part of the broader building automation system), the user improves surveillance reduces the need for additional security personnel. Integrated with access control, video verification, for example, allows a user to see live video as well as the cardholder s picture when a given access card is presented at a reader. The security staff can verify that the person presenting the badge is the actual cardholder. Another example of video verification effectiveness occurs in identifying individuals who are tailgating, or when one person swipes their badge gains access to the facility another person follows them in without presenting their badge. The integrated system allows organizations to visually identify, verify capture security breaches at access points. Creating Safe Campuses with Integrated Security Solutions 6

7 VIDEO ANALYTICS HELP SPOT INCIDENTS The advent of video analytics brings additional flexibility increased productivity of security staff who monitor many cameras. Video analytics is a technology applied in software that examines the video camera s field of view DEO ANALYTICS HELP SPOT INCIDENTS for patterns of movement that match real-life events, e advent such of video as falling, analytics fence brings climbing, additional lurking, flexibility trip-lines. Video analytics software Video help d increased Video productivity analytics provides of security a means staff who by monitor which the user can tracks people or objects, any cameras. focus spot only Video incidents on analytics what is is truly a technology important, applied managing can alarm on types of behavior ftware surveillance that examines by the exception video camera s events field rather of view than all events. r patterns The of advent movement of video that analytics match real-life brings additional events, ch as falling, A flexibility DVR fence or NVR climbing, increased can be lurking, productivity configured of trip-lines. to security only display a deo analytics camera s staff who provides monitor video a if means many a specific cameras. by which event Video the or user analytics alarm can occurs. At a cus only university is on a technology what is for truly example, applied important, in foot software managing traffic that on examines a sidewalk near a rveillance residence the by video exception camera s hall may events field be of deemed rather view for than normal, patterns all events. of not trip an alarm movement according that match to video real-life analytics events, such assessment. However, Video analytics software tracks people or objects, DVR or NVR falling, can fence be configured climbing, lurking, to only display trip-lines. a can alarm on types of behavior stepping off the sidewalk crossing left-to-right across mera s video Video if analytics a specific provides event a or means alarm by occurs. which the At a the field of view to a window may trigger an alarm. iversity for example, foot traffic on a sidewalk near a Additional user can focus alarms only can on what be escalated is truly important, if video analytics sidewalk detect loitering crossing near left-to-right the window, across the or someone climbing a sidence hall may be deemed normal, not trip an fence. managing surveillance by exception events rather field of view to a window may trigger an alarm. arm according to video analytics assessment. However, Video analytics software tracks people or objects, than all events. Additional alarms can alarm can be on escalated types of behavior if video epping off the sidewalk crossing left-to-right across These are examples of how exped use of video analytics surveillance detect loitering technology near can the window, increase or security at universities e field of A view DVR to or a NVR window can be may configured trigger to an only alarm. display someone climbing a fence. ditional without alarms requiring can be escalated an increase if video in analytics security personnel. detect loitering near the window, or someone climbing a a camera s video if a specific event or alarm nce. occurs. At a university for example, foot traffic on These are examples of how exped use of a sidewalk near a residence hall may be deemed video surveillance technology can increase security ese are examples of how exped use of video surveillance technology can increase security at universities normal, A university not trip serving an alarm 20,000 according students to video on five campuses at universities sought without an requiring integrated an increase BAS that in would allow ithout requiring an increase in security personnel. analytics the school assessment. to decrease However, operating stepping costs, off the increase security security personnel. for students faculty, allow for remote monitoring of each campus from a central location. The resulting system controls monitors a wide variety of different building functions, such as access control events logs, A university serving 20,000 students ventilation, A university five campuses serving day 20,000 sought nighttime students an integrated energy on five campuses use, BAS chillers that sought would allow boilers, integrated air the school to decrease operating costs, quality. BAS that increase Even would security allow though the there for school students are to decrease five campus operating faculty, locations, costs, allow increase they for are all centrally remote monitoring of each campus security from a for central students location. faculty, The resulting allow for system remote controls monitoring of each monitored campus from from a central an off-campus location. The resulting office. system controls monitors monitors a wide variety of different building functions, such as access control events logs, a wide variety of different building functions, such as access control events ventilation, A day series logs, ventilation, of nighttime unobtrusive day energy security nighttime use, chillers measures energy use, boilers, are chillers in place air boilers, that ensure student quality. Even safety air though quality. Even there prevent though are five campus there campus are crime five locations, campus or unlawful locations, they are trespassing, they all are centrally centrally without monitored from an off-campus office. monitored interfering from an off-campus with university office. life. Three of the campuses have a state-of-theart A series of unobtrusive A series contactless of unobtrusive smartcard-based security security measures measures access are in are place in control place that that system ensure ensure that student student is linked via the university s safety prevent existing campus IT Ethernet. crime or unlawful trespassing, without safety prevent interfering campus with university crime or life. unlawful Three of trespassing, the campuses without have a state-of-theart contactless TAC university system smartcard-based life. controls Three of over the access 160 campuses control doors system have can a that state-of-the- hle is linked 20,000 via the unique interfering The with art contactless university s smartcard-based existing IT Ethernet. users. The system users. The system also access integrates control with system other that security is linked systems, via the such as CCTV intrusion university s alarms. The existing TAC The system BAS IT Ethernet. controls over all aspects 160 doors of security can hle 20,000 daily indoor unique users. environmental operations via The system users. The system also integrates with other security systems, The constant TAC system readings controls from over 3, control doors points. can Via hle the 20,000 university unique Ethernet, data passes such as CCTV intrusion alarms. The BAS controls all aspects of security users. The from system one building users. to The another system daily also indoor allows integrates environmental system with access other operations from security via any constant systems, site. readings such as from 3,500 CCTV intrusion alarms. The BAS controls points. all Via aspects the university of security Ethernet, daily data passes indoor from environmental one building to operations via constant readings from another 3,500 control allows system points. access Via the from university any site. Ethernet, data passes from one building to another allows system access from any site. 7 CREATING SAFE CAMPUSES WITH INTEGRATED SECURITY SOLUTIONS 7 EATING SAFE CAMPUSES WITH INTEGRATED SECURITY SOLUTIONS Creating Safe Campuses with Integrated Security Solutions 7

