SlideShare a Scribd company logo
1 of 43
Experience and Perspective
of Security Installation
Opportunities
Edward J. Donelan, RCDD/NTS, TLT
President, Telecom Infrastructure Corp
BICSI Publications
• NDRM (Network Design Reference) 6th Edition
– November 2005
• ESS (Electronic Safety and Security Design) 1st Edition
– January 2006
• CO-OSP (Customer Owned Outside Plant) 4th Edition
– January 2007
• PAVDRM (Principles of AV Design) 1st Edition
– June 2006 (ICIA Partnership)
BICSI UPDATE
• ESS (Electronic Safety and Security) Designer
Designation Direction
The ESS designer is the person who understands vulnerability,
risk, and threat, designs a complete and functional security
system, oversees the implementation and verifies / validates
system performance.
• SIA – Javits Center, NYC
– August 24 – 25, 2005
– Security Industry Association
– www.isceast.com
BICSI UPDATE
• ESS Outline
– Threat – Legal, liability, ethic
– Asset Protection
– Intercom / Annunciators
– Biometrics / Intrusion
Detection
– CCTV – Access Control
– Monitoring - training
– Fire Detection & Alarm
– Sensors / Integrated
System
– Mobile Security /
Wireless / Data
Security
– Doors, locks, safes and
seals
Business
Opportunity
In 2004 47% said their
company is listed on a
GSA Schedule,
compared to just 12% in
2003.
The convergence of IT
and computer
networking with
electronic security is
becoming reality.
A true indicator that
separates an alarm dealer
from a serious systems
integrator is if the company
has its own CAD/CAM
plotter equipment.
Source: SecuritySales.com
Business
Opportunity
CCTV and Access
Control making strides
toward topping burglar
alarms as the
electronic security
industry’s No 1 source
of revenue
Source: SecuritySales.com
Security Business
Opportunity
Source: SecuritySales.com
Business
Opportunity
Homeland security
efforts appear to be
substantially impacting
the electronic security
industry as large
industrial (gov’t, utilities,
airports, stadiums, etc.)
swiped 6 percentage
points from both
commercial and
residential installations in
2004.
Source: SecuritySales.com
Business
Opportunity
Electronic security
contractors continue
the recent trend of
making more at the
front end as paid-in-
full installations
remained at 58%.
Source: SecuritySales.com
Security
Installation
Statistics
• Average number of installed accounts in
2004 is 550
• Average number of monitored accounts in
2004 is 300
•76% use a third-party contract central
monitoring station
• 47% of integrators have access to the
internet from the field.
Security Business Opportunities
The “sweet spot” for
the typical security
contractor is $1
million to $4.9 million
in annual gross
revenues.
Source: SecuritySales.com
Security
Average gross profit margins
40.3% and 27.4% net profit
on CCTV installations
Remote video is one of the most
in-demand features with
networked video on the rise.
Source: SecuritySales.com
QUESTIONS TO ASK
What is the application?
• Retail store, office, parking lot, all
How many cameras in the system?
• How many indoors & outdoors
What are the cameras viewing?
• Area, distance
• This may determine if P/T/Z is needed
QUESTIONS TO ASK
What is camera environment?
• Freezer, office, hot warehouse, etc.
Where or how are cameras mounted?
• Ceiling dome, outdoor pole, etc.
How will the system be used?
• Manned system, monitored
• Passive system just recorded
QUESTIONS TO ASK
How many monitor locations?
• View only or control
Is remote access needed?
• Remote network connection
• Internet
QUESTIONS TO ASK
What does user want to achieve?
• Stop internal theft
• Security from outside influences
• Shoplifting
• Vandalism issues
GUIDELINES
Be aware of lighting
Observe the sun
Know why customer wants cameras
1 camera will not cover a 300’ fence
INTRODUCTION TO ACCESS
CONTROL
Access
Control
Access
Control
• Average profit margins for Access Control
installations are 37% gross and 22% net.
• Integrators say more than 48% of their access
control installations include some sort of
integration with CCTV or other security system.
• Commercial office environment accounts for
more than 36% of all access control system
installations.
AC
Worksheet
Access Control System
Door Planning
