3. Commercial Building Security
• Security Design Elements
• Security Department Issues
• Facilities Department Requirements
• HR Department Issues
• Critical Infrastructure Concerns
• Service and Support Requirements
5. Security Design Elements
Security Concentric Ring
– Perimeter, Building(s), Internal Areas
Protection of Property
– People, Assets, Information
Program Management
– Ease of use
– Policies and Procedures
– Manpower Multiplier
6. Security Concentric Ring
Perimeter Control, Protection & Observation
– Need to control building / campus / parking
garages and perimeter with the use of gates,
fences and video observation
– Ability to lock down / unlock the outer building(s)
perimeter based on events or time of day
– Ability to manage the access of key interior
building areas.
7. Protection of Property
“Safety of People, Assets and Information”
– Providing a safe environment and facility from
crime prevention to slip & falls
– Ability to secure & track equipment, information
and people
– Ability to manage / control the access & storage
of confidential records and materials
8. Program Management
“Security is more than Guards”
– Security management focused on ease of use,
understanding, implementation & compliance
– Apply Technology, People, Policies/Procedures to
mitigate security & information risk
– Technology can be a security workforce multiplier
by reducing the number of security personnel
10. Security Department Issues
• Visitor Management
• ID Credentials
• Restricting of Public / Internal Access
• Observing of Key Public / Internal Areas
• Critical Communications To / From
Secured Areas
• Event Documentation
• Security Workforce Efficiency
12. Visitor Management
“Knowing Who is On Site”
– Visitor Sign In and Issue a Temporary Badge
– Restricting Access to “Public” Space and
“Tenant” Areas
– Contractor Sign In Area and Controls
– Security Awareness, Education and Procedures
14. ID Credentials
“More Than Just a Pretty Picture”
– Visible Display of Who You Are
– Access Control Card
– Network Sign On Card
– Read / Write of Portable Data
– Time & Attendance Reporting
16. Restricting Access
“Securing Public vs. Private Space”
– Allowing the public access to public and tenants
areas
– Internal (Private) space control based on
authorization and “need to be in” approach
– Allowing exception based access through
reception desk, intercom and access cards
– Audit Trail reporting of people movements
17. Restricting Access
“Public Lobby Security Situations”
– Always Busy “Around the Clock”
– Weapons, Personal Conflict, Law Enforcement
– Privacy Issues
– First Responders (Fire, EMT, Police, Courts)
– Media and Related Concerns
18. Restricting Access
“HAZMAT / Inventory Security Solutions”
– Inventory Logs and Movement Transactions
– Video and Access Control Event Recording /
Documentation Process
– HAZMAT Disposal Procedures and Policies
– Appropriate Access Credentials / Privileges'
20. Observing of Key Areas
“Keeping an Eye On the Facility”
– Video observation of public and private space to
create a security workforce multiplier
– Video Analytics to create “Logic” in observation
control and “Event” management
– Centralized video storage, display and monitoring
– Remote monitoring and investigation capabilities
21. Observing of Key Areas
“Perimeter Security Situations”
– Vehicles Entering and Leaving the Site
– Parking Lot / Garages & Surface Roads
– Pathways Into & Between the Facilities
– Loading Dock and Waste Removal Areas
– Facility Entry & Exit Points
22. Observing of Key Areas
“Perimeter Security Solutions”
– PTZ and Fixed Cameras In Garages
– Intercom Stations w/Cameras (Code Blue)
– Exterior Cameras at Loading Doc
– Loading Dock and Waste Removal Areas
– Facility Entry & Exit Points
23. Observing of Key Areas
“Interior Security Situations”
– Video Verification to & from Secured Areas
– Tenant / Owner & Public Lobby Areas
– Cashier, Secured Storage & Loading Dock Areas
– Physical Plant & Critical Infrastructure Areas
– Food Courts & Fitness Health Centers
24. Observing of Key Areas
“Interior Security Solutions”
– Fixed Cameras at Secured Doors for Verification
– Event Definition and Video Storage
– Intercom Door Stations with Fixed/PTZ Cameras
– PTZ Cameras for Multiple Video Area (targets)
– Deterrent of Potential Acts of Crime or Abuse
26. Critical Communications
“More Than Just an Intercom Station”
– Real time communications for emergency
situations (tenant access or parking garage)
– Verification to allow exception based access
– Mass notification for first responders
– Network communications monitoring of edge
devices (video loss, panel down)
28. Event Documentation
“Keeping Track of What is Going On”
– Need “policies and procedures” to define what an
event is and it’s resolution
– Video, Access and Intercom “Date Stamped” for
complete story of event
– “Guard Tours” to support policies / procedures
– Manual visitor logs and ID Credential Issuance
30. Security Force Efficiency
Making the Security Force more Efficient
– Access Control and CCTV should create a
workforce multiplier by developing an exception
based security program (go to the event)
– Policies and procedures are key to structuring the
program so guard’s know what to do every time
– Communications, documentation and visibility are
key to mitigating risk
32. Facilities Management
“It’s All About Getting Along w/Facilities”
– Life Safety Compliance with JHA (Fire Marshall)
– Do Not Impact Tenant Business Activities
– Installation Acceptance, Permitting & Fire Alarm
Interface Requirement
– Building Lock Down / Unlock Capabilities
– Integration w/Building Controls
34. HR Department
“It’s All About Getting Along w/HR”
– Custom ID Badge Layout Development
– Tenant System /Database Integration for ID
Management and Confidentiality
– ID Card Issuance, Printing, Supplies, Service
– Card Integration w/Point of Sale (POS) Devices
– Make it Easy to Use and Administer
36. Critical Infrastructure
“Getting Along with the IT Group”
– Ownership of the Network (Security vs. Internal)
– Managing IP Address’s and Network Connections
– Supporting Software and Update
– Supporting Client Applications and Related
Hardware
38. Service and Support
“Take Ownership of the System”
– Service Response Time “Hours not Days”
– Problem Resolution Time “One Trip Fix”
– Software Support and Programming “On Going”
– Network Support and Diagnostics
– Spare Parts Management “On Site if Available”
39. Service and Support
“Fanatical Service Requires”
– Appropriate & Trained Technicians
– Truck Level Spare Parts
– Partnership with Customers IT Group
– Great Attitude Toward Service
– Demonstrate “Value” On Every Customer Visit