8 SURVEILLANCE integrated BAS to provide a Integrating intrusion detection, access control, video surveillance pus, limiting access to facilities duce the risk of crime. This is ty solution. Using an integrated surveillance Today s access cameras, control control video surveillance rs (DVRs). systems When can an work alarm together is in an integrated BAS to ing, display provide live a holistic video solution from a on college university n administrator campuses. all Keeping at the intruders same off campus, limiting access to facilities that house expensive equipment, remotely monitoring secluded areas to reduce the risk of crime. This is why more hen a student contacts more campuses now rely on CCTV as part of y the scene to observe the their overall security solution. Using an integrated seful for adding extra system, security staff at a central monitoring station ially late at night. can view live images from surveillance cameras, control pan-tilt-zoom cameras, or search for video clips stored on digital video recorders (DVRs). When an alarm is triggered by another part of the BAS, it can comm the DVR to begin recording, display live video from a linked camera at the location, map the alarm location, send an to an administrator all at the same moment. CCTV cameras are an important component of campus emergency call boxes. When a student contacts security via one of these stations, lights cameras can be activated to survey the scene to observe the emergency, officers can intervene to thwart an attack. Cameras are also useful for adding extra protection in remote areas, such as parking lots garages on campus, especially late at night. ditures oday. stem his ted A major university of medicine on the U.S. east coast has increased expenditures for security from a $100,000 investment in 1993 to more than $2 million today. One reason for the increase is that the university has upgraded its CCTV system to digital video recorders with Ethernet capability added 75 cameras. This enabled the security staff to record, play view surveillance activity simultaneously with digital day/night pan-tilt-zoom cameras stationed throughout the university s campuses spread across five cities. The integrated surveillance access-control systems allow officials to call up instant live video recordings of alarm conditions system activity. Using a single system that ties all of its properties together, the university has improved security while maintaining a discrete unobtrusive surveillance presence for more than 18,000 students, researchers, teachers, patients employees. e system that ties all of ing a discrete ers, teachers, patients 8 Creating Safe Campuses with Integrated Security Solutions 8

9 IV. Benefits of Integration For colleges universities with diverse populations building types spread over large areas, integrating various building systems offers numerous advantages. Foremost, integration provides for reduced installation operating costs because it eliminates component redundancy allows customers to streamline operations. Furthermore, it reduces training empowers system operators by allowing them to perform their duties more efficiently. Colleges universities are also vulnerable to lawsuits alleging negligence in providing security, especially if there are uneven or inconsistent levels of security for buildings with similar purposes or design. Integration allows for uniform monitoring control across a campus demonstrates that an institution has applied appropriate security strategies at all its buildings. Lastly, enhanced safety, security comfort create a more positive learning environment where faculty can teach students can learn. Benefits of Integrating the Security System with the BAS A site-wide single-seat interface enables one person to be trained on multiple security systems. Security components become multi-use. A motion sensor can be used for lighting control during occupied hours, intrusion detection during unoccupied hours. During design, flexibility, efficiency, economy provide room for additional security expansion or integration at the lowest cost. Better more flexible response to campus needs, offering students staff greater security peace of mind. More information put to effective use, which gives university security staff solid ground to st on for prosecution proof of loss. CCTV records also aid law enforcement authorities in finding criminals. Vendor independence, allowing the university customer to choose among best-of-class security products. Laundry facilities kitchens can consume 10-15% of the building s energy, increasing the need to more closely monitor hours of peak dem from these sources. Single-source responsibility, whereby one integrator is held accountable for all the components of the security system. Integrated security lighting control By way of example, consider the benefits of simply installing a lighting control system versus integrating it with security. In a university laboratory facility, the lighting controls will enable the operator to maintain comfortable lighting levels use presets to control the lighting. This ensures the lights are only on when where they are needed, saving energy related costs. If, however, there is a security breach late at night, without integration, personnel will need to locate switches issue comms to the control system to switch on lights in the affected area. If the lighting controls are integrated, the scenario after the security breach is much different. The lights are automatically switched on in the area where the security breach is reported, CCTV cameras are activated to record the emergency. The operator has a single console to assess the situation to ensure the appropriate reaction from the fire department or police. Creating Safe Campuses with Integrated Security Solutions 9

10 With an integrated security BAS, it is possible for a university s facility staff to control entire buildings from one workstation via a networked computer. From this single browser interface, operators can manage diverse building functions, such as environmental control, access control, video surveillance alarm event monitoring. Building staff can view live or recorded video, open or lock a door, grant access to service technicians for emergency situations hle visitor management. These tasks can be accomplished onsite or remotely at any time, whether during business hours, at nights or on weekends. Integration Improves the Bottom Line In an independent case study involving a 145,313 square-foot office building with 1,500 occupants, a research team examined the installation costs of the components of a non-integrated BAS versus that of an integrated BAS. Systems integrated: Lighting Controls Building Controls Security Fire Life Safety Metering Monitoring Structured Cabling $2,464,693 non-integrated BAS $1,868,166 integrated BAS $596,527 difference = savings As the results show, the cost-savings were significant over 24 percent. Findings also show that an integrated approach offers a broad range of commercial technical benefits, including a single vendor point of contact, efficient project management, easier equipment deployment investment protection for future upgrades. Source: Strategic ICT Consulting, April 2005 Convergence: the future is here Today, most colleges universities have highspeed computer networks sophisticated secure IT infrastructure. The campus network supports administrative servers, Internet access, multimedia file sharing, collaborative online communities, class registration, many other computing resources. This type of infrastructure positions the institution to leverage the best that integrated BASs have to offer by sharing the campus-wide network for security facilities management as well. As a single integrated system, security facilities management allows many building functions to be viewed within a single, common interface. All hardware, even video, alarm printing equipment, can work seamlessly within its framework. Entering security facility data just once, having the framework synchronize with existing hardware software automatically, is common on many campuses. An integrated system reduces the overall hardware software requirements. This leads to fewer training issues, lowers training costs, allows staff to work more efficiently trending building performance troubleshooting building alarms. All of these benefits result in decreasing the burden on tightly controlled higher education budgets, freeing more money to go directly to educational programs. Creating Safe Campuses with Integrated Security Solutions 10

