SlideShare a Scribd company logo
1 of 12
• Without strong Red Team Testing of your security it is completely ineffective against criminals with intent,
and they will not be deterred.
• When criminals have intent they will carefully choose their moment to break through access control
systems; they will outwit manned guarding patrols, and will evade the many different types of “high
security” standalone and surveillance operator monitored CCTV systems.
• Viseum solutions are purchased throughout the world where the potential impact of anti-social, criminal or
terrorist activity upon public confidence, commercial profit or corporate reputation is judged as being
unacceptably high.
Viseum security designs deliver all future-proof technologies as trusted plug-and-play solutions. This optimises
the site survey process and security results, Viseum Solutions allow all customers to deliver the strongest
available professional security:
• The 360 long range coverage of Viseum cameras allow each camera installation to be easily positioned to
cover larger areas, and for all simultaneous security applications that a customer may have.
• No need to select special camera lens types and focal lengths, unless extreme high traffic pinch points of a
remote site.
• No need to priorities cameras for a primary function as all Viseum cameras multitask, collecting multiple
images of all angles.
• Where does the Security Site Survey sit in the scheme of your Physical Security Program?
• Advantages of the Assessment Process.
• Identify the System Types to match and minimize the Risk Types.
• Conduct the Site Survey.
• What are you going to Assess?
• Protect this key information with procedures.
• Identify and Rank Critical Assets.
• Analyse Network Architecture.
• Assess Threat Environment.
• Test and try to defeat the System (Viseum Red Team and Blue Team).
• Conduct Physical Asset Analysis.
• Assess Operations Security.
• Examine Policies and Procedures.
• Conduct Impact Analysis.
• Assess Infrastructure Interdependencies.
• Conduct Risk Characterisation.
> download Viseum design architecture <
• Prioritise Recommendations.
• Develop Action Plan.
• Capture Lessons Learned & Best Practices.
• Deploy Security System.
• Conduct Training.
> download Viseum project management <
• Increase awareness, not necessarily paranoia.
• Identify vulnerabilities and develop responses.
• What key assets drive the risk management process.
• Promote action to minimize risk.
• Start your Physical Security Program.
Classify Video System by type:
• Video Surveillance (Monitoring Function).
• Forensic (Recording Function).
• Video Analytics.
• Perimeter Security.
• Access Control.
Classify Camera by Function:
• Monitor basic activity (subject is 5% of vertical).
• Detection (10%).
• Recognition (Human, Animal or Vehicle) (50%).
• Identification (120%).
• Viewing Angle
• Fixed Directional Cameras.
• Viseum IMC Cameras (60° -
360°).
• Environment:
• Lighting type, level
• Reflectance/Emissivity
• Obstruction
• Temperature
• Humidity.
• Corrosives.
• Water.
• Vandalism.
• Viewing Angle
• Mounting Conditions:
• Cabling Entry Requirements.
• Accessibility.
• “Special” Objects / Scenes (some examples):
• Vehicles.
• Vehicle Number Plates.
• Shoreline/Boarder.
• Transit Platforms.
• Enter Site Survey Data (Rough Sketches, Location Notes).
• Input data onto a Standard Site Survey Form.
• Normalize Devices by Camera Types.
• Transfer to Floor Plans.
• Verify samples with actual site.
• Assess communications i.e. hardwired or wireless, or an amalgamation of each.
AutoCad
Google
Maps
• Make sure users have the live and recorded image quality they need.
• Maintain most favourable criteria for your project.
• Increase the number of ways you can access your video information.
• Strengthen and secure your network.
• Do not have one device service too many users or perform many critical functions –
Improve your System Availability.
• Model all network-based systems prior to specification phase.
• The Assessment and Survey Process increases awareness.
• Think like a criminal with intent and ways to defeat the systems.
• Expect wider ranging environmental conditions (light, etc.) than seen during your survey.
• If using wireless technologies, you must conduct a separate RF Survey.

