SlideShare a Scribd company logo
Experience and Perspective
of Security Installation
Opportunities
Edward J. Donelan, RCDD/NTS, TLT
President, Telecom Infrastructure Corp
BICSI Publications
• NDRM (Network Design Reference) 6th Edition
– November 2005
• ESS (Electronic Safety and Security Design) 1st Edition
– January 2006
• CO-OSP (Customer Owned Outside Plant) 4th Edition
– January 2007
• PAVDRM (Principles of AV Design) 1st Edition
– June 2006 (ICIA Partnership)
BICSI UPDATE
• ESS (Electronic Safety and Security) Designer
Designation Direction
The ESS designer is the person who understands vulnerability,
risk, and threat, designs a complete and functional security
system, oversees the implementation and verifies / validates
system performance.
• SIA – Javits Center, NYC
– August 24 – 25, 2005
– Security Industry Association
– www.isceast.com
BICSI UPDATE
• ESS Outline
– Threat – Legal, liability, ethic
– Asset Protection
– Intercom / Annunciators
– Biometrics / Intrusion
Detection
– CCTV – Access Control
– Monitoring - training
– Fire Detection & Alarm
– Sensors / Integrated
System
– Mobile Security /
Wireless / Data
Security
– Doors, locks, safes and
seals
Business
Opportunity
In 2004 47% said their
company is listed on a
GSA Schedule,
compared to just 12% in
2003.
The convergence of IT
and computer
networking with
electronic security is
becoming reality.
A true indicator that
separates an alarm dealer
from a serious systems
integrator is if the company
has its own CAD/CAM
plotter equipment.
Source: SecuritySales.com
Business
Opportunity
CCTV and Access
Control making strides
toward topping burglar
alarms as the
electronic security
industry’s No 1 source
of revenue
Source: SecuritySales.com
Security Business
Opportunity
Source: SecuritySales.com
Business
Opportunity
Homeland security
efforts appear to be
substantially impacting
the electronic security
industry as large
industrial (gov’t, utilities,
airports, stadiums, etc.)
swiped 6 percentage
points from both
commercial and
residential installations in
2004.
Source: SecuritySales.com
Business
Opportunity
Electronic security
contractors continue
the recent trend of
making more at the
front end as paid-in-
full installations
remained at 58%.
Source: SecuritySales.com
Security
Installation
Statistics
• Average number of installed accounts in
2004 is 550
• Average number of monitored accounts in
2004 is 300
•76% use a third-party contract central
monitoring station
• 47% of integrators have access to the
internet from the field.
Security Business Opportunities
The “sweet spot” for
the typical security
contractor is $1
million to $4.9 million
in annual gross
revenues.
Source: SecuritySales.com
Security
Average gross profit margins
40.3% and 27.4% net profit
on CCTV installations
Remote video is one of the most
in-demand features with
networked video on the rise.
Source: SecuritySales.com
QUESTIONS TO ASK
What is the application?
• Retail store, office, parking lot, all
How many cameras in the system?
• How many indoors & outdoors
What are the cameras viewing?
• Area, distance
• This may determine if P/T/Z is needed
QUESTIONS TO ASK
What is camera environment?
• Freezer, office, hot warehouse, etc.
Where or how are cameras mounted?
• Ceiling dome, outdoor pole, etc.
How will the system be used?
• Manned system, monitored
• Passive system just recorded
QUESTIONS TO ASK
How many monitor locations?
• View only or control
Is remote access needed?
• Remote network connection
• Internet
QUESTIONS TO ASK
What does user want to achieve?
• Stop internal theft
• Security from outside influences
• Shoplifting
• Vandalism issues
GUIDELINES
Be aware of lighting
Observe the sun
Know why customer wants cameras
1 camera will not cover a 300’ fence
INTRODUCTION TO ACCESS
CONTROL
Access
Control
Access
Control
• Average profit margins for Access Control
installations are 37% gross and 22% net.
• Integrators say more than 48% of their access
control installations include some sort of
integration with CCTV or other security system.
• Commercial office environment accounts for
more than 36% of all access control system
installations.
AC
Worksheet
Access Control System
Door Planning