11 VI. Examples of TAC Customer Solutions VI. Examples of TAC Customer Solutions TAC provides comprehensive, effective, worldwide. Below are some examples of TAC s innovative VI. Examples building automation of TAC solutions Customer for Solutions TAC provides comprehensive, effective, innovative security solutions, building automation the benefits solutions gained for hundreds of college hundreds university of college campuses university worldwide. campuses Below are by some the examples institutions. of TAC s security solutions, the benefits TAC provides comprehensive, effective, innovative building automation solutions for hundreds of college gained by the institutions. university campuses worldwide. Below are some examples of TAC s security solutions, the benefits gained by the institutions. The Georgia Institute The Georgia of Technology Institute of Technology The Georgia Institute of Technology is a renowned education The Georgia Institute research institution situated The of Georgia Technology in downtown Institute is a renowned Atlanta. of The Technology education research 350-acre institution situated in downtown Atlanta. The 350-acre urban campus contains urban campus contains 160 buildings 20,000 students. Over The 160 the years, Georgia buildings various Institute 20,000 departments of Technology students. installed is Over several a renowned the years, types of education various departments keyless research institution entry installed systems several situated in more types in than downtown of two keyless dozen Atlanta. entry buildings. systems The There 350-acre in was more no urban than campus two dozen contains 160 compatibility buildings. There or integration was 20,000 no compatibility between students. systems, Over or integration the years, service various between departments systems, installed maintenance service several maintenance were types difficult. of keyless were difficult. entry systems in more than two dozen buildings. There was no compatibility or integration between systems, service Solution maintenance were difficult. Georgia Tech turned to a to TAC a TAC partner partner to install to install a system a system that that integrated access Solution integrated control, security access control, management, security management, alarm monitoring alarm monitoring CCTV. Operating over the Georgia campus CCTV. Tech existing Operating turned LAN, over to the a TAC system campus partner offers existing to install distributed LAN, a the system network that operations. integrated access A control, offers single distributed agency security provides management, network campus-wide operations. alarm A single monitoring centralized agency system provides CCTV. security Operating database over the campus campus-wide management, existing centralized while LAN, the the system individual system security offers academic distributed database departments management, network maintain operations. decentralized A single while operation the agency individual provides control. academic campus-wide Each departments centralized maintain assigns decentralized system access to security its facilities database for management, operation students control. staff while the Each sets individual department door lock/unlock academic assigns access departments schedules. to its facilities maintain decentralized operation for students control. staff Each sets department door lock/unlock assigns schedules. access to its facilities for students Gains staff sets door lock/unlock schedules. The The University University now now issues issues one one multi-purpose multi-purpose card card to the to faculty, the faculty, staff, Gains staff, students students for both for access both access control control for campus for campus retail retail operations, such as food The operations, service University such the now as bookstore. food issues service one The multi-purpose ID the card bookstore. has both card The a to magnetic ID the card faculty, has stripe staff, bar students both code, a magnetic so for it is both used stripe access as control bar access code, control so it for is card, used campus as a an library retail access operations, card, control meal card, such as food debit service card, card. a Another library card, card bookstore. meal includes card, The a chip ID debit card that card. has only Another both allows a card magnetic designated includes stripe a individuals bar access code, chip to sensitive that so only is areas allows used as on designated an campus access individuals requiring control card, more access a stringent to library sensitive card, security. areas meal card, debit card. on campus Another requiring card includes more stringent a chip security. that only allows designated individuals access to sensitive areas on campus requiring more stringent security. The University of The Wales, University in Swansea, of Wales, is one of Swansea, the UK s top U.K. 50 universities, according to the Financial Times. More than 10,000 students 2,000 staff The University of Wales, in Swansea, is one of the UK s top 50 The study University or work of on Wales, its campus in Swansea, of 20 buildings. is one of There the UK s are top also 50 five universities, off-campus universities, according to the Financial Times. More than 10,000 buildings the new Wales National Pool. students according to 2,000 the Financial staff study Times. or work More on its than campus 10,000 of 20 students buildings. 2,000 staff There study are or also work five on off-campus its campus buildings of 20 buildings. the new There Wales are also five off-campus National buildings Solution Pool. the new Wales National Pool. Previously, on-site access control consisted of various st-alone systems Solution using several different access cards. The university decided to revamp the Previously, entire access on-site infrastructure access access control control consisted move consisted of to various a single, of various st-alone comprehensive st-alone security systems systems using management several using several different control different system. access access cards. cards. The The university decided to revamp the to entire revamp access the entire infrastructure access infrastructure move to a move single, to a comprehensive single, security comprehensive management TAC provides security control a system system. capable management of monitoring control system. controlling a wide range of TAC electrical provides a system mechanical capable subsystems, of monitoring in addition controlling to security. a wide This flexibility range TAC gives provides of university electrical a system staff mechanical a capable unifying subsystems, of control monitoring system in addition that controlling to feeds security. all a data wide to range a central of This electrical database flexibility for gives easy mechanical university operation, subsystems, staff data a unifying storage in control addition system report to security. generation. that This TAC flexibility feeds gives integrated all university data to its a solution central staff a database with unifying existing for control easy legacy operation, system systems that data feeds using storage all hybrid data smart to a central cards, an database affordable report generation. for solution easy operation, that TAC integrated did not data compromise its storage solution with security. report existing generation. The legacy system TAC controls all systems integrated card-based using its hybrid services, solution smart such with cards, as existing vending, an affordable legacy printing systems solution that using copying, did hybrid not use smart one cards, that an compromise affordable functions over solution security. the The that university s system did not controls IP compromise network all card-based for security. easier services, The faster system management. controls all such card-based as vending, services, printing such copying, as vending, use one printing card that functions copying, use one card that over functions Gains the university s over the IP university s network for IP easier network faster for easier management. faster management. The university now uses security staff more efficiently because training Gains Gains operation occurs on a single system. And costs were kept low by integrating the The The legacy university university card now system. now uses uses security security staff staff more more efficiently efficiently because because training training operation occurs operation on occurs a single on system. a single system. And costs And were costs kept were low kept by integrating the low legacy by integrating card system. the legacy card system. 11 CREATING SAFE CAMPUSES WITH INTEGRATED SECURITY SOLUTIONS The University of Wales, Swansea, U.K. The University of Wales, Swansea, U.K. CREATING SAFE CAMPUSES WITH INTEGRATED SECURITY SOLUTIONS 11 Creating Safe Campuses with Integrated Security Solutions 11

