SlideShare a Scribd company logo
Rev 09/07/11
Using Integrated Security
Systems to Accommodate
Expansion, Ensure Safety
2
Why is integration rising in popularity?
What is true integration?
How does integration work?
How does integration impact security?
How can I implement an integrated system?
How do I maintain an integrated system?
Integration: A BUZZ Word
3
Challenges to overcome
• Open campus
• Serving thousands of
students, staff, faculty,
visitors and dignitaries at
multi urban locations
• Independent security systems
• Aging Technology
• Capital Improvements
4
Digital Video Recorders
Network
Joy stick
controllers
Viewing Software
Analog
CCTV Technology when we started
50 fixed cameras
Viewing through the DVR
5
Access Control Technology when we started
Automatic Locking and unlocking of doors on the Van Ness Campus only
6
Police Communications Center 2005
7
Considerations
• Maintain an open environment
• Maximize return on investment
• Do not exceed infrastructure capacity
• Align improvements with University mission
• Understand technology limitation
• Technology should complement the human element
• Plan for system growth
Cheap
FastGreat
8
Don’t forget the campus ERP (database)
• Your access control system can be your complete
campus database or integrate with existing ERP
- Student registration
- Faculty and Staff
- Contractors
• Link class schedules to access rights
- Implement on-line or data transfer utility
• Employ a single card across multiple campus
functions
- Meal plans
- Library
- Book store
- Vending
- Parking
9
UltraKey
IP and Serial
Surveillance Keyboards
DB
MAXPRO VMS Client MAXPRO VMS Client
Enterprise NVR
IP Engine NVR Database Sever
Rapid Eye DVR
Fusion DVR
IP Access Control Panels
IP Encoders
Network
IP Engine NVR Camera Sever
IP Engine NVR Camera Sever
DB
MAXPRO VMS Client
DB
ProWatch
Server CE
IP Cameras
Analytics Server
EQUIP™
MAXPRO VMS
MS 2008 with SQL 2008 Software
MAXPRO™ VMS Server Software
MAXPRO™ VMS Controller Software
MAXPRO NVR
Vista Commercial
Burglary Control
Today at UDC
10
New Emergency Communications Center
11
The appeal of integration
• Growth of the existing
system was impractical
• System failures are very
costly
• Force multiplier
• Allows operators to
focus on exceptions
• Open Architecture
• Doing More with Less
12
The Implementation
• Working with your integrator
• The approach to
implementation
• Challenges faced and how
they were solved
13
Improvements & Metrics
• Since deployment at UDC:
- More effective
- More efficient
- Virtual Patrols to support all locations from the Emergency
Communications Center (ECC)
14
Key Takeaways
• Choosing technology
• Choosing your integrator
• Steps to success
• Pitfalls
• Continous process
15
Choosing a technology
• Do your research
- What systems do you want/need to integrate?
- How many of those systems does the manufacturer offer?
- Does the manufacturer comply with industry standards?
- Does the manufacturer employ open technology?
- How does the manufacturer go to market?
- How does the manufacturer vet integrators?
- Is the solution scalable?
- Is training offered – classroom and online?
- Does the manufacturer support us directly?
• Ask your integrator
- Is the integrator exclusive to the manufacturer?
16
Choosing your integrator
• Longevity: At least 5 years in the security business
- Meet the owner or local management
- Assure accessibility
- Will they support a team relationship?
• Experience: provide a minimum of 3 customers that
you can reference with a project of similar scope
- Actually check references
• Training certificates; manufacturers, network,
operating systems and database
• Investment in service
- 24 hour call-in
- Project management program
- Documentation manuals and drawings
- Test facilities
17
Integrator Evaluation
18
Steps to success
• Develop a plan and publish a roadmap
• Research technology
• Interview local integrators
• Justify investment in security
• Publish security technology standards
• Get buy in from Stake Holders (Administrators &
Academics)
• Work with IT & Facilities on infrastructure and
equipment needs
• Get involved early with Construction Management
Teams on designs .make sure security technology
is included in every project
19
Pitfalls
• Analysis paralysis
- Take small bites
• Get the latest and greatest technology
- There is a thin line between the leading and bleeding edge
- You will never get the latest
- Today’s technology is surpassed by tomorrow’s
20
Continuous process
Analysis
Design
ImplementationTesting/Acceptance
Measurement
21
Contact Information
Ronald Culmer III
Captain/Technology Manager
Univ. of the District of Columbia
Office of Public Safety/Police
Washington, DC 20008
202.274.5839
rculmer@udc.edu
www.udc.edu/ps
Twitter @RonCulmer
For more information on this presentation or for contact information on the integrators and
manufacturers we have experience working with please contact me directly.

