Download presentation
Presentation is loading. Please wait.
Published byNorah Stone Modified over 9 years ago
1
An Overview of Security Capabilities and Technology
2
A Living Security Strategy Starts with A.D.A.M. Assess AssessAssess Determine the risk. Internal & External.Determine the risk. Internal & External. Pinpoint and Prioritize Risk.Pinpoint and Prioritize Risk. Discuss Possible Emergency Scenarios.Discuss Possible Emergency Scenarios. Prioritize RiskPrioritize Risk Identifying the Institution’s current state of preparedness.Identifying the Institution’s current state of preparedness. Determine Determine countermeasuresDetermine countermeasures Consider DeterrentsConsider Deterrents Existing InfrastructureExisting Infrastructure TechnologyTechnology ProcessProcess Apply ApplyApply Implement/ProceduresImplement/Procedures Develop & Implement Security & Safety Training all DepartmentsDevelop & Implement Security & Safety Training all Departments Maintain MaintainMaintain verify security is maintainedverify security is maintained Testing & Exercising Plans Periodically.Testing & Exercising Plans Periodically. ServiceService This is a living process that is revisited as technology as technology and business needs change
3
INTEGRATION Video Surveillance Intrusion Alarm Duress System Card Access Fire Alarm Lighting Mass Notification Mobile Apps Security Management Platform (SMS) Maximize all of your Security Solutions to better Manage and Monitor every aspect.
4
INTRUSION DETECTION/DURESS SYSTEM Detect & Report Unauthorized Access Indentifying Possible Incidents Logging Information Monitoring/Reporting What’s New More Reliable Detectors Network Monitoring VS Landline User Interactive Keypads Cellular/Radio Back Up Improved Wireless Technology. Network IP Panic Alarm Systems Integration
5
FOUR COMMON DESIGN NOTES Perimeter Common Access Areas High Risk/High Threat Areas/Zones INTRUSION DETECTION DESIGN NOTES
6
VIDEO SURVEILLANCE Preventing & Deterring Crime Sense of Safety & Security Aid in an Arrest Monitoring Activity: Information/Knowledge What’s New Leveraging Infrastructure Better Resolution Cameras MP/HD High Quality Recording Non Proprietary Components Improved Quicker Viewing/Search Mobile Apps Integration
7
VIDEO SURVEILLANCE UNDERSTANDING TODAY’S SURVEILLANCE SYSTEMS VMS SOFTWARESTORAGECAMERAS Don’t Forget About : Expansion/Growth Integration Service/Maintenance
8
Card Access (Security Management System) Limit Un-Authorized Entry Regulate and Monitor Access Area Management Audit Trail (Record) Instant Lock-Out Stops Widespread Knowledge of Door Entry codes & duplicate Keys. What’s New Interactive Live Maps Lock Down: Alarm Escalation Mustering HR System Integration Open API’s IP Readers Wireless Readers Smart Cards, Biometric Readers Integration
9
School Lock Down Assess Determine Apply Maintain Lock Down Existing Infrastructure New Technology Implement/Procedures Testing & Exercising Plan Periodically In General, there are two main lockdown situations: 1.Lockdown with warning: The threat is outside the school building. 2.Lockdown with intruder: The threat or intruder is inside the school building. Mission First Securing Classrooms Teachers must be able to hear the lockdown announcement.
10
Questions THANK YOU Norman Nomie 503-709-4309 Norman.e.nomie@jci.com
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.