Introduction. Industry Changes

Size: px
Start display at page:

Download "Introduction. Industry Changes"

Transcription

1 Introduction The Electronic Safety and Security Design Reference Manual (ESSDRM) is designed to educate and inform professionals in the safety and security arena. The ESSDRM discusses trends and expertise in security areas that apply to information transport systems (ITS) and the integration of safety and security systems. IMPORTANT: Industry Changes The ESSDRM is not intended to be a stand-alone manual; therefore, the construction of a comprehensive safety and security design requires reference to additional bodies of knowledge. The security industry has standards, practices, and organizations dedicated to defining and refining those practices. Prior to the ESSDRM, there has been no common publication providing information on design and implementation for electronic safety and security (ESS) systems. This manual provides information from both the security and ITS industries so that professionals in both industries will have a common understanding of each other s roles in designing and implementing ESS systems. Security systems were viewed as an option to most architectural projects, and with the specialized cabling and equipment required for installation, not many changes were made to the products offered within the industry. That changed in 1996 when the first Internet protocol (IP) camera was introduced to the industry. The excitement of being able to use standard network cabling and infrastructure was tempered with other complex issues. Not only did cameras tend to have extremely high bandwidths, but a user had to consider what to do with the analog systems they had already implemented. As late as 2002, speculation was that hybrid systems would remain very popular over the use of straight IP systems. Against all speculation, the IP camera market exploded. Vendors and users alike began to consider the integration and implementation of entire security and safety systems on a network platform. This discipline has grown from the early human guarding of objects to sophisticated surveillance cameras and building automation systems (BASs). Each began as a stand-alone system, but the rise of networks and ITS has lead to an increased need to converge multiple systems. As technology is developing at a rapid pace, its influence in the relatively stable world of security is on-going and ever changing. Advancements in common infrastructure have enabled manufacturers to create systems based on similar network protocols, allowing different systems to communicate with one another. The simple beginnings, exemplified by the employment of guards and patrols, have progressed to complex advancements in surveillance that have enabled the addition of intelligence to electronic security systems and BASs. The cost benefits can be seen with lower cabling costs; easy modifications for moves, adds, or changes (MACs); unified integration with other IT environments; elimination of specialized equipment; and space saving by using standard servers and storage devices instead of videocassette recorder (VCR) tapes and recorders. Although the concept of converged systems is gaining momentum, many systems still function using proprietary hardware and software components BICSI 1-1 ESS Design Reference Manual, 2nd edition

2 Electronic Safety and Security (ESS) Bodies of Knowledge The ESS designer should have knowledge of: ITS fundamentals. Principles of security. Design process. Preliminary security design. Architecture and engineering (A&E) design. IP design. Security systems. Access control systems (ACSs). Surveillance systems. Intrusion detection. Fire alarm. Special systems. Network security. Systems integration. Project management. Systems operation and commissioning. Other chapters in this manual are devoted to areas and practices that influence the design of a security system. These chapters address: Security consulting. Design practices. Codes, standards, regulations, and organizations. Legal issues. The design process of the Construction Specifications Institute (CSI) and the American Institute of Architects (AIA). With the expansion of security and special systems, nontraditional bodies of knowledge that can now be included in the responsibilities of the ESS designer include: Voice and notification. Nurse call. Mustering. Radio frequency identification (RFID) inventory management. ESS Design Reference Manual, 2nd edition BICSI

3 Physical Security Physical security describes measures that deter, detect, delay, mitigate, or notify any attempt to injure, damage, modify, or remove an asset or person. This includes damage by accident, fire, environmental elements, crime, vandalism, and industrial espionage. Physical security can be a simple device or as elaborate as multiple layers of electronic measures. Depending on the situation, consulting with architects, engineers, and hardware designers may be necessary for physical security consideration. This manual will describe in detail situations and hardware types for general building applications falling under conventional codes. In some special situations (e.g., military, correctional facilities, hospitals), codes commonly used for commercial buildings may not apply BICSI 1-3 ESS Design Reference Manual, 2nd edition

4 Electronic Safety and Security (ESS) Design Fundamentals The ability to use and integrate the various practices, methodologies, and devices constitutes the practice of safety and security design. Many elements of design are unique to the protection of life and property, and others are multidisciplinary. The ESS designer must have a firm grasp of the fundamentals and be able to incorporate aspects of the trades brought into the ESS design by other professionals. Depending on the expertise or knowledge of the ESS designer, additional support may not be necessary. These fundamentals will be discussed in detail throughout this manual. The physical and electronic security and safety must work as a comprehensive package. The ESS designer must understand how they influence each other to have a successful project. Access Control Access control is important for overall personal safety and the protection of physical and intellectual property. Access control devices can include entry point locks, integrated electronic devices controlling a single door or room, or a complex system of interconnected electronic devices controlling a zone, building, or campus. ESS designs can be affected by each individual s location and the level of security desired. Intrusion Detection Intrusion detection is often viewed as part of the ACS because most door controls for access control can alarm when the door is left open or opened without a valid card read. However, it is a stand-alone system that must be evaluated to its own standards and levels of due diligence. These systems use everything from simple switches to complex devices that detect motion, heat, glass breaking, or other nonstandard occurrences in the area to detect the presence of persons in secure zones. Intrusion detection systems (IDSs) can generate simple local or paging alarms or can be integrated with other systems to provide more active responses (e.g., turning on cameras or lighting). Surveillance Video surveillance is a widely used technology within ESS systems. Video surveillance involves the use of cameras for watching or controlling assets. It is the process of image: Capturing. Transmitting. Processing. Viewing. Recording. This technology requires knowledge of cameras and their placement, as well as knowledge of image transmission and recording principles. ESS Design Reference Manual, 2nd edition BICSI

