SlideShare a Scribd company logo
1 of 40
Commercial
 Building
 Security
A Sales Guild to
  Commercial
    Security
Commercial Building Security
•   Security Design Elements
•   Security Department Issues
•   Facilities Department Requirements
•   HR Department Issues
•   Critical Infrastructure Concerns
•   Service and Support Requirements
Security Design
   Elements
Security Design Elements
Security Concentric Ring
  – Perimeter, Building(s), Internal Areas
Protection of Property
  – People, Assets, Information
Program Management
  – Ease of use
  – Policies and Procedures
  – Manpower Multiplier
Security Concentric Ring
Perimeter Control, Protection & Observation

 – Need to control building / campus / parking
   garages and perimeter with the use of gates,
   fences and video observation

 – Ability to lock down / unlock the outer building(s)
   perimeter based on events or time of day

 – Ability to manage the access of key interior
   building areas.
Protection of Property
“Safety of People, Assets and Information”

– Providing a safe environment and facility from
  crime prevention to slip & falls

– Ability to secure & track equipment, information
  and people

– Ability to manage / control the access & storage
  of confidential records and materials
Program Management
      “Security is more than Guards”

– Security management focused on ease of use,
  understanding, implementation & compliance

– Apply Technology, People, Policies/Procedures to
  mitigate security & information risk

– Technology can be a security workforce multiplier
  by reducing the number of security personnel
Security
Department
  Issues
Security Department Issues
• Visitor Management
• ID Credentials
• Restricting of Public / Internal Access
• Observing of Key Public / Internal Areas
• Critical Communications To / From
  Secured Areas
• Event Documentation
• Security Workforce Efficiency
Visitor Management
Visitor Management
         “Knowing Who is On Site”

– Visitor Sign In and Issue a Temporary Badge

– Restricting Access to “Public” Space and
  “Tenant” Areas

– Contractor Sign In Area and Controls

– Security Awareness, Education and Procedures
ID Credentials
ID Credentials
    “More Than Just a Pretty Picture”

– Visible Display of Who You Are

– Access Control Card

– Network Sign On Card

– Read / Write of Portable Data

– Time & Attendance Reporting
Restricting Access
Restricting Access
   “Securing Public vs. Private Space”

– Allowing the public access to public and tenants
  areas

– Internal (Private) space control based on
  authorization and “need to be in” approach

– Allowing exception based access through
  reception desk, intercom and access cards

– Audit Trail reporting of people movements
Restricting Access
    “Public Lobby Security Situations”

– Always Busy “Around the Clock”

– Weapons, Personal Conflict, Law Enforcement

– Privacy Issues

– First Responders (Fire, EMT, Police, Courts)

– Media and Related Concerns
Restricting Access
“HAZMAT / Inventory Security Solutions”

– Inventory Logs and Movement Transactions

– Video and Access Control Event Recording /
  Documentation Process

– HAZMAT Disposal Procedures and Policies

– Appropriate Access Credentials / Privileges'
Observing of Key Areas
Observing of Key Areas
     “Keeping an Eye On the Facility”

– Video observation of public and private space to
  create a security workforce multiplier

– Video Analytics to create “Logic” in observation
  control and “Event” management

– Centralized video storage, display and monitoring

– Remote monitoring and investigation capabilities
Observing of Key Areas
      “Perimeter Security Situations”

– Vehicles Entering and Leaving the Site

– Parking Lot / Garages & Surface Roads

– Pathways Into & Between the Facilities

– Loading Dock and Waste Removal Areas

– Facility Entry & Exit Points
Observing of Key Areas
       “Perimeter Security Solutions”

– PTZ and Fixed Cameras In Garages

– Intercom Stations w/Cameras (Code Blue)

– Exterior Cameras at Loading Doc

– Loading Dock and Waste Removal Areas

– Facility Entry & Exit Points
Observing of Key Areas
        “Interior Security Situations”

– Video Verification to & from Secured Areas

– Tenant / Owner & Public Lobby Areas

– Cashier, Secured Storage & Loading Dock Areas

– Physical Plant & Critical Infrastructure Areas

– Food Courts & Fitness Health Centers
Observing of Key Areas
      “Interior Security Solutions”

– Fixed Cameras at Secured Doors for Verification

– Event Definition and Video Storage

– Intercom Door Stations with Fixed/PTZ Cameras

– PTZ Cameras for Multiple Video Area (targets)