Worksheet
 In order to install the
proper locking
hardware, answers to
the following questions
are essential.
Reasons For Access Control
• Reduce Key Control Problems
• Allows Managed Access
• Provide 24/7 Security
• Management Tool
• Reduce Cost
Key Control Problems
• Affects all business and government
• No control of distributed keys
• Huge security risk
– Stolen/missing keys = new locks & keys
• Very labor intensive and expensive
Key Control Solutions
• Provide card access to all employees
• Each card is unique, assigned to user
• Absolute control
• Immediate information
• Easier to manage
• Reduced costs
Allow Access…Problems
• Providing security to the building
– Day vs. night
– Various levels of security
• Authorized personnel
– Time, day,entry & exit
• Doors must be locked and unlocked
• Key holder control
Allow Access…Solutions
• All employees are issued a card
• Demonstrates confidence to employees
• Maintains control over usage
– Time, day, schedule. Etc.
– By employee, dept., visitor
• Cards are difficult to duplicate
• Provides flexibility with security
– Secure when and where needed
24/7 Security Problems
• Key systems are not secure
• Employees must feel safe
• High cost for keys, locks, guards, etc.
• Risk of internal theft and fraud
24/7 Security Solutions
• Provide perimeter security
• Permit free movement of employees
– Authorized access w/o supervisor key
– Increase mobility of workers
• Reduce or eliminate guards
• Reduce opportunity for theft of fraud
Application for Access Control
• Need to improve or upgrade security
• Companies with key control problems
• Real or potential security risks
• Need to provide greater security
– Shift schedules
– High employee turnover
– Temp. workers
Application for Access Control
• Multiple levels of security
– Execs., factory, R&D, TR’s, MTER’s, etc.
• Need to record or control usage
– Charge for use, common conf. Room
• Companies offering flexible schedules
• Improve after hours security
• Need to automate security functions
Why Sell Access Control
• Leads to add-on sales
– CCTV
– Expansion
– Motion detectors
• Small recurring revenue in cards
– Also keeps you in touch
• Less competition than traditional alarms
Why Sell Access Control
• Potential for higher margins
• Leads to other sales
– Word of mouth
– Envy
Access Control Basics
• Who, When, Where, What
– Who uses the system
– When they use the system
– Where they use the system
– What happened
Access Control Components
• Controller
– Multi-reader control in a can
– Single door keypad
– All wire goes to this point
• Cards
– Each user assigned a unique card
– Usage parameters programmed in system
– Bit formats
Access Control Components
• Reader Technologies
– Proximity (prox)
– Magnetic Stripe
– Bar Code
– Weigand
– Radio (RF)
– Multi-Technology
Access Control Components
• Reader Technologies
– Biometric
• Hand
• Finger
• Face
• Voice
• Retina
– With Keypad
Access Control Components
• Controlled Door
– Lock
• Electric strike or magnetic lock
– One or two readers
– Door contact
– Request to exit detector (REX)
– Automatic door closer
– Optional annunciater
Access Control Components
• Magnetic Lock
– Must release with fire alarm, power failure
• Building not secure in power failure
– “Push To Exit” button w/ separate timer
– Automatic release (15 sec. delay max.)
• Electric Strike
– Free exit device
– Typically locked without power
– Use a locksmith
Access Functions & Features
• Schedules & Holidays
• Access Levels
• Monitored Inputs
• Alarm Events
• Elevator Control
• Antipassback
• Mantrap
• Time & Attendance
AC
Worksheet
Access Control Quick
Quote Fax Form
 In order to spec the
right equipment for the
job, fill out this handy
quick quote sheet.
Burglary
Alarms
• Average profit
margins installing
companies realize
on burglary jobs are
42.2% gross and
25.5% net.
• 26% of burglary
installations include
wireless equipment
Opportunity
Average Profit Margins
Gross Net
Access Control 37% 22%
CCTV 40.3% 27.4%
Security Contractor typical Sales is $1 million to
$4.9 million in annual gross revenues.
Thank You
Edward J. Donelan, RCDD, NTS, TLT
President, Telecom Infrastructure Corp
Treasurer, BICSI
edonelan@BICSI.org