5 Fire Detection and Alarm Fire detection and alarm involves the early detection and notification of life safety threats. Fire detection and alarm requires that the ESS designer have a thorough knowledge of specific codes, statutes, and the requirements of the applicable authority having jurisdiction (AHJ). Integrated Systems Integrated systems cover concepts, systems, and processes related to the convergence of ESS systems or their integration with other building systems. Through integration, ESS systems begin to interact with other building systems. Integrated ESS systems are deployed in a wide variety of environments, including facilities, campuses, vehicles, and persons. Special Systems With the convergence of systems to the network, the addition of specialty systems such as nurse call, RFID tracking, intercom, and mustering will sometimes fall under the responsibilities of the ESS designer. Network Security As more systems migrate to the network, the issues of protecting those systems must be addressed. Isolation can provide protection but at the cost of remote access. Remote access to a network allows the possibility of outside interference and harm. Firewalls, encryption, virtual private networks (VPNs), and other methods of protection are available. Types of Projects An ESS project may be a new construction or a retrofit for an existing facility. Types of designs facing the ESS designer may include: Original design. Retrofit of an existing plan. Upgrade or replacement of an existing system. To successfully complete a project, the ESS designer must be able to interact with building owners, tenants, architects, engineers, and security professionals. The ESS designer also may need to consult end users and other stakeholders BICSI 1-5 ESS Design Reference Manual, 2nd edition

6 Current and Future Trends in Safety and Security Several areas in safety and security design are affected by rapid growth in technology, including: Information technology (IT). Physical security. Integration of access control and BAS. Surveillance. Information Technology (IT) Most of the systems today have migrated to the use of the network for communication protocol between the servers and control panels. Some are hybrid systems where there are limited gateways to the network and the devices communicate through older protocols for the subsystem communication. The ESS designer must understand the system communication methods, the required infrastructure particular to the specific system installed, and how network outages will impact system functionality. The ESS designer must understand the impact of the project on the client s IT networks. The impact may be financial, operational, and physical (e.g., switch ports, bandwidth, cabling). The ESS designer also must have a reasonable understanding of network terminology, architecture, and function. Coordination with the client s IT department is important for ensuring the success of any safety or security project that has an impact on the IT network. Integration of Access Control and Building Automation Systems (BASs) The client often will require multiple levels of access within a space, and personnel may require access to a number of different areas, rooms, or spaces. The access levels may change over time and may impact or be impacted by other building systems. When an ACS is integrated with one or more BASs, the design goals require a more holistic approach. Observing the client s space and surrounding areas has always been a major aspect of access control as part of the security system. Understanding how the electronic access control (EAC) system integrates with BASs and subsystems in the surrounding areas is becoming a major factor in the design of EACs. Surveillance Surveillance systems record activities in the client s targeted areas for local or remote review. Modern camera systems may be: Digital. Analog. Digital/analog hybrids. IP cameras. Many factors will affect the selection, including court admissibility, network impact, and available space within buildings to house equipment. ESS Design Reference Manual, 2nd edition BICSI

7 Today s Technology and Convergence Technology s growing impact on security has led to the convergence of many systems. Convergence can encompass a range of capabilities, from limited monitoring to full command and control functions across a common IP-based network. Some of the most common types of convergence are the interconnection of: Multiple systems within a single site. Single systems across multiple sites. Multiple systems across multiple sites. This shift in implementation is driving a change in both the security industry and the communications industry. Professionals in both industries have to learn more concerning each industry. Security professionals can no longer be successful without understanding the cabling infrastructure required for an installation, and cabling infrastructure professionals are asked to perform more security and safety related tasks BICSI 1-7 ESS Design Reference Manual, 2nd edition

8 Manual Overview This second edition of the ESSDRM comprises 13 chapters and two appendixes that contain information intended to assist both security specialists and IT professionals in understanding the systems and the convergence that is occurring between the industries. Following is a brief description of what the reader can expect to find in each chapter of this manual. Chapter 2: Principles of Security Chapter 2 discusses security planning and applications as they pertain to the integration of a system of deterrence and detection by electronic means, including: Basics of security theory. Fundamentals of security design. Roles of practitioners involved in electronic security systems. Skills and experience required for each role. Chapter 3: Electronic Safety and Security Design Process There are many considerations for the ESS design process so Chapter 3 is divided into three sections: Preliminary design guidelines Architecture and engineering design process IP design principles. Section 1: Preliminary Design Guidelines This section provides guidance to the ESS designer to adequately address the information from the client as prepared by a consultant, including: Threat vulnerability analysis. Client interview. Facility location analysis. Section 2: Architecture and Engineering Design Process The second section introduces the architecture and design process by discussing the various types of contractual relationships and the following design processes: Schematic design Design development Construction documentation Construction administration Additionally, the roles of team members and interaction between those individuals during the various design processes are explored. ESS Design Reference Manual, 2nd edition BICSI

