Chapter 1 Introduction

Size: px
Start display at page:

Download "Chapter 1 Introduction"

Transcription

1 Chapter 1 Introduction Chapter 1 provides an overview of the fundamental aspects of the industries that influence electronic safety and security (ESS) design.

2

3 Table of Contents Introduction to Safety and Security Industry Changes Electronic Safety and Security (ESS) Bodies of Knowledge Electronic Safety and Security (ESS) Design Fundamentals Access Control Surveillance Intrusion Detection Fire Detection and Alarm Special Systems Network Security Integrated Systems Types of Projects Current and Future Trends in Safety and Security Information Technology (IT) Physical Security Integration of Access Control Systems (ACS) and. Building Automation Systems (BAS) Video Surveillance Technology Advancements and Convergence Manual Overview Chapter 2: Principles of Security Chapter 3: Electronic Safety and Security (ESS) Design Process Chapter 4: Access Control Systems (ACS) Chapter 5: Video Surveillance Systems (VSS) Chapter 6: Intrusion Detection Systems (IDS) Chapter 7: Fire Detection and Alarm Systems Chapter 8: Notification, Communication, and Display Devices Chapter 9: Special Systems Chapter 10: Network Concepts Section 1: Network Design Principles Section 2: Network Security Chapter 11: Systems Integration Chapter 12: System Operation and Commissioning Appendix A: Codes, Standards, Regulations, and Organizations Appendix B: Legal Aspects of Electronic Safety and Security (ESS) Design BICSI 1-i ESS Design Reference Manual, 3rd edition

4 Introduction to Safety and Security The Electronic Safety and Security Design Reference Manual (ESSDRM) is designed to educate and inform professionals engaged in the electronic safety and security (ESS) arena. Safety is protection against hazards, while security is protection against threats. To be safe is to be protected, while to be secure is to be free from danger. Protection leads to a condition of being free from danger or threat, which ultimately reduces risks. The ESSDRM discusses trends and expertise in security areas that apply to information technology systems (ITS) and the integration of ESS systems. IMPORTANT: The ESSDRM is not intended to be a stand-alone reference manual; therefore, the construction of a comprehensive ESS design requires reference to additional bodies of knowledge. This manual presents a guideline for the design and deployment of ESS systems and should never be used in place of a legal opinion. An ESS designer should be familiar with the laws governing surveillance, legislation that is pending, and the requirements of the authority having jurisdiction (AHJ). The ESS designer should seek multiple legal opinions and use these opinions and established standards, guidelines, and best practices to deploy an ESS system as part of the overall security master plan. The security industry has standards, practices, and organizations dedicated to defining and refining those practices. In addition to the ESSDRM, BICSI is developing an industry standard for the design and implementation of structured cabling for ESS systems. This reference manual provides information from both the security and ITS industries so that professionals in both industries will have a common understanding of each other s roles in designing and implementing ESS systems BICSI 1-1 ESS Design Reference Manual, 3rd edition

5 Industry Changes Prior to 1996, security systems were viewed as an option to most architectural projects. With the specialized cabling and equipment required for installation, not many changes were made to the products offered within the industry for a number of years. That changed when the first Internet protocol (IP) camera was introduced to the industry in The opportunity to use standards-based telecommunications cabling and cabling infrastructure was tempered with other complex issues. IP cameras tended to have extremely high bandwidths. Users also had to consider whether to maintain or abandon the analog systems they had previously implemented. As late as 2002, there was some speculation that hybrid systems would remain very popular over the use of pure IP systems. In spite of this speculation, the IP camera market expanded dramatically. ESS equipment suppliers, system integrators, and users began to consider the integration and implementation of entire safety and security systems on an IP platform. This discipline has grown from the early human guarding of objects to sophisticated surveillance cameras and building automation systems (BAS). Each began as a stand-alone system, but the rise of networks and ITS has lead to an increased need to converge multiple systems. As technology develops at a rapid pace, its influence in the relatively stable world of security is ongoing and ever changing. Advancements in common infrastructure have enabled manufacturers to create systems based on similar network protocols, allowing different systems to communicate with one another. The simple beginnings, exemplified by the employment of guards and patrols, have progressed to complex advancements in surveillance that have enabled the addition of intelligence to electronic security systems and BAS. The cost benefits of cabling infrastructure convergence can be seen with lower cabling costs; easy modifications for moves, adds, or changes (MACs); unified integration with other information technology (IT) environments; elimination of specialized equipment; and space savings by using ITS servers and storage devices instead of video cassette recorder (VCR) tapes and video recorders. ESS Design Reference Manual, 3rd edition BICSI

6 Electronic Safety and Security (ESS) Bodies of Knowledge The ESS designer should have knowledge of: ITS fundamentals. Principles of security. Design process. Preliminary security design. Architecture and engineering (A&E) design. IP design. Security systems. Access control systems (ACS). Surveillance systems. Intrusion detection. Fire alarms. Special systems. Network security. Systems integration. Project management. Systems operation and commissioning. Chapters in this manual are devoted to areas and practices that influence the design of a security system. These chapters address: Security consulting. Design practices. Codes, standards, regulations, and organizations. Legal issues. The design process of the Construction Specifications Institute (CSI) and the American Institute of Architects (AIA). With the expansion of security and special systems, nontraditional bodies of knowledge that can now be included in the responsibilities of the ESS designer include the following systems: Voice and notification. Nurse call. Mustering. Radio frequency identification (RFID) inventory management BICSI 1-3 ESS Design Reference Manual, 3rd edition

