Navigating Needs & Options



Similar documents
visit us on the web at:

integrated fire and security solutions Maximum protection for buildings

Chapter 1 Introduction

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee

How to Solve the Most Persistent Problem in Perimeter Security Systems

Protecting datacenters & mission critical facilities - using IP based systems. Presented by: Jeffrey Lam RCDD Director, Global Accts, Asia ANIXTER

Business Owner s. Security Buyers. Guide. Everything you need to know before purchasing a security system. Safer. Smarter. Tyco.

Retail Solutions. Why Tyco Security Products for Retail?

Security 101 For School Safety. Intertech Associates, Inc. Lunch & Learn

Type caption text here.

Appendix G. Security management plan

Products. Technology. Services. Delivered Globally. PROTECTING CRITICAL INFRASTRUCTURE SOLUTION

PHLOSOPHY OF SCHOOL SAFETY AND SECURITY SYSTEMS INTERDICIPLINARY DECISION MATRIX

Axis network cameras A wide portfolio of products for professional video surveillance.

UBC Technical Guidelines Section Edition Secure Access: General Standards Page 1 of 7

Introduction. Industry Changes

A guide to access control for manufacturing sites

Elements of Physical Security Systems II: Intrusion Detection, Alarm Communication and Assessment, Delay, and Response

Enhanced Security Monitoring Primer For Water Quality Surveillance and Response Systems

Understanding Access Control

Middleborough Police Electronic Security Narrative

NSW POLICE FORCE. Home Safe

Integrated Physical Security and Incident Management

Alarm Systems. The purpose of an intruder alarm system is: Commonly utilised detection devices include:

Integration: The Future of Commercial Office Building Security

Smile Security and Surveillance Pvt. Ltd. (SSSPL) Brings to you

Physical Security for Companies that Maintain Social Infrastructure

Electronic Security Systems Made in Germany

Winning Initiatives and Best Practices for Physical Security

Conducting Security System Site Surveys

5800 Wireless Series INFORMATION FOR DEALERS: WIRELESS SOLUTIONS FOR EVERY HOME OR BUSINESS. Quicker Installs... Higher Profits

Siemens S-Box: Wireless security for your home.

Communication Infrastructure Convergence & The need of IS Audit Compliance. Ninad M. Desai

Media Conversion in Video Security and Surveillance Systems

Small Business Security Devices Rebate Guidelines

solutions Deter Criminal Activity

Your Canadian Security Specialists. Eddie D Orazio

Course Catalog WINTER 2015 PAGE 2

IMS [Integrated Management System] Surveillance Solution Segment Focus: Gaming Industry

GLOSSARY of SECURITY TERMS

A guide to access control for offices

Questions related to specific materials, methods, and services will be addressed at the conclusion of each presentation.

User Authentication Methods for Mobile Systems Dr Steven Furnell

Technology & Security Advances. Presented by: Tommy Thornton Director of Technology

Security and Convenience A Paradox on Campus

DOT HAZMAT SECURITY AWARENESS TRAINING

Global Market Study on Electronic Access Control (EAC) Systems: Biometric Systems to Witness Highest Growth by 2019

Galaxy Flex SECURITY THAT FITS WITH YOUR BUSINESS AND LIFESTYLE. Protect your property

Chapter 5 Understanding Input. Discovering Computers Your Interactive Guide to the Digital World

Learning Outcomes. Physical Security. Zoning systems. Zone 1 Open areas. Information Security

IP Video Surveillance

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Brave New World: Integrating electronics into a hospital security plan

LYNX Touch Small Business Solutions DYNAMIC, FULL COLOR SELF-CONTAINED BUSINESS CONTROL SYSTEM. Your Connected Business

Access Control in Commercial Applications. Is the future of commercial building security built in, or bolted on? A discussion paper

CCTV Security Cameras: 5 Tips for choosing what s best for your business

TOOLKIT ONE: ASSESSMENT

Complete solutions for commercial security. Verex delivers leading intrusion, access and video products to protect today s companies

Remote Monitors. Advanced IP CCTV MAXCOM TECHNOLOGIES CCTV. Wireless Camera. Fingerprint Access. Exper. Dubai. Ready Stock.