More Related Content

Similar to experience_and_perspective_of_security_installation.ppt

Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013Niraj Kumar
 
Defcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shopDefcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shopPriyanka Aash
 
Practical SME Security on a Shoestring
Practical SME Security on a ShoestringPractical SME Security on a Shoestring
Practical SME Security on a ShoestringNCC Group
 
Dncybersecurity
DncybersecurityDncybersecurity
DncybersecurityAnne Starr
 
ComSec Security Systems - Tanzania
ComSec Security Systems - TanzaniaComSec Security Systems - Tanzania
ComSec Security Systems - TanzaniaComSecManager
 
Automotive Cyber-Security Insights learned from IT and ICS/SCADA
Automotive Cyber-Security Insights learned from IT and ICS/SCADAAutomotive Cyber-Security Insights learned from IT and ICS/SCADA
Automotive Cyber-Security Insights learned from IT and ICS/SCADAGilad Bandel
 
Information Security
Information SecurityInformation Security
Information Securitysonykhan3
 
Access control system
Access control systemAccess control system
Access control systemMatrix COSEC
 
PT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolPT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolShah Sheikh
 
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure ThingsSecurity Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure ThingsDesign World
 
Attacking and Defending Autos Via OBD-II from escar Asia
Attacking and Defending Autos Via OBD-II from escar AsiaAttacking and Defending Autos Via OBD-II from escar Asia
Attacking and Defending Autos Via OBD-II from escar AsiaDigital Bond
 
Track 5 session 4 - st dev con 2016 - life cycle management for web
Track 5   session 4 - st dev con 2016 - life cycle management for webTrack 5   session 4 - st dev con 2016 - life cycle management for web
Track 5 session 4 - st dev con 2016 - life cycle management for webST_World
 
Penetration testing & Ethical Hacking
Penetration testing & Ethical HackingPenetration testing & Ethical Hacking
Penetration testing & Ethical HackingS.E. CTS CERT-GOV-MD
 
Considerations for a secure internet of things for cities and communities
Considerations for a secure internet of things for cities and communitiesConsiderations for a secure internet of things for cities and communities
Considerations for a secure internet of things for cities and communitiesMrinal Wadhwa
 
Security Change Management: Agility vs. Control
Security Change Management: Agility vs. ControlSecurity Change Management: Agility vs. Control
Security Change Management: Agility vs. ControlAlgoSec
 

Similar to experience_and_perspective_of_security_installation.ppt (20)

Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013
 
Defcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shopDefcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shop
 
Practical SME Security on a Shoestring
Practical SME Security on a ShoestringPractical SME Security on a Shoestring
Practical SME Security on a Shoestring
 
Karunia Wijaya - Proactive Incident Handling
Karunia Wijaya - Proactive Incident HandlingKarunia Wijaya - Proactive Incident Handling
Karunia Wijaya - Proactive Incident Handling
 
Dncybersecurity
DncybersecurityDncybersecurity
Dncybersecurity
 
ComSec Security Systems - Tanzania
ComSec Security Systems - TanzaniaComSec Security Systems - Tanzania
ComSec Security Systems - Tanzania
 
Lessson 1
Lessson 1Lessson 1
Lessson 1
 
Automotive Cyber-Security Insights learned from IT and ICS/SCADA
Automotive Cyber-Security Insights learned from IT and ICS/SCADAAutomotive Cyber-Security Insights learned from IT and ICS/SCADA
Automotive Cyber-Security Insights learned from IT and ICS/SCADA
 
BOMA
BOMABOMA
BOMA
 
ISBB_Chapter6.pptx
ISBB_Chapter6.pptxISBB_Chapter6.pptx
ISBB_Chapter6.pptx
 
Information Security
Information SecurityInformation Security
Information Security
 
Access control system
Access control systemAccess control system
Access control system
 
PT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolPT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrol
 
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure ThingsSecurity Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
 
Attacking and Defending Autos Via OBD-II from escar Asia
Attacking and Defending Autos Via OBD-II from escar AsiaAttacking and Defending Autos Via OBD-II from escar Asia
Attacking and Defending Autos Via OBD-II from escar Asia
 
Track 5 session 4 - st dev con 2016 - life cycle management for web
Track 5   session 4 - st dev con 2016 - life cycle management for webTrack 5   session 4 - st dev con 2016 - life cycle management for web
Track 5 session 4 - st dev con 2016 - life cycle management for web
 
Embedded
EmbeddedEmbedded
Embedded
 
Penetration testing & Ethical Hacking
Penetration testing & Ethical HackingPenetration testing & Ethical Hacking
Penetration testing & Ethical Hacking
 