9 Chapter 3: Electronic Safety and Security Design Process, continued Section 3: Internet Protocol Design Principles The third section provides an introduction to the design principles for IP-based ESS systems. It includes a brief overview of the IP network-based security world, followed by a general introduction to network architecture and the considerations necessary for the planning, design, and implementation of state-of-the-art systems. Chapter 4: Access Control Chapter 4 explores the purpose and application of ACSs. The various types of systems are discussed, with an in-depth review of the hardware and software requirements. RFID and IP integration are included in this chapter. Chapter 5: Surveillance Systems Chapter 5 provides an overview of video surveillance fundamentals and explains formal risk assessment and security master programs. Designing with a perspective-oriented approach is discussed. The progression from analog to hybrid analog/digital to digital also is explained. Chapter 6: Intrusion Detection Systems Electronic intrusion detection is designed to allow a timely response or deterrent to security breaches that may adversely affect people and property. Chapter 6 explores the basics of design and provides examples of the application of various types of sensors to provide intrusion detection. Chapter 7: Fire Detection and Alarm Systems Chapter 7 provides an overview of the complex subject of fire detection and alarm systems, including: Classes of fire alarm and detection systems. Components that initiate a fire alarm condition. Detectors and systems currently available. Fire suppression systems and their related initiation devices. Notification appliances. Chapter 8: Notification, Communication, and Display Devices Notification and display devices provide a means of communicating a message through the use of voice and video devices or with the combination of both. Chapter 8 discusses: Audio communications. Emergency telephones. Public address and paging. Display devices BICSI 1-9 ESS Design Reference Manual, 2nd edition

10 Chapter 9: Special Systems Chapter 9 explains the design and application of various specialty systems. It provides a designer with the fundamental tools necessary to properly design some of the more basic systems as well as a level of knowledge necessary to work in cooperation with the specific system providers. Some of the systems discussed include: Nurse call. RFID. At-risk human perimeter systems. Asset management systems. Chapter 10: Network Security Chapter 10 focuses on a broad overview of threats and countermeasures for network security as it relates to IP-based ESS system design. Risks and control measures are explained and discussed. Chapter 11: Systems Integration Chapter 11 discusses the concepts, systems, and processes related to the integration of ESS, including: ESS systems. Command and control. Data networks. Building automation. Fire-life-safety (FLS). Energy/lighting management. Chapter 12: Project Management Chapter 12 contains an overview of the key elements, roles, and processes associated with the project management of an ESS project. The ESS project manager must understand the fundamentals of project management as well as the unique process and technology involved in ESS. Chapter 13: Systems Operation and Commissioning Chapter 13 provides designers, security contractors, and end users with a framework to develop standardized policies and procedures. ESS Design Reference Manual, 2nd edition BICSI

11 Appendix A: Codes, Standards, and Regulations Appendix A provides an overview of the regulations, codes, and standards that the ESS designer must work with, including: Telecommunications. Building and construction. Electrical. Fire protection. Life safety. Security. Appendix B: Legal Aspects of Electronic Safety and Security Design Appendix B examines some of the legal issues relevant to the finding or avoidance of liability BICSI 1-11 ESS Design Reference Manual, 2nd edition

Chapter 1 Introduction

Chapter 1 Introduction Chapter 1 Introduction Chapter 1 provides background information on electronic safety and secuirty (ESS), including the definition and areas of knowledge required for an ESS designer. Information contained

More information

Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments

Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments What You Will Learn In many enterprises, physical security departments are making a notable

More information

Communication Infrastructure Convergence & The need of IS Audit Compliance. Ninad M. Desai

Communication Infrastructure Convergence & The need of IS Audit Compliance. Ninad M. Desai Communication Infrastructure Convergence & The need of IS Audit Compliance. Ninad M. Desai RCDD CISA CFOT Consulting Specialist Communication Cabling. Auditor Information Systems & Technology. Convergence

More information

Cyber Threats in Physical Security Understanding and Mitigating the Risk

Cyber Threats in Physical Security Understanding and Mitigating the Risk Cyber Threats in Physical Security Understanding and Mitigating the Risk Synopsis Over the last few years, many industrial control systems, including security solutions, have adopted digital technology.

More information

Conducting Security System Site Surveys

Conducting Security System Site Surveys Conducting Security System Site Surveys Written By: Harold C. Gillens, PSP, CFC, CHS-III Quintech Security Consultants, Inc. 102 Sangaree Park Court Suite 4 Summerville, SC 29483 CONDUCTING SECURITY SYSTEM

More information

Security Issues with Integrated Smart Buildings

Security Issues with Integrated Smart Buildings Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

Recommended IP Telephony Architecture

Recommended IP Telephony Architecture Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings

More information

Cyber Security through Education & Awareness. KSU Police Converged Security: A holistic approach to cyber safety and security. Community Policing

Cyber Security through Education & Awareness. KSU Police Converged Security: A holistic approach to cyber safety and security. Community Policing KSU Police Converged Security: A holistic approach to cyber safety and security Cyber Security through Education & Awareness by Community Policing Community Policing Community Policing Initial meeting

More information

The Cisco and Pelco Industrial Wireless Video Surveillance Solution: Real-Time Monitoring of Process Environments for Safety and Security

The Cisco and Pelco Industrial Wireless Video Surveillance Solution: Real-Time Monitoring of Process Environments for Safety and Security The Cisco and Pelco Industrial Wireless Video Surveillance Solution: Real-Time Monitoring of Process Environments for Safety and Security The Cisco and Pelco Industrial Wireless Video Surveillance Solution

More information

Business Owner s. Security Buyers. Guide. Everything you need to know before purchasing a security system. Safer. Smarter. Tyco.