7 Electronic Safety and Security (ESS) Design Fundamentals The practice of safety and security design involves the ability to use and integrate various practices, methodologies, and devices, resulting in improved safety and security. Many elements of design are unique to the protection of life and property, and others are multidisciplinary. The ESS designer must have a thorough understanding of the fundamentals described in detail throughout this manual and be able to incorporate aspects of the trades brought into the ESS design by other professionals. Depending on the expertise or knowledge of the ESS designer, additional support may not be necessary. Physical and ESS systems must work as a comprehensive package. The ESS designer must understand how they influence each other to be successful. Access Control Access control is the process by which access to an asset or location can be limited to those individuals expressly authorized for its use. Access control is important for overall personal safety and the protection of physical and intellectual property. Access control devices can include entry point locks, integrated electronic devices controlling a single door or room, or a complex system of interconnected electronic devices controlling a zone, building, or campus. ESS designs can be affected by each individual s location and the level of security desired. Surveillance Video surveillance is a widely used technology within ESS systems, and it involves the use of cameras for watching or controlling assets. Video surveillance is the process of image: Capturing. Transmitting. Processing. Viewing. Recording. This technology requires knowledge of cameras and their placement, image transmission, and recording principles. Intrusion Detection Intrusion detection is often viewed as part of the ACS because most door controls for access control can alarm when the door is left open or opened without a valid card read. However, it is a stand-alone system that must be evaluated to its own standards and levels of due diligence. These systems use everything from simple switches to complex devices that detect motion, heat, glass breaking, or other nonstandard occurrences in the area to detect the presence of people in secure zones. Intrusion detection systems (IDS) can generate simple local or paging alarms, or they can be integrated with other systems to provide more active responses (e.g., turning on cameras or lighting). ESS Design Reference Manual, 3rd edition BICSI

8 Fire Detection and Alarm Fire detection and alarm involves the early detection and notification of life safety threats. Fire detection and alarm requires that the ESS designer have a thorough knowledge of specific codes, statutes, and the requirements of the applicable AHJ. Special Systems With the convergence of systems to the network, the addition of specialty systems, such as nurse call, RFID tracking, intercom, and mustering, will sometimes fall under the responsibilities of the ESS designer. Network Security As more systems migrate to the network, the issues associated with protecting those systems must be addressed. Isolation can provide protection, but it comes at the cost of remote access. Remote access to a network allows the possibility of outside interference and harm. Firewalls, encryption, virtual private networks (VPNs), and other methods of protection are available. Integrated Systems Integrated systems cover concepts, systems, and processes related to the convergence of ESS systems or their integration with other building systems. Through integration, ESS systems begin to interact with other building systems. Integrated ESS systems are deployed in a wide variety of applications, including facilities, campuses, vehicles, and personal tracking. Types of Projects An ESS project may be: An original design. A retrofit of an existing plan. An upgrade or replacement of an existing system. To successfully complete a project, the ESS designer must be able to interact with building owners, tenants, architects, engineers, and security professionals. Additionally, the ESS designer may need to consult end users and other stakeholders BICSI 1-5 ESS Design Reference Manual, 3rd edition

9 Current and Future Trends in Safety and Security Several areas in ESS design are affected by rapid advancement in technology, including: IT. Physical security. Integration of ACS and BAS. Video surveillance. Technology advancements and convergence. Information Technology (IT) Most current systems have migrated to the use of the IP network for communication between the servers and control panels. Some are hybrid systems where there are limited gateways to the network, and the devices communicate through older protocols for the subsystem communication. The ESS designer must understand the system communication methods, the required infrastructure particular to the specific system installed, and the effect network outages will have on system functionality. The ESS designer must understand the impact of the project on the client s IT networks. The impact may be financial, operational, and physical (e.g., switch ports, bandwidth, cabling). The ESS designer also must have a reasonable understanding of network terminology, architecture, and function. Coordination with the client s IT department is important for ensuring the success of any safety or security project that has an impact on the IT network. Physical Security Physical security involves measures that deter, detect, delay, mitigate, or notify any attempt to injure, damage, modify, or remove an asset or person. This includes damage by accident, fire, environmental elements, crime, vandalism, and industrial espionage. It can be a simple device or multiple layers of electronic measures. Strong security measures also come at a cost, and there can be no perfect security. It is up to a security designer to balance security features and a tolerable amount of personnel access against available resources as well as the risk to assets that are to be protected. Depending on the situation, consulting with architects, engineers, and hardware designers may be necessary for physical security considerations. This reference manual will describe, in detail, situations and hardware types for general building applications being governed by conventional codes. In some special situations (e.g., military, correctional facilities, hospitals), codes commonly used for commercial buildings may not apply. ESS Design Reference Manual, 3rd edition BICSI