Considerations for a secure internet of things for cities and communities
Considerations for a secure internet of things for cities and communitiesConsiderations for a secure internet of things for cities and communities
Considerations for a secure internet of things for cities and communities
 
Security Change Management: Agility vs. Control
Security Change Management: Agility vs. ControlSecurity Change Management: Agility vs. Control
Security Change Management: Agility vs. Control
 

More from PawachMetharattanara

BIZ model 2024nnnmmmmmmmmmmmmmmmmmmm.pptx
BIZ model 2024nnnmmmmmmmmmmmmmmmmmmm.pptxBIZ model 2024nnnmmmmmmmmmmmmmmmmmmm.pptx
BIZ model 2024nnnmmmmmmmmmmmmmmmmmmm.pptxPawachMetharattanara
 
1. คู่มือคนสอน คนเรียน PMS.pdf
1. คู่มือคนสอน คนเรียน PMS.pdf1. คู่มือคนสอน คนเรียน PMS.pdf
1. คู่มือคนสอน คนเรียน PMS.pdfPawachMetharattanara
 
Smart Parking รพ.กล้วยน้ำไท.pptx
Smart Parking รพ.กล้วยน้ำไท.pptxSmart Parking รพ.กล้วยน้ำไท.pptx
Smart Parking รพ.กล้วยน้ำไท.pptxPawachMetharattanara
 
1. คู่มือคนสอน คนเรียน PMS.pdf
1. คู่มือคนสอน คนเรียน PMS.pdf1. คู่มือคนสอน คนเรียน PMS.pdf
1. คู่มือคนสอน คนเรียน PMS.pdfPawachMetharattanara
 
Uniview Company Introduction with brief solution(1).pdf
Uniview Company Introduction with brief solution(1).pdfUniview Company Introduction with brief solution(1).pdf
Uniview Company Introduction with brief solution(1).pdfPawachMetharattanara
 
Uniview Company Introduction with brief solution(1).pdf
Uniview Company Introduction with brief solution(1).pdfUniview Company Introduction with brief solution(1).pdf
Uniview Company Introduction with brief solution(1).pdfPawachMetharattanara
 
หนังสือเชิญ Quicktron Robotic .Thailand(1).pdf
หนังสือเชิญ  Quicktron Robotic .Thailand(1).pdfหนังสือเชิญ  Quicktron Robotic .Thailand(1).pdf
หนังสือเชิญ Quicktron Robotic .Thailand(1).pdfPawachMetharattanara
 
07 TOR ระบบ Smart Classroom ขนาด 50 ที่นั่ง 231220.docx
07 TOR ระบบ Smart Classroom ขนาด 50 ที่นั่ง 231220.docx07 TOR ระบบ Smart Classroom ขนาด 50 ที่นั่ง 231220.docx
07 TOR ระบบ Smart Classroom ขนาด 50 ที่นั่ง 231220.docxPawachMetharattanara
 
Presentation DGF Logistics Thailand.คุณอรุณ.1.ppt
Presentation DGF Logistics Thailand.คุณอรุณ.1.pptPresentation DGF Logistics Thailand.คุณอรุณ.1.ppt
Presentation DGF Logistics Thailand.คุณอรุณ.1.pptPawachMetharattanara
 
อบรมพื้นฐาน 2023.pptx
อบรมพื้นฐาน 2023.pptxอบรมพื้นฐาน 2023.pptx
อบรมพื้นฐาน 2023.pptxPawachMetharattanara
 
presentationsolutioncovidschool-230115131900-5c73fd21.pptx
presentationsolutioncovidschool-230115131900-5c73fd21.pptxpresentationsolutioncovidschool-230115131900-5c73fd21.pptx
presentationsolutioncovidschool-230115131900-5c73fd21.pptxPawachMetharattanara
 
01416_PPT_FG_DAY1-บ่าย_651219V2.pdf
01416_PPT_FG_DAY1-บ่าย_651219V2.pdf01416_PPT_FG_DAY1-บ่าย_651219V2.pdf
01416_PPT_FG_DAY1-บ่าย_651219V2.pdfPawachMetharattanara
 
