Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Step Into Security Webinar - Planning for Security Technology Upgrades


Published on

In this Step Into Security webinar, we take a look at physical security upgrades using technology and appropriate techniques for planning your upcoming projects.

Jeff Kellick, LENSEC's Chief Product Officer, has a lot of expertise in the security industry. He has been working over 15 years to ensure the capability and usability of security products solving the needs and demands of today's customers.

Jeff explains how to approach your security project and prepare with the best information on your current system while evaluating your priorities for system expansion.

Webinar Agenda:
• Assessment of Existing Equipment
• Proper Evaluation of Current Technology Standards
• Building a Transitional Plan
• Security Plan Implementation
• Case Study Walkthrough

Please register for the upcoming webinar. Share this info with your colleagues and invite them to join us.

Step Into Security Webinar Archive:

Published in: Technology
  • Be the first to comment

Step Into Security Webinar - Planning for Security Technology Upgrades

  1. 1. Planning For Security Technology Upgrades
  2. 2. Today’s Moderator David Martin Physical Security Technical Specialist LENSEC
  3. 3. Webinar Sponsor Based in Houston, TX Since 1998 IP Video Management System Design Installation Project Management LENSEC is committed to empowering our clients and partners to prevent or mitigate physical security risks. We want to help protect people and assets as well as improve operations through our evolutionary and intuitive technology. We can do this by providing expertise in security and software development. Our Mission
  4. 4. Webinar Logistics • Q&A At The End • Questions For The Panelist • Audio From Attendees Muted • Poll Questions • Survey
  5. 5. Today’s Panelists Jeff Kellick, CSPM Chief Product Officer LENSEC
  6. 6. Training Goal Planning for Security Technology Upgrades Webinar Topics • Site Assessment – State Of Your System • Market Assessment – Current Technologies, Standards & Practices • Transitional Planning – Getting From Here To There • Implementation Cycle – Executing On The Plan • Case-in-Point – Entities With Successful Projects
  7. 7. Poll Question Poll Question #1 What is the state of your physical security system?
  8. 8. Site Assessment Overview • Build Awareness Of Current Status • Review Current Vulnerabilities • Triage New Priorities
  9. 9. Site Assessment – Site Audit • Site Audit Points • Area of Interest • Coverage Field • Buildings, Walls & Enclosures • New or Modified • Equipment existing • Technology • Infrastructure • Human Resources • Guards, Officers, Volunteers & Administrators • System Use & Standard Operating Procedures • Crime Prevention Through Environmental Design (CPTED)
  10. 10. Site Assessment – Current Vulnerabilities • Vulnerabilities • Human Protection • Asset Protection • Property Protection • Areas of Concern • Weak Spots / Faulty Equipment • Areas of Risk • Risk Assessment • Local Community Reports/Trends • Adjacent Environment • Any New Risk From Neighbors
  11. 11. Site Assessment – Customer Priorities • Revisit original goals • Meeting? Exceeding? Deficient? • Priorities (AKA Wish List) • Shifting Priorities • Considerations • Functional Integration Designs • Training & Utilization • Triage Needs Before & During The Budget Process
  12. 12. Market Assessment – Overview • Current State Of The Market / Professional Industry • Technologies • Standards • Best Practices
  13. 13. Poll Question Poll Question #2 Are you familiar with current physical security technology?
  14. 14. Market Assessment – Technologies • Today • Video Tech • 360 • MPX • Compressions • Analytics • Power Consumption • Solar • Battery • Integration tools • Unification Of Alerts/Alarms
  15. 15. Market Assessment – Technologies • Future Proof • Warranty Protection • Resolution & Codec Availability • PC & Server Technology • Bang For The Buck…
  16. 16. Market Assessment – Standards • Standards Bodies • Affects Technology Choices
  17. 17. Market Assessment – Best Practices • Installation Procedures • Site/Project Commissioning • Monitoring Procedures • Evaluation Routines
  18. 18. Transitional Planning - Overview • Budget & Resource Allocation • Single Or Multi-phase Approach • Communicate Effectively • Improve From Lessons Learned
  19. 19. Transitional Planning – Budget/Resources • Capital Expenditures • Operational Budget • Technology Equipment • Services • Training
  20. 20. Transitional Planning – Budget/Resources • Funding Sources • Grants & Bonds • Scheduling Vehicles • TCPN • GSA • Buy/Lease • Resource allocation • Preparing Staff • Preparing Facilities
  21. 21. Transitional Planning – Phasing • One & Done • Multi-phase • Predictive Analysis – Think about where pitfalls may occur and use smart scheduling. • New Software/Server Phase-in • Legacy Software/Server Phase-out
  22. 22. Transitional Planning – Collaboration • Communicate • Talk • Email • Document • Text • Contractors • GC meet Sub • Sub meet POC • Departments • Communicate the approach deadlines, dates, expectations
  23. 23. Transitional Planning – Iterative Improvement • Iterative Improvement – To learn from and improve upon a repetitive process. • (LESSONS LEARNED, LEARNING APPLIED) • Technology • Training • Exercises & Standard Operating Procedures
  24. 24. Implementation – Overview • Challenges • Overcoming Obstacles • Execute • Train • Sign-off
  25. 25. Poll Question Poll Question #3 I’m familiar with the obstacles I’ll experience when implementing a physical security project?
  26. 26. Implementation – Hurdles And Concerns • Project Management • Standup Meetings • Identify Allies & Build Bridges • Solve & Move On
  27. 27. Implementation – Execution • Hardware • New Equipment • New Manufacturers • Software • Users • Devices • Details • Infrastructure • System Overlap / Redundancy • Cutover