Business Owner s. Security Buyers. Guide. Everything you need to know before purchasing a security system. Safer. Smarter. Tyco. Business Owner s Security Buyers Guide Everything you need to know before purchasing a security system Business Owners Security Buyer s Guide You re a business owner. That means you wear a lot of hats

More information

CDW Advanced Image Deployment Service Customer Guide

CDW Advanced Image Deployment Service Customer Guide CDW Advanced Image Deployment Service Customer Guide Contents Service Description... 2 Image Deployment Solutions... 2 Why would my organization use this service?... 2 Benefits of Advanced Imaging over

More information

UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM 800.820.5855 1

UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM 800.820.5855 1 UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM 800.820.5855 1 As organizations unlock the true potential of meeting over the web as an alternative to costly and timeconsuming travel,

More information

Middleborough Police Electronic Security Narrative

Middleborough Police Electronic Security Narrative Middleborough Police Electronic Security Narrative 1. PURPOSE The purpose of this document is to define specific security, access control and surveillance requirements for the exterior and interior of

More information

Network & Information Security Policy

Network & Information Security Policy Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk

More information

Frankfurt Data Centre Overview

Frankfurt Data Centre Overview Technical Services Briefing Document Frankfurt Data Centre Overview Version 2.1 Contents Introduction... 3 TelecityGroup Data Centre in Frankfurt... 4 Data Centre Characteristics... 4 Technologies in Use

More information

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1 Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3

More information

Products. Technology. Services. Delivered Globally. SECURITY SOLUTIONS

Products. Technology. Services. Delivered Globally. SECURITY SOLUTIONS Products. Technology. Services. Delivered Globally. SECURITY SOLUTIONS THE ANIXTER DIFFERENCE Anixter s network of highly trained security specialists is ready to help you make informed decisions about

More information

How Cisco IT Controls Building Security over the Enterprise WAN

How Cisco IT Controls Building Security over the Enterprise WAN How Cisco IT Controls Building Security over the Enterprise WAN Centrally managed IP-based building security system saves costs and improves safety and responsiveness. Cisco IT Case Study / Security and

More information

Experts in Life Safety and Security Systems since 1977

Experts in Life Safety and Security Systems since 1977 Experts in Life Safety and Security Systems since 1977 Bass-United. Your Go-To Team For Life Safety and Security Solutions. Bass-United began in 1977 with one man and his passion for life safety and technology.

More information

Identifying the Future. Physical Security Information Management (PSIM) The Transformation of Gaming Security and Surveillance

Identifying the Future. Physical Security Information Management (PSIM) The Transformation of Gaming Security and Surveillance Identifying the Future Physical Security Information Management (PSIM) The Transformation of Gaming Security and Surveillance April 20 th, 2011 The application of advanced technologies over the past decade

More information

Secure Ports Solutions

Secure Ports Solutions Solutions Grupo Revenga is a leading provider of telecommunications and information technology solutions, electronic security and energy efficiency. The company offers comprehensive end-to-end solutions

More information

How To Create An Intelligent Infrastructure Solution

How To Create An Intelligent Infrastructure Solution SYSTIMAX Solutions Intelligent Infrastructure & Security Using an Internet Protocol Architecture for Security Applications White Paper July 2009 www.commscope.com Contents I. Intelligent Building Infrastructure

More information

BroadData Unified Meeting Security Whitepaper v4.2

BroadData Unified Meeting Security Whitepaper v4.2 BroadData Unified Meeting Security Whitepaper v4.2 Introduction As organizations unlock the true potential of meeting over the Web as an alternative to costly and time-consuming travel, they do so in the

More information

honeywell building solutions INNOVATIVE TECHNOLOGY ACHIEVING MEASURABLE RESULTS Intelligent healthcare Management

honeywell building solutions INNOVATIVE TECHNOLOGY ACHIEVING MEASURABLE RESULTS Intelligent healthcare Management honeywell building solutions INNOVATIVE TECHNOLOGY ACHIEVING MEASURABLE RESULTS Intelligent healthcare Management As an industry leader and single source expert, Honeywell can deliver fully integrated

More information

ABOUT ANIXTER UNIVERSITY

ABOUT ANIXTER UNIVERSITY Q3 2015 ABOUT ANIXTER UNIVERSITY Anixter University TM is the educational initiative of Anixter, a leading global supplier of communications and security products, electrical and electronic wire and cable,

More information

Vindicator Security Solutions. Security for Mission-Critical Applications

Vindicator Security Solutions. Security for Mission-Critical Applications Vindicator Security Solutions Security for Mission-Critical Applications About Vindicator Security Solutions Photo courtesy of U.S. Department of Defense. Military, Federal and State Governments Ports

More information

Products. Technology. Services. Delivered Globally. ANIXTER IPASSURED SM FOR SECURITY APPLICATIONS