12 VIII. Conclusion Students have high expectations when they select a college or university. They require a quality education campus experience at a reasonable cost. State-of-the-art facilities, safety security are of primary concern. In order to meet rising expectations within this cost-sensitive market, colleges universities must invest wisely in their facilities as a strategic asset to recruit students attract faculty staff. Fortunately, new building management solutions are able to increase campus security while also maximizing energy efficiency performance. This leads to a reduction in operating costs enables resources saved to be reallocated within the budget to new programs for students. Technology must work effectively as a tool for well-trained security staff. When evaluating intrusion detection, card access control, video surveillance systems, require that your vendors show how integration of these security functions can increase security minimize the training burden to security personnel. Ask that they show how integration with the campus building automation system could provide further efficiencies of operations. Schneider Electric One High Street, North Andover, MA USA Telephone: Fax: All br names, trademarks registered trademarks are the property of their respective owners. Information contained within this document is subject to change without notice. On October 1st, 2009, TAC became the Buildings Business of its parent company Schneider Electric. This document reflects the visual identity of Schneider Electric, however there remains references to TAC as a corporate br in the body copy. As each document is updated, the body copy will be changed to reflect appropriate corporate br changes Schneider Electric. All rights reserved. WP-COLLEGESECURITY-US.BU.N.EN CC September 2006 sm

Integration: The Future of Commercial Office Building Security

Integration: The Future of Commercial Office Building Security Commercial Offices Integration: The Future of Commercial Office Building Security Providing security in commercial offices involves more than the best choice of products and features. Learn how security

More information

Integration: The Future of Commercial Office Building Security

Integration: The Future of Commercial Office Building Security Integration: The Future of Commercial Office Building Security Providing security in commercial offices involves more than the best choice of products and features. Learn how security systems such as access

More information

Hospitals Meet Security Challenges With Integrated Solutions

Hospitals Meet Security Challenges With Integrated Solutions Healthcare Hospitals Meet Security Challenges With Integrated Solutions Providing security for hospitals involves more than the best choice of products and features it also requires best practices. Learn

More information

Hospitals Meet Security Challenges With Integrated Solutions

Hospitals Meet Security Challenges With Integrated Solutions Hospitals Meet Security Challenges With Integrated Solutions Providing security for hospitals involves more than the best choice of products and features it also requires best practices. Learn how security

More information

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee Marquee Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Securing the Workplace Executive Summary OPTIMIZE TODAY S WORKPLACE Protecting

More information

Redefining Security for the Modern Facility

Redefining Security for the Modern Facility Redefining Security for the Modern Facility TM Make the most of your energy 02 Protecting your people, property and data 03 Trust your facilities to a leader in security systems The world is changing rapidly.

More information

An Experimental Access Control System For Enhancing Security And Safety In University Campuses

An Experimental Access Control System For Enhancing Security And Safety In University Campuses Scholars Journal of Engineering and Technology (SJET) ISSN 2321-435X Sch. J. Eng. Tech., 2013; 1(3):172-176 Scholars Academic and Scientific Publisher (An International Publisher for Academic and Scientific

More information

Access Control in Commercial Applications. Is the future of commercial building security built in, or bolted on? A discussion paper

Access Control in Commercial Applications. Is the future of commercial building security built in, or bolted on? A discussion paper Access Control in Commercial Applications Is the future of commercial building security built in, or bolted on? A discussion paper Author: Damian Marsh, Managing Director UK, ASSA ABLOY Access Control

More information

TAC I/A Series Continuum Security Solutions Redefining Security for the Modern Facility

TAC I/A Series Continuum Security Solutions Redefining Security for the Modern Facility TAC I/A Series Continuum Security Solutions Redefining Security for the Modern Facility Trust your facilities to a leader in security systems The world is changing rapidly. Companies and government agencies

More information

Security Service de Services sécurité. Security Alarm Monitoring Protocol

Security Service de Services sécurité. Security Alarm Monitoring Protocol Security Service de Services sécurité TABLE OF CONTENTS 1.0 PURPOSE. Page 1 2.0 SCOPE.. Page 1 3.0 DEFINITIONS Page 1 4.0 PROTOCOL 4.1 General.. Page 4 4.2 of Buildings Perimeter Page 5 4.3 of Buildings

More information

Security Alarm Monitoring Protocol

Security Alarm Monitoring Protocol Security Protocol TABLE OF CONTENTS 1.0 PURPOSE. Page 1 2.0 SCOPE.. Page 1 3.0 DEFINITIONS... Page 1 4.0 PROTOCOL 4.1 General.. Page 4 4.2 of Buildings Perimeter Page 5 4.3 of Buildings Interior Room or

More information

Business Owner s. Security Buyers. Guide. Everything you need to know before purchasing a security system. Safer. Smarter. Tyco.

Business Owner s. Security Buyers. Guide. Everything you need to know before purchasing a security system. Safer. Smarter. Tyco. Business Owner s Security Buyers Guide Everything you need to know before purchasing a security system Business Owners Security Buyer s Guide You re a business owner. That means you wear a lot of hats

More information

Retail Solutions. Why Tyco Security Products for Retail?

Retail Solutions. Why Tyco Security Products for Retail? Retail Solutions Why Tyco Security Products for Retail? We are a leading provider of integrated retail security solutions, deployed today at more than 80 percent of the world s top 200 retailers. Tyco

More information

CCTV Security Cameras: 5 Tips for choosing what s best for your business

CCTV Security Cameras: 5 Tips for choosing what s best for your business CCTV Security Cameras: 5 Tips for choosing what s best for your business Choosing closed-circuit television (CCTV) security cameras requires research into functionality and budget. What do you want to

More information

IMS [Integrated Management System] Surveillance Solution Segment Focus: Gaming Industry

IMS [Integrated Management System] Surveillance Solution Segment Focus: Gaming Industry IMS [Integrated Management System] Surveillance Solution Segment Focus: Gaming Industry Needs analysis Reduce disputes over payouts Eliminate theft Detect misconduct and record it for use as evidence in

More information

Axis network cameras A wide portfolio of products for professional video surveillance.

Axis network cameras A wide portfolio of products for professional video surveillance. Axis network cameras A wide portfolio of products for professional video surveillance. The market s widest range of network cameras The video surveillance market is thriving, driven by increased public

More information

Unsurpassed Integrated Access & Video Security Performance

Unsurpassed Integrated Access & Video Security Performance 2013 Unsurpassed Integrated Access & Video Security Performance OnGuard Integrated Security Solutions The Intelligent Choice for Today and Tomorrow With over 20,000 installations in over 90 countries and

More information

Video Analytics and Security

Video Analytics and Security Video Analytics and Security Using video data to improve both safety and ROI March 2008 / White Paper Make the most of your energy Summary I. Executive Summary... 3 II. Captured on Video. Now What?...

