Upload
norah-stone
View
218
Download
1
Tags:
Embed Size (px)
Citation preview
A Living Security Strategy Starts with A.D.A.M.
Assess
• Assess• Determine the risk. Internal &
External.• Pinpoint and Prioritize Risk.• Discuss Possible Emergency
Scenarios.• Prioritize Risk• Identifying the Institution’s
current state of preparedness.
Dete
rmin
e
• Determine countermeasures• Consider Deterrents• Existing Infrastructure• Technology• Process
Apply
• Apply• Implement/Procedures• Develop & Implement Security
& Safety Training all Departments
Main
tain
• Maintain• verify security is maintained• Testing & Exercising Plans
Periodically.• Service
This is a living
process that is
revisited
as technology
and business
needs change
INTEGRATION
Video SurveillanceIntrusion
Alarm
Duress System
Card Access
Fire Alarm
Lighting
Mass Notification
Mobile AppsSecurity Management Platform (SMS)
Maximize all of your Security Solutions to better Manage and Monitor every aspect.
INTRUSION DETECTION/DURESS SYSTEM
Detect & Report Unauthorized Access
Indentifying Possible Incidents
Logging Information
Monitoring/Reporting
What’s New
More Reliable Detectors
Network Monitoring VS Landline
User Interactive Keypads
Cellular/Radio Back Up
Improved Wireless Technology.
Network IP Panic Alarm Systems
Integration
• FOUR COMMON DESIGN NOTES•P
erimeter
•Common Access Areas
•High Risk/High Threat
•Areas/Zones
INTRUSION DETECTION DESIGN NOTES
VIDEO SURVEILLANCE
Preventing & Deterring Crime
Sense of Safety & Security
Aid in an Arrest
Monitoring Activity: Information/Knowledge
What’s New
Leveraging Infrastructure
Better Resolution Cameras MP/HD
High Quality Recording
Non Proprietary Components
Improved Quicker Viewing/Search
Mobile Apps
Integration
VIDEO SURVEILLANCE
UNDERSTANDING TODAY’S SURVEILLANCE SYSTEMS
•VMS SOFTWARE
•STORAGE
•CAMERAS
•Don’t Forget About :
Expansion/Growth
Integration
Service/Maintenance
Card Access (Security Management System)
Limit Un-Authorized Entry
Regulate and Monitor Access
Area Management Audit Trail (Record)
Instant Lock-Out
Stops Widespread Knowledge of Door Entry codes & duplicate Keys.
What’s New Interactive Live Maps
Lock Down: Alarm Escalation
Mustering
HR System Integration
Open API’s
IP Readers
Wireless Readers
Smart Cards, Biometric Readers
Integration
School Lock Down
Assess Determine Apply Maintain
Lock Down Existing Infrastructure
New Technology
Implement/Procedures Testing & Exercising Plan Periodically In General, there are two main lockdown situations:
1. Lockdown with warning: The threat is outside the school building.
2. Lockdown with intruder: The threat or intruder is inside the school building.
Mission First Securing Classrooms
Teachers must be able to hear the lockdown announcement.