SlideShare a Scribd company logo
Get verified or get extinct?
                                    Wednesday, November 4, 2009 15:16

I was speaking with Keith Jentoft over at RSI Video Technologies today about yet another partnership,
this time with Mace CSSS. Earlier this week it was CMS.

Keith was telling me about a recent case study RSI put together about the Detroit Public School system.
Apparently there were a large number–100–public school buildings in Detroit that were closed and in need
of protection from thieves and vandals. An RFP was issued and a bid accepted. 30 schools were outfitted by
D/A Central of Security-Net with the Videofied solution as apposed to traditional video surveillance at a cost
to the city, according to RSI’s study, of $5,000 as opposed to $100,000 for each school.

That’s a lot of money and a lot of savings.

Keith’s point is that a Videofied system–which he is quick to point out is NOT video surveillance (”We’re not
monitored by a special boutique in the back. The ordinary worker bee does Videofied. Why? Because we’re
not video surveillance. All we’re trying to do is answer the question: ‘Is there someone there?’ If there is
somewhere there you dispatch.”)–is much cheaper and more effective. Case in point: the Videofied solution
costs just 5 percent, again according to RSI’s study, of the full-blown surveillance solution. What’s more, it
was effective.

According to the case study, after Videofied was deployed in the remaining buildings, and monitored by
Exton, Pa.-based The Protection Bureau, the powers-that-be got 45 apprehensions in four weeks with no
false alarms… That’s a pretty good track record.

Jentoft pointed out the savings didn’t stop at the lower price of the Videofied solution. There’s savings in not
having to board up the vacant buildings as tightly, savings in the form of not having to clean up graffiti,
savings of pipes and cabling that weren’t stolen, savings in the form of reduced liability from lawsuits from
those who break in. Some of the unprotected buildings in the original lot were so damaged by looters and
vandals that, according to Jentoft, they had to be torn down at great cost to the city.

Jentoft’s main point, however, is that many municipalities are moving toward actively changing their dispatch
procedures to prioritize alarms that are accompanied by video verification. NYPD was named specifically.

I called Long Island City, N.Y.-based American Security Systems’ senior security consultant Edwin Day for
some background. Day has been around and has an impressive law enforcement resume. During his 22-
year career with the NYPD, he was awarded 40 citations for meritorious and heroic actions in the line of
duty. Day is an active member of ASIS and the Detectives Crime Clinic of New York and New Jersey. He
has completed the Facility Security Design and Physical Security Technology and Applications courses, and
is also the recipient of the Detectives Crime Clinic Award for Excellence, the NYPD Detective Bureau
Certificate of Exemplary Conduct, and the Detectives Endowment Association Certificate.

Speaking of dispatch procedures at the NYPD, Day said he had advocated for understanding of what a
video-verified system could do. “They have made a structural change in the approach to video verification of
alarms,” Day said. “When I first saw this product my first reaction was ‘this is fantastic.’ … My belief was
basically that the typical burglar alarm is a victim of its own success. Everybody’s putting them out there. I
know, as a cop, it’s a low priority job as a necessity simply because there are so many false alarms.”

Jentoft said cities in California were following suit. I have emails out to officials at CAA to follow up on this
assertion. I wrote a story recently for SSN that postulated the genesis of a trend toward all alarms having
audio or video verification.

With prices coming down, perhaps now is the time to get into video and two-way voice.

More Related Content

Similar to Security systems news 4 november

Sect f41
Sect f41Sect f41
Steven Greschner Biography
Steven Greschner BiographySteven Greschner Biography
Steven Greschner Biography
NextNet Partners
 
Trends final
Trends   finalTrends   final
Trends final
Ilias Varsamis
 
CHI2010 p1505
CHI2010 p1505CHI2010 p1505
CHI2010 p1505
Harry Zhang
 
merged_document
merged_documentmerged_document
merged_document
Nikhil D'souza
 
The Difference Between Being Secure And Being Compliant
The Difference Between Being Secure And Being CompliantThe Difference Between Being Secure And Being Compliant
The Difference Between Being Secure And Being Compliant
John Bedrick
 
Boyd Bryant Resume July2012
Boyd Bryant  Resume July2012Boyd Bryant  Resume July2012
Boyd Bryant Resume July2012
BoydBryant
 
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
NRBsanv
 
Ht t17
Ht t17Ht t17
Hoe gemakkelijk is het om digitaal in te breken?
Hoe gemakkelijk is het om digitaal in te breken?Hoe gemakkelijk is het om digitaal in te breken?
Hoe gemakkelijk is het om digitaal in te breken?
Xtandit_Marketing
 
RTCC Stakeholder BLOG_V1
RTCC Stakeholder BLOG_V1RTCC Stakeholder BLOG_V1
RTCC Stakeholder BLOG_V1
Jeff Menken
 