More Related Content

What's hot

Cybersecurity - Simple, Sustainable, Secure
Cybersecurity - Simple, Sustainable, SecureCybersecurity - Simple, Sustainable, Secure
Cybersecurity - Simple, Sustainable, Secure
Yokogawa1
 
June 09 - build recurring revenue from reactive customers
June 09  -  build recurring revenue from reactive customersJune 09  -  build recurring revenue from reactive customers
June 09 - build recurring revenue from reactive customers
Solarwinds N-able
 
Wichita State University, Manufacturing Cyber Security
Wichita State University, Manufacturing Cyber SecurityWichita State University, Manufacturing Cyber Security
Wichita State University, Manufacturing Cyber Security
kphodel
 
The savvy security leader final dg ppt issa_la
The savvy security leader final dg ppt issa_laThe savvy security leader final dg ppt issa_la
The savvy security leader final dg ppt issa_la
ISSA LA
 
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
Enterprise Management Associates
 
EtQ Reliance: Solution for Enterprise Compliance Management
EtQ Reliance: Solution for Enterprise Compliance ManagementEtQ Reliance: Solution for Enterprise Compliance Management
EtQ Reliance: Solution for Enterprise Compliance Management
EtQ, Inc.
 
Design Like a Pro: Essential Steps for Enterprise Architectures
Design Like a Pro: Essential Steps for Enterprise ArchitecturesDesign Like a Pro: Essential Steps for Enterprise Architectures
Design Like a Pro: Essential Steps for Enterprise Architectures
Inductive Automation
 
VET4SBO Level 1 module 2 - unit 4 - v1.0 en
VET4SBO Level 1   module 2 - unit 4 - v1.0 enVET4SBO Level 1   module 2 - unit 4 - v1.0 en
VET4SBO Level 1 module 2 - unit 4 - v1.0 en
Karel Van Isacker
 
Security Architecture Principles
Security Architecture PrinciplesSecurity Architecture Principles
Security Architecture Principles
Richard Dempers
 
SteveNuccioResume2
SteveNuccioResume2SteveNuccioResume2
SteveNuccioResume2
Steve Nuccio
 
About mr j linden
About mr j lindenAbout mr j linden
About mr j linden
MrLinden
 
Val Lynch, AND Technology Research - Med tech resiliancy
Val Lynch, AND Technology Research - Med tech resiliancyVal Lynch, AND Technology Research - Med tech resiliancy
Val Lynch, AND Technology Research - Med tech resiliancy
techUK
 
Herman Tembo
Herman TemboHerman Tembo
Herman Tembo
Tembo Herman
 
Security Outsourcing - Couples Counseling - Atif Ghauri
Security Outsourcing - Couples Counseling - Atif GhauriSecurity Outsourcing - Couples Counseling - Atif Ghauri
Security Outsourcing - Couples Counseling - Atif Ghauri
Atif Ghauri
 
Secure by Design - Security Design Principles for the Working Architect
Secure by Design - Security Design Principles for the Working ArchitectSecure by Design - Security Design Principles for the Working Architect
Secure by Design - Security Design Principles for the Working Architect
Eoin Woods
 
9 ics vlp certificate (1)
9 ics vlp certificate (1)9 ics vlp certificate (1)
9 ics vlp certificate (1)
BillyGeorgeKThielebe
 
Taking the Pulse of IBM i Security for 2020
Taking the Pulse of IBM i Security for 2020Taking the Pulse of IBM i Security for 2020
Taking the Pulse of IBM i Security for 2020
Precisely
 