Worksheet
 In order to install the
proper locking
hardware, answers to
the following questions
are essential.
Reasons For Access Control
• Reduce Key Control Problems
• Allows Managed Access
• Provide 24/7 Security
• Management Tool
• Reduce Cost
Key Control Problems
• Affects all business and government
• No control of distributed keys
• Huge security risk
– Stolen/missing keys = new locks & keys
• Very labor intensive and expensive
Key Control Solutions
• Provide card access to all employees
• Each card is unique, assigned to user
• Absolute control
• Immediate information
• Easier to manage
• Reduced costs
Allow Access…Problems
• Providing security to the building
– Day vs. night
– Various levels of security
• Authorized personnel
– Time, day,entry & exit
• Doors must be locked and unlocked
• Key holder control
Allow Access…Solutions
• All employees are issued a card
• Demonstrates confidence to employees
• Maintains control over usage
– Time, day, schedule. Etc.
– By employee, dept., visitor
• Cards are difficult to duplicate
• Provides flexibility with security
– Secure when and where needed
24/7 Security Problems
• Key systems are not secure
• Employees must feel safe
• High cost for keys, locks, guards, etc.
• Risk of internal theft and fraud
24/7 Security Solutions
• Provide perimeter security
• Permit free movement of employees
– Authorized access w/o supervisor key
– Increase mobility of workers
• Reduce or eliminate guards
• Reduce opportunity for theft of fraud
Application for Access Control
• Need to improve or upgrade security
• Companies with key control problems
• Real or potential security risks
• Need to provide greater security
– Shift schedules
– High employee turnover
– Temp. workers
Application for Access Control
• Multiple levels of security
– Execs., factory, R&D, TR’s, MTER’s, etc.
• Need to record or control usage
– Charge for use, common conf. Room
• Companies offering flexible schedules
• Improve after hours security
• Need to automate security functions
Why Sell Access Control
• Leads to add-on sales
– CCTV
– Expansion
– Motion detectors
• Small recurring revenue in cards
– Also keeps you in touch
• Less competition than traditional alarms
Why Sell Access Control
• Potential for higher margins
• Leads to other sales
– Word of mouth
– Envy
Access Control Basics
• Who, When, Where, What
– Who uses the system
– When they use the system
– Where they use the system
– What happened
Access Control Components
• Controller
– Multi-reader control in a can
– Single door keypad
– All wire goes to this point
• Cards
– Each user assigned a unique card
– Usage parameters programmed in system
– Bit formats
Access Control Components
• Reader Technologies
– Proximity (prox)
– Magnetic Stripe
– Bar Code
– Weigand
– Radio (RF)
– Multi-Technology
Access Control Components
• Reader Technologies
– Biometric
• Hand
• Finger
• Face
• Voice
• Retina
– With Keypad
Access Control Components
• Controlled Door
– Lock
• Electric strike or magnetic lock
– One or two readers
– Door contact
– Request to exit detector (REX)
– Automatic door closer
– Optional annunciater
Access Control Components
• Magnetic Lock
– Must release with fire alarm, power failure
• Building not secure in power failure
– “Push To Exit” button w/ separate timer
– Automatic release (15 sec. delay max.)
• Electric Strike
– Free exit device
– Typically locked without power
– Use a locksmith
Access Functions & Features
• Schedules & Holidays
• Access Levels
• Monitored Inputs
• Alarm Events
• Elevator Control
• Antipassback
• Mantrap
• Time & Attendance
AC
Worksheet
Access Control Quick
Quote Fax Form
 In order to spec the
right equipment for the
job, fill out this handy
quick quote sheet.
Burglary
Alarms
• Average profit
margins installing
companies realize
on burglary jobs are
42.2% gross and
25.5% net.
• 26% of burglary
installations include
wireless equipment
Opportunity
Average Profit Margins
Gross Net
Access Control 37% 22%
CCTV 40.3% 27.4%
Security Contractor typical Sales is $1 million to
$4.9 million in annual gross revenues.
Thank You
Edward J. Donelan, RCDD, NTS, TLT
President, Telecom Infrastructure Corp
Treasurer, BICSI
edonelan@BICSI.org