More Related Content

Viewers also liked

Building construction-report (1)
Building construction-report (1)Building construction-report (1)
Building construction-report (1)Soh Shing
 
The delhi-metro-project
The delhi-metro-projectThe delhi-metro-project
The delhi-metro-projectVikas Saini
 
Residential Land Development Process
Residential Land Development ProcessResidential Land Development Process
Residential Land Development ProcessDuncan Smith
 
Internship Report on Building Construction
Internship Report on Building ConstructionInternship Report on Building Construction
Internship Report on Building ConstructionEsmael Aragaw
 
Building Construction
Building ConstructionBuilding Construction
Building ConstructionWilden How
 
project on construction of house report.
project on construction of house report.project on construction of house report.
project on construction of house report.Hagi Sahib
 

Viewers also liked (8)

Site Planning
Site PlanningSite Planning
Site Planning
 
urban design project 3
urban design project 3urban design project 3
urban design project 3
 
Building construction-report (1)
Building construction-report (1)Building construction-report (1)
Building construction-report (1)
 
The delhi-metro-project
The delhi-metro-projectThe delhi-metro-project
The delhi-metro-project
 
Residential Land Development Process
Residential Land Development ProcessResidential Land Development Process
Residential Land Development Process
 
Internship Report on Building Construction
Internship Report on Building ConstructionInternship Report on Building Construction
Internship Report on Building Construction
 
Building Construction
Building ConstructionBuilding Construction
Building Construction
 
project on construction of house report.
project on construction of house report.project on construction of house report.
project on construction of house report.
 

Similar to Viseum security-site-survey

AUTOMATED_VIRTUAL_SECURITY_TESTING_PLATFORM.pptx
AUTOMATED_VIRTUAL_SECURITY_TESTING_PLATFORM.pptxAUTOMATED_VIRTUAL_SECURITY_TESTING_PLATFORM.pptx
AUTOMATED_VIRTUAL_SECURITY_TESTING_PLATFORM.pptxGhanaKiran1
 
IPNEC - Security Services
IPNEC - Security ServicesIPNEC - Security Services
IPNEC - Security ServicesAbdus Saboor
 
Defcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shopDefcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shopPriyanka Aash
 
Threat modelling & apps testing
Threat modelling & apps testingThreat modelling & apps testing
Threat modelling & apps testingAdrian Munteanu
 
05 ip suervilence application
05 ip suervilence application05 ip suervilence application
05 ip suervilence applicationNader Elmansi
 
5 Pro Tips for Establishing and Managing CCTV Camera Collaboration with the B...
5 Pro Tips for Establishing and Managing CCTV Camera Collaboration with the B...5 Pro Tips for Establishing and Managing CCTV Camera Collaboration with the B...
5 Pro Tips for Establishing and Managing CCTV Camera Collaboration with the B...Brihaspathi Technologies Pvt. Ltd.
 
FS Presentation CCTV solution rev1 (1).pptx
FS Presentation CCTV solution rev1 (1).pptxFS Presentation CCTV solution rev1 (1).pptx
FS Presentation CCTV solution rev1 (1).pptxPawachMetharattanara
 
FS Presentation CCTV solution rev1 (2).pptx
FS Presentation CCTV solution rev1 (2).pptxFS Presentation CCTV solution rev1 (2).pptx
FS Presentation CCTV solution rev1 (2).pptxPawachMetharattanara
 
Safety and security in mission critical IoT systems
Safety and security in mission critical IoT systemsSafety and security in mission critical IoT systems
Safety and security in mission critical IoT systemsEinar Landre
 
FS Presentation CCTV solution rev1.pptx
FS Presentation CCTV solution rev1.pptxFS Presentation CCTV solution rev1.pptx
FS Presentation CCTV solution rev1.pptxPawachMetharattanara
 
CISM_WK_3.pptx
CISM_WK_3.pptxCISM_WK_3.pptx
CISM_WK_3.pptxdotco
 
Cloud security design considerations
Cloud security design considerationsCloud security design considerations
Cloud security design considerationsMike Kavis
 
Security testing fundamentals
Security testing fundamentalsSecurity testing fundamentals
Security testing fundamentalsCygnet Infotech
 
Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNicholas Davis
 
Scada security webinar 2012
Scada security webinar 2012Scada security webinar 2012
Scada security webinar 2012AVEVA
 
Network security, change control, outsourcing
Network security, change control, outsourcingNetwork security, change control, outsourcing
Network security, change control, outsourcingNicholas Davis
 
Securely Monitor Critical Systems From Anywhere
Securely Monitor Critical Systems From AnywhereSecurely Monitor Critical Systems From Anywhere
Securely Monitor Critical Systems From AnywhereInductive Automation
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineeringaizazhussain234
 

Similar to Viseum security-site-survey (20)

AUTOMATED_VIRTUAL_SECURITY_TESTING_PLATFORM.pptx
AUTOMATED_VIRTUAL_SECURITY_TESTING_PLATFORM.pptxAUTOMATED_VIRTUAL_SECURITY_TESTING_PLATFORM.pptx
AUTOMATED_VIRTUAL_SECURITY_TESTING_PLATFORM.pptx
 