City of Irving Police Department
City of Irving Police Department City of Irving Police Department
City of Irving Police Department
InteractiveNEC
 
Essay On Water Conservation.pdf
Essay On Water Conservation.pdfEssay On Water Conservation.pdf
Essay On Water Conservation.pdf
Jill Johnson
 
Anticipate Versus React To Security Threats with Security Surveillance
Anticipate Versus React To Security Threats with Security SurveillanceAnticipate Versus React To Security Threats with Security Surveillance
Anticipate Versus React To Security Threats with Security Surveillance
cgiprotects
 
Anticipate Versus React To Security Threats with Surveillance Behavioral Anal...
Anticipate Versus React To Security Threats with Surveillance Behavioral Anal...Anticipate Versus React To Security Threats with Surveillance Behavioral Anal...
Anticipate Versus React To Security Threats with Surveillance Behavioral Anal...
cgiprotects
 
Huawei STW 2018 public
Huawei STW 2018 publicHuawei STW 2018 public
Huawei STW 2018 public
Alan Smeaton
 
Video & AI: capabilities and limitations of AI in detecting video manipulations
Video & AI: capabilities and limitations of AI in detecting video manipulationsVideo & AI: capabilities and limitations of AI in detecting video manipulations
Video & AI: capabilities and limitations of AI in detecting video manipulations
VasileiosMezaris
 
Mike Doane: Mike Doane
Mike Doane: Mike DoaneMike Doane: Mike Doane
Mike Doane: Mike Doane
Semantic Web Company
 
Cybersecurity Continuing Education Course Outline
Cybersecurity Continuing Education Course OutlineCybersecurity Continuing Education Course Outline
Cybersecurity Continuing Education Course Outline
Nance L. Schick, Esq.
 
Risk Assessment Case Study
Risk Assessment Case StudyRisk Assessment Case Study
Risk Assessment Case Study
Praveen Vackayil
 

Similar to Security systems news 4 november (20)

Sect f41
Sect f41Sect f41
Sect f41
 
Steven Greschner Biography
Steven Greschner BiographySteven Greschner Biography
Steven Greschner Biography
 
Trends final
Trends   finalTrends   final
Trends final
 
CHI2010 p1505
CHI2010 p1505CHI2010 p1505
CHI2010 p1505
 
merged_document
merged_documentmerged_document
merged_document
 
The Difference Between Being Secure And Being Compliant
The Difference Between Being Secure And Being CompliantThe Difference Between Being Secure And Being Compliant
The Difference Between Being Secure And Being Compliant
 
Boyd Bryant Resume July2012
Boyd Bryant  Resume July2012Boyd Bryant  Resume July2012
Boyd Bryant Resume July2012
 
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
 
Ht t17
Ht t17Ht t17
Ht t17
 
Hoe gemakkelijk is het om digitaal in te breken?
Hoe gemakkelijk is het om digitaal in te breken?Hoe gemakkelijk is het om digitaal in te breken?
Hoe gemakkelijk is het om digitaal in te breken?
 
RTCC Stakeholder BLOG_V1
RTCC Stakeholder BLOG_V1RTCC Stakeholder BLOG_V1
RTCC Stakeholder BLOG_V1
 
City of Irving Police Department
City of Irving Police Department City of Irving Police Department
City of Irving Police Department
 
Essay On Water Conservation.pdf
Essay On Water Conservation.pdfEssay On Water Conservation.pdf
Essay On Water Conservation.pdf
 
Anticipate Versus React To Security Threats with Security Surveillance
Anticipate Versus React To Security Threats with Security SurveillanceAnticipate Versus React To Security Threats with Security Surveillance
Anticipate Versus React To Security Threats with Security Surveillance
 
Anticipate Versus React To Security Threats with Surveillance Behavioral Anal...
Anticipate Versus React To Security Threats with Surveillance Behavioral Anal...Anticipate Versus React To Security Threats with Surveillance Behavioral Anal...
Anticipate Versus React To Security Threats with Surveillance Behavioral Anal...
 
Huawei STW 2018 public
Huawei STW 2018 publicHuawei STW 2018 public
Huawei STW 2018 public
 
Video & AI: capabilities and limitations of AI in detecting video manipulations
Video & AI: capabilities and limitations of AI in detecting video manipulationsVideo & AI: capabilities and limitations of AI in detecting video manipulations
Video & AI: capabilities and limitations of AI in detecting video manipulations
 
Mike Doane: Mike Doane
Mike Doane: Mike DoaneMike Doane: Mike Doane
Mike Doane: Mike Doane
 
Cybersecurity Continuing Education Course Outline
Cybersecurity Continuing Education Course OutlineCybersecurity Continuing Education Course Outline
Cybersecurity Continuing Education Course Outline
 
Risk Assessment Case Study
Risk Assessment Case StudyRisk Assessment Case Study
Risk Assessment Case Study
 