More Related Content

Similar to experience_and_perspective_of_security_installation.ppt

Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013
Niraj Kumar
 
Defcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shopDefcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shop
Priyanka Aash
 
Practical SME Security on a Shoestring
Practical SME Security on a ShoestringPractical SME Security on a Shoestring
Practical SME Security on a Shoestring
NCC Group
 
Karunia Wijaya - Proactive Incident Handling
Karunia Wijaya - Proactive Incident HandlingKarunia Wijaya - Proactive Incident Handling
Karunia Wijaya - Proactive Incident Handling
Indonesia Honeynet Chapter
 
Dncybersecurity
DncybersecurityDncybersecurity
Dncybersecurity
Anne Starr
 
ComSec Security Systems - Tanzania
ComSec Security Systems - TanzaniaComSec Security Systems - Tanzania
ComSec Security Systems - Tanzania
ComSecManager
 
Lessson 1
Lessson 1Lessson 1
Day-4-Cyber-Analysis-Course_01152016.pptx
Day-4-Cyber-Analysis-Course_01152016.pptxDay-4-Cyber-Analysis-Course_01152016.pptx
Day-4-Cyber-Analysis-Course_01152016.pptx
XarCrystal
 
Automotive Cyber-Security Insights learned from IT and ICS/SCADA
Automotive Cyber-Security Insights learned from IT and ICS/SCADAAutomotive Cyber-Security Insights learned from IT and ICS/SCADA
Automotive Cyber-Security Insights learned from IT and ICS/SCADA
Gilad Bandel
 
BOMA
BOMABOMA
BOMA
jdemone
 
Information Security
Information SecurityInformation Security
Information Security
sonykhan3
 
ISBB_Chapter6.pptx
ISBB_Chapter6.pptxISBB_Chapter6.pptx
ISBB_Chapter6.pptx
AmanSoni665879
 
Access control system
Access control systemAccess control system
Access control system
Matrix COSEC
 
PT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolPT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrol
Shah Sheikh
 
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure ThingsSecurity Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
Design World
 
Attacking and Defending Autos Via OBD-II from escar Asia
Attacking and Defending Autos Via OBD-II from escar AsiaAttacking and Defending Autos Via OBD-II from escar Asia
Attacking and Defending Autos Via OBD-II from escar Asia
Digital Bond
 
Track 5 session 4 - st dev con 2016 - life cycle management for web
Track 5   session 4 - st dev con 2016 - life cycle management for webTrack 5   session 4 - st dev con 2016 - life cycle management for web
Track 5 session 4 - st dev con 2016 - life cycle management for web
ST_World
 
Embedded
EmbeddedEmbedded
Embedded
Arpan Pal
 
Penetration testing & Ethical Hacking
Penetration testing & Ethical HackingPenetration testing & Ethical Hacking
Penetration testing & Ethical Hacking
S.E. CTS CERT-GOV-MD
 
Considerations for a secure internet of things for cities and communities
Considerations for a secure internet of things for cities and communitiesConsiderations for a secure internet of things for cities and communities
Considerations for a secure internet of things for cities and communities
Mrinal Wadhwa
 

Similar to experience_and_perspective_of_security_installation.ppt (20)

Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013
 
Defcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shopDefcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shop
 
Practical SME Security on a Shoestring
Practical SME Security on a ShoestringPractical SME Security on a Shoestring
Practical SME Security on a Shoestring
 
Karunia Wijaya - Proactive Incident Handling
Karunia Wijaya - Proactive Incident HandlingKarunia Wijaya - Proactive Incident Handling
Karunia Wijaya - Proactive Incident Handling
 