10 Integration of Access Control Systems (ACS) and Building Automation Systems (BAS) The client often will require multiple levels of access within a space, and personnel may require access to a number of different areas, rooms, or spaces. The access levels may change over time and may impact or be impacted by other building systems. When an ACS is integrated with one or more BAS, the design goals require a more holistic approach. Observing the client s space and surrounding areas has always been a major aspect of access control as part of the security system. Understanding how the ACS integrates with BAS and subsystems in the surrounding areas is becoming a major factor in the design of ACS. Video Surveillance Video surveillance systems record activities in the client s targeted areas for local or remote review. Modern camera systems may be: Digital. Analog. Digital/analog hybrids. IP. Many factors will affect the selection, including court admissibility, network impact, and available space within buildings to house equipment. Technology Advancements and Convergence Technology s growing impact on security has led to the convergence of many systems. Convergence can encompass a range of capabilities, from limited monitoring to full command and control functions across a common IP network. Some of the most common types of convergence are the interconnection of: Multiple systems within a single site. Single systems across multiple sites. Multiple systems across multiple sites. This shift in implementation is driving a change in both the security industry and communications industry. Professionals in both industries have to learn more concerning each industry. Today s successful security professionals must understand the cabling infrastructure required for an installation, while cabling infrastructure professionals are asked to perform more safety and security related tasks BICSI 1-7 ESS Design Reference Manual, 3rd edition

11 Manual Overview This third edition of the ESSDRM comprises 12 chapters and two appendixes that contain information intended to assist both security specialists and IT professionals in understanding the systems and the convergence that occurs between the industries. The following is a brief description of what the reader can expect to find in each chapter of this reference manual. Chapter 2: Principles of Security Chapter 2 discusses security planning and applications that pertain to the integration of a system of deterrence and detection by electronic means, including the: Basics of security theory. Fundamentals of security design. Roles of practitioners involved in electronic security systems. Skills and experience required for each role. Chapter 3: Electronic Safety and Security (ESS) Design Process Chapter 3 introduces the ESS design process by discussing the various types of contractual relationships and the following design process phases: Schematic design Design development Construction documentation Bidding Construction administration Postconstruction Chapter 3 also provides guidance to the ESS designer to adequately address the information from the client as prepared by a consultant, including: Threat assessment. Client interview. Facility location analysis. Additionally, the roles of team members and the interaction between those individuals during the various design process phases are explored. Chapter 4: Access Control Systems (ACS) Chapter 4 explores the purpose and application of ACS. The various types of systems are discussed, including a review of the hardware and software requirements. RFID and IP integration are included in this chapter. ESS Design Reference Manual, 3rd edition BICSI

12 Chapter 5: Video Surveillance Systems (VSS) Chapter 5 provides an overview of video surveillance fundamentals. Designing with a perspective-oriented approach is discussed. The progression from analog also is explained. Chapter 6: Intrusion Detection Systems (IDS) Electronic intrusion detection is designed to both ensure the detection of and allow a timely response or deterrent to security breaches that may adversely affect people and property. Chapter 6 explores the basics of design and provides examples of the application of various types of sensors to provide intrusion detection. Chapter 7: Fire Detection and Alarm Systems Chapter 7 provides an overview of the complex subject of fire detection and alarm systems, including: Classes of fire alarm and detection systems. Components that initiate a fire alarm condition. Detectors and systems currently available. Fire suppression systems and their related initiation devices. Notification appliances. Chapter 8: Notification, Communication, and Display Devices Notification and display devices provide a means of communicating a message through the use of audio or display devices or a combination of both. Chapter 8 discusses: Audio communication. Emergency telephones. Public address and paging. Display devices. Chapter 9: Special Systems Chapter 9 explains the design and application of various specialty systems. It provides an ESS designer with the fundamental tools necessary to properly design some of the more basic systems as well as a level of knowledge necessary to work in cooperation with the specific system providers. Some of the systems discussed include: Nurse call. RFID. At-risk human perimeter systems. Asset management systems BICSI 1-9 ESS Design Reference Manual, 3rd edition

13 Chapter 10: Network Concepts Chapter 10 is divided into two sections: Network design principles Network security Section 1: Network Design Principles The first section provides an introduction to the design principles for IP-based ESS systems. It includes a brief overview of the IP network-based security world, followed by a general introduction to network architecture and the considerations necessary for the planning, design, and implementation of state-of-the-art systems. Section 2: Network Security The second section focuses on a broad overview of threats and countermeasures for network security as it relates to IP-based ESS system design. Risks and control measures are explained and discussed. Chapter 11: Systems Integration Chapter 11 discusses the concepts, systems, and processes related to the integration of ESS, including: ESS systems. Command and control. Data networks. Building automation. Fire-life-safety. Energy/lighting management. Chapter 12: System Operation and Commissioning Chapter 12 provides ESS designers, security contractors, and end users with a framework to develop standardized policies and procedures. ESS Design Reference Manual, 3rd edition BICSI

14 Appendix A: Codes, Standards, Regulations, and Organizations Appendix A provides an overview of the codes, standards, and regulations that the ESS designer must work with, including: Telecommunications. Building and construction. Electrical. Fire protection. Life safety. Security. Appendix B: Legal Aspects of Electronic Safety and Security (ESS) Design Appendix B examines some of the legal issues relevant to the ESS designer regarding liability and risk BICSI 1-11 ESS Design Reference Manual, 3rd edition

Organize your security with PSIM + software

Organize your security with PSIM + software Organize your security with PSIM + software WHAT IS PSIM SOFTWARE? Functional scope of a Physical Security Information Management System Application In practice, the WinGuard platform is collecting all