More information

Bosch IP An introduction to IP technology and the future of CCTV. Bosch IP Network Video Product Guide

Bosch IP An introduction to IP technology and the future of CCTV. Bosch IP Network Video Product Guide Bosch IP An introduction to IP technology and the future of CCTV Bosch IP Network Video Product Guide 2 3 Changes in CCTV technology have been driven by three main requirements. The first is the need to

More information

IP Video Surveillance

IP Video Surveillance IP Video Surveillance Solutions and Services Wireless IP PDA Administration Wireless Access Point Viewer Remote Control IP Video Server IP Network Alarm Management Video Recording Analog Video Server Access

More information

CCTV & Video Surveillance over 10G ip

CCTV & Video Surveillance over 10G ip CCTV & Video Surveillance over 10G ip Background With the increase in data, research and development and corporate competition, many companies are realizing the need to not only protect their data, but

More information

WIN-PAK Integrated Security POWERFUL SECURITY INTEGRATION. Integrated Access Control, Video and Intrusion Platform

WIN-PAK Integrated Security POWERFUL SECURITY INTEGRATION. Integrated Access Control, Video and Intrusion Platform WIN-PAK Integrated Security POWERFUL SECURITY INTEGRATION Integrated Access Control, Video and Intrusion Platform WIN-PAK WIN-PAK - A Proven Security Integration Platform With over 100,000 systems installed

More information

Alarm Systems. The purpose of an intruder alarm system is: Commonly utilised detection devices include:

Alarm Systems. The purpose of an intruder alarm system is: Commonly utilised detection devices include: Alarm Systems An intruder alarm system is designed to detect intruder presence at your premises. When detected, a siren will activate and communicate an alarm signal to one of our highly sophisticated

More information

Integrated Physical Security and Incident Management

Integrated Physical Security and Incident Management IT Enterprise Services Integrated Physical Security and Incident Management Every organisation needs to be confident about its physical security and its ability to respond to unexpected incidents. Protecting

More information

Online Training Certifications

Online Training Certifications Online Training Certifications March Networks online certifications provide our certified partners with the knowledge required to install, operate and maintain our industry-leading Visual Intelligence

More information

Surveillance and Security for Casinos. Cost-Effective Solutions for Any Size Facility

Surveillance and Security for Casinos. Cost-Effective Solutions for Any Size Facility Surveillance and Security for Casinos Cost-Effective Solutions for Any Size Facility Honeywell Security Technologies Honeywell s video systems protect many of the world s casino properties. But did you

More information

solutions Deter Criminal Activity

solutions Deter Criminal Activity SCHOOL security & Campus surveillance solutions Protect Students and Staff Deter Criminal Activity Capture Forensic Evidence School Security & Campus Safe and nurturing environments are the necessary foundation

More information

GMS GRAPHICAL MANAGEMENT SYSTEM

GMS GRAPHICAL MANAGEMENT SYSTEM GMS GRAPHICAL MANAGEMENT SYSTEM 1 GMS The integrated security management system for multi-site organizations. Pacom s Graphical Management System (GMS) is the modular client-server application that integrates

More information

BANKING AND FINANCE. Advanced technology solutions to maximize the security of financial institutions and branch banks.

BANKING AND FINANCE. Advanced technology solutions to maximize the security of financial institutions and branch banks. BANKING AND FINANCE Advanced technology solutions to maximize the security of financial institutions and branch banks. advisory services. technology delivery. SmartSourcing SM managed services. www.sdisolutions.com

More information

SYMMETRY PRODUCT OVERVIEW

SYMMETRY PRODUCT OVERVIEW ACCESS CONTROL The Symmetry Security Management Systems provides powerful integrated solutions for organizations requiring Access Control and Integrated Security. Solutions are available for organizations

More information

SYMMETRY. DATASHEET ACCESS CONTROL Product Overview

SYMMETRY. DATASHEET ACCESS CONTROL Product Overview DATASHEET ACCESS CONTROL Product Overview SYMMETRY The AMAG Technology range of Security Management Systems provides powerful integrated solutions for organizations requiring Access Control and Integrated

More information

Smile Security and Surveillance Pvt. Ltd. (SSSPL) Brings to you

Smile Security and Surveillance Pvt. Ltd. (SSSPL) Brings to you Smile Security and Surveillance Pvt. Ltd. (SSSPL) Brings to you Building Management System Total Security & Surveillance Solutions for Building Complexes Intelligent Building Management System Solution

More information

Thank you for the opportunity and privilege to introduce the services offered by Silver Space Electro Mechanical Works L.L.C.

Thank you for the opportunity and privilege to introduce the services offered by Silver Space Electro Mechanical Works L.L.C. COMPANY PROFIL Date: 18 th May 2015 Dear Sir/Madam, Thank you for the opportunity and privilege to introduce the services offered by Silver Space Electro Mechanical Works L.L.C. Silver Space Electro Mechanical

More information

XProtect Product Overview

XProtect Product Overview Milestone Systems Product Overview 8 cameras 26 cameras 64 cameras 250+ cameras unlimited number of cameras Functionality It s not just video management software. It s. Milestone Systems is the world s

More information

Milestone Customer Story September 2008

Milestone Customer Story September 2008 The IT Department for the University at Buffalo s Faculty Student Association sets up future-proof security platform with a Milestone IP video solution running as a service for multiple campus locations

More information

Totally Wireless Video Security

Totally Wireless Video Security Traditional Video Surveillance ($50,000+) vs. Event-Based Videofied Solution ($2,500) Executive Summary: Totally Wireless Video Security has been effective but cost and complexity has limited deployment

More information

Benefits of Standardizing the Video Security System

Benefits of Standardizing the Video Security System SALIENT SYSTEMS WHITE PAPER Benefits of Standardizing the Video Security System Salient Systems Corp. 10801 N. MoPac Exp. Building 3, Suite 700 Austin, TX 78759 Phone: (512) 617-4800 For a variety of reasons

More information

City Surveillance and the Cloud

City Surveillance and the Cloud Keep Watch on Your Projects Through the Cloud, 24/7/365 Unlock the all the potential tools of a modern enterprise video surveillance system with a costeffective and elegantly simple cloud video surveillance

More information

Building Integration System (BIS)

Building Integration System (BIS) Building Integration System (BIS) The Bosch Building Integration System (BIS) is an open PC-based system that applies the best elements of security system technology with the advantages of the latest information

More information

Integrated security management platform for Windows. Seamless. Effective. Efficient.