Products. Technology. Services. Delivered Globally. ANIXTER IPASSURED SM FOR SECURITY APPLICATIONS Products. Technology. Services. Delivered Globally. ANIXTER IPASSURED SM FOR SECURITY APPLICATIONS Anixter is a leading global supplier of communications and security products, electrical and electronic

More information

Cisco Incident Response and Workforce Enablement for the Utility

Cisco Incident Response and Workforce Enablement for the Utility Cisco Incident Response and Workforce Enablement for the Utility Over the next ten years, it is predicted that aging energy infrastructure and utility industry workforce will undergo their greatest transition

More information

How to Integrate NERC s Requirements in an Ongoing Automation and Integration Project Framework

How to Integrate NERC s Requirements in an Ongoing Automation and Integration Project Framework How to Integrate NERC s Requirements in an Ongoing Automation and Integration Project Framework Jacques Benoit, Cooper Power Systems Inc., Energy Automations Solutions - Cybectec Robert O Reilly, Cooper

More information

Smile Security and Surveillance Pvt. Ltd. (SSSPL) Brings to you

Smile Security and Surveillance Pvt. Ltd. (SSSPL) Brings to you Smile Security and Surveillance Pvt. Ltd. (SSSPL) Brings to you Building Management System Total Security & Surveillance Solutions for Building Complexes Intelligent Building Management System Solution

More information

CCTV on IP Network. How Cisco IT Deploys Closed- Circuit TV Cameras over the Secure IP Network. A Cisco on Cisco Case Study: Inside Cisco IT

CCTV on IP Network. How Cisco IT Deploys Closed- Circuit TV Cameras over the Secure IP Network. A Cisco on Cisco Case Study: Inside Cisco IT CCTV on IP Network How Cisco IT Deploys Closed- Circuit TV Cameras over the Secure IP Network A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge Security transitioned from analog closed-circuit

More information

Managed Security Services for Data

Managed Security Services for Data A v a y a G l o b a l S e r v i c e s Managed Security Services for Data P r o a c t i v e l y M a n a g i n g Y o u r N e t w o r k S e c u r i t y 2 4 x 7 x 3 6 5 IP Telephony Contact Centers Unified

More information

Cisco Advanced Services for Network Security

Cisco Advanced Services for Network Security Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs

More information

OCCUPATIONAL GROUP: Information Technology. CLASS FAMILY: Systems and Infrastructure CLASS FAMILY DESCRIPTION:

OCCUPATIONAL GROUP: Information Technology. CLASS FAMILY: Systems and Infrastructure CLASS FAMILY DESCRIPTION: OCCUPATIONAL GROUP: Information Technology CLASS FAMILY: Systems and Infrastructure CLASS FAMILY DESCRIPTION: This family includes those positions that provide networking services involving the planning,

More information

Insert Client Name Request for Proposal for Security Risk Assessment Services Consulting

Insert Client Name Request for Proposal for Security Risk Assessment Services Consulting Insert Client Name Request for Proposal for Security Risk Assessment Services Consulting Release Date: Closing Date: SUBMIT THE PROPOSAL TO: Insert Name Insert Title Insert Email or Physical Address Table

More information

Training Courses 2015 What our delegates say about ADI training courses

Training Courses 2015 What our delegates say about ADI training courses Training Courses 2015 What our delegates say about ADI training courses Very informative and clearly delivered. Good practical exercises, very knowledgeable tutor. It has given me the knowledge and confidence

More information

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific documents requested,

More information

Security Center Unified Security Platform

Security Center Unified Security Platform Security Center Unified Security Platform License Plate Recognition Video Surveillance Access Control Innovative Solutions Simply Powerful. The Security Center is a unified security platform. It seamlessly

More information

IMS [Integrated Management System] Surveillance Solution Segment Focus: Gaming Industry

IMS [Integrated Management System] Surveillance Solution Segment Focus: Gaming Industry IMS [Integrated Management System] Surveillance Solution Segment Focus: Gaming Industry Needs analysis Reduce disputes over payouts Eliminate theft Detect misconduct and record it for use as evidence in

More information

Server Room, Data Centre Management and Monitoring Solutions

Server Room, Data Centre Management and Monitoring Solutions Server Room, Data Centre Management and Monitoring Solutions Published in October 2007 Management & Monitoring Solutions The ability to alert a business to disasters or potential performance issues at

More information

Physical Security Reliability Standard Implementation

Physical Security Reliability Standard Implementation Physical Security Reliability Standard Implementation Tobias Whitney, Manager of CIP Compliance (NERC) Carl Herron, Physical Security Leader (NERC) NERC Sub-Committee Meeting New Orleans, Louisiana CIP-014

More information

Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System

Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System To provide more flexibility and scalability for comprehensive security systems, more components are becoming IP enabled.