More information

Organize your security with PSIM + software

Organize your security with PSIM + software Organize your security with PSIM + software WHAT IS PSIM SOFTWARE? Functional scope of a Physical Security Information Management System Application 1 2 4 5 In practice, the WinGuard platform is collecting

More information

Professional Security Officer Program(PSOP)

Professional Security Officer Program(PSOP) Professional Security Officer Program(PSOP) Unit descriptions and lesson learning objectives. The Professional Security Officer Program course consists of 11 units, with each unit having between two and

More information

Integrated Security and Building Automation Technology Solutions and Services. SDI Security Center of Excellence Charleston, SC

Integrated Security and Building Automation Technology Solutions and Services. SDI Security Center of Excellence Charleston, SC Integrated Security and Building Automation Technology Solutions and Services SDI Security Center of Excellence Charleston, SC SDI 7445 Cross County Road, Suite 10 North Charleston, SC 29418 843.554.7622

More information

Access Professional Edition. The flexible access control system that grows with your business.

Access Professional Edition. The flexible access control system that grows with your business. Access Professional Edition The flexible access control system that grows with your business www.boschsecurity.com Access Professional Edition: the ideal solution for easy and intuitive access management

More information

One call protects it all.

One call protects it all. One call protects it all. 2 // Tyco Integrated Fire & Security Two industry leaders. One great resource. Driven by our shared passion for protecting the employees and operations of businesses and institutions

More information

Industrial Security Capabilities. Honeywell Proprietary

Industrial Security Capabilities. Honeywell Proprietary Industrial Security Capabilities 1 Honeywell Corporate Overview Founded in 1886 128,000 employees in more than 100 countries A $34 billion (2007) Fortune 100 company Global leader in advanced technology

More information

Government Security Solutions YOUR PARTNER OF CHOICE. Protecting People, Places And Perimeters

Government Security Solutions YOUR PARTNER OF CHOICE. Protecting People, Places And Perimeters Government Security Solutions YOUR PARTNER OF CHOICE Protecting People, Places And Perimeters From government buildings to military facilities to legislative offices and more, everything is a target. And

More information

Application of OPC in the Intelligent Building System Integration

Application of OPC in the Intelligent Building System Integration Application of OPC in the Intelligent Building System Integration Jie Chen Dongying Vocational College Dongying 257091, P.R.China Xiuli Sun The control system education of Jinan university Jinan 250022,

More information

Comprehensive solutions for greater safety and security Answers for infrastructure.

Comprehensive solutions for greater safety and security Answers for infrastructure. Fire Safety & Security Comprehensive solutions for greater safety and security Answers for infrastructure. Combining fire and security expertise to deliver a higher level of safety and security Meeting

More information

Comprehensive Security for Banks and Credit Unions

Comprehensive Security for Banks and Credit Unions Comprehensive Security for Banks and Credit Unions Trust a Turnkey Solutions Provider As a leading security provider, STANLEY Security understands the needs of financial institutions like yours and has

More information

Building Integration System. Your platform for customized security and safety management.

Building Integration System. Your platform for customized security and safety management. Building Integration System Your platform for customized security and safety management www.boschsecurity.com One platform for everything Efficient building management is becoming not only more important,

More information

Austin Independent School District Police Department Policy and Procedure Manual

Austin Independent School District Police Department Policy and Procedure Manual Policy 8.07 Austin Independent School District Police Department Policy and Procedure Manual Life Safety Systems I. POLICY The proper operations of the AISD Life Safety Systems (LSS) are essential for

More information

Managing technical risks

Managing technical risks Aon Global Risk Consulting Managing technical risks Choosing the right protection for your investments. Our offer at a glance Introduction...3 Fire Protection...5 Fire protection advice and planning Design

More information

FALCON EYE Land Based Surveillance System

FALCON EYE Land Based Surveillance System Land Based Surveillance System SpecOps Group is a global technology innovation leader in security systems and autonomous border protection platforms. SpecOps Group provides a unique autonomous situational

More information

Facility Explorer Asset Protection by Yorkland Controls Ltd. Fr

Facility Explorer Asset Protection by Yorkland Controls Ltd. Fr Date: October 13, 2006 Announcing: Facility Explorer Asset Protection by Yorkland Controls Ltd. Fr Facility Explorer Asset Protection Yorkland Controls Ltd. is excited to announce a significant addition

More information

ASSEMBLY, No. 475 STATE OF NEW JERSEY. 218th LEGISLATURE PRE-FILED FOR INTRODUCTION IN THE 2018 SESSION

ASSEMBLY, No. 475 STATE OF NEW JERSEY. 218th LEGISLATURE PRE-FILED FOR INTRODUCTION IN THE 2018 SESSION ASSEMBLY, No. STATE OF NEW JERSEY th LEGISLATURE PRE-FILED FOR INTRODUCTION IN THE 0 SESSION Sponsored by: Assemblyman VINCENT PRIETO District (Bergen and Hudson) Assemblyman CRAIG J. COUGHLIN District

More information

The Security Company. Expert in Security. On demand Solution. Total Security Solution Provider. High level of security. Products

The Security Company. Expert in Security. On demand Solution. Total Security Solution Provider. High level of security. Products Expert in Security 24 years of project implementations in the world Ability to provide perfect advices for system integration Help to spec-in consulting for government / corporate project Total Security

More information

Session VI Smart safety systems

Session VI Smart safety systems Session VI Smart safety systems September 09th, 2016 Kolkata Denzil D Enterprise security Building Technologies Siemens Ltd Siemens AG 2011. All rights reserved. Safety every where Hospital Office Residential

More information

SMART. FLEXIBLE. RELIABLE.