Integrated security management platform for Windows. Seamless. Effective. Efficient. Integrated security management platform for Windows Seamless. Effective. Efficient. We have 70% security personnel turnover in a year. How can we effectively train them on multiple applications when each

More information

Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE

Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE The District and its colleges are committed to enhancing the quality of life of the community by integrating

More information

Honeywell Video Analytics

Honeywell Video Analytics INTELLIGENT VIDEO ANALYTICS Honeywell s suite of video analytics products enables enhanced security and surveillance solutions by automatically monitoring video for specific people, vehicles, objects and

More information

Increase data center uptime while decreasing costs. Why not have it all? Data Center Building Management Solutions

Increase data center uptime while decreasing costs. Why not have it all? Data Center Building Management Solutions Increase data center uptime while decreasing costs Why not have it all? Data Center Building Management Solutions Keep your data center and your customers from overheating Balance your ever-increasing

More information

Urban School District Centralizes Physical Security Systems

Urban School District Centralizes Physical Security Systems Customer Case Study Urban School District Centralizes Physical Security Systems Memphis City Schools implemented high-definition IP-based video surveillance cameras and physical access controls. EXECUTIVE

More information

VIDEO VERIFIED ALARMS INCREASED SECURITY AT AN AFFORDABLE PRICE

VIDEO VERIFIED ALARMS INCREASED SECURITY AT AN AFFORDABLE PRICE VIDEO VERIFIED ALARMS INCREASED SECURITY AT AN AFFORDABLE PRICE Executive Summary: This ebook will highlight the importance of security for your business. It discusses a new entrant in the security field

More information

White paper. Axis Video Analytics. Enhancing video surveillance efficiency

White paper. Axis Video Analytics. Enhancing video surveillance efficiency White paper Axis Video Analytics Enhancing video surveillance efficiency Table of contents 1. What is video analytics? 3 2. Why use video analytics? 3 2.1 Efficient use of manpower 3 2.2 Reduced network

More information

What s Best. for You? Protecting What s Important to You

What s Best. for You? Protecting What s Important to You c o m p r e h e n s i v e V i d e o s o l u t i o n s What s Best for You? Protecting What s Important to You 1Local Video Surveillance Stanley is a leading provider of local video surveillance systems.

More information

MAXPRO VMS VIDEO MANAGEMENT SYSTEM. Your One-Stop Platform for Security Integration

MAXPRO VMS VIDEO MANAGEMENT SYSTEM. Your One-Stop Platform for Security Integration MAXPRO VMS VIDEO MANAGEMENT SYSTEM Your One-Stop Platform for Security Integration Honeywell has incorporated our rich knowledge and trusted experience of security and surveillance systems into a powerful

More information

The evolution of data connectivity

The evolution of data connectivity Leveraging the Benefits of IP and the Cloud in the Security Sector The CCTV and alarm industry has relied on analogue or Integrated Services Digital Network (ISDN) communications to provide data connectivity

More information

AKCess Pro Server Management Software

AKCess Pro Server Management Software Management Software v.100.00x takes the best from IP Video Monitoring Software and is the first to combine it with Environmental / Security Sensor and Access Control equipment in one centralized management

More information

Remote Managed Services

Remote Managed Services Remote Managed Services A Model for Growth and Efficiency in Security IFSEC 2011 Honeywell at a Glance $38B Fortune 100 company with a 120-year legacy of innovation 120,000 employees in 100 countries World-class

More information

White paper. Video encoders - brings the benefits of IP surveillance to analog systems

White paper. Video encoders - brings the benefits of IP surveillance to analog systems White paper Video encoders - brings the benefits of IP surveillance to analog systems Table of contents 1. The easy path to network video 3 1.1 Technology shift 3 1.2 Gaining advanced and important functionalities

More information

Remote Monitoring offers a comprehensive range of services, which are continually

Remote Monitoring offers a comprehensive range of services, which are continually Remote Monitoring Since the early 1990 s commercial remote monitoring has provided security solutions across a broad spectrum of industries. As the threat of crime and the cost of manned guarding have

More information

NLSS Gateway Video Management Access Control Video Analytics Intrusion Remote Monitoring Cloud-Based Security

NLSS Gateway Video Management Access Control Video Analytics Intrusion Remote Monitoring Cloud-Based Security NLSS Gateway Access Control Analytics Intrusion Remote Monitoring Cloud-Based Security Introducing the NLSS Gateway The Integrated Solution The Next Generation of Security is here Access Control & Intrusion

More information

Improving the Effectiveness of Retail Video Surveillance

Improving the Effectiveness of Retail Video Surveillance Brochure Improving the Effectiveness of Retail Video Surveillance Cisco Video Surveillance for Retail solutions help you boost loss prevention effectiveness and much more. W ha t Y ou Will Lea rn Theft

More information

State-of-the-Art Headquarters Includes Centralized Physical Security

State-of-the-Art Headquarters Includes Centralized Physical Security Customer Case Study State-of-the-Art Headquarters Includes Centralized Physical Security EXECUTIVE SUMMARY Alexander Forbes Financial Services Johannesburg, South Africa Approximately 4,000 Employees BUSINESS

More information

VisioWave TM. Intelligent Video Platform (IVP) Smart Scalable Open. Optimized for high-performance, mission-critical digital video surveillance

VisioWave TM. Intelligent Video Platform (IVP) Smart Scalable Open. Optimized for high-performance, mission-critical digital video surveillance GE Security VisioWave TM Intelligent Video Platform (IVP) Optimized for high-performance, mission-critical digital video surveillance Smart Scalable Open Take a good look at VisioWave TM IVP You ll watch

More information

Increase data center uptime while decreasing costs. Why not have it all? DData Center Building Management Solutions

Increase data center uptime while decreasing costs. Why not have it all? DData Center Building Management Solutions Increase data center uptime while decreasing costs. Why not have it all? DData Center Building Management Solutions Keep your data center and your Your data center is a complex, dynamic environment that

More information

Security Technology. Virtual

Security Technology. Virtual Virtual Security Technology Complete Security Solutions for Communities Secure your Entire Community with an Envera Integrated System We were concerned residents would feel they weren t receiving the same