IPNEC - Security Services
IPNEC - Security ServicesIPNEC - Security Services
IPNEC - Security Services
 
Defcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shopDefcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shop
 
Threat modelling & apps testing
Threat modelling & apps testingThreat modelling & apps testing
Threat modelling & apps testing
 
05 ip suervilence application
05 ip suervilence application05 ip suervilence application
05 ip suervilence application
 
5 Pro Tips for Establishing and Managing CCTV Camera Collaboration with the B...
5 Pro Tips for Establishing and Managing CCTV Camera Collaboration with the B...5 Pro Tips for Establishing and Managing CCTV Camera Collaboration with the B...
5 Pro Tips for Establishing and Managing CCTV Camera Collaboration with the B...
 
CSO CXO Series Breakfast
CSO CXO Series BreakfastCSO CXO Series Breakfast
CSO CXO Series Breakfast
 
FS Presentation CCTV solution rev1 (1).pptx
FS Presentation CCTV solution rev1 (1).pptxFS Presentation CCTV solution rev1 (1).pptx
FS Presentation CCTV solution rev1 (1).pptx
 
FS Presentation CCTV solution rev1 (2).pptx
FS Presentation CCTV solution rev1 (2).pptxFS Presentation CCTV solution rev1 (2).pptx
FS Presentation CCTV solution rev1 (2).pptx
 
Safety and security in mission critical IoT systems
Safety and security in mission critical IoT systemsSafety and security in mission critical IoT systems
Safety and security in mission critical IoT systems
 
FS Presentation CCTV solution rev1.pptx
FS Presentation CCTV solution rev1.pptxFS Presentation CCTV solution rev1.pptx
FS Presentation CCTV solution rev1.pptx
 
CISM_WK_3.pptx
CISM_WK_3.pptxCISM_WK_3.pptx
CISM_WK_3.pptx
 
Cloud security design considerations
Cloud security design considerationsCloud security design considerations
Cloud security design considerations
 
Marketing wi comply
Marketing wi complyMarketing wi comply
Marketing wi comply
 
Security testing fundamentals
Security testing fundamentalsSecurity testing fundamentals
Security testing fundamentals
 
Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, Outsourcing
 
Scada security webinar 2012
Scada security webinar 2012Scada security webinar 2012
Scada security webinar 2012
 
Network security, change control, outsourcing
Network security, change control, outsourcingNetwork security, change control, outsourcing
Network security, change control, outsourcing
 
Securely Monitor Critical Systems From Anywhere
Securely Monitor Critical Systems From AnywhereSecurely Monitor Critical Systems From Anywhere
Securely Monitor Critical Systems From Anywhere
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineering
 

More from Stuart Thompson Viseum Group Owner & President

More from Stuart Thompson Viseum Group Owner & President (16)

Viseum certified-technology-partner-program
Viseum certified-technology-partner-programViseum certified-technology-partner-program
Viseum certified-technology-partner-program
 
Face recognition-software-presentation
Face recognition-software-presentationFace recognition-software-presentation
Face recognition-software-presentation
 
Uk cctv-viseum-strategy-recommendations
Uk cctv-viseum-strategy-recommendationsUk cctv-viseum-strategy-recommendations
Uk cctv-viseum-strategy-recommendations
 
Viseum security-project-management
Viseum security-project-managementViseum security-project-management
Viseum security-project-management
 
Thermal radar-perimeter-surveillance-systems
Thermal radar-perimeter-surveillance-systemsThermal radar-perimeter-surveillance-systems
Thermal radar-perimeter-surveillance-systems
 
Temporary CCTV redeployable-cctv
Temporary CCTV redeployable-cctvTemporary CCTV redeployable-cctv
Temporary CCTV redeployable-cctv
 
Surveillance system-situational-awareness-people-surveillance
Surveillance system-situational-awareness-people-surveillanceSurveillance system-situational-awareness-people-surveillance
Surveillance system-situational-awareness-people-surveillance
 
Safe city-people-vehicles
Safe city-people-vehiclesSafe city-people-vehicles
Safe city-people-vehicles
 
Rapid deployment-cctv-intelligent-cctv-trailer
Rapid deployment-cctv-intelligent-cctv-trailerRapid deployment-cctv-intelligent-cctv-trailer
Rapid deployment-cctv-intelligent-cctv-trailer
 
Police force
Police forcePolice force
Police force
 
Perimeter surveillance-systems
Perimeter surveillance-systemsPerimeter surveillance-systems
Perimeter surveillance-systems
 