SMART. FLEXIBLE. RELIABLE. SMART. FLEXIBLE. RELIABLE. Life Safety Communications for Education, Healthcare, Correctional, and Industrial/Commercial Applications. WWW.CAREHAWK.COM THE CH1000(LT) PLATFORM The CH1000(LT), a life safety

More information

Success Story Claas. Ein WinGuard Reference Project

Success Story Claas. Ein WinGuard Reference Project Success Story Claas Ein WinGuard Reference Project CHRISTIAN VOGT Corporate Security Manager In addition to our production site for combine harvesters and self-propelled forage harvesters, our headquarters

More information

GMS GRAPHICAL MANAGEMENT SYSTEM

GMS GRAPHICAL MANAGEMENT SYSTEM GMS GRAPHICAL MANAGEMENT SYSTEM 1 GMS Security management system for multi-site organizations. PACOM Graphical Management System (GMS) is the modular client-server application that integrates all of PACOM

More information

Am I safe working in this building?

Am I safe working in this building? Am I safe working in this building? Fusion is a user-friendly security management solution providing situational awareness and peace of mind at all times. Answers for infrastructure. Sophisticated technology

More information

Overview. Executive Summary. Solution Description CHAPTER

Overview. Executive Summary. Solution Description CHAPTER CHAPTER 1 Executive Summary In large and complex urban environments, it is critical for decision makers to reduce the time from detection of an incident to response by first responders. Additionally, it

More information

Why Should You Invest In An Access Management System?

Why Should You Invest In An Access Management System? Why Should You Invest In An Access Management System? The key word in this question is Invest. Buying and installing an access system by itself is an investment that will increase security, enhance overall

More information

Tyco Integrated Security Monitoring Services. Helping you secure your business 24 hours a day, 365 days a year. Safer. Smarter. Tyco.

Tyco Integrated Security Monitoring Services. Helping you secure your business 24 hours a day, 365 days a year. Safer. Smarter. Tyco. MONITORING ACCESS CONTROL VIDEO SURVEILLANCE INTRUSION DETECTION FIRE & LIFE SAFETY COMMERCIAL SOLUTIONS Tyco Integrated Security Monitoring Services Helping you secure your business 24 hours a day, 365

More information

Innovating security where you need it most. Transportation: License Plate Capture.

Innovating security where you need it most. Transportation: License Plate Capture. Innovating security where you need it most. Transportation: License Plate Capture. License Plate Capture 2 License Plate Capture: Manage the usage of roads and parking lots more effectively by knowing

More information

Designing the Right Access Control System A Case Study. 12 th May 2010

Designing the Right Access Control System A Case Study. 12 th May 2010 Designing the Right Access Control System A Case Study 12 th May 2010 Partner of Choice Approach Committed to working together to deliver innovative security solutions - End User - System Integrator -

More information

Electronic Safety and Security

Electronic Safety and Security 28 Electronic Safety and Security NOTE: This is a new section, which includes content from previous sections of the KU Design Standards, along with appropriate revisions and updates. Significant revisions

More information

SAFETY ON A BROADER SCALE Safety and security for people, processes, plants, communities and environment

SAFETY ON A BROADER SCALE Safety and security for people, processes, plants, communities and environment Phil Jarrell, Director Integrated Protective Solutions June, 2016 SAFETY ON A BROADER SCALE Safety and security for people, processes, plants, communities and environment 1 INTEGRATED PROTECTIVE SOLUTIONS

More information

End-to-end security for a Smarter, Safer world

End-to-end security for a Smarter, Safer world End-to-end security for a Smarter, Safer world Introduction Company Profile About Our Company CONSLINT INTEGRATED SECURITY SYSTEMS LTD was established in 2009 to engage in the business of Design, supply,

More information

"VOICE OF SECURITY: Trends In Intercom, Public Address, and Mass Notification Emergency Communications

VOICE OF SECURITY: Trends In Intercom, Public Address, and Mass Notification Emergency Communications "VOICE OF SECURITY: Trends In Intercom, Public Address, and Mass Notification Emergency Communications ASIS Houston Chapter Luncheon May 21, 2014 Paul Rux Director of Sales Mexico / South Central Region

More information

Perimeter Product Overview. Effective protection for your business

Perimeter Product Overview. Effective protection for your business Perimeter Product Overview Effective protection for your business The Gallagher difference Our innovation is driven by the desire to solve problems, meet your needs and provide real business value. We

More information

Totally Wireless Video Security

Totally Wireless Video Security Totally Wireless Video Security Traditional Video Surveillance ($50,000+) vs. Event-Based Videofied Solution ($2,500) Executive Summary: Totally Wireless Video Security has been effective but cost and

More information

Security & Safety in the Building Automation World. Presented by Gary P. Wright, RCDD, EE, EC Director of Security & Communications

Security & Safety in the Building Automation World. Presented by Gary P. Wright, RCDD, EE, EC Director of Security & Communications Security & Safety in the Building Automation World Presented by Gary P. Wright, RCDD, EE, EC Director of Security & Communications MC2 Inc., Sanford, Florida Introduction to Electronic Security & Safety

More information

Preliminary Site Security Plan Operations Cassadaga Wind Farm

Preliminary Site Security Plan Operations Cassadaga Wind Farm Preliminary Site Security Plan Operations Cassadaga Wind Farm January 2016 Table of Contents 1. Introduction... 3 2. Access roads... 3 3. Wind Turbines... 3 4. Substations... 3 5. Operations and Maintenance

More information

Today s world has more risk than ever. Today s G4S has more ways to protect you.

