26
A Comprehensive Guide to Physical Security Brian Mulligan-Vice President Sales and Marketing Michelle Syc-Senior Analyst, Advisory & Assurance Services

A Comprehensive Approach to Physical Security

Embed Size (px)

Citation preview

A Comprehensive Guide to Physical Security

Brian Mulligan-Vice President Sales and MarketingMichelle Syc-Senior Analyst, Advisory & Assurance

Services

Why is physical security important for a business? How does a lack of physical security affect the business? The fundamentals of physical security

• Intrusion Detection• Access Control• Video Surveillance• Fire Detection

What is a good, better best solution for physical security?

Agenda

Comprehensive Security Controls

Administrative Safeguards

Physical Safeguards

Technical Safeguards

Securing the physical perimeter is equally as important as securing your data network. Why?

Define and restrict areas based on a “need to access” level. What is the risk of not having environmental controls in

place? Three important considerations to physical security-cost,

benefits and return on investment

Why is Physical Security Important to a Business?

Employee theft costs American businesses $120 billion each year. “Fraud and white-collar crime

cost businesses more than $400 billion* annually”

“On-the-job violence costs employers $36 billion annually”

Why is Physical Security Important to a Business?

Do You have a Security Strategy in Place?Many times a lack of a security strategy is due to not knowing where to start

Access to areas not for public leave files and data open to corruption and loss

Safety of employees and clients Physical loss of corporate and personal assets Potential theft of proprietary and confidential information etc.

Risks associated with a lack of physical security

What are my Options and where do I start?

Why have Physical Intrusion Protection?o Protect your home and Business from potential threats of theft,

violence, intrusion, vandalism and more. o Home alarm systems aim to reduce your exposure to crime, limit

crime in progress, apprehend criminals o Most importantly allow you to monitor your home and family anytime,

anywhere.

Intrusion Protection Overview

Intrusion Protection OverviewIntrusions are Detected in Different StagesIntruders entered the facility through:

Door – 35%

Window – 26%

Unconventional Entry – 25%

Did Not Gain Entry – 14%

What Options are available to me?o First and foremost, sensors including door contacts, window sensors

and motion detectors are most common.o Triggering these items will send an alarm to a Central Monitoring

Stationo Not your Parents security system anymore……

• Introduction of automation• Ability to use mobile devices to arm/disarm• Notifications of events on smart phone or tablet via text/email• Control lights, locks and thermostats remotely

Intrusion Protection Overview

Unlike conventional alarm systems, verified alarms use audio and/or video.

When an alarm is triggered local monitoring professionals are able to listen the live audio to determine whether a break-in is in progress. If it is a break in, police are dispatched immediately and real-time information is relayed to the responding officers.

Verified alarms provide better protection, early detection, and more comprehensive coverage than traditional intrusion detection systems.

Ability to identify intruders who enter the building unconventionally, unlike perimeter protection systems

Verified alarms have the highest apprehension rate and the lowest false alarm rate in the industry.

Verified Solutions

Verified SolutionsEnhanced Call Verification

Criminal attempts to break in through a door, window, wall or ceiling

Advanced intrusion sensors detect intruder and sound alarm

Central Monitoring Center receives digital alarm signal

A monitoring specialist verifies alarm by contacting customer premise (ECV)

Contacts the police on verified alarm

Police dispatched to customer location

Notifies customer of alarm and dispatch

All alarm events documented and available to customers online

o Door Contacts and Window Sensors provide your “Good” solution as you are doing something to attempt secure your home or business

o A combination of Door Contacts, Window Contacts and Motion Detectors provide a “Better” scenario

o A compliment of all three, plus audio verification (Commercial application) provide full volumetric protection.

Good, Better, Best

Customer A has several door and window detectors along with motion detectors. Criminal is able to enter the space and cause some damage upon entry and flees. Siren alarm scares off the criminal, but damage has been done. Police are dispatched and arrive with investigation in mind.

Customer B has an audio verification system in place. Criminal enters space and silent audio alarm is tripped. Central Station operator hears the criminal voice and knows where in the building they are. A verified alarm is called into Police for Dispatch. Police dispatch an average of 10 minutes faster on a verified alarm and arrive on scene with apprehension in mind.

Intrusion Protection Sample ScenariosNon Verified versus Verified

Access cards to lock & unlock doors Tracks employees, visitors, contractors use of your facilities Integrate with HVAC and lighting systems Multiple levels of access cards

Access Control Overview

On a recent snow day, a public school customer goes into their access management portal and changes the predefined Alert System to “Snow Day”.

The system can automatically: Deny door access to general personnel Turns on the alarm system Link to HVAC system to lower the temperature in the building Email the cable/radio station to notify the parents of the closing Play prerecord school closing message over PA system for janitors Text message the faculty & staff that the school will be closed for the day

Access Control Sample Scenario

Increases employee supervision/security Reduces vandalism, theft, shoplifting Helps control inventory shrinkage Improves employee safety Verifies disability and accident claims Documents activity on the premises Provides visually verified evidence Assists in training and evaluating employees

Video Surveillance Overview

Customer A has a non verified video system and has an event on a Saturday. Customer is able to pull the video from DVR to provide to Police for action of action following event.

Customer B has a verified video system. Customer has an event on a Saturday. Video signal of event is sent to Central Monitoring station. Police are dispatched to the scene and criminal is apprehended.

Video Surveillance Sample ScenarioVerified versus non verified

Smoke and heat detection Water flow and sprinkler monitoring Elevator recall Voice evacuation system Duct detection

Fire Detection Overview

The key to limiting fire loss is early detection and verification

• A combination of door/windows contacts provides some level of physical protection.

• Addition of motion detectors provides a “Good” security protocol as there is something in place to attempt to stop a crime in progress.

• Sirens and notification to Central Monitoring Station will allow for notification to customer and to Police that an event is taking place.

Good physical Security Protocol

Door/Window Contacts and Motion Detectors with siren Access Control system to serve as entry level security to

location as well as to areas that need to be secured. Video surveillance system in place with Digital Video Recorder

to capture events.

Better Physical Security Protocol

Door/Window Contacts and Motion Detectors with siren Access Control system to serve as entry level security to

location as well as to areas that need to be secured. Video surveillance system in place with Digital Video Recorder

to capture events. Video/Audio Verified solution in place allows for full

volumetric coverage and the opportunity to not only stop the event, but leaves a better chance for apprehension.

Best Physical Security Protocol

About Sonitrol of New EnglandADNET proudly partners with Sonitrol of New England. Since 1970 Sonitrol of New England has been providing world class security solution to clients in New England. From residential homes to schools, municipalities and large corporate businesses, Sonitrol of New England has the expertise to provide innovative solutions to fit all security needs small and large.

Partner Logo

@SonitrolNewEngland

@SonitrolNewEngland

www.sonitrolnewengland.com

Partner Logo

@ADNETTech

@ADNETTechnologiesLLC

@ADNETTechnologiesLLC

www.thinkADNET.com