People surveillance-systems-command-control-and-communications
People surveillance-systems-command-control-and-communicationsPeople surveillance-systems-command-control-and-communications
People surveillance-systems-command-control-and-communications
 
Panoramic security-camera
Panoramic security-cameraPanoramic security-camera
Panoramic security-camera
 
Baggage handling-innovation-examples
Baggage handling-innovation-examplesBaggage handling-innovation-examples
Baggage handling-innovation-examples
 
Viseum thermal-security-camera-comparison
Viseum thermal-security-camera-comparisonViseum thermal-security-camera-comparison
Viseum thermal-security-camera-comparison
 
Viseum technology-and-support-strengths
Viseum technology-and-support-strengthsViseum technology-and-support-strengths
Viseum technology-and-support-strengths
 

Recently uploaded

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Recently uploaded (20)

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

Viseum security-site-survey

  • 1. • Without strong Red Team Testing of your security it is completely ineffective against criminals with intent, and they will not be deterred. • When criminals have intent they will carefully choose their moment to break through access control systems; they will outwit manned guarding patrols, and will evade the many different types of “high security” standalone and surveillance operator monitored CCTV systems. • Viseum solutions are purchased throughout the world where the potential impact of anti-social, criminal or terrorist activity upon public confidence, commercial profit or corporate reputation is judged as being unacceptably high.
  • 2. Viseum security designs deliver all future-proof technologies as trusted plug-and-play solutions. This optimises the site survey process and security results, Viseum Solutions allow all customers to deliver the strongest available professional security: • The 360 long range coverage of Viseum cameras allow each camera installation to be easily positioned to cover larger areas, and for all simultaneous security applications that a customer may have. • No need to select special camera lens types and focal lengths, unless extreme high traffic pinch points of a remote site. • No need to priorities cameras for a primary function as all Viseum cameras multitask, collecting multiple images of all angles.
  • 3. • Where does the Security Site Survey sit in the scheme of your Physical Security Program? • Advantages of the Assessment Process. • Identify the System Types to match and minimize the Risk Types. • Conduct the Site Survey.
  • 4. • What are you going to Assess? • Protect this key information with procedures. • Identify and Rank Critical Assets.
  • 5. • Analyse Network Architecture. • Assess Threat Environment. • Test and try to defeat the System (Viseum Red Team and Blue Team). • Conduct Physical Asset Analysis. • Assess Operations Security. • Examine Policies and Procedures. • Conduct Impact Analysis. • Assess Infrastructure Interdependencies. • Conduct Risk Characterisation. > download Viseum design architecture <
  • 6. • Prioritise Recommendations. • Develop Action Plan. • Capture Lessons Learned & Best Practices. • Deploy Security System. • Conduct Training. > download Viseum project management <
  • 7. • Increase awareness, not necessarily paranoia. • Identify vulnerabilities and develop responses. • What key assets drive the risk management process. • Promote action to minimize risk. • Start your Physical Security Program.
  • 8. Classify Video System by type: • Video Surveillance (Monitoring Function). • Forensic (Recording Function). • Video Analytics. • Perimeter Security. • Access Control. Classify Camera by Function: • Monitor basic activity (subject is 5% of vertical). • Detection (10%). • Recognition (Human, Animal or Vehicle) (50%). • Identification (120%).
  • 9. • Viewing Angle • Fixed Directional Cameras. • Viseum IMC Cameras (60° - 360°). • Environment: • Lighting type, level • Reflectance/Emissivity • Obstruction • Temperature • Humidity. • Corrosives. • Water. • Vandalism. • Viewing Angle • Mounting Conditions: • Cabling Entry Requirements. • Accessibility. • “Special” Objects / Scenes (some examples): • Vehicles. • Vehicle Number Plates. • Shoreline/Boarder. • Transit Platforms.
  • 10. • Enter Site Survey Data (Rough Sketches, Location Notes). • Input data onto a Standard Site Survey Form. • Normalize Devices by Camera Types. • Transfer to Floor Plans. • Verify samples with actual site. • Assess communications i.e. hardwired or wireless, or an amalgamation of each. AutoCad Google Maps
  • 11. • Make sure users have the live and recorded image quality they need. • Maintain most favourable criteria for your project. • Increase the number of ways you can access your video information. • Strengthen and secure your network. • Do not have one device service too many users or perform many critical functions – Improve your System Availability. • Model all network-based systems prior to specification phase.
  • 12. • The Assessment and Survey Process increases awareness. • Think like a criminal with intent and ways to defeat the systems. • Expect wider ranging environmental conditions (light, etc.) than seen during your survey. • If using wireless technologies, you must conduct a separate RF Survey.