More information

Integrated Physical Security and Incident Management

Integrated Physical Security and Incident Management IT Enterprise Services Integrated Physical Security and Incident Management Every organisation needs to be confident about its physical security and its ability to respond to unexpected incidents. Protecting

More information

IP Surveillance. Presentation for BICSI Regional Conference Troy, Michigan March 15, 2011. Tom Jones, PE, RCDD / NTS Field Sales Engineer, D-Link

IP Surveillance. Presentation for BICSI Regional Conference Troy, Michigan March 15, 2011. Tom Jones, PE, RCDD / NTS Field Sales Engineer, D-Link IP Surveillance Presentation for BICSI Regional Conference Troy, Michigan March 15, 2011 Tom Jones, PE, RCDD / NTS Field Sales Engineer, D-Link Agenda Analog or IP Security Cameras VGA or Megapixel Resolution

More information

Information Security Network Connectivity Process

Information Security Network Connectivity Process Information Security Network Connectivity Process Handbook AS-805-D September 2009 Transmittal Letter A. Purpose It is more important than ever that each of us be aware of the latest policies, regulations,

More information

White Paper: Nurse Call Systems and IT Networks

White Paper: Nurse Call Systems and IT Networks Intelligent Life Care White Paper: Nurse Call Systems and IT Networks Creating Synergies through Integrated System Landscapes The saving potential of a common infrastructure is quite obvious: Standard

More information

Products. Technology. Services. Delivered Globally. PROTECTING CRITICAL INFRASTRUCTURE SOLUTION

Products. Technology. Services. Delivered Globally. PROTECTING CRITICAL INFRASTRUCTURE SOLUTION Products. Technology. Services. Delivered Globally. PROTECTING CRITICAL INFRASTRUCTURE SOLUTION THE ANIXTER DIFFERENCE Organizations responsible for building and maintaining critical infrastructures face

More information

Major Risks and Recommended Solutions

Major Risks and Recommended Solutions Major Risks and Recommended Solutions www.icdsecurity.com OVERVIEW Are you familiar with the main security risks that threaten data centers? This paper provides an overview of the most common and major

More information

Tk20 Network Infrastructure

Tk20 Network Infrastructure Tk20 Network Infrastructure Tk20 Network Infrastructure Table of Contents Overview... 4 Physical Layout... 4 Air Conditioning:... 4 Backup Power:... 4 Personnel Security:... 4 Fire Prevention and Suppression:...

More information

I N T E LLIGENCE WATC H. Ireland s only 24/7/365 CCTV intruder monitoring services with dedicated back up facilities

I N T E LLIGENCE WATC H. Ireland s only 24/7/365 CCTV intruder monitoring services with dedicated back up facilities I N T E LLIGENCE WATC H Ireland s only 24/7/365 CCTV intruder monitoring services with dedicated back up facilities WELCOME TO I-WATCH i-watch (Intelligence Watch) provides monitoring services for residential

More information

Empowering the Enterprise Through Unified Communications & Managed Services Solutions

Empowering the Enterprise Through Unified Communications & Managed Services Solutions Continuant Managed Services Empowering the Enterprise Through Unified Communications & Managed Services Solutions Making the transition from a legacy system to a Unified Communications environment can

More information

SECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES

SECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES SECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES by the American Chemical Society, Committee on Chemical Safety, Safe Practices Subcommittee Introduction Terrorism

More information

BANKING AND FINANCE. Advanced technology solutions to maximize the security of financial institutions and branch banks.

BANKING AND FINANCE. Advanced technology solutions to maximize the security of financial institutions and branch banks. BANKING AND FINANCE Advanced technology solutions to maximize the security of financial institutions and branch banks. advisory services. technology delivery. SmartSourcing SM managed services. www.sdisolutions.com

More information

ASSEMBLY, No. 1750 STATE OF NEW JERSEY. 215th LEGISLATURE PRE-FILED FOR INTRODUCTION IN THE 2012 SESSION

ASSEMBLY, No. 1750 STATE OF NEW JERSEY. 215th LEGISLATURE PRE-FILED FOR INTRODUCTION IN THE 2012 SESSION ASSEMBLY, No. 0 STATE OF NEW JERSEY th LEGISLATURE PRE-FILED FOR INTRODUCTION IN THE 0 SESSION Sponsored by: Assemblyman VINCENT PRIETO District (Bergen and Hudson) Assemblyman CHARLES MAINOR District

More information

Healthcare Security Solutions. Building Technologies

Healthcare Security Solutions. Building Technologies Healthcare Security Solutions Building Technologies s Meeting the Challenge More than ever before, security is one of healthcare s fundamental infrastructure needs. The security requirements of a hospital,

More information

Site Security Standards and Strategy

Site Security Standards and Strategy Site Security Standards and Strategy I. Background and Overview A. The City s Program Standards and Procedures (PSP) are intended to be used in conjunction with the data contained in related standards

More information

What Is a Smart Building? p. 1 Brief History p. 1 What Is a Smart Building? p. 3 The Foundations of a Smart Building p. 7 Overview p.

What Is a Smart Building? p. 1 Brief History p. 1 What Is a Smart Building? p. 3 The Foundations of a Smart Building p. 7 Overview p. Preface p. xiii What Is a Smart Building? p. 1 Brief History p. 1 What Is a Smart Building? p. 3 The Foundations of a Smart Building p. 7 Overview p. 7 The Framework for Referencing Integration p. 8 Physical

More information

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323

More information

Communications Management within Your Security Platform

Communications Management within Your Security Platform WHITE PAPER Communications Management within Your Security Platform Innovative Solutions Executive Summary In the physical security and public safety industry, communications management systems, such as

More information

Information Technology Cluster

Information Technology Cluster Network Systems Pathway Information Technology Cluster Assistant Network Technician -- This major prepares students to install, configure, operate, and connections to remote sites in a wide area network