แผนที่PICKชีวิต.pdf
แผนที่PICKชีวิต.pdfแผนที่PICKชีวิต.pdf
แผนที่PICKชีวิต.pdfPawachMetharattanara
 

More from PawachMetharattanara (20)

BIZ model 2024nnnmmmmmmmmmmmmmmmmmmm.pptx
BIZ model 2024nnnmmmmmmmmmmmmmmmmmmm.pptxBIZ model 2024nnnmmmmmmmmmmmmmmmmmmm.pptx
BIZ model 2024nnnmmmmmmmmmmmmmmmmmmm.pptx
 
DLS_CP_Payment Rev.00.pdf
DLS_CP_Payment Rev.00.pdfDLS_CP_Payment Rev.00.pdf
DLS_CP_Payment Rev.00.pdf
 
1. คู่มือคนสอน คนเรียน PMS.pdf
1. คู่มือคนสอน คนเรียน PMS.pdf1. คู่มือคนสอน คนเรียน PMS.pdf
1. คู่มือคนสอน คนเรียน PMS.pdf
 
Smart Parking รพ.กล้วยน้ำไท.pptx
Smart Parking รพ.กล้วยน้ำไท.pptxSmart Parking รพ.กล้วยน้ำไท.pptx
Smart Parking รพ.กล้วยน้ำไท.pptx
 
KPI 2021 Sale ( Nov ).pptx
KPI 2021 Sale ( Nov ).pptxKPI 2021 Sale ( Nov ).pptx
KPI 2021 Sale ( Nov ).pptx
 
1. คู่มือคนสอน คนเรียน PMS.pdf
1. คู่มือคนสอน คนเรียน PMS.pdf1. คู่มือคนสอน คนเรียน PMS.pdf
1. คู่มือคนสอน คนเรียน PMS.pdf
 
Presentation1333.pptx
Presentation1333.pptxPresentation1333.pptx
Presentation1333.pptx
 
Presentation1unv2.pptx
Presentation1unv2.pptxPresentation1unv2.pptx
Presentation1unv2.pptx
 
Presentation1ubv.pptx
Presentation1ubv.pptxPresentation1ubv.pptx
Presentation1ubv.pptx
 
Uniview Company Introduction with brief solution(1).pdf
Uniview Company Introduction with brief solution(1).pdfUniview Company Introduction with brief solution(1).pdf
Uniview Company Introduction with brief solution(1).pdf
 
Univiwe Training 2023.pdf
Univiwe Training 2023.pdfUniviwe Training 2023.pdf
Univiwe Training 2023.pdf
 
Uniview Company Introduction with brief solution(1).pdf
Uniview Company Introduction with brief solution(1).pdfUniview Company Introduction with brief solution(1).pdf
Uniview Company Introduction with brief solution(1).pdf
 
หนังสือเชิญ Quicktron Robotic .Thailand(1).pdf
หนังสือเชิญ  Quicktron Robotic .Thailand(1).pdfหนังสือเชิญ  Quicktron Robotic .Thailand(1).pdf
หนังสือเชิญ Quicktron Robotic .Thailand(1).pdf
 
07 TOR ระบบ Smart Classroom ขนาด 50 ที่นั่ง 231220.docx
07 TOR ระบบ Smart Classroom ขนาด 50 ที่นั่ง 231220.docx07 TOR ระบบ Smart Classroom ขนาด 50 ที่นั่ง 231220.docx
07 TOR ระบบ Smart Classroom ขนาด 50 ที่นั่ง 231220.docx
 
Presentation DGF Logistics Thailand.คุณอรุณ.1.ppt
Presentation DGF Logistics Thailand.คุณอรุณ.1.pptPresentation DGF Logistics Thailand.คุณอรุณ.1.ppt
Presentation DGF Logistics Thailand.คุณอรุณ.1.ppt
 
อบรมพื้นฐาน 2023.pptx
อบรมพื้นฐาน 2023.pptxอบรมพื้นฐาน 2023.pptx
อบรมพื้นฐาน 2023.pptx
 
presentationsolutioncovidschool-230115131900-5c73fd21.pptx
presentationsolutioncovidschool-230115131900-5c73fd21.pptxpresentationsolutioncovidschool-230115131900-5c73fd21.pptx
presentationsolutioncovidschool-230115131900-5c73fd21.pptx
 