More from Ilias Varsamis

2 -Tower - Thief cuts copper.mpg
2 -Tower - Thief cuts copper.mpg2 -Tower - Thief cuts copper.mpg
2 -Tower - Thief cuts copper.mpg
Ilias Varsamis
 
06 outdoor siren specification sheet.pdf1
06 outdoor siren specification sheet.pdf106 outdoor siren specification sheet.pdf1
06 outdoor siren specification sheet.pdf1
Ilias Varsamis
 
09 door contact specifications sheet
09 door contact specifications sheet09 door contact specifications sheet
09 door contact specifications sheet
Ilias Varsamis
 
08 badge reader specifications sheet
08 badge reader specifications sheet08 badge reader specifications sheet
08 badge reader specifications sheet
Ilias Varsamis
 
07 keyfob specifications sheet
07 keyfob specifications sheet07 keyfob specifications sheet
07 keyfob specifications sheet
Ilias Varsamis
 
06 outdoor siren specification sheet.pdf1
06 outdoor siren specification sheet.pdf106 outdoor siren specification sheet.pdf1
06 outdoor siren specification sheet.pdf1
Ilias Varsamis
 
06 outdoor siren specification sheet
06 outdoor siren specification sheet06 outdoor siren specification sheet
06 outdoor siren specification sheet
Ilias Varsamis
 
05 indoor siren specifications sheet
05 indoor siren specifications sheet05 indoor siren specifications sheet
05 indoor siren specifications sheet
Ilias Varsamis
 
04 b pir itra specifications sheet
04 b pir itra specifications sheet04 b pir itra specifications sheet
04 b pir itra specifications sheet
Ilias Varsamis
 
04 a pir itr specification sheet
04 a pir itr specification sheet04 a pir itr specification sheet
04 a pir itr specification sheet
Ilias Varsamis
 
03 outdoor pcam specification sheet
03 outdoor pcam specification sheet03 outdoor pcam specification sheet
03 outdoor pcam specification sheet
Ilias Varsamis
 
02 b pcam dcva specification sheet
02 b pcam dcva specification sheet02 b pcam dcva specification sheet
02 b pcam dcva specification sheet
Ilias Varsamis
 
02 a pcam dcv specification sheet
02 a pcam dcv specification sheet02 a pcam dcv specification sheet
02 a pcam dcv specification sheet
Ilias Varsamis
 
01 keypad specification sheet
01 keypad specification sheet01 keypad specification sheet
01 keypad specification sheet
Ilias Varsamis
 
00 control panel xv specifications sheet
00 control panel xv specifications sheet00 control panel xv specifications sheet
00 control panel xv specifications sheet
Ilias Varsamis
 
00 control panel xt specification sheet
00 control panel xt specification sheet00 control panel xt specification sheet
00 control panel xt specification sheet
Ilias Varsamis
 
00 control panel videofied xl gprs specification sheet
00 control panel videofied xl gprs specification sheet00 control panel videofied xl gprs specification sheet
00 control panel videofied xl gprs specification sheet
Ilias Varsamis
 
00 control panel videofied visio specifications sheet
00 control panel videofied visio specifications sheet00 control panel videofied visio specifications sheet
00 control panel videofied visio specifications sheet
Ilias Varsamis
 
Videofied brochure greek_base
Videofied brochure greek_baseVideofied brochure greek_base
Videofied brochure greek_baseIlias Varsamis
 

More from Ilias Varsamis (20)

2 -Tower - Thief cuts copper.mpg
2 -Tower - Thief cuts copper.mpg2 -Tower - Thief cuts copper.mpg
2 -Tower - Thief cuts copper.mpg
 
06 outdoor siren specification sheet.pdf1
06 outdoor siren specification sheet.pdf106 outdoor siren specification sheet.pdf1
06 outdoor siren specification sheet.pdf1
 
09 door contact specifications sheet
09 door contact specifications sheet09 door contact specifications sheet
09 door contact specifications sheet
 
08 badge reader specifications sheet
08 badge reader specifications sheet08 badge reader specifications sheet
08 badge reader specifications sheet
 
07 keyfob specifications sheet
07 keyfob specifications sheet07 keyfob specifications sheet
07 keyfob specifications sheet
 
06 outdoor siren specification sheet.pdf1
06 outdoor siren specification sheet.pdf106 outdoor siren specification sheet.pdf1
06 outdoor siren specification sheet.pdf1
 
06 outdoor siren specification sheet
06 outdoor siren specification sheet06 outdoor siren specification sheet
06 outdoor siren specification sheet
 
05 indoor siren specifications sheet
05 indoor siren specifications sheet05 indoor siren specifications sheet
05 indoor siren specifications sheet
 
04 b pir itra specifications sheet
04 b pir itra specifications sheet04 b pir itra specifications sheet
04 b pir itra specifications sheet
 
