10
An Overview of Security Capabilities and Technology

An Overview of Security Capabilities and Technology

Embed Size (px)

Citation preview

An Overview of Security Capabilities and Technology

A Living Security Strategy Starts with A.D.A.M.

Assess

• Assess• Determine the risk. Internal &

External.• Pinpoint and Prioritize Risk.• Discuss Possible Emergency

Scenarios.• Prioritize Risk• Identifying the Institution’s

current state of preparedness.

Dete

rmin

e

• Determine countermeasures• Consider Deterrents• Existing Infrastructure• Technology• Process

Apply

• Apply• Implement/Procedures• Develop & Implement Security

& Safety Training all Departments

Main

tain

• Maintain• verify security is maintained• Testing & Exercising Plans

Periodically.• Service

This is a living

process that is

revisited

as technology

and business

needs change

INTEGRATION

Video SurveillanceIntrusion

Alarm

Duress System

Card Access

Fire Alarm

Lighting

Mass Notification

Mobile AppsSecurity Management Platform (SMS)

Maximize all of your Security Solutions to better Manage and Monitor every aspect.

INTRUSION DETECTION/DURESS SYSTEM

Detect & Report Unauthorized Access

Indentifying Possible Incidents

Logging Information

Monitoring/Reporting

What’s New

More Reliable Detectors

Network Monitoring VS Landline

User Interactive Keypads

Cellular/Radio Back Up

Improved Wireless Technology.

Network IP Panic Alarm Systems

Integration

• FOUR COMMON DESIGN NOTES•P

erimeter

•Common Access Areas

•High Risk/High Threat

•Areas/Zones

INTRUSION DETECTION DESIGN NOTES

VIDEO SURVEILLANCE

Preventing & Deterring Crime

Sense of Safety & Security

Aid in an Arrest

Monitoring Activity: Information/Knowledge

What’s New

Leveraging Infrastructure

Better Resolution Cameras MP/HD

High Quality Recording

Non Proprietary Components

Improved Quicker Viewing/Search

Mobile Apps

Integration

VIDEO SURVEILLANCE

UNDERSTANDING TODAY’S SURVEILLANCE SYSTEMS

•VMS SOFTWARE

•STORAGE

•CAMERAS

•Don’t Forget About :

Expansion/Growth

Integration

Service/Maintenance

Card Access (Security Management System)

Limit Un-Authorized Entry

Regulate and Monitor Access

Area Management Audit Trail (Record)

Instant Lock-Out

Stops Widespread Knowledge of Door Entry codes & duplicate Keys.

What’s New Interactive Live Maps

Lock Down: Alarm Escalation

Mustering

HR System Integration

Open API’s

IP Readers

Wireless Readers

Smart Cards, Biometric Readers

Integration

School Lock Down

Assess Determine Apply Maintain

Lock Down Existing Infrastructure

New Technology

Implement/Procedures Testing & Exercising Plan Periodically In General, there are two main lockdown situations:

1. Lockdown with warning: The threat is outside the school building.

2. Lockdown with intruder: The threat or intruder is inside the school building.

Mission First Securing Classrooms

Teachers must be able to hear the lockdown announcement.

Questions

THANK YOUNorman Nomie

503-709-4309

[email protected]