Catalog Quick.pdf
Catalog Quick.pdfCatalog Quick.pdf
Catalog Quick.pdf
 
01416_PPT_FG_DAY1-บ่าย_651219V2.pdf
01416_PPT_FG_DAY1-บ่าย_651219V2.pdf01416_PPT_FG_DAY1-บ่าย_651219V2.pdf
01416_PPT_FG_DAY1-บ่าย_651219V2.pdf
 
แผนที่PICKชีวิต.pdf
แผนที่PICKชีวิต.pdfแผนที่PICKชีวิต.pdf
แผนที่PICKชีวิต.pdf
 

Recently uploaded

MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 

Recently uploaded (20)

MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 

experience_and_perspective_of_security_installation.ppt

  • 1. Experience and Perspective of Security Installation Opportunities Edward J. Donelan, RCDD/NTS, TLT President, Telecom Infrastructure Corp
  • 2. BICSI Publications • NDRM (Network Design Reference) 6th Edition – November 2005 • ESS (Electronic Safety and Security Design) 1st Edition – January 2006 • CO-OSP (Customer Owned Outside Plant) 4th Edition – January 2007 • PAVDRM (Principles of AV Design) 1st Edition – June 2006 (ICIA Partnership)
  • 3. BICSI UPDATE • ESS (Electronic Safety and Security) Designer Designation Direction The ESS designer is the person who understands vulnerability, risk, and threat, designs a complete and functional security system, oversees the implementation and verifies / validates system performance. • SIA – Javits Center, NYC – August 24 – 25, 2005 – Security Industry Association – www.isceast.com
  • 4. BICSI UPDATE • ESS Outline – Threat – Legal, liability, ethic – Asset Protection – Intercom / Annunciators – Biometrics / Intrusion Detection – CCTV – Access Control – Monitoring - training – Fire Detection & Alarm – Sensors / Integrated System – Mobile Security / Wireless / Data Security – Doors, locks, safes and seals
  • 5. Business Opportunity In 2004 47% said their company is listed on a GSA Schedule, compared to just 12% in 2003. The convergence of IT and computer networking with electronic security is becoming reality. A true indicator that separates an alarm dealer from a serious systems integrator is if the company has its own CAD/CAM plotter equipment. Source: SecuritySales.com
  • 6. Business Opportunity CCTV and Access Control making strides toward topping burglar alarms as the electronic security industry’s No 1 source of revenue Source: SecuritySales.com
  • 8. Business Opportunity Homeland security efforts appear to be substantially impacting the electronic security industry as large industrial (gov’t, utilities, airports, stadiums, etc.) swiped 6 percentage points from both commercial and residential installations in 2004. Source: SecuritySales.com
  • 9. Business Opportunity Electronic security contractors continue the recent trend of making more at the front end as paid-in- full installations remained at 58%. Source: SecuritySales.com
  • 10. Security Installation Statistics • Average number of installed accounts in 2004 is 550 • Average number of monitored accounts in 2004 is 300 •76% use a third-party contract central monitoring station • 47% of integrators have access to the internet from the field.
  • 11. Security Business Opportunities The “sweet spot” for the typical security contractor is $1 million to $4.9 million in annual gross revenues. Source: SecuritySales.com
  • 12. Security Average gross profit margins 40.3% and 27.4% net profit on CCTV installations Remote video is one of the most in-demand features with networked video on the rise. Source: SecuritySales.com
  • 13. QUESTIONS TO ASK What is the application? • Retail store, office, parking lot, all How many cameras in the system? • How many indoors & outdoors What are the cameras viewing? • Area, distance • This may determine if P/T/Z is needed
  • 14. QUESTIONS TO ASK What is camera environment? • Freezer, office, hot warehouse, etc. Where or how are cameras mounted? • Ceiling dome, outdoor pole, etc. How will the system be used? • Manned system, monitored • Passive system just recorded
  • 15. QUESTIONS TO ASK How many monitor locations? • View only or control Is remote access needed? • Remote network connection • Internet
  • 16. QUESTIONS TO ASK What does user want to achieve? • Stop internal theft • Security from outside influences • Shoplifting • Vandalism issues
  • 17. GUIDELINES Be aware of lighting Observe the sun Know why customer wants cameras 1 camera will not cover a 300’ fence
  • 20. Access Control • Average profit margins for Access Control installations are 37% gross and 22% net. • Integrators say more than 48% of their access control installations include some sort of integration with CCTV or other security system. • Commercial office environment accounts for more than 36% of all access control system installations.