DatacenterTrak RFID-BASED ASSET MANAGEMENT & ASSET TRACKING. Committed to Data Your trusted partner in data management and protection

How can Access Control Systems Improve Security and Reduce Costs? A Discussion Paper

ASSEMBLY 38TH SESSION EXECUTIVE COMMITTEE THREAT RESPONSE SYSTEM USING STATE OF THE ART INFORMATION TECHNOLOGIES IN THE REPUBLIC OF KOREA

TABLE OF CONTENTS. Introduction 1. Components of a System 2. Door Control Hardware 3. Request to Exit Devices 5. Credential Technology 6

AKCess Pro Server Management Software

DIVISION 28 ELECTRONIC SAFETY AND SECURITY

Security Management System

Security and Data Center Overview

print digital online

OCR LEVEL 3 CAMBRIDGE TECHNICAL

APEC Private Sector. Supply Chain Security Guidelines

WEBFIL LIMITED. Your Security Partner

GMS GRAPHICAL MANAGEMENT SYSTEM

Major Risks and Recommended Solutions

1. Perimeter fencing or walls should enclose the vicinity around cargo handling and loading areas, as well as storage facilities.

Nuclear Plant Security Systems

retail Partners Here is an example of one of

SYMMETRY PRODUCT OVERVIEW

Experts who understand security, integration and great project delivery. Leading Security Through Innovation

White paper. Axis Video Analytics. Enhancing video surveillance efficiency

Totally Wireless Video Security

Everything you need to know!

How To Protect Your Business With Cms.Com

The EVA Solution to Physical Security

Safety & Security Intruder Fire Access CCTV VeriSafe Alarms Alarms Systems Systems Keeping people safe & businesses compliant

Security for Railways and Metros

SYMMETRY. DATASHEET ACCESS CONTROL Product Overview

Training Courses 2015 What our delegates say about ADI training courses

Tyco Integrated Fire & Security Advanced Integration Solutions

The Cisco and Pelco Industrial Wireless Video Surveillance Solution: Real-Time Monitoring of Process Environments for Safety and Security

Guide for Non-Profit Housing Societies Security Guide Table of Contents

Preemptive security solutions for healthcare

BIOMETRIC SOLUTIONS 2013 ISSUE

TAC I/A Series Continuum Security Solutions Redefining Security for the Modern Facility

Next Generation. Surveillance Solutions. Cware. The Advanced Video Management & NVR Platform

Solutions for Oil and Gas Protecting onshore, offshore and coastal assets and infrastructure. Improving safety, security, maintenance and operations.

By Ian Kilpatrick, chairman Wick Hill Group, specialists in secure infrastructure solutions.

Quick Start Guide For Vera Small Business Solution

Current Products. B and M Communications LLC. The following is a list of our current offerings and services:

INTRUSION ALARM SYSTEM

Transcription:

Security Technology: Navigating Needs & Options by Barbara A. Nadel, FAIA T he technology marketplace offers electronic devices designed to make life easier, simpler, faster, and safer. In the post-9/11 world, building owners, tenants, and occupants are concerned about threats from terrorism, crime, and workplace violence to theft, intruders, and industrial espionage. Technology is one of several approaches that can mitigate potential threats, especially as part of overall security planning. A comprehensive security plan encompasses three elements: design (architectural, engineering, landscaping), technology, and building operations. Each element can be effective alone, but the best results are achieved when all three are considered together. Good planning and design can eliminate the need for some security posts by providing: n High observation capabilities. n Emphasis on open, transparent areas and avoiding alcoves where intruders can hide. n High lighting levels and other technology. n Low shrubs. Closed-circuit television (CCTV), monitors, electronic fencing, and smart cards are among technologies that can replace the need for security personnel, especially in remote, dangerous, or extreme climate areas or where labor costs are high. The initial costs of electronic equipment, along with training, warranties, and maintenance, 54 DOORS AND HARDWARE June 2007

should be amortized on a long-term basis, especially when considering additional security-related one-time capital and annual operational costs for security personnel. Reliability and efficiency are other evaluation criteria. Performing a life-cycle cost analysis will illustrate overall short- and long-term budget impact. To further illustrate this balance, when planning correctional facilities, the ideal approach is to provide corridors and spaces that allow maximum visibility by people and cameras to ensure safety and reduce the number of officer posts required. A rule of thumb has been to calculate each post as $250,000 in annual operating costs, when several individuals staff a single position, 24/7/365, with salaries and benefits. Eliminating several officer positions through design enhancements and use of technology can provide long-range operational savings to agencies. Threat Analysis To best consider the options for balancing costs and solutions, security planning should begin during the early project phases and involve the owner s team, in-house security personnel or security consultants, architects, engineers, and design professionals. A threat analysis identifies scenarios and when they are most likely to occur, such as at large public gatherings and dignitary visits. Factors include geographic location, adjacent facilities, and building functions. The nature and identity of the building owner and occupants may also reveal potential risks, such as foreign companies in commercial high-rises and businesses handling confidential data or money. The security team should review the existing capabilities of mitigating each scenario, determine where weaknesses lie, and the solutions whether design, technology, operational, or a combination of each that will best address each potential threat. Trends New technology advances, such as video analytics or smart cameras, can establish invisible or virtual fencing around a site perimeter, an advantage where aesthetics count. At transportation facilities, smart cameras and motion detectors can June 2007 DOORS AND HARDWARE 55