– Deterrent of Potential Acts of Crime or Abuse
Critical Communications
Critical Communications
  “More Than Just an Intercom Station”

– Real time communications for emergency
  situations (tenant access or parking garage)

– Verification to allow exception based access

– Mass notification for first responders

– Network communications monitoring of edge
  devices (video loss, panel down)
Event Documentation
Event Documentation
  “Keeping Track of What is Going On”

– Need “policies and procedures” to define what an
  event is and it’s resolution

– Video, Access and Intercom “Date Stamped” for
  complete story of event

– “Guard Tours” to support policies / procedures

– Manual visitor logs and ID Credential Issuance
Security Force Efficiency
Security Force Efficiency
Making the Security Force more Efficient

– Access Control and CCTV should create a
  workforce multiplier by developing an exception
  based security program (go to the event)

– Policies and procedures are key to structuring the
  program so guard’s know what to do every time

– Communications, documentation and visibility are
  key to mitigating risk
Facilities
Department
Facilities Management
 “It’s All About Getting Along w/Facilities”

– Life Safety Compliance with JHA (Fire Marshall)

– Do Not Impact Tenant Business Activities

– Installation Acceptance, Permitting & Fire Alarm
  Interface Requirement

– Building Lock Down / Unlock Capabilities

– Integration w/Building Controls
HR Department
HR Department
    “It’s All About Getting Along w/HR”

– Custom ID Badge Layout Development

– Tenant System /Database Integration for ID
  Management and Confidentiality

– ID Card Issuance, Printing, Supplies, Service

– Card Integration w/Point of Sale (POS) Devices

– Make it Easy to Use and Administer
Critical
Infrastructure
Critical Infrastructure
     “Getting Along with the IT Group”

– Ownership of the Network (Security vs. Internal)

– Managing IP Address’s and Network Connections

– Supporting Software and Update

– Supporting Client Applications and Related
  Hardware
Service & Support
Service and Support
     “Take Ownership of the System”

– Service Response Time “Hours not Days”

– Problem Resolution Time “One Trip Fix”

– Software Support and Programming “On Going”

– Network Support and Diagnostics

– Spare Parts Management “On Site if Available”
Service and Support
       “Fanatical Service Requires”

– Appropriate & Trained Technicians

– Truck Level Spare Parts

– Partnership with Customers IT Group

– Great Attitude Toward Service

– Demonstrate “Value” On Every Customer Visit
Questions
   &
Answers

More Related Content

Similar to BOMA

experience_and_perspective_of_security_installation.ppt
experience_and_perspective_of_security_installation.pptexperience_and_perspective_of_security_installation.ppt
experience_and_perspective_of_security_installation.pptPawachMetharattanara
 
Cause 11 im final
Cause 11   im finalCause 11   im final
Cause 11 im finalcavapyta
 
Cause 11 im final
Cause 11   im finalCause 11   im final
Cause 11 im finalcavapyta
 
Open Nature Park Ops & Security Solutions
Open Nature Park Ops & Security SolutionsOpen Nature Park Ops & Security Solutions
Open Nature Park Ops & Security Solutionskoottummel
 
Hidden security and privacy consequences around mobility (Infosec 2013)
Hidden security and privacy consequences around mobility (Infosec 2013)Hidden security and privacy consequences around mobility (Infosec 2013)
Hidden security and privacy consequences around mobility (Infosec 2013)Huntsman Security
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & BuildSameer Paradia
 
basic-security-concepts-what-is-security48.ppt
basic-security-concepts-what-is-security48.pptbasic-security-concepts-what-is-security48.ppt
basic-security-concepts-what-is-security48.pptPawachMetharattanara
 
محتويات مادة آمن الشبكات
محتويات مادة آمن الشبكاتمحتويات مادة آمن الشبكات
محتويات مادة آمن الشبكاتeng_SamMoh
 
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.IGN MANTRA
 
Practical SME Security on a Shoestring
Practical SME Security on a ShoestringPractical SME Security on a Shoestring
Practical SME Security on a ShoestringNCC Group
 
managingyouraccesscontrolsystems-130223182036-phpapp01
managingyouraccesscontrolsystems-130223182036-phpapp01managingyouraccesscontrolsystems-130223182036-phpapp01
managingyouraccesscontrolsystems-130223182036-phpapp01Walter Sinchak,
 
2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLD
2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLD2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLD
2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLDJack Kessler
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information PrivacyPerry Slack
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation Technology Society Nepal
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control PresentationWajahat Rajab
 
DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015T. J. Saotome
 
Unit 1&2.pdf
Unit 1&2.pdfUnit 1&2.pdf
Unit 1&2.pdfNdheh
 

Similar to BOMA (20)

experience_and_perspective_of_security_installation.ppt
experience_and_perspective_of_security_installation.pptexperience_and_perspective_of_security_installation.ppt
experience_and_perspective_of_security_installation.ppt
 
Cause 11 im final
Cause 11   im finalCause 11   im final
Cause 11 im final
 
Cause 11 im final
Cause 11   im finalCause 11   im final
Cause 11 im final
 
Hisplus Biometrics
Hisplus Biometrics Hisplus Biometrics
Hisplus Biometrics
 
Open Nature Park Ops & Security Solutions
Open Nature Park Ops & Security SolutionsOpen Nature Park Ops & Security Solutions
Open Nature Park Ops & Security Solutions
 
Widepoint orc thales webinar 111313d - nov 2013
Widepoint orc thales webinar 111313d - nov 2013Widepoint orc thales webinar 111313d - nov 2013
Widepoint orc thales webinar 111313d - nov 2013
 
BYOD / Mobile-Device Security Guidelines for CxO's
BYOD / Mobile-Device Security Guidelines for CxO'sBYOD / Mobile-Device Security Guidelines for CxO's
BYOD / Mobile-Device Security Guidelines for CxO's
 
Hidden security and privacy consequences around mobility (Infosec 2013)
Hidden security and privacy consequences around mobility (Infosec 2013)Hidden security and privacy consequences around mobility (Infosec 2013)
Hidden security and privacy consequences around mobility (Infosec 2013)
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
 
basic-security-concepts-what-is-security48.ppt
basic-security-concepts-what-is-security48.pptbasic-security-concepts-what-is-security48.ppt
basic-security-concepts-what-is-security48.ppt
 
محتويات مادة آمن الشبكات
محتويات مادة آمن الشبكاتمحتويات مادة آمن الشبكات
محتويات مادة آمن الشبكات
 
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
 
Practical SME Security on a Shoestring
Practical SME Security on a ShoestringPractical SME Security on a Shoestring
Practical SME Security on a Shoestring
 
managingyouraccesscontrolsystems-130223182036-phpapp01
managingyouraccesscontrolsystems-130223182036-phpapp01managingyouraccesscontrolsystems-130223182036-phpapp01
managingyouraccesscontrolsystems-130223182036-phpapp01
 
2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLD
2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLD2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLD
2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLD
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015
 