  • 21. AC Worksheet Access Control System Door Planning Worksheet  In order to install the proper locking hardware, answers to the following questions are essential.
  • 22. Reasons For Access Control • Reduce Key Control Problems • Allows Managed Access • Provide 24/7 Security • Management Tool • Reduce Cost
  • 23. Key Control Problems • Affects all business and government • No control of distributed keys • Huge security risk – Stolen/missing keys = new locks & keys • Very labor intensive and expensive
  • 24. Key Control Solutions • Provide card access to all employees • Each card is unique, assigned to user • Absolute control • Immediate information • Easier to manage • Reduced costs
  • 25. Allow Access…Problems • Providing security to the building – Day vs. night – Various levels of security • Authorized personnel – Time, day,entry & exit • Doors must be locked and unlocked • Key holder control
  • 26. Allow Access…Solutions • All employees are issued a card • Demonstrates confidence to employees • Maintains control over usage – Time, day, schedule. Etc. – By employee, dept., visitor • Cards are difficult to duplicate • Provides flexibility with security – Secure when and where needed
  • 27. 24/7 Security Problems • Key systems are not secure • Employees must feel safe • High cost for keys, locks, guards, etc. • Risk of internal theft and fraud
  • 28. 24/7 Security Solutions • Provide perimeter security • Permit free movement of employees – Authorized access w/o supervisor key – Increase mobility of workers • Reduce or eliminate guards • Reduce opportunity for theft of fraud
  • 29. Application for Access Control • Need to improve or upgrade security • Companies with key control problems • Real or potential security risks • Need to provide greater security – Shift schedules – High employee turnover – Temp. workers
  • 30. Application for Access Control • Multiple levels of security – Execs., factory, R&D, TR’s, MTER’s, etc. • Need to record or control usage – Charge for use, common conf. Room • Companies offering flexible schedules • Improve after hours security • Need to automate security functions
  • 31. Why Sell Access Control • Leads to add-on sales – CCTV – Expansion – Motion detectors • Small recurring revenue in cards – Also keeps you in touch • Less competition than traditional alarms
  • 32. Why Sell Access Control • Potential for higher margins • Leads to other sales – Word of mouth – Envy
  • 33. Access Control Basics • Who, When, Where, What – Who uses the system – When they use the system – Where they use the system – What happened
  • 34. Access Control Components • Controller – Multi-reader control in a can – Single door keypad – All wire goes to this point • Cards – Each user assigned a unique card – Usage parameters programmed in system – Bit formats
  • 35. Access Control Components • Reader Technologies – Proximity (prox) – Magnetic Stripe – Bar Code – Weigand – Radio (RF) – Multi-Technology
  • 36. Access Control Components • Reader Technologies – Biometric • Hand • Finger • Face • Voice • Retina – With Keypad
  • 37. Access Control Components • Controlled Door – Lock • Electric strike or magnetic lock – One or two readers – Door contact – Request to exit detector (REX) – Automatic door closer – Optional annunciater
  • 38. Access Control Components • Magnetic Lock – Must release with fire alarm, power failure • Building not secure in power failure – “Push To Exit” button w/ separate timer – Automatic release (15 sec. delay max.) • Electric Strike – Free exit device – Typically locked without power – Use a locksmith
  • 39. Access Functions & Features • Schedules & Holidays • Access Levels • Monitored Inputs • Alarm Events • Elevator Control • Antipassback • Mantrap • Time & Attendance
  • 40. AC Worksheet Access Control Quick Quote Fax Form  In order to spec the right equipment for the job, fill out this handy quick quote sheet.
  • 41. Burglary Alarms • Average profit margins installing companies realize on burglary jobs are 42.2% gross and 25.5% net. • 26% of burglary installations include wireless equipment
  • 42. Opportunity Average Profit Margins Gross Net Access Control 37% 22% CCTV 40.3% 27.4% Security Contractor typical Sales is $1 million to $4.9 million in annual gross revenues.
  • 43. Thank You Edward J. Donelan, RCDD, NTS, TLT President, Telecom Infrastructure Corp Treasurer, BICSI edonelan@BICSI.org