More information

Product Characteristics Page 2. Management & Administration Page 2. Real-Time Detections & Alerts Page 4. Video Search Page 6

Product Characteristics Page 2. Management & Administration Page 2. Real-Time Detections & Alerts Page 4. Video Search Page 6 Data Sheet savvi Version 5.3 savvi TM is a unified video analytics software solution that offers a wide variety of analytics functionalities through a single, easy to use platform that integrates with

More information

Introduction. Industry Changes

Introduction. Industry Changes Introduction The Electronic Safety and Security Design Reference Manual (ESSDRM) is designed to educate and inform professionals in the safety and security arena. The ESSDRM discusses trends and expertise

More information

ID Card Strategies for Private Schools

ID Card Strategies for Private Schools ID Card Strategies for Private Schools AB&R 3431 East Elwood Street Phoenix, Arizona 85040 800-281-3056 info@abr.com www.abr.com/education Many private schools around the country face the challenge of

More information

Security Center Unified Security Platform

Security Center Unified Security Platform Security Center Unified Security Platform License Plate Recognition Video Surveillance Access Control Innovative Solutions Simply Powerful. The Security Center is a unified security platform. It seamlessly

More information

Connect C CURE 9000 with dozens of applications for a holistic business-empowering, all inclusive solution

Connect C CURE 9000 with dozens of applications for a holistic business-empowering, all inclusive solution Connect C CURE 9000 with dozens of applications for a holistic business-empowering, all inclusive solution Chances are, you re not just responsible for making sure people get in and out of your facilities.

More information

Lessons in Wireless for K-12 Schools

Lessons in Wireless for K-12 Schools White Paper Education Lessons in Wireless for K-12 Schools Don Reckles Introduction The Growing Need for the Network Primary and secondary (K-12) educational institutions are increasingly turning to computer

More information

Security and Convenience A Paradox on Campus

Security and Convenience A Paradox on Campus Security and Convenience A Paradox on Campus by Ingersoll Rand Security Technologies Recent research shows the need for balance between safety, security and convenience on campuses The Background In May

More information

Data Storage for Video Surveillance

Data Storage for Video Surveillance Data Storage for Video Surveillance In the past, it was an expensive proposition to deploy a video camera. The camera itself was expensive, and it required a dedicated closed circuit television network

More information

Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments

Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments What You Will Learn In many enterprises, physical security departments are making a notable

More information

Commercial Security Made Simple with Cloud Video Surveillance

Commercial Security Made Simple with Cloud Video Surveillance Commercial Security Made Simple with Cloud Video Surveillance From the Fine Detail to the Big Picture See It All from Anywhere Keep Watch on Your Properties Through the Cloud, 24/7/365 Unlock the all the

More information

Building Integration System Selection Guide for V4.0

Building Integration System Selection Guide for V4.0 Building Integration System Selection Guide for V.0 Building Integration System Contents Contents System overview... Typical applications... Connection types and licensing basics... 6 Selection Guide

More information

Next Generation. Surveillance Solutions. Cware. The Advanced Video Management & NVR Platform

Next Generation. Surveillance Solutions. Cware. The Advanced Video Management & NVR Platform Next Generation Surveillance Solutions Cware The Advanced Video Management & NVR Platform Advanced Open Management Benefit from the most effective CCTV management platform Cware is an advanced video management

More information

Major Risks and Recommended Solutions

Major Risks and Recommended Solutions Major Risks and Recommended Solutions www.icdsecurity.com OVERVIEW Are you familiar with the main security risks that threaten data centers? This paper provides an overview of the most common and major

More information

Buildings Business. Chris Curtis President & CEO Buildings Business Schneider Electric. June 2009

Buildings Business. Chris Curtis President & CEO Buildings Business Schneider Electric. June 2009 Buildings Business Chris Curtis President & CEO Buildings Business Schneider Electric June 2009 We help the best buildings in the world get that way. Schneider Electric Buildings Business 2009 2 Agenda

More information

Tailored integration to suit you

Tailored integration to suit you UTC Fire & Security Integrated Systems Platforms Tailored integration to suit you We listened to you A majority of the Fortune 100 companies have chosen UTC Fire & Security for their integration needs.*

More information

GET THE ALARM.COM ADVANTAGE.

GET THE ALARM.COM ADVANTAGE. BETTER SECURITY REMOTE WEB CONTROL MOBILE APPS GET THE ALARM.COM ADVANTAGE. STAY SECURE. STAY CONNECTED. WIRELESS TECHNOLOGY VIDEO MONITORING INTERACTIVE SERVICES HOME AUTOMATION ENERGY MANAGEMENT Alarm.com

More information

The Cisco and Pelco Industrial Wireless Video Surveillance Solution: Real-Time Monitoring of Process Environments for Safety and Security

The Cisco and Pelco Industrial Wireless Video Surveillance Solution: Real-Time Monitoring of Process Environments for Safety and Security The Cisco and Pelco Industrial Wireless Video Surveillance Solution: Real-Time Monitoring of Process Environments for Safety and Security The Cisco and Pelco Industrial Wireless Video Surveillance Solution

More information

Enhanced Security Monitoring Primer For Water Quality Surveillance and Response Systems

Enhanced Security Monitoring Primer For Water Quality Surveillance and Response Systems United States Environmental Protection Agency Enhanced Security Monitoring Primer For Water Quality Surveillance and Response Systems Office of Water (M 140) EPA 817-B-15-002B May 2015 Introduction A Water

More information

A guide to access control for manufacturing sites

A guide to access control for manufacturing sites A guide to access control for manufacturing sites What is access control? Access control provides the ability to control, monitor and restrict the movement of people, assets or vehicles, in, out and round

More information

Deploying VSaaS and Hosted Solutions Using CompleteView

Deploying VSaaS and Hosted Solutions Using CompleteView SALIENT SYSTEMS WHITE PAPER Deploying VSaaS and Hosted Solutions Using CompleteView Understanding the benefits of CompleteView for hosted solutions and successful deployment architecture Salient Systems

More information

Hospitals Meet Security Challenges with Integrated Security and Facility Solutions

Hospitals Meet Security Challenges with Integrated Security and Facility Solutions Hospitals Meet Security Challenges with Integrated Security and Facility Solutions by Steve Nibbelink, CHPA January 2012 / White paper Make the most of your energy SM Summary Executive summary...3 Healthcare

More information

Axis IP surveillance. Endless possibilities for video surveillance.