Today s world has more risk than ever. Today s G4S has more ways to protect you. Today s world has more risk than ever. Today s G4S has more ways to protect you. Compliance & Investigations Systems Integration AMAG Technology Security Officers G4S secures your people, property and

More information

2016 Bond Steering Committee Meeting

2016 Bond Steering Committee Meeting 2016 Bond Steering Committee Meeting Meeting 4: July 14, 2016 Safety & Security Needs Bond Steering Committee Schedule Thursday, June 23 6:00-8:00 p.m. Spring ISD Boardroom Thursday, June 30 6:00-8 :00

More information

Security Considerations for Secure Workplaces

Security Considerations for Secure Workplaces Security Considerations for Secure Workplaces Mitchell Factor HMA Consulting, Inc. USA Canada UK UAE Overview Security Risk Assessment The Process Security Design Process Technology Updates & Design Considerations

More information

Aviation Solutions. Why Tyco for airports? Our systems help protect over 110 airports. Secures over 80% of UK Airports and more than 60 US Airports

Aviation Solutions. Why Tyco for airports? Our systems help protect over 110 airports. Secures over 80% of UK Airports and more than 60 US Airports Aviation Solutions Why Tyco for airports? Our systems help protect over 110 airports Secures over 80% of UK Airports and more than 60 US Airports Tyco has the only dedicated airport specific access control

More information

Health Care. NewVoice. San Francisco Paris Geneva Zurich Linz Mainz Shanghai Brisbane Hong Kong São Paulo Dubai

Health Care. NewVoice. San Francisco Paris Geneva Zurich Linz Mainz Shanghai Brisbane Hong Kong São Paulo Dubai Health Care Emergency & Medical Services Nurse Call Heart Alarm Emergency Hotline Skill Based Mobilization Emergency Conference Bed Transportation MobiCall Health Care Security & Infrastructure MobiCall

More information

SECURITY SOLUTIONS Banking and finance

SECURITY SOLUTIONS Banking and finance SECURITY SOLUTIONS Banking and finance Pacom has developed a distinguished reputation as a global leader in the field of remote security management for the banking and financial market. Pacom has: Over

More information

Integrated Security Solutions

Integrated Security Solutions Integrated Security Solutions Stand-alone and Integrated Security Systems over IP ADPRO S3100 IP Security Panel ADPRO S3000 IP Access Control ADPRO FALCONnet Analogue Addressable Fire Detection Panel (Approved

More information

Siemens Enterprise Security. Integrated Security Process. Airports. & Resource Management for Today s Airports. Steve Batt, Market Manager Airports

Siemens Enterprise Security. Integrated Security Process. Airports. & Resource Management for Today s Airports. Steve Batt, Market Manager Airports Siemens Enterprise Security Integrated Security Process Airports & Resource Management for Today s Airports Steve Batt, Market Manager Airports The Spectrum of Airport Security Technology Intrusion Detection

More information

Complete solutions for commercial security. Verex delivers leading intrusion, access and video products to protect today s companies

Complete solutions for commercial security. Verex delivers leading intrusion, access and video products to protect today s companies Complete solutions for commercial security Verex delivers leading intrusion, access and video products to protect today s companies Scalable, cost-effective security designed for today s businesses Designed

More information

Web Services are based on Apache and Tomcat servers. The html/jsp (tags, beans) are fully customisable and extendable.

Web Services are based on Apache and Tomcat servers. The html/jsp (tags, beans) are fully customisable and extendable. New thinking Sentus Automation is able to control and manipulate data at ease whilst delivering a low cost per point return. XML interface: Information can be exported/viewed by an unlimited number of

More information

Proven Leaders in Security Solutions & Integration.

Proven Leaders in Security Solutions & Integration. Proven Leaders in Security Solutions & Integration. skynetsecurity.com Amazing techs and customer service. Skynet goes above & beyond for (its) customers! - Entertainment Cruises (Navy Pier) 1. About Us

More information

Site Security Plan - Operations Baron Winds Project

Site Security Plan - Operations Baron Winds Project Site Security Plan - Operations Baron Winds Project August 2017 Table of Contents 1. Introduction... 3 2. Access Roads... 3 3. Wind Turbines... 3 4. Substation... 4 5. Operations and Maintenance Building...

More information

Hikvision Certification Tracks

Hikvision Certification Tracks www.hikvisionlearning.com PAGE 2 Hikvision Certification Tracks You asked for it... and we delivered! Hikvision is proud to announce the Hikvision Certification Program! We ve partnered with SecurityCEU.