control lighting and temperature. Integration of different systems can collect huge amounts of data. End-users, however, must decide what to do with the data. Common Sense Prevails When all else fails, say many security consultants, apply common sense. If the system is too complex for in-house operators to use, the effectiveness will be compromised. detect size and speed of any object and relay messages to the alarm system if the object s characteristics exceed an accepted range. The trend is toward new applications with enhanced functions and capability of communicating with other systems, says Robert Martino, associate principal, shen Milsom & Wilke Inc., New York City. An example is a motion detector from a security system that can be used as an occupancy indicator reporting to a building management system to A basic guide to security technology applications includes: n fence technology provides perimeter and site security and may be connected to alarms and video. Electric fences, pulsed, and fiber-optics are available. Architectural Wood Doors Commercial Wood Doors Stile & Rail Doors Artisan Doors Specialty Doors Inlaid Doors Wood Jamb Sets Algoma Express Now Available for 2006-07... Discover the Benefits of DHI Education & Start Advancing Your Career TODAY! 1.800.678.8910 www.algomahardwoods.com Go Online: www.dhi.org or call: 703.222.2010 to get your copy TODAY! 56 DOORS AND HARDWARE June 2007 Ed Resource Guide_.25 adv.indd 1 9/1/06 3:23:39 PM

n access control deters intruders from entering a facility and ensures only authorized personnel are allowed to enter. Combining one or more systems can delay or deny access. Combination locks, magnetic strip access cards often in combination with keypads, and proximity card readers are readily available. United Abrasives/Sait Fiber Discs are made with the highest quality materials using a premium resin over resin construction. Packaged in a unique bulk spindle that offers easy access and assures that each disc remains flat. Used for sanding and weld smoothing. Offered in three grains: GOOD: 2A Aluminum Oxide BETTER: Z Zirconium BEST: 8S Ceramic Packaged 100/spindle Available sizes: 4-1/2", 5", 7" Available grits: 24 through 120 Receive a Free Backing Pad with your first order of min. 200 or more Fiber Discs. n Biometric technology, used for identity confirmation and access control, can verify information on an access card against unique personal features, such as hand geometry, fingerprints, iris or retinal scans, and facial recognition. When combined with access controls, it can prevent the use of Smooth Solutions for Hollow Metal Frames & Doors Tanner has earned a reputation in the Door Hardware industry as the Solutions Specialists. Introducing our new website resource center, www.tannerdoor.com, created expressly for the door/window industry. This site is packed with articles, tips, trends, and a pathway to our e-commerce site www.tannerbolt.com for convenient online ordering! Three Convenient Shipping Locations: Brooklyn, NY: Ask for Ryan Miles Dallas/Ft.Worth, TX Atlanta, GA Call or visit our website to receive Tanner s New 12 page Door Hardware Fastener Catalog. 4302 GLENWOOD ROAD BROOKLYN, NEW YORK 11210 800 456-2658 718 434-4500 FAX 888 434-3215 718 434-3215 WWW.TANNERDOOR.COM WWW.TANNERBOLT.COM borrowed pass cards, a common problem at many businesses. n revolving door portals allow passage of only one person at a time and prevent tailgating, another major security problem. This occurs when an authorized person opens a door and an unauthorized person enters at the same time, resulting in a security breach. n Weapons detection systems, such as magnetometers, metal detectors, and hand wands, can identify metal objects and hazardous materials and are often used at airports, civic facilities, and public lobbies. n cctv video capabilities photograph and record images with cameras. Images are displayed on a console and may be stored for future use. Popular features include visible and infrared spectrum; digital and analog formats; indoor and outdoor uses; pan-tiltzoom (PTZ) models; and monitors integrated with building systems. Recent advances include fully digital systems with recorders and Internet Provider (IP) cameras delivering a digitized, compressed image on Ethernetbased local area networks. Wireless cameras are available, removing the need for cabling. Other systems offer digital storage, motion detection recording, and high-resolution capabilities. About the Author: Barbara A. Nadel, FAIA, is principal at New York City-based Barbara Nadel Architect, specializing in planning and design of justice and institutional facilities. She is editor-in-chief of Building security: Handbook for Architectural Planning and Design (McGraw-Hill, 2004) and writes a security column on www.buildings.com. This article originally appeared in the March 2007 column on Buildings.com. Reprinted with permission. Copyright 2007. 58 DOORS AND HARDWARE June 2007