Dncybersecurity
DncybersecurityDncybersecurity
Dncybersecurity
 
ComSec Security Systems - Tanzania
ComSec Security Systems - TanzaniaComSec Security Systems - Tanzania
ComSec Security Systems - Tanzania
 
Lessson 1
Lessson 1Lessson 1
Lessson 1
 
Day-4-Cyber-Analysis-Course_01152016.pptx
Day-4-Cyber-Analysis-Course_01152016.pptxDay-4-Cyber-Analysis-Course_01152016.pptx
Day-4-Cyber-Analysis-Course_01152016.pptx
 
Automotive Cyber-Security Insights learned from IT and ICS/SCADA
Automotive Cyber-Security Insights learned from IT and ICS/SCADAAutomotive Cyber-Security Insights learned from IT and ICS/SCADA
Automotive Cyber-Security Insights learned from IT and ICS/SCADA
 
BOMA
BOMABOMA
BOMA
 
Information Security
Information SecurityInformation Security
Information Security
 
ISBB_Chapter6.pptx
ISBB_Chapter6.pptxISBB_Chapter6.pptx
ISBB_Chapter6.pptx
 
Access control system
Access control systemAccess control system
Access control system
 
PT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolPT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrol
 
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure ThingsSecurity Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
 
Attacking and Defending Autos Via OBD-II from escar Asia
Attacking and Defending Autos Via OBD-II from escar AsiaAttacking and Defending Autos Via OBD-II from escar Asia
Attacking and Defending Autos Via OBD-II from escar Asia
 
Track 5 session 4 - st dev con 2016 - life cycle management for web
Track 5   session 4 - st dev con 2016 - life cycle management for webTrack 5   session 4 - st dev con 2016 - life cycle management for web
Track 5 session 4 - st dev con 2016 - life cycle management for web
 
Embedded
EmbeddedEmbedded
Embedded
 
Penetration testing & Ethical Hacking
Penetration testing & Ethical HackingPenetration testing & Ethical Hacking
Penetration testing & Ethical Hacking
 
Considerations for a secure internet of things for cities and communities
Considerations for a secure internet of things for cities and communitiesConsiderations for a secure internet of things for cities and communities
Considerations for a secure internet of things for cities and communities
 

More from PawachMetharattanara

BIZ model 2024nnnmmmmmmmmmmmmmmmmmmm.pptx
BIZ model 2024nnnmmmmmmmmmmmmmmmmmmm.pptxBIZ model 2024nnnmmmmmmmmmmmmmmmmmmm.pptx
BIZ model 2024nnnmmmmmmmmmmmmmmmmmmm.pptx
PawachMetharattanara
 
1. คู่มือคนสอน คนเรียน PMS.pdf
1. คู่มือคนสอน คนเรียน PMS.pdf1. คู่มือคนสอน คนเรียน PMS.pdf
1. คู่มือคนสอน คนเรียน PMS.pdf
PawachMetharattanara
 
Smart Parking รพ.กล้วยน้ำไท.pptx
Smart Parking รพ.กล้วยน้ำไท.pptxSmart Parking รพ.กล้วยน้ำไท.pptx
Smart Parking รพ.กล้วยน้ำไท.pptx
PawachMetharattanara
 
1. คู่มือคนสอน คนเรียน PMS.pdf
1. คู่มือคนสอน คนเรียน PMS.pdf1. คู่มือคนสอน คนเรียน PMS.pdf
1. คู่มือคนสอน คนเรียน PMS.pdf
PawachMetharattanara
 
Presentation1333.pptx
Presentation1333.pptxPresentation1333.pptx
Presentation1333.pptx
PawachMetharattanara
 
Presentation1unv2.pptx
Presentation1unv2.pptxPresentation1unv2.pptx
Presentation1unv2.pptx
PawachMetharattanara
 