Mobile & Cloud Tech - doing more with less
Mobile & Cloud Tech - doing more with lessMobile & Cloud Tech - doing more with less
Mobile & Cloud Tech - doing more with less
Sasha Levage
 

What's hot (18)

Cybersecurity - Simple, Sustainable, Secure
Cybersecurity - Simple, Sustainable, SecureCybersecurity - Simple, Sustainable, Secure
Cybersecurity - Simple, Sustainable, Secure
 
June 09 - build recurring revenue from reactive customers
June 09  -  build recurring revenue from reactive customersJune 09  -  build recurring revenue from reactive customers
June 09 - build recurring revenue from reactive customers
 
Wichita State University, Manufacturing Cyber Security
Wichita State University, Manufacturing Cyber SecurityWichita State University, Manufacturing Cyber Security
Wichita State University, Manufacturing Cyber Security
 
The savvy security leader final dg ppt issa_la
The savvy security leader final dg ppt issa_laThe savvy security leader final dg ppt issa_la
The savvy security leader final dg ppt issa_la
 
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
 
EtQ Reliance: Solution for Enterprise Compliance Management
EtQ Reliance: Solution for Enterprise Compliance ManagementEtQ Reliance: Solution for Enterprise Compliance Management
EtQ Reliance: Solution for Enterprise Compliance Management
 
Design Like a Pro: Essential Steps for Enterprise Architectures
Design Like a Pro: Essential Steps for Enterprise ArchitecturesDesign Like a Pro: Essential Steps for Enterprise Architectures
Design Like a Pro: Essential Steps for Enterprise Architectures
 
VET4SBO Level 1 module 2 - unit 4 - v1.0 en
VET4SBO Level 1   module 2 - unit 4 - v1.0 enVET4SBO Level 1   module 2 - unit 4 - v1.0 en
VET4SBO Level 1 module 2 - unit 4 - v1.0 en
 
Security Architecture Principles
Security Architecture PrinciplesSecurity Architecture Principles
Security Architecture Principles
 
SteveNuccioResume2
SteveNuccioResume2SteveNuccioResume2
SteveNuccioResume2
 
About mr j linden
About mr j lindenAbout mr j linden
About mr j linden
 
Val Lynch, AND Technology Research - Med tech resiliancy
Val Lynch, AND Technology Research - Med tech resiliancyVal Lynch, AND Technology Research - Med tech resiliancy
Val Lynch, AND Technology Research - Med tech resiliancy
 
Herman Tembo
Herman TemboHerman Tembo
Herman Tembo
 
Security Outsourcing - Couples Counseling - Atif Ghauri
Security Outsourcing - Couples Counseling - Atif GhauriSecurity Outsourcing - Couples Counseling - Atif Ghauri
Security Outsourcing - Couples Counseling - Atif Ghauri
 
Secure by Design - Security Design Principles for the Working Architect
Secure by Design - Security Design Principles for the Working ArchitectSecure by Design - Security Design Principles for the Working Architect
Secure by Design - Security Design Principles for the Working Architect
 
9 ics vlp certificate (1)
9 ics vlp certificate (1)9 ics vlp certificate (1)
9 ics vlp certificate (1)
 
Taking the Pulse of IBM i Security for 2020
Taking the Pulse of IBM i Security for 2020Taking the Pulse of IBM i Security for 2020
Taking the Pulse of IBM i Security for 2020
 
Mobile & Cloud Tech - doing more with less
Mobile & Cloud Tech - doing more with lessMobile & Cloud Tech - doing more with less
Mobile & Cloud Tech - doing more with less
 

Viewers also liked

Q1 2014 Halo Report Infographic
Q1 2014 Halo Report InfographicQ1 2014 Halo Report Infographic
Q1 2014 Halo Report Infographic
sdickey
 
Mc2014 01
Mc2014 01Mc2014 01
Mc2014 01
Juliet Muego
 
OpenEdition, Pierre Mounier
OpenEdition, Pierre Mounier OpenEdition, Pierre Mounier
OpenEdition, Pierre Mounier
OAbooks
 