More information

Securing a Better Future Securing a Better Job The IGS Security Academy guide to careers in the private security industry

Securing a Better Future Securing a Better Job The IGS Security Academy guide to careers in the private security industry Securing a Better Future Securing a Better Job The IGS Security Academy guide to careers in the private security industry http://academie-igs.com TABLE OF CONTENTS: Is this book for you? 4 Why choose a

More information

SIMPLY MORE SECURITY MOSRO

SIMPLY MORE SECURITY MOSRO MOBILE SECURITY ROBOT SIMPLY MORE SECURITY IN ACTION Monday, three in the morning: s shrill siren gives the burglar a fright. Did anybody hear me? What is this? What s it doing? The thing is moving and

More information

AMENDMENT NO.: III INVITATION FOR BID NO.: GPA FOR

AMENDMENT NO.: III INVITATION FOR BID NO.: GPA FOR January 26, 2018 AMENDMENT NO.: III TO INVITATION FOR BID NO.: GPA-022-18 FOR PHYSICAL SECURITY AND ACCESS CONTROL SYSTEM (ACS) REPAIR AND UPGRADE AT VARIOUS GPA LOCATIONS Prospective Bidders are hereby

More information

Effective Deployment of the Integrated Wireless Network Video Systems for the Homeland Security & Government Sectors

Effective Deployment of the Integrated Wireless Network Video Systems for the Homeland Security & Government Sectors Effective Deployment of the Integrated Wireless Network Video Systems for the Homeland Security & Government Sectors Premier Webinar Program Inscape Data Corporation June 8, 2005 1 Today s Agenda First

More information

MNEC NFPA 72 WHITE PAPER

MNEC NFPA 72 WHITE PAPER MNEC NFPA 72 WHITE PAPER In 2010, the National Fire Protection Assocation (NFPA), significantly changed their code # 72 (National Fire Alarm Code) and has forever improved the importance of communicating

More information

Physical Security Standards WARREN J. BUJOL, IBERIABANK MATTHEW RONIGER, IBERIABANK

Physical Security Standards WARREN J. BUJOL, IBERIABANK MATTHEW RONIGER, IBERIABANK Physical Security Standards WARREN J. BUJOL, IBERIABANK MATTHEW RONIGER, IBERIABANK Physical Security Standards Agenda Making a Case for Physical Security Why have Standards? Risk Assessments - Justifications

More information

Course Catalogue. An evolution of excellence. Welcome to the UTC Fire and Security EMEA Lenel OnGuard Training Catalogue for Value Added Resellers

Course Catalogue. An evolution of excellence. Welcome to the UTC Fire and Security EMEA Lenel OnGuard Training Catalogue for Value Added Resellers Course Catalogue Welcome to the UTC Fire and Security EMEA Lenel OnGuard Training Catalogue for Value Added Resellers An evolution of excellence Contact information: UTC Fire & Security Kouterveldstraat

More information

WHEN IT COMES TO LIFE SAFETY, THERE S NO MARGIN FOR ERROR.

WHEN IT COMES TO LIFE SAFETY, THERE S NO MARGIN FOR ERROR. WHEN IT COMES TO LIFE SAFETY, THERE S NO MARGIN FOR ERROR. WHO IS AMERICAN SECURITY? When it comes to life safety, there s no margin for error. That s why our customers have been relying on American Security

More information

Gallagher Perimeter Product Overview

Gallagher Perimeter Product Overview Gallagher Perimeter Product Overview 1 security.gallagher.com Gallagher is a global leader in the innovation, manufacture and delivery of security solutions. Meeting our customers needs inspires us to

More information

CALL FOR A FREE SURVEY

CALL FOR A FREE SURVEY CCTV FIRE & SECURITY SOLUTIONS MADE SAFE CCTV Systems specifically designed and tailored for the commercial CCTV market What is CCTV? Closed-circuit television (CCTV), also known as video surveillance,

More information

YOUR TRUSTED PARTNER IN RETAIL SECURITY

YOUR TRUSTED PARTNER IN RETAIL SECURITY YOUR TRUSTED PARTNER IN RETAIL SECURITY When you are looking for a trusted partner in retail security, STANLEY Security is here for you. With over 00 locations across, STANLEY service providers live and

More information

Total Unified Solution for Building Integration: Communications, Access Control, Video Surveillance and Fire

Total Unified Solution for Building Integration: Communications, Access Control, Video Surveillance and Fire ISC West 2013 Product Showcase Total Unified Solution for Building Integration: Communications, Access Control, Video Surveillance and Fire www.mircomgroup.com [TX3] Unified Solution Our unified solution

More information

NeXT is a powerful stand-alone application running fully embedded in network cameras to perform an intelligent video surveillance for ATM devices.

NeXT is a powerful stand-alone application running fully embedded in network cameras to perform an intelligent video surveillance for ATM devices. NeXT is a powerful stand-alone application running fully embedded in network cameras to perform an intelligent video surveillance for ATM devices. It s no longer necessary installing workstation servers

More information

Business Owner s Security Buyers Guide

Business Owner s Security Buyers Guide Business Owner s Security Buyers Guide You re a business owner. That means you wear a lot of hats including that of the security manager. One of your many jobs is to protect your customers, employees,

More information

University. NewVoice. San Francisco Paris Geneva Zurich Linz Mainz Shanghai Brisbane Hong Kong São Paulo Dubai

University. NewVoice. San Francisco Paris Geneva Zurich Linz Mainz Shanghai Brisbane Hong Kong São Paulo Dubai University Case Study University - Message Broadcast Powerful messaging scenarios to persons and groups, voice and text, dynamic and predefined. Messaging can be triggered via phone or web. With or without