Presentation1ubv.pptx
Presentation1ubv.pptxPresentation1ubv.pptx
Presentation1ubv.pptx
PawachMetharattanara
 
Uniview Company Introduction with brief solution(1).pdf
Uniview Company Introduction with brief solution(1).pdfUniview Company Introduction with brief solution(1).pdf
Uniview Company Introduction with brief solution(1).pdf
PawachMetharattanara
 
Uniview Company Introduction with brief solution(1).pdf
Uniview Company Introduction with brief solution(1).pdfUniview Company Introduction with brief solution(1).pdf
Uniview Company Introduction with brief solution(1).pdf
PawachMetharattanara
 
หนังสือเชิญ Quicktron Robotic .Thailand(1).pdf
หนังสือเชิญ  Quicktron Robotic .Thailand(1).pdfหนังสือเชิญ  Quicktron Robotic .Thailand(1).pdf
หนังสือเชิญ Quicktron Robotic .Thailand(1).pdf
PawachMetharattanara
 
07 TOR ระบบ Smart Classroom ขนาด 50 ที่นั่ง 231220.docx
07 TOR ระบบ Smart Classroom ขนาด 50 ที่นั่ง 231220.docx07 TOR ระบบ Smart Classroom ขนาด 50 ที่นั่ง 231220.docx
07 TOR ระบบ Smart Classroom ขนาด 50 ที่นั่ง 231220.docx
PawachMetharattanara
 
Presentation DGF Logistics Thailand.คุณอรุณ.1.ppt
Presentation DGF Logistics Thailand.คุณอรุณ.1.pptPresentation DGF Logistics Thailand.คุณอรุณ.1.ppt
Presentation DGF Logistics Thailand.คุณอรุณ.1.ppt
PawachMetharattanara
 
อบรมพื้นฐาน 2023.pptx
อบรมพื้นฐาน 2023.pptxอบรมพื้นฐาน 2023.pptx
อบรมพื้นฐาน 2023.pptx
PawachMetharattanara
 
presentationsolutioncovidschool-230115131900-5c73fd21.pptx
presentationsolutioncovidschool-230115131900-5c73fd21.pptxpresentationsolutioncovidschool-230115131900-5c73fd21.pptx
presentationsolutioncovidschool-230115131900-5c73fd21.pptx
PawachMetharattanara
 
01416_PPT_FG_DAY1-บ่าย_651219V2.pdf
01416_PPT_FG_DAY1-บ่าย_651219V2.pdf01416_PPT_FG_DAY1-บ่าย_651219V2.pdf
01416_PPT_FG_DAY1-บ่าย_651219V2.pdf
PawachMetharattanara
 
แผนที่PICKชีวิต.pdf
แผนที่PICKชีวิต.pdfแผนที่PICKชีวิต.pdf
แผนที่PICKชีวิต.pdf
PawachMetharattanara
 

More from PawachMetharattanara (20)

BIZ model 2024nnnmmmmmmmmmmmmmmmmmmm.pptx
BIZ model 2024nnnmmmmmmmmmmmmmmmmmmm.pptxBIZ model 2024nnnmmmmmmmmmmmmmmmmmmm.pptx
BIZ model 2024nnnmmmmmmmmmmmmmmmmmmm.pptx
 
DLS_CP_Payment Rev.00.pdf
DLS_CP_Payment Rev.00.pdfDLS_CP_Payment Rev.00.pdf
DLS_CP_Payment Rev.00.pdf
 
1. คู่มือคนสอน คนเรียน PMS.pdf
1. คู่มือคนสอน คนเรียน PMS.pdf1. คู่มือคนสอน คนเรียน PMS.pdf
1. คู่มือคนสอน คนเรียน PMS.pdf
 
Smart Parking รพ.กล้วยน้ำไท.pptx
Smart Parking รพ.กล้วยน้ำไท.pptxSmart Parking รพ.กล้วยน้ำไท.pptx
Smart Parking รพ.กล้วยน้ำไท.pptx
 