CBP-Vision-Strategy-2020
CBP-Vision-Strategy-2020CBP-Vision-Strategy-2020
CBP-Vision-Strategy-2020
Benjamin Webb
 
Knowledge Unlatched by Frances Pinter
Knowledge Unlatched by Frances PinterKnowledge Unlatched by Frances Pinter
Knowledge Unlatched by Frances Pinter
OAbooks
 
Strand 3: Ralf Schimmer, Max Planck Digital Library
Strand 3: Ralf Schimmer, Max Planck Digital LibraryStrand 3: Ralf Schimmer, Max Planck Digital Library
Strand 3: Ralf Schimmer, Max Planck Digital Library
OAbooks
 
Strand 1: Connecting research and researchers: An introduction to ORCID by Ed...
Strand 1: Connecting research and researchers: An introduction to ORCID by Ed...Strand 1: Connecting research and researchers: An introduction to ORCID by Ed...
Strand 1: Connecting research and researchers: An introduction to ORCID by Ed...
OAbooks
 
Angel Group Investing Heats Up: Q1 2014 Halo Report
Angel Group Investing Heats Up: Q1 2014 Halo Report Angel Group Investing Heats Up: Q1 2014 Halo Report
Angel Group Investing Heats Up: Q1 2014 Halo Report
sdickey
 
Q3 2013 Halo Report
Q3 2013 Halo Report Q3 2013 Halo Report
Q3 2013 Halo Report
sdickey
 
2013 Year-End Halo Report
2013 Year-End Halo Report 2013 Year-End Halo Report
2013 Year-End Halo Report
sdickey
 
Halo Report Q1 2013
Halo Report Q1 2013Halo Report Q1 2013
Halo Report Q1 2013
sdickey
 
Q2 2014 Halo Report
Q2 2014 Halo Report Q2 2014 Halo Report
Q2 2014 Halo Report
sdickey
 
Potabilización
PotabilizaciónPotabilización
Potabilizacion del agua
Potabilizacion del aguaPotabilizacion del agua
Potabilizacion del agua
Aldhair Alvarez Uchuya
 
Monografia
MonografiaMonografia

Viewers also liked (15)

Q1 2014 Halo Report Infographic
Q1 2014 Halo Report InfographicQ1 2014 Halo Report Infographic
Q1 2014 Halo Report Infographic
 
Mc2014 01
Mc2014 01Mc2014 01
Mc2014 01
 
OpenEdition, Pierre Mounier
OpenEdition, Pierre Mounier OpenEdition, Pierre Mounier
OpenEdition, Pierre Mounier
 
CBP-Vision-Strategy-2020
CBP-Vision-Strategy-2020CBP-Vision-Strategy-2020
CBP-Vision-Strategy-2020
 
Knowledge Unlatched by Frances Pinter
Knowledge Unlatched by Frances PinterKnowledge Unlatched by Frances Pinter
Knowledge Unlatched by Frances Pinter
 
Strand 3: Ralf Schimmer, Max Planck Digital Library
Strand 3: Ralf Schimmer, Max Planck Digital LibraryStrand 3: Ralf Schimmer, Max Planck Digital Library
Strand 3: Ralf Schimmer, Max Planck Digital Library
 
Strand 1: Connecting research and researchers: An introduction to ORCID by Ed...
Strand 1: Connecting research and researchers: An introduction to ORCID by Ed...Strand 1: Connecting research and researchers: An introduction to ORCID by Ed...
Strand 1: Connecting research and researchers: An introduction to ORCID by Ed...
 