Unit 1&2.pdf
Unit 1&2.pdfUnit 1&2.pdf
Unit 1&2.pdf
 

BOMA

  • 2. A Sales Guild to Commercial Security
  • 3. Commercial Building Security • Security Design Elements • Security Department Issues • Facilities Department Requirements • HR Department Issues • Critical Infrastructure Concerns • Service and Support Requirements
  • 4. Security Design Elements
  • 5. Security Design Elements Security Concentric Ring – Perimeter, Building(s), Internal Areas Protection of Property – People, Assets, Information Program Management – Ease of use – Policies and Procedures – Manpower Multiplier
  • 6. Security Concentric Ring Perimeter Control, Protection & Observation – Need to control building / campus / parking garages and perimeter with the use of gates, fences and video observation – Ability to lock down / unlock the outer building(s) perimeter based on events or time of day – Ability to manage the access of key interior building areas.
  • 7. Protection of Property “Safety of People, Assets and Information” – Providing a safe environment and facility from crime prevention to slip & falls – Ability to secure & track equipment, information and people – Ability to manage / control the access & storage of confidential records and materials
  • 8. Program Management “Security is more than Guards” – Security management focused on ease of use, understanding, implementation & compliance – Apply Technology, People, Policies/Procedures to mitigate security & information risk – Technology can be a security workforce multiplier by reducing the number of security personnel
  • 10. Security Department Issues • Visitor Management • ID Credentials • Restricting of Public / Internal Access • Observing of Key Public / Internal Areas • Critical Communications To / From Secured Areas • Event Documentation • Security Workforce Efficiency
  • 12. Visitor Management “Knowing Who is On Site” – Visitor Sign In and Issue a Temporary Badge – Restricting Access to “Public” Space and “Tenant” Areas – Contractor Sign In Area and Controls – Security Awareness, Education and Procedures
  • 14. ID Credentials “More Than Just a Pretty Picture” – Visible Display of Who You Are – Access Control Card – Network Sign On Card – Read / Write of Portable Data – Time & Attendance Reporting
  • 16. Restricting Access “Securing Public vs. Private Space” – Allowing the public access to public and tenants areas – Internal (Private) space control based on authorization and “need to be in” approach – Allowing exception based access through reception desk, intercom and access cards – Audit Trail reporting of people movements
  • 17. Restricting Access “Public Lobby Security Situations” – Always Busy “Around the Clock” – Weapons, Personal Conflict, Law Enforcement – Privacy Issues – First Responders (Fire, EMT, Police, Courts) – Media and Related Concerns
  • 18. Restricting Access “HAZMAT / Inventory Security Solutions” – Inventory Logs and Movement Transactions – Video and Access Control Event Recording / Documentation Process – HAZMAT Disposal Procedures and Policies – Appropriate Access Credentials / Privileges'
  • 20. Observing of Key Areas “Keeping an Eye On the Facility” – Video observation of public and private space to create a security workforce multiplier – Video Analytics to create “Logic” in observation control and “Event” management – Centralized video storage, display and monitoring – Remote monitoring and investigation capabilities
  • 21. Observing of Key Areas “Perimeter Security Situations” – Vehicles Entering and Leaving the Site – Parking Lot / Garages & Surface Roads – Pathways Into & Between the Facilities – Loading Dock and Waste Removal Areas – Facility Entry & Exit Points
  • 22. Observing of Key Areas “Perimeter Security Solutions” – PTZ and Fixed Cameras In Garages – Intercom Stations w/Cameras (Code Blue) – Exterior Cameras at Loading Doc – Loading Dock and Waste Removal Areas – Facility Entry & Exit Points
  • 23. Observing of Key Areas “Interior Security Situations” – Video Verification to & from Secured Areas – Tenant / Owner & Public Lobby Areas – Cashier, Secured Storage & Loading Dock Areas – Physical Plant & Critical Infrastructure Areas – Food Courts & Fitness Health Centers
  • 24. Observing of Key Areas “Interior Security Solutions” – Fixed Cameras at Secured Doors for Verification – Event Definition and Video Storage – Intercom Door Stations with Fixed/PTZ Cameras – PTZ Cameras for Multiple Video Area (targets) – Deterrent of Potential Acts of Crime or Abuse
  • 26. Critical Communications “More Than Just an Intercom Station” – Real time communications for emergency situations (tenant access or parking garage) – Verification to allow exception based access – Mass notification for first responders – Network communications monitoring of edge devices (video loss, panel down)
  • 28. Event Documentation “Keeping Track of What is Going On” – Need “policies and procedures” to define what an event is and it’s resolution – Video, Access and Intercom “Date Stamped” for complete story of event – “Guard Tours” to support policies / procedures – Manual visitor logs and ID Credential Issuance
  • 30. Security Force Efficiency Making the Security Force more Efficient – Access Control and CCTV should create a workforce multiplier by developing an exception based security program (go to the event) – Policies and procedures are key to structuring the program so guard’s know what to do every time – Communications, documentation and visibility are key to mitigating risk
  • 32. Facilities Management “It’s All About Getting Along w/Facilities” – Life Safety Compliance with JHA (Fire Marshall) – Do Not Impact Tenant Business Activities – Installation Acceptance, Permitting & Fire Alarm Interface Requirement – Building Lock Down / Unlock Capabilities – Integration w/Building Controls
  • 34. HR Department “It’s All About Getting Along w/HR” – Custom ID Badge Layout Development – Tenant System /Database Integration for ID Management and Confidentiality – ID Card Issuance, Printing, Supplies, Service – Card Integration w/Point of Sale (POS) Devices – Make it Easy to Use and Administer
  • 36. Critical Infrastructure “Getting Along with the IT Group” – Ownership of the Network (Security vs. Internal) – Managing IP Address’s and Network Connections – Supporting Software and Update – Supporting Client Applications and Related Hardware
  • 38. Service and Support “Take Ownership of the System” – Service Response Time “Hours not Days” – Problem Resolution Time “One Trip Fix” – Software Support and Programming “On Going” – Network Support and Diagnostics – Spare Parts Management “On Site if Available”
  • 39. Service and Support “Fanatical Service Requires” – Appropriate & Trained Technicians – Truck Level Spare Parts – Partnership with Customers IT Group – Great Attitude Toward Service – Demonstrate “Value” On Every Customer Visit
  • 40. Questions & Answers