KPI 2021 Sale ( Nov ).pptx
KPI 2021 Sale ( Nov ).pptxKPI 2021 Sale ( Nov ).pptx
KPI 2021 Sale ( Nov ).pptx
 
1. คู่มือคนสอน คนเรียน PMS.pdf
1. คู่มือคนสอน คนเรียน PMS.pdf1. คู่มือคนสอน คนเรียน PMS.pdf
1. คู่มือคนสอน คนเรียน PMS.pdf
 
Presentation1333.pptx
Presentation1333.pptxPresentation1333.pptx
Presentation1333.pptx
 
Presentation1unv2.pptx
Presentation1unv2.pptxPresentation1unv2.pptx
Presentation1unv2.pptx
 
Presentation1ubv.pptx
Presentation1ubv.pptxPresentation1ubv.pptx
Presentation1ubv.pptx
 
Uniview Company Introduction with brief solution(1).pdf
Uniview Company Introduction with brief solution(1).pdfUniview Company Introduction with brief solution(1).pdf
Uniview Company Introduction with brief solution(1).pdf
 
Univiwe Training 2023.pdf
Univiwe Training 2023.pdfUniviwe Training 2023.pdf
Univiwe Training 2023.pdf
 
Uniview Company Introduction with brief solution(1).pdf
Uniview Company Introduction with brief solution(1).pdfUniview Company Introduction with brief solution(1).pdf
Uniview Company Introduction with brief solution(1).pdf
 
หนังสือเชิญ Quicktron Robotic .Thailand(1).pdf
หนังสือเชิญ  Quicktron Robotic .Thailand(1).pdfหนังสือเชิญ  Quicktron Robotic .Thailand(1).pdf
หนังสือเชิญ Quicktron Robotic .Thailand(1).pdf
 
07 TOR ระบบ Smart Classroom ขนาด 50 ที่นั่ง 231220.docx
07 TOR ระบบ Smart Classroom ขนาด 50 ที่นั่ง 231220.docx07 TOR ระบบ Smart Classroom ขนาด 50 ที่นั่ง 231220.docx
07 TOR ระบบ Smart Classroom ขนาด 50 ที่นั่ง 231220.docx
 
Presentation DGF Logistics Thailand.คุณอรุณ.1.ppt
Presentation DGF Logistics Thailand.คุณอรุณ.1.pptPresentation DGF Logistics Thailand.คุณอรุณ.1.ppt
Presentation DGF Logistics Thailand.คุณอรุณ.1.ppt
 
อบรมพื้นฐาน 2023.pptx
อบรมพื้นฐาน 2023.pptxอบรมพื้นฐาน 2023.pptx
อบรมพื้นฐาน 2023.pptx
 
presentationsolutioncovidschool-230115131900-5c73fd21.pptx
presentationsolutioncovidschool-230115131900-5c73fd21.pptxpresentationsolutioncovidschool-230115131900-5c73fd21.pptx
presentationsolutioncovidschool-230115131900-5c73fd21.pptx
 
Catalog Quick.pdf
Catalog Quick.pdfCatalog Quick.pdf
Catalog Quick.pdf
 
01416_PPT_FG_DAY1-บ่าย_651219V2.pdf
01416_PPT_FG_DAY1-บ่าย_651219V2.pdf01416_PPT_FG_DAY1-บ่าย_651219V2.pdf
01416_PPT_FG_DAY1-บ่าย_651219V2.pdf
 
แผนที่PICKชีวิต.pdf
แผนที่PICKชีวิต.pdfแผนที่PICKชีวิต.pdf
แผนที่PICKชีวิต.pdf
 

Recently uploaded

CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
ssuser36d3051
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
awadeshbabu
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
Madhumitha Jayaram
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 
2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt
PuktoonEngr
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
anoopmanoharan2
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
yokeleetan1
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
mahammadsalmanmech
 

Recently uploaded (20)

CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 
2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
 

experience_and_perspective_of_security_installation.ppt

  • 1. Experience and Perspective of Security Installation Opportunities Edward J. Donelan, RCDD/NTS, TLT President, Telecom Infrastructure Corp
  • 2. BICSI Publications • NDRM (Network Design Reference) 6th Edition – November 2005 • ESS (Electronic Safety and Security Design) 1st Edition – January 2006 • CO-OSP (Customer Owned Outside Plant) 4th Edition – January 2007 • PAVDRM (Principles of AV Design) 1st Edition – June 2006 (ICIA Partnership)
  • 3. BICSI UPDATE • ESS (Electronic Safety and Security) Designer Designation Direction The ESS designer is the person who understands vulnerability, risk, and threat, designs a complete and functional security system, oversees the implementation and verifies / validates system performance. • SIA – Javits Center, NYC – August 24 – 25, 2005 – Security Industry Association – www.isceast.com
  • 4. BICSI UPDATE • ESS Outline – Threat – Legal, liability, ethic – Asset Protection – Intercom / Annunciators – Biometrics / Intrusion Detection – CCTV – Access Control – Monitoring - training – Fire Detection & Alarm – Sensors / Integrated System – Mobile Security / Wireless / Data Security – Doors, locks, safes and seals
  • 5. Business Opportunity In 2004 47% said their company is listed on a GSA Schedule, compared to just 12% in 2003. The convergence of IT and computer networking with electronic security is becoming reality. A true indicator that separates an alarm dealer from a serious systems integrator is if the company has its own CAD/CAM plotter equipment. Source: SecuritySales.com
  • 6. Business Opportunity CCTV and Access Control making strides toward topping burglar alarms as the electronic security industry’s No 1 source of revenue Source: SecuritySales.com
  • 8. Business Opportunity Homeland security efforts appear to be substantially impacting the electronic security industry as large industrial (gov’t, utilities, airports, stadiums, etc.) swiped 6 percentage points from both commercial and residential installations in 2004. Source: SecuritySales.com
  • 9. Business Opportunity Electronic security contractors continue the recent trend of making more at the front end as paid-in- full installations remained at 58%. Source: SecuritySales.com
  • 10. Security Installation Statistics • Average number of installed accounts in 2004 is 550 • Average number of monitored accounts in 2004 is 300 •76% use a third-party contract central monitoring station • 47% of integrators have access to the internet from the field.
  • 11. Security Business Opportunities The “sweet spot” for the typical security contractor is $1 million to $4.9 million in annual gross revenues. Source: SecuritySales.com
  • 12. Security Average gross profit margins 40.3% and 27.4% net profit on CCTV installations Remote video is one of the most in-demand features with networked video on the rise. Source: SecuritySales.com
  • 13. QUESTIONS TO ASK What is the application? • Retail store, office, parking lot, all How many cameras in the system? • How many indoors & outdoors What are the cameras viewing? • Area, distance • This may determine if P/T/Z is needed
  • 14. QUESTIONS TO ASK What is camera environment? • Freezer, office, hot warehouse, etc. Where or how are cameras mounted? • Ceiling dome, outdoor pole, etc. How will the system be used? • Manned system, monitored • Passive system just recorded
  • 15. QUESTIONS TO ASK How many monitor locations? • View only or control Is remote access needed? • Remote network connection • Internet
  • 16. QUESTIONS TO ASK What does user want to achieve? • Stop internal theft • Security from outside influences • Shoplifting • Vandalism issues
  • 17. GUIDELINES Be aware of lighting Observe the sun Know why customer wants cameras 1 camera will not cover a 300’ fence
  • 20. Access Control • Average profit margins for Access Control installations are 37% gross and 22% net. • Integrators say more than 48% of their access control installations include some sort of integration with CCTV or other security system. • Commercial office environment accounts for more than 36% of all access control system installations.