More information

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample

More information

presentation Our customers & Partners AE40 www.ae40.com +972-9-743-8410

presentation Our customers & Partners AE40 www.ae40.com +972-9-743-8410 AE40 presentation AE40 Our customers & Partners AE40 profile AE40 founded at 2002 Privately held company VoIP and Video over IP based communication solutions(radio, intercom, public announcements, telephony,

More information

Security-in-Depth 4/26/2013. Physical Security Webinar. DCO Meeting Room Navigation. Host: Danny Jennings

Security-in-Depth 4/26/2013. Physical Security Webinar. DCO Meeting Room Navigation. Host: Danny Jennings Security-in-Depth Physical Security Webinar Host: Danny Jennings Physical Security Curriculum Manager responsible for: Curriculum development Course instruction Curriculum review Retired military; over

More information

Colocation. Scalable Solutions for a Shared IT Infrastructure. Enterprise. Colocation

Colocation. Scalable Solutions for a Shared IT Infrastructure. Enterprise. Colocation Scalable Solutions for a Shared IT Infrastructure Global and domestic competition, rising real estate and power costs, and shrinking IT budgets are causing today s businesses to seek alternatives to building

More information

BUILDING SECURITY & ACCESS CONTROL

BUILDING SECURITY & ACCESS CONTROL Department of Facilities Management BUILDING SECURITY & ACCESS CONTROL OBJECTIVE: PERFORMANCE GUIDELINES AUGUST 19, 2011 The objective of this guideline is to limit the probability that, as a result of

More information

How To Create A Security Solution For Retail Banking

How To Create A Security Solution For Retail Banking Cisco Physical Security for Retail Banking Enabling a Collaborative Customer Experience What You Will Learn Physical security systems that effectively protect your assets, customers, and employees are

More information

Security for Railways and Metros

Security for Railways and Metros Security for Railways and Metros Security for Railways and Metros Security Management System Railways and Metros worldwide share a set of characteristics that make them very vulnerable to possible attacks,

More information

Guarded community solutions Easy Series for villa and apartment projects

Guarded community solutions Easy Series for villa and apartment projects Guarded community solutions Easy Series for villa and apartment projects 2 Easy Series Control Panel Making security easy and reliable Add value to your innovative real-estate projects Ambitious apartment

More information

The Business Argument for Integrating Security Systems

The Business Argument for Integrating Security Systems The Business Argument for Integrating Security Systems Over the past decade security managers and others charged with the protection of an organization s assets have faced the dichotomy of defending against

More information

Motorola Wireless Broadband. Video Surveillance Solutions

Motorola Wireless Broadband. Video Surveillance Solutions Motorola Wireless Broadband Video Surveillance Solutions Maximize Video Surveillance Performance and ROI. With today s increased emphasis on public safety and asset protection, the world has begun looking

More information

The Path to ESS Credential & the Top Ten Transformative Technologies for Video Surveillance

The Path to ESS Credential & the Top Ten Transformative Technologies for Video Surveillance The Path to ESS Credential & the Top Ten Transformative Technologies for Video Surveillance Presented by Steve Surfaro Business Development Manager Industry Liaison Business Development Manager, Industry

More information

Extreme Physical Security

Extreme Physical Security Extreme Networks White Paper Extreme Physical Security Abstract Extreme Networks takes a holistic view of the Physical Security market, leveraging Ethernet technology and features with go-to-market sellers

More information

A Study on Integrated Security Service Control Solution Development about CRETA Security

A Study on Integrated Security Service Control Solution Development about CRETA Security A Study on Integrated Security Service Control Solution Development about CRETA Security Yongwon (Conrad) Cho 1, Jinwon (Frank) Choi 2 1 Director Research Engineer, Virtual Builders Co., Ltd. 2 CEO & Co-Founder,

More information

Alarm Systems. The purpose of an intruder alarm system is: Commonly utilised detection devices include:

Alarm Systems. The purpose of an intruder alarm system is: Commonly utilised detection devices include: Alarm Systems An intruder alarm system is designed to detect intruder presence at your premises. When detected, a siren will activate and communicate an alarm signal to one of our highly sophisticated

More information

Music Recording Studio Security Program Security Assessment Version 1.1

Music Recording Studio Security Program Security Assessment Version 1.1 Music Recording Studio Security Program Security Assessment Version 1.1 DOCUMENTATION, RISK MANAGEMENT AND COMPLIANCE PERSONNEL AND RESOURCES ASSET MANAGEMENT PHYSICAL SECURITY IT SECURITY TRAINING AND

More information

Update On Smart Grid Cyber Security

Update On Smart Grid Cyber Security Update On Smart Grid Cyber Security Kshamit Dixit Manager IT Security, Toronto Hydro, Ontario, Canada 1 Agenda Cyber Security Overview Security Framework Securing Smart Grid 2 Smart Grid Attack Threats

More information

Seamless ICT Infrastructure Security.

Seamless ICT Infrastructure Security. Seamless ICT Infrastructure Security. Integrated solutions from a single source. Effective protection requires comprehensive measures. Global networking has practically removed all borders in the exchange

More information

Security Technology & Best Practices - Alternatives to IP

Security Technology & Best Practices - Alternatives to IP October 24, 2012 Security Technology & Best Practices INTRODUCTION Kevin Parisien, PMP. Associate & Senior Project Manager- Security 19 years experience in Security & Project Management (5 with MMM) System

More information

Your Canadian Security Specialists. Eddie D Orazio

Your Canadian Security Specialists. Eddie D Orazio Your Canadian Security Specialists Eddie D Orazio Commercial Sales Structured Security Systems Toll Free: 1-888-693-1118 Tel: 905-640-0069 Fax: 905-576-2836 Mobile: 905-424-0050 eddie.dorazio@structuredss.com

More information

Make your business EXCEL with technology solutions provided by Excel Communications Worldwide, Inc.