04 a pir itr specification sheet
04 a pir itr specification sheet04 a pir itr specification sheet
04 a pir itr specification sheet
 
03 outdoor pcam specification sheet
03 outdoor pcam specification sheet03 outdoor pcam specification sheet
03 outdoor pcam specification sheet
 
02 b pcam dcva specification sheet
02 b pcam dcva specification sheet02 b pcam dcva specification sheet
02 b pcam dcva specification sheet
 
02 a pcam dcv specification sheet
02 a pcam dcv specification sheet02 a pcam dcv specification sheet
02 a pcam dcv specification sheet
 
01 keypad specification sheet
01 keypad specification sheet01 keypad specification sheet
01 keypad specification sheet
 
00 control panel xv specifications sheet
00 control panel xv specifications sheet00 control panel xv specifications sheet
00 control panel xv specifications sheet
 
00 control panel xt specification sheet
00 control panel xt specification sheet00 control panel xt specification sheet
00 control panel xt specification sheet
 
00 control panel videofied xl gprs specification sheet
00 control panel videofied xl gprs specification sheet00 control panel videofied xl gprs specification sheet
00 control panel videofied xl gprs specification sheet
 
00 control panel videofied visio specifications sheet
00 control panel videofied visio specifications sheet00 control panel videofied visio specifications sheet
00 control panel videofied visio specifications sheet
 
Xl for prospect
Xl for prospectXl for prospect
Xl for prospect
 
Videofied brochure greek_base
Videofied brochure greek_baseVideofied brochure greek_base
Videofied brochure greek_base
 

Security systems news 4 november

  • 1. Get verified or get extinct? Wednesday, November 4, 2009 15:16 I was speaking with Keith Jentoft over at RSI Video Technologies today about yet another partnership, this time with Mace CSSS. Earlier this week it was CMS. Keith was telling me about a recent case study RSI put together about the Detroit Public School system. Apparently there were a large number–100–public school buildings in Detroit that were closed and in need of protection from thieves and vandals. An RFP was issued and a bid accepted. 30 schools were outfitted by D/A Central of Security-Net with the Videofied solution as apposed to traditional video surveillance at a cost to the city, according to RSI’s study, of $5,000 as opposed to $100,000 for each school. That’s a lot of money and a lot of savings. Keith’s point is that a Videofied system–which he is quick to point out is NOT video surveillance (”We’re not monitored by a special boutique in the back. The ordinary worker bee does Videofied. Why? Because we’re not video surveillance. All we’re trying to do is answer the question: ‘Is there someone there?’ If there is somewhere there you dispatch.”)–is much cheaper and more effective. Case in point: the Videofied solution costs just 5 percent, again according to RSI’s study, of the full-blown surveillance solution. What’s more, it was effective. According to the case study, after Videofied was deployed in the remaining buildings, and monitored by Exton, Pa.-based The Protection Bureau, the powers-that-be got 45 apprehensions in four weeks with no false alarms… That’s a pretty good track record. Jentoft pointed out the savings didn’t stop at the lower price of the Videofied solution. There’s savings in not having to board up the vacant buildings as tightly, savings in the form of not having to clean up graffiti, savings of pipes and cabling that weren’t stolen, savings in the form of reduced liability from lawsuits from those who break in. Some of the unprotected buildings in the original lot were so damaged by looters and vandals that, according to Jentoft, they had to be torn down at great cost to the city. Jentoft’s main point, however, is that many municipalities are moving toward actively changing their dispatch procedures to prioritize alarms that are accompanied by video verification. NYPD was named specifically. I called Long Island City, N.Y.-based American Security Systems’ senior security consultant Edwin Day for some background. Day has been around and has an impressive law enforcement resume. During his 22- year career with the NYPD, he was awarded 40 citations for meritorious and heroic actions in the line of duty. Day is an active member of ASIS and the Detectives Crime Clinic of New York and New Jersey. He has completed the Facility Security Design and Physical Security Technology and Applications courses, and is also the recipient of the Detectives Crime Clinic Award for Excellence, the NYPD Detective Bureau Certificate of Exemplary Conduct, and the Detectives Endowment Association Certificate. Speaking of dispatch procedures at the NYPD, Day said he had advocated for understanding of what a video-verified system could do. “They have made a structural change in the approach to video verification of alarms,” Day said. “When I first saw this product my first reaction was ‘this is fantastic.’ … My belief was basically that the typical burglar alarm is a victim of its own success. Everybody’s putting them out there. I know, as a cop, it’s a low priority job as a necessity simply because there are so many false alarms.” Jentoft said cities in California were following suit. I have emails out to officials at CAA to follow up on this assertion. I wrote a story recently for SSN that postulated the genesis of a trend toward all alarms having audio or video verification. With prices coming down, perhaps now is the time to get into video and two-way voice.