Angel Group Investing Heats Up: Q1 2014 Halo Report
Angel Group Investing Heats Up: Q1 2014 Halo Report Angel Group Investing Heats Up: Q1 2014 Halo Report
Angel Group Investing Heats Up: Q1 2014 Halo Report
 
Q3 2013 Halo Report
Q3 2013 Halo Report Q3 2013 Halo Report
Q3 2013 Halo Report
 
2013 Year-End Halo Report
2013 Year-End Halo Report 2013 Year-End Halo Report
2013 Year-End Halo Report
 
Halo Report Q1 2013
Halo Report Q1 2013Halo Report Q1 2013
Halo Report Q1 2013
 
Q2 2014 Halo Report
Q2 2014 Halo Report Q2 2014 Halo Report
Q2 2014 Halo Report
 
Potabilización
PotabilizaciónPotabilización
Potabilización
 
Potabilizacion del agua
Potabilizacion del aguaPotabilizacion del agua
Potabilizacion del agua
 
Monografia
MonografiaMonografia
Monografia
 

Similar to Using Integrated Security Systems to Accommodate Expansion and Ensure Safety

Curiosity Software, Infuse and Kumoco present: The Democratisation of Testing
Curiosity Software, Infuse and Kumoco present: The Democratisation of TestingCuriosity Software, Infuse and Kumoco present: The Democratisation of Testing
Curiosity Software, Infuse and Kumoco present: The Democratisation of Testing
Curiosity Software Ireland
 
Volwassen IoT-oplossingen met Microsoft Azure (Sam Vanhoutte at CONNECT17)
Volwassen IoT-oplossingen met Microsoft Azure (Sam Vanhoutte at CONNECT17)Volwassen IoT-oplossingen met Microsoft Azure (Sam Vanhoutte at CONNECT17)
Volwassen IoT-oplossingen met Microsoft Azure (Sam Vanhoutte at CONNECT17)
Codit
 
Network Automation Journey, A systems engineer NetOps perspective
Network Automation Journey, A systems engineer NetOps perspectiveNetwork Automation Journey, A systems engineer NetOps perspective
Network Automation Journey, A systems engineer NetOps perspective
Walid Shaari
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber Essentials
Jisc
 
Case Study: University of Chicago Achieves High Availability through a Centr...
Case Study:  University of Chicago Achieves High Availability through a Centr...Case Study:  University of Chicago Achieves High Availability through a Centr...
Case Study: University of Chicago Achieves High Availability through a Centr...
CA Technologies
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
Sameer Paradia
 
How to go from waterfall app dev to secure agile development in 2 weeks
How to go from waterfall app dev to secure agile development in 2 weeks How to go from waterfall app dev to secure agile development in 2 weeks
How to go from waterfall app dev to secure agile development in 2 weeks
Ulf Mattsson
 
End to-End Monitoring for ITSM and DevOps
End to-End Monitoring for ITSM and DevOpsEnd to-End Monitoring for ITSM and DevOps
End to-End Monitoring for ITSM and DevOps
eG Innovations
 
Succeeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalSucceeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps final
rkadayam
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night?
Jorge García
 
IT_manager
IT_managerIT_manager
IT_manager
maher adam
 
DevSecOps - It can change your life (cycle)
DevSecOps - It can change your life (cycle)DevSecOps - It can change your life (cycle)
DevSecOps - It can change your life (cycle)
Qualitest
 
Comparing Legacy and Modern e-commerce solutions
Comparing Legacy and Modern e-commerce solutionsComparing Legacy and Modern e-commerce solutions
Comparing Legacy and Modern e-commerce solutions
Mike Ensor
 
Week 1: Introduction to Cloud Computing - DSA 441 Cloud Computing
Week 1: Introduction to Cloud Computing - DSA 441 Cloud ComputingWeek 1: Introduction to Cloud Computing - DSA 441 Cloud Computing
Week 1: Introduction to Cloud Computing - DSA 441 Cloud Computing
Ferdin Joe John Joseph PhD
 
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
Dell World
 
Assessing Business Operations Risk With Unified Vulnerability Management in T...
Assessing Business Operations Risk With Unified Vulnerability Management in T...Assessing Business Operations Risk With Unified Vulnerability Management in T...
Assessing Business Operations Risk With Unified Vulnerability Management in T...
Denim Group
 
The Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeThe Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - Rothke
Ben Rothke
 
Bridging the Gap: from Data Science to Production
Bridging the Gap: from Data Science to ProductionBridging the Gap: from Data Science to Production
Bridging the Gap: from Data Science to Production
Florian Wilhelm
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
Leif Davidsen
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
Robert Parker
 