  28. 28. IP Vs. Analog Cameras & Equipment • Proprietary Equipment • A Word Of Warning • Data Transfer Protocols • Open Source
  29. 29. Implementation – Training • Who • Users (Day-to-Day) • Users (Infrequent) • Administrators • Responders • Contractors • How • Classroom-based • Video Tutorial • Documentation • User Manuals • Quick Reference Guides
  30. 30. Implementation – Commissioning • Sign Off • Service / Maintenance • Monitoring
  31. 31. Case Study – Pflugerville Independent School District • Switching Over Software • Phased Camera Upgrades • Refreshed Network Infrastructure • Phased Server Upgrades
  32. 32. Case Study – Pflugerville Independent School District • Switch Over Software
  33. 33. Case Study – Pflugerville Independent School District • Phased Camera Upgrades
  34. 34. Case Study – Pflugerville Independent School District • Refreshed Network Infrastructure
  35. 35. Case Study – Pflugerville Independent School District • Phased Server Upgrades
  36. 36. Summary • Site Assessment – State of Your System • Market Assessment – Current Technologies, Standards, and Practices • Transitional Planning – Getting from Here to There • Implementation Cycle – Executing on the Plan • Case-in-Point – Entities that Have “Been There and Done That”
  37. 37. Questions Q&A
  38. 38. Contacts Jeff Kellick (713) 395.7330 LENSEC David Martin (512) 318-3829 LENSEC
  39. 39. Thanks for Attending Today’s Webinar
  40. 40. Planning For Security Technology Upgrades
  41. 41. SIS7-16 Webinar – Security Technology Upgrades Questions & Answers Poll Question #1 What is the state of your physical security system? Most doors default to Fail Safe if you don’t have direction from the specifications or the AHJ. 1) It’s perfect! I wouldn’t change a thing. 2) It needs some improvements. 3) It’s in bad shape and quite antiquated. 4) I don’t know. Poll Question #2 Are you familiar with current physical security technology? 1. No, I have no idea what’s available today. 2. I know some current technology, but I need an update. 3. I’m very familiar with current physical security technology Poll Question 3 I’m familiar with the obstacles I’ll experience when implementing a physical security project? 1. I’ve never done this before and I don’t know what to expect. 2. It’s been a while since I’ve put a security project together. 3. This is familiar to me and I know what to expect. 4. I don’t know. How often should a business plan for an upgrade at their facility? It depends on the type of facility, what their goals are, and what their plans are. On the whole, most entities we’ve seen in the industry average a refreshment cycle every five to seven years. That typically corresponds with the expiration or the failure rate of the infrastructure, whether it’s the cameras or the server itself. How do I determine what technology I need – whether wireless, wired, megapixel, lower resolution for example? That’s a challenging question. You really have to think through what it is you’re trying to accomplish as a user. You may have a mix of different technologies. For example, let’s thinking about a hallway. You want to ensure that you see the face of everybody that walks down that hallway because it’s a high traffic area and you know you want to look at it forensically. You’re going to take into account the number of megapixels you’re going to use on those types of cameras.
  42. 42. Similarly, if you’re going to put cameras in a parking lot area or you want to put cameras outside, you’re going to need to think about what it is you’re trying to solve. Do you want to pick up license plates for the vehicles that come and park? If so, you need to ensure that from where that camera is mounted, it has clear field of view – there are no obstacles in the way at the point you expect to capture the license plate. You need to make sure you have high enough megapixel resolution to capture the detail needed. You also need to make sure you are recording at a high enough frame rate to pick up that traffic. Keep in mind the frame rate will also have an impact on the amount of storage you will need. You’ll also want to think about overall retention time. When you take a look back at incidents at your facility, how long does it take for something to be reported? We’ve seen examples of schools that choose to record at 45 to 60 days because they know it might take a while for a report to be filed. It really is about understanding the challenges that you’re facing. With that information, we can start to understand the technology pieces that are needed to solve specific problems. The solution you’re needing may not require the latest and greatest technology. You may be able to get better bang for your buck by using a little bit older technology in areas that don’t need the highest resolution and all you require is general coverage. It doesn’t make sense to put a 5 Megapixel camera when all you need in that low priority area is 2 Megapixels. Are there consultants that can help us decide our vulnerabilities at our site? Absolutely and there are some very good ones out there. A lot of times, you’ll find consultant’s that have a background in law enforcement that may be coming from different police agencies or federal agencies. These consultants will have a good understanding of physical vulnerabilities, area crime rates, environmental factors, and more. All of those play into what makes your facility vulnerable. Having a proper assessment done by a qualified professional will go a long way in ensuring you are meeting the scope required for you or your customer. You can check with the International Association of Professional Security Consultants (IAPSC) to find a list of highly qualified consultants. Other resources include the American Society for Industrial Security (ASIS) and the Security Industry Association (SIA). They will also be able to provide referrals for consultants as well.