Axis IP surveillance. Endless possibilities for video surveillance. Axis IP surveillance. Endless possibilities for video surveillance. The video surveillance market is growing constantly, driven by increased public and private security concerns, as well as a technology

More information

Stop Them. Jail. Put Them in. How to Guide. Scrap Theft Prevention & Conviction Kit

Stop Them. Jail. Put Them in. How to Guide. Scrap Theft Prevention & Conviction Kit Florida Recyclers Association Representing the Private Recycling Industry P.O. Box 1585, LAKELAND,FL 33802 Scrap Theft Prevention & Conviction Kit How to Guide Stop Them Put Them in Jail Paint Markings

More information

DPS APPROVED INSTALLER

DPS APPROVED INSTALLER COMPANY PROFILE About us ABOUT OUR COMPANY Transwall Technologies L.L.C was established in 2006 in Dubai, United Arab Emirates. Transwall Technologies L.L.C is a provider of high-level Security Systems,

More information

Remote Guarding. The traditional guarding functions that you depend on can now be performed remotely.

Remote Guarding. The traditional guarding functions that you depend on can now be performed remotely. Remote Guarding Remote Guarding The traditional guarding functions that you depend on can now be performed remotely. When you have Remote Guarding managed by Securitas USA, we act on incidents in real-time

More information

Appropriate response: A guide to security system integration, monitoring and verification

Appropriate response: A guide to security system integration, monitoring and verification Appropriate response: A guide to security system integration, monitoring and verification The benefits of integrating intruder, fire, access control and audio systems with CCTV for verification of alarm

More information

Education Security Solutions YOUR PARTNER OF CHOICE. Challenging Times Call For Uncompromising Solutions

Education Security Solutions YOUR PARTNER OF CHOICE. Challenging Times Call For Uncompromising Solutions Education Security Solutions YOUR PARTNER OF CHOICE Challenging Times Call For Uncompromising Solutions From small schools to multi-campus universities, providing a safe, secure learning environment within

More information

Solution Overview. Smarter Video Surveillance with NETGEAR

Solution Overview. Smarter Video Surveillance with NETGEAR Smarter Video Surveillance with NETGEAR A b s t r a c t a n d A u d i e n c e NETGEAR Solution Overviews provide high-level solutions to common business IT challenges for end users, Value-Added Resellers

More information

Access CONTROL. MANAGEMENT Software

Access CONTROL. MANAGEMENT Software Software Guide Access CONTROL MANAGEMENT Software 21 Personnel Fields Users are provided twenty one fields to record various personnel data such as first name, last name, department, parking spot, and

More information

How To Protect Video From Being Lost In A Fault Fault On A Network With A Shadow Archive

How To Protect Video From Being Lost In A Fault Fault On A Network With A Shadow Archive A MARCH NETWORKS WHITE PAPER Shadow Archiving in Video Surveillance Systems Fail Safe Recording Options for IP Edge Devices Table of Contents Executive Summary...2 Introduction...2 Background...2 DVR

More information

Integrated Building Management and Security System. Building Automation & Security. www.coba-group.com

Integrated Building Management and Security System. Building Automation & Security. www.coba-group.com Integrated Building Management and Security System Building Automation & Security www.coba-group.com INTEGRATED BUILDING MANAGEMENT AND SECURITY SYSTEM INDEX 1 GENERAL... 3 1.1 SYSTEM INTEGRATION... 3

More information

View. Select View Managed Video Services ADT

View. Select View Managed Video Services ADT monitoring Access Control Video Surveillance Intrusion Detection Fire & life safety Commercial Solutions ADT SM Select View Managed Video Services Leverage your existing investment in video surveillance

More information

CCTV on IP Network. How Cisco IT Deploys Closed- Circuit TV Cameras over the Secure IP Network. A Cisco on Cisco Case Study: Inside Cisco IT

CCTV on IP Network. How Cisco IT Deploys Closed- Circuit TV Cameras over the Secure IP Network. A Cisco on Cisco Case Study: Inside Cisco IT CCTV on IP Network How Cisco IT Deploys Closed- Circuit TV Cameras over the Secure IP Network A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge Security transitioned from analog closed-circuit

More information

P2000 AND P2000LE SECURITY MANAGEMENT SYSTEM. Interactive, real time security management

P2000 AND P2000LE SECURITY MANAGEMENT SYSTEM. Interactive, real time security management P2000 AND P2000LE SECURITY MANAGEMENT SYSTEM Interactive, real time security management P2000 Security Management System Fully scalable, intuitive and easy to use. The Johnson Controls P2000 security management

More information

Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System

Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System To provide more flexibility and scalability for comprehensive security systems, more components are becoming IP enabled.

More information

Integrated Identity Management Whitepaper

Integrated Identity Management Whitepaper Integrated Identity Management Whitepaper Tom Stiles, Identification Systems Group 9600 N. Locust Drive Kansas City, MO 64155 Phone: 816.582.1596 tstiles@identificationssystemsgroup.com Contents 1. Introduction......

More information

URBAN. Security Solution. Urban Security Solution Military Security Solution SOC Security Solution

URBAN. Security Solution. Urban Security Solution Military Security Solution SOC Security Solution URBAN Security Solution Urban Security Solution Military Security Solution SOC Security Solution Samsung Security Solution Peace of mind at all times with Samsung Techwin's innovative security solutions...

More information

Motorola AirDefense Network Assurance Solution. Improve WLAN reliability and reduce management cost

Motorola AirDefense Network Assurance Solution. Improve WLAN reliability and reduce management cost Motorola AirDefense Network Assurance Solution Improve WLAN reliability and reduce management cost The challenge: Ensuring wireless network performance and availability Wireless LANs help organizations

More information

Security Management System

Security Management System Security Management System Schlage Security Management System High Security Enables you to maximize the effectiveness of multiple security applications in one powerful system Allows transactions, associated

More information

Complete IP Video Security Solutions

Complete IP Video Security Solutions Complete IP Video Security Solutions www.indigovision.com About Us First security project World s first NVR The IndigoVision Network Video Recorder (NVR) is introduced to the Security Market. World s first

More information

Policing requirements for Closed Circuit Television

Policing requirements for Closed Circuit Television Policing requirements for Closed Circuit Television 1 Policing requirements for Closed Circuit Television Policing requirements for Closed Circuit Television 2 Closed circuit television (CCTV) systems

More information