  • 21. AC Worksheet Access Control System Door Planning Worksheet  In order to install the proper locking hardware, answers to the following questions are essential.
  • 22. Reasons For Access Control • Reduce Key Control Problems • Allows Managed Access • Provide 24/7 Security • Management Tool • Reduce Cost
  • 23. Key Control Problems • Affects all business and government • No control of distributed keys • Huge security risk – Stolen/missing keys = new locks & keys • Very labor intensive and expensive
  • 24. Key Control Solutions • Provide card access to all employees • Each card is unique, assigned to user • Absolute control • Immediate information • Easier to manage • Reduced costs
  • 25. Allow Access…Problems • Providing security to the building – Day vs. night – Various levels of security • Authorized personnel – Time, day,entry & exit • Doors must be locked and unlocked • Key holder control
  • 26. Allow Access…Solutions • All employees are issued a card • Demonstrates confidence to employees • Maintains control over usage – Time, day, schedule. Etc. – By employee, dept., visitor • Cards are difficult to duplicate • Provides flexibility with security – Secure when and where needed
  • 27. 24/7 Security Problems • Key systems are not secure • Employees must feel safe • High cost for keys, locks, guards, etc. • Risk of internal theft and fraud
  • 28. 24/7 Security Solutions • Provide perimeter security • Permit free movement of employees – Authorized access w/o supervisor key – Increase mobility of workers • Reduce or eliminate guards • Reduce opportunity for theft of fraud
  • 29. Application for Access Control • Need to improve or upgrade security • Companies with key control problems • Real or potential security risks • Need to provide greater security – Shift schedules – High employee turnover – Temp. workers
  • 30. Application for Access Control • Multiple levels of security – Execs., factory, R&D, TR’s, MTER’s, etc. • Need to record or control usage – Charge for use, common conf. Room • Companies offering flexible schedules • Improve after hours security • Need to automate security functions
  • 31. Why Sell Access Control • Leads to add-on sales – CCTV – Expansion – Motion detectors • Small recurring revenue in cards – Also keeps you in touch • Less competition than traditional alarms
  • 32. Why Sell Access Control • Potential for higher margins • Leads to other sales – Word of mouth – Envy
  • 33. Access Control Basics • Who, When, Where, What – Who uses the system – When they use the system – Where they use the system – What happened
  • 34. Access Control Components • Controller – Multi-reader control in a can – Single door keypad – All wire goes to this point • Cards – Each user assigned a unique card – Usage parameters programmed in system – Bit formats
  • 35. Access Control Components • Reader Technologies – Proximity (prox) – Magnetic Stripe – Bar Code – Weigand – Radio (RF) – Multi-Technology
  • 36. Access Control Components • Reader Technologies – Biometric • Hand • Finger • Face • Voice • Retina – With Keypad
  • 37. Access Control Components • Controlled Door – Lock • Electric strike or magnetic lock – One or two readers – Door contact – Request to exit detector (REX) – Automatic door closer – Optional annunciater
  • 38. Access Control Components • Magnetic Lock – Must release with fire alarm, power failure • Building not secure in power failure – “Push To Exit” button w/ separate timer – Automatic release (15 sec. delay max.) • Electric Strike – Free exit device – Typically locked without power – Use a locksmith
  • 39. Access Functions & Features • Schedules & Holidays • Access Levels • Monitored Inputs • Alarm Events • Elevator Control • Antipassback • Mantrap • Time & Attendance
  • 40. AC Worksheet Access Control Quick Quote Fax Form  In order to spec the right equipment for the job, fill out this handy quick quote sheet.
  • 41. Burglary Alarms • Average profit margins installing companies realize on burglary jobs are 42.2% gross and 25.5% net. • 26% of burglary installations include wireless equipment
  • 42. Opportunity Average Profit Margins Gross Net Access Control 37% 22% CCTV 40.3% 27.4% Security Contractor typical Sales is $1 million to $4.9 million in annual gross revenues.
  • 43. Thank You Edward J. Donelan, RCDD, NTS, TLT President, Telecom Infrastructure Corp Treasurer, BICSI edonelan@BICSI.org