Similar to Using Integrated Security Systems to Accommodate Expansion and Ensure Safety (20)

Curiosity Software, Infuse and Kumoco present: The Democratisation of Testing
Curiosity Software, Infuse and Kumoco present: The Democratisation of TestingCuriosity Software, Infuse and Kumoco present: The Democratisation of Testing
Curiosity Software, Infuse and Kumoco present: The Democratisation of Testing
 
Volwassen IoT-oplossingen met Microsoft Azure (Sam Vanhoutte at CONNECT17)
Volwassen IoT-oplossingen met Microsoft Azure (Sam Vanhoutte at CONNECT17)Volwassen IoT-oplossingen met Microsoft Azure (Sam Vanhoutte at CONNECT17)
Volwassen IoT-oplossingen met Microsoft Azure (Sam Vanhoutte at CONNECT17)
 
Network Automation Journey, A systems engineer NetOps perspective
Network Automation Journey, A systems engineer NetOps perspectiveNetwork Automation Journey, A systems engineer NetOps perspective
Network Automation Journey, A systems engineer NetOps perspective
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber Essentials
 
Case Study: University of Chicago Achieves High Availability through a Centr...
Case Study:  University of Chicago Achieves High Availability through a Centr...Case Study:  University of Chicago Achieves High Availability through a Centr...
Case Study: University of Chicago Achieves High Availability through a Centr...
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
 
How to go from waterfall app dev to secure agile development in 2 weeks
How to go from waterfall app dev to secure agile development in 2 weeks How to go from waterfall app dev to secure agile development in 2 weeks
How to go from waterfall app dev to secure agile development in 2 weeks
 
End to-End Monitoring for ITSM and DevOps
End to-End Monitoring for ITSM and DevOpsEnd to-End Monitoring for ITSM and DevOps
End to-End Monitoring for ITSM and DevOps
 
Succeeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalSucceeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps final
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night?
 
IT_manager
IT_managerIT_manager
IT_manager
 
DevSecOps - It can change your life (cycle)
DevSecOps - It can change your life (cycle)DevSecOps - It can change your life (cycle)
DevSecOps - It can change your life (cycle)
 
Comparing Legacy and Modern e-commerce solutions
Comparing Legacy and Modern e-commerce solutionsComparing Legacy and Modern e-commerce solutions
Comparing Legacy and Modern e-commerce solutions
 
Week 1: Introduction to Cloud Computing - DSA 441 Cloud Computing
Week 1: Introduction to Cloud Computing - DSA 441 Cloud ComputingWeek 1: Introduction to Cloud Computing - DSA 441 Cloud Computing
Week 1: Introduction to Cloud Computing - DSA 441 Cloud Computing
 
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
 
Assessing Business Operations Risk With Unified Vulnerability Management in T...
Assessing Business Operations Risk With Unified Vulnerability Management in T...Assessing Business Operations Risk With Unified Vulnerability Management in T...
Assessing Business Operations Risk With Unified Vulnerability Management in T...
 
The Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeThe Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - Rothke
 
Bridging the Gap: from Data Science to Production
Bridging the Gap: from Data Science to ProductionBridging the Gap: from Data Science to Production
Bridging the Gap: from Data Science to Production
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
 

Recently uploaded

REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
giancarloi8888
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
Iris Thiele Isip-Tan
 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
ImMuslim
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
TechSoup
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
Prof. Dr. K. Adisesha
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
imrankhan141184
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
سمير بسيوني
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
RamseyBerglund
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
indexPub
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
Steve Thomason
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
PsychoTech Services
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
National Information Standards Organization (NISO)
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
deepaannamalai16
 
MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025
khuleseema60
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 

Recently uploaded (20)

REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
 
MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 

Using Integrated Security Systems to Accommodate Expansion and Ensure Safety

  • 1. Rev 09/07/11 Using Integrated Security Systems to Accommodate Expansion, Ensure Safety
  • 2. 2 Why is integration rising in popularity? What is true integration? How does integration work? How does integration impact security? How can I implement an integrated system? How do I maintain an integrated system? Integration: A BUZZ Word
  • 3. 3 Challenges to overcome • Open campus • Serving thousands of students, staff, faculty, visitors and dignitaries at multi urban locations • Independent security systems • Aging Technology • Capital Improvements
  • 4. 4 Digital Video Recorders Network Joy stick controllers Viewing Software Analog CCTV Technology when we started 50 fixed cameras Viewing through the DVR
  • 5. 5 Access Control Technology when we started Automatic Locking and unlocking of doors on the Van Ness Campus only
  • 7. 7 Considerations • Maintain an open environment • Maximize return on investment • Do not exceed infrastructure capacity • Align improvements with University mission • Understand technology limitation • Technology should complement the human element • Plan for system growth Cheap FastGreat
  • 8. 8 Don’t forget the campus ERP (database) • Your access control system can be your complete campus database or integrate with existing ERP - Student registration - Faculty and Staff - Contractors • Link class schedules to access rights - Implement on-line or data transfer utility • Employ a single card across multiple campus functions - Meal plans - Library - Book store - Vending - Parking
  • 9. 9 UltraKey IP and Serial Surveillance Keyboards DB MAXPRO VMS Client MAXPRO VMS Client Enterprise NVR IP Engine NVR Database Sever Rapid Eye DVR Fusion DVR IP Access Control Panels IP Encoders Network IP Engine NVR Camera Sever IP Engine NVR Camera Sever DB MAXPRO VMS Client DB ProWatch Server CE IP Cameras Analytics Server EQUIP™ MAXPRO VMS MS 2008 with SQL 2008 Software MAXPRO™ VMS Server Software MAXPRO™ VMS Controller Software MAXPRO NVR Vista Commercial Burglary Control Today at UDC
  • 11. 11 The appeal of integration • Growth of the existing system was impractical • System failures are very costly • Force multiplier • Allows operators to focus on exceptions • Open Architecture • Doing More with Less
  • 12. 12 The Implementation • Working with your integrator • The approach to implementation • Challenges faced and how they were solved
  • 13. 13 Improvements & Metrics • Since deployment at UDC: - More effective - More efficient - Virtual Patrols to support all locations from the Emergency Communications Center (ECC)
  • 14. 14 Key Takeaways • Choosing technology • Choosing your integrator • Steps to success • Pitfalls • Continous process
  • 15. 15 Choosing a technology • Do your research - What systems do you want/need to integrate? - How many of those systems does the manufacturer offer? - Does the manufacturer comply with industry standards? - Does the manufacturer employ open technology? - How does the manufacturer go to market? - How does the manufacturer vet integrators? - Is the solution scalable? - Is training offered – classroom and online? - Does the manufacturer support us directly? • Ask your integrator - Is the integrator exclusive to the manufacturer?
  • 16. 16 Choosing your integrator • Longevity: At least 5 years in the security business - Meet the owner or local management - Assure accessibility - Will they support a team relationship? • Experience: provide a minimum of 3 customers that you can reference with a project of similar scope - Actually check references • Training certificates; manufacturers, network, operating systems and database • Investment in service - 24 hour call-in - Project management program - Documentation manuals and drawings - Test facilities
  • 18. 18 Steps to success • Develop a plan and publish a roadmap • Research technology • Interview local integrators • Justify investment in security • Publish security technology standards • Get buy in from Stake Holders (Administrators & Academics) • Work with IT & Facilities on infrastructure and equipment needs • Get involved early with Construction Management Teams on designs .make sure security technology is included in every project
  • 19. 19 Pitfalls • Analysis paralysis - Take small bites • Get the latest and greatest technology - There is a thin line between the leading and bleeding edge - You will never get the latest - Today’s technology is surpassed by tomorrow’s
  • 21. 21 Contact Information Ronald Culmer III Captain/Technology Manager Univ. of the District of Columbia Office of Public Safety/Police Washington, DC 20008 202.274.5839 rculmer@udc.edu www.udc.edu/ps Twitter @RonCulmer For more information on this presentation or for contact information on the integrators and manufacturers we have experience working with please contact me directly.