Make your business EXCEL with technology solutions provided by Excel Communications Worldwide, Inc. Make your business EXCEL with technology solutions provided by Excel Communications Worldwide, Inc. Established in 2001, Excel brings you decades of experience in the Telecommunications Industry. Our dedicated

More information

Autodesk PLM 360 Security Whitepaper

Autodesk PLM 360 Security Whitepaper Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure

More information

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the

More information

Database Security, Virtualization and Cloud Computing

Database Security, Virtualization and Cloud Computing Whitepaper Database Security, Virtualization and Cloud Computing The three key technology challenges in protecting sensitive data in modern IT architectures Including: Limitations of existing database

More information

SYRACUSE CITY SCHOOL DISTRICT

SYRACUSE CITY SCHOOL DISTRICT SYRACUSE CITY SCHOOL DISTRICT EMERGENCY OPERATIONS PLAN Sharon L. Contreras, Superintendent of Schools Effective Date: September 2014 1 Table of Contents Contents Section I. Introduction:... 4 1.1 Purpose...

More information

A Model-based Methodology for Developing Secure VoIP Systems

A Model-based Methodology for Developing Secure VoIP Systems A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN

More information

A HELPING HAND TO PROTECT YOUR REPUTATION

A HELPING HAND TO PROTECT YOUR REPUTATION OVERVIEW SECURITY SOLUTIONS A HELPING HAND TO PROTECT YOUR REPUTATION CONTENTS INFORMATION SECURITY MATTERS 01 TAKE NOTE! 02 LAYERS OF PROTECTION 04 ON GUARD WITH OPTUS 05 THREE STEPS TO SECURITY PROTECTION

More information

Building Integration System Your platform for customized security and safety management

Building Integration System Your platform for customized security and safety management Building Integration System Your platform for customized security and safety management 2 One platform for everything Efficient building management is becoming not only more important, but also a more

More information

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee Marquee Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Securing the Workplace Executive Summary OPTIMIZE TODAY S WORKPLACE Protecting

More information

UW MEDICINE SITE CONFIGURATION STANDARDS Overview

UW MEDICINE SITE CONFIGURATION STANDARDS Overview UW MEDICINE SITE CONFIGURATION STANDARDS Overview UW-IT is deploying Voice over IP (VoIP) phone service to improve and expand existing voice services, leveraging state-of-the-art capabilities that allow

More information

IP Video Door Stations

IP Video Door Stations White paper IP Video Door Stations Enhancing video surveillance with communication and entry control Table of contents 1. IP to keep an eye at the door 3 2. New technology, new possibilities 4 3. Benefits

More information

The IP-Connected Enterprise

The IP-Connected Enterprise The IP-Connected Enterprise Exploring Issues Associated with Migration to Intelligent Information Networks Mark Niblett, RCDD. Anixter Inc Definition Fact or Fiction Value Proposition Case Study Part 1

More information

Building Integration System Your platform for customized security and safety management

Building Integration System Your platform for customized security and safety management A Tradition of Quality and Innovation For 12 years, the Bosch name stands for quality and reliability. Bosch is the global supplier of choice for innovative technology, backed by the highest standards

More information

Axis IP surveillance. Endless possibilities for video surveillance.

Axis IP surveillance. Endless possibilities for video surveillance. Axis IP surveillance. Endless possibilities for video surveillance. The video surveillance market is growing constantly, driven by increased public and private security concerns, as well as a technology

More information

ICANWK406A Install, configure and test network security

ICANWK406A Install, configure and test network security ICANWK406A Install, configure and test network security Release: 1 ICANWK406A Install, configure and test network security Modification History Release Release 1 Comments This Unit first released with

More information

IT - General Controls Questionnaire

IT - General Controls Questionnaire IT - General Controls Questionnaire Internal Control Questionnaire Question Yes No N/A Remarks G1. ACCESS CONTROLS Access controls are comprised of those policies and procedures that are designed to allow

More information

Louis A. Noriega Automated Port Solutions Physical Security and Operations Technology Consultant louis.noriega@aportsolutions.com

Louis A. Noriega Automated Port Solutions Physical Security and Operations Technology Consultant louis.noriega@aportsolutions.com Systems integration, collaboration, and partnerships to leverage existing systems and to eliminate redundant regional information technology initiatives, information sharing Louis A. Noriega Automated

More information

Information Technology General Controls Review (ITGC) Audit Program Prepared by:

Information Technology General Controls Review (ITGC) Audit Program Prepared by: Information Technology General Controls Review (ITGC) Audit Program Date Prepared: 2012 Internal Audit Work Plan Objective: IT General Controls (ITGC) address the overall operation and activities of the

More information

The evolution of data connectivity

The evolution of data connectivity Leveraging the Benefits of IP and the Cloud in the Security Sector The CCTV and alarm industry has relied on analogue or Integrated Services Digital Network (ISDN) communications to provide data connectivity

More information