More information

Plan Overview. Manhattan Area 2035 Reflections and Progress. Chapter 1: Introduction. Background

Plan Overview. Manhattan Area 2035 Reflections and Progress. Chapter 1: Introduction. Background Plan Overview The Manhattan Urban Area Comprehensive Plan (the Comprehensive Plan) is a joint planning initiative of the City of Manhattan, Pottawatomie County, and Riley County. The 2014 Comprehensive

More information

Vykon. Security. Integrated Access Control. Web enabled security management built on the Niagara Framework

Vykon. Security. Integrated Access Control. Web enabled security management built on the Niagara Framework Vykon Security Integrated Access Control Web enabled security management built on the Niagara Framework Niagara for Security Applications Integrating security within building automation systems brings

More information

Sustain.Ability. Adrian Fielding Integrated Safety & Security Honeywell Users Group EMEA

Sustain.Ability. Adrian Fielding Integrated Safety & Security Honeywell Users Group EMEA Sustain.Ability. Adrian Fielding Integrated Safety & Security 2012 Honeywell Users Group EMEA 1 Safety Moment DALE EARNHARDT Sr. 1951-2001 76 NASCAR Wins in 677 Races Refused to wear his HANS (Head and

More information

Emergency Notification Plan. Developed By: Cleveland State University Police Department Office of Emergency Management

Emergency Notification Plan. Developed By: Cleveland State University Police Department Office of Emergency Management Emergency Notification Plan Developed By: Cleveland State University Police Department Office of Emergency Management 216.687.2184 Rev.2.0 June, 2015 EMERGENCY NOTIFICATION, RESPONSE AND EVACUATION The

More information

WIRELESS CCTV. Utility Site Security & Surveillance.

WIRELESS CCTV. Utility Site Security & Surveillance. WIRELESS CCTV Utility Site Security & Surveillance Wireless CCTV WCCTV is the UK s leading provider of site security systems for utilities and critical national infrastructure sites, including power stations,

More information

Moving to the Cloud: The Potential of Hosted Central Station Services

Moving to the Cloud: The Potential of Hosted Central Station Services Moving to the Cloud: The Potential of Hosted Central Station Services Moving to the Cloud: The Potential of Hosted Central Station Services The global market for alarm monitoring services is expected to

More information

Intelligent Keys. A smart solution for recurring revenue

Intelligent Keys. A smart solution for recurring revenue Intelligent Keys A smart solution for recurring revenue Cloud-Based Services Benefits of the Cloud: For your customers: Ensures that a facility s database is always accessible, secure and up-to-date Enables

More information

Volume 9 January EMEA Edition GIT. Perimeter Protection. Security for Transportation. Fire Safety GIT SECURITY AWARD.

Volume 9 January EMEA Edition GIT. Perimeter Protection. Security for Transportation. Fire Safety GIT SECURITY AWARD. Volume 9 January 2013 EMEA Edition 79 824GIT 1 Perimeter Protection Security for Transportation Fire Safety GIT SECURITY AWARD Intersec 2013 Access Control COVER: Siemens Perimeter Security Solutions for

More information

BSD Technical Standard. Division 28: Electronic Safety & Security

BSD Technical Standard. Division 28: Electronic Safety & Security Division 28: Electronic Safety & Security I. PURPOSE This Technical Standard is a narrative describing Beaverton School District s (BSD s) basis of design for electronic safety and security in BSD facilities.

More information

Physical and Environmental Security. CISSP Guide to Security Essentials Chapter 8

Physical and Environmental Security. CISSP Guide to Security Essentials Chapter 8 Physical and Environmental Security CISSP Guide to Security Essentials Chapter 8 Objectives Site access controls including key card access systems, biometrics, video surveillance, fences and walls, notices,

More information

Council is committed to its groups working together, and to working closely with other relevant agencies, including the Queensland Police Service.

Council is committed to its groups working together, and to working closely with other relevant agencies, including the Queensland Police Service. Strategic policy Public Space Closed Circuit Television (CCTV) Corporate Plan reference: Endorsed by Council on: Manager responsible for policy: A Strong Community In all our communities, people are included,

More information

Axis thermal cameras. Reliable detection and verification, without compromising privacy.

Axis thermal cameras. Reliable detection and verification, without compromising privacy. Axis thermal cameras. Reliable detection and verification, without compromising privacy. Picturing the invisible. When you need reliable round-the-clock detection, Axis thermal cameras are an excellent

More information

TAB C-6 KEYLESS ACCESS AND SECURITY SYSTEM GUIDELINE

TAB C-6 KEYLESS ACCESS AND SECURITY SYSTEM GUIDELINE TAB C-6 KEYLESS ACCESS AND SECURITY SYSTEM GUIDELINE The University of Arizona has implemented a Keyless Access and Security System program to provide a cost effective, efficient, and maintainable means

More information

Clino Systevo. Intelligent Life Care. Modern Patient Communication intelligently integrated

Clino Systevo. Intelligent Life Care. Modern Patient Communication intelligently integrated Clino Systevo Intelligent Life Care Modern Patient Communication intelligently integrated Convergence of the systems Systems such as telephony, nurse call, hazard and building management have so far been

More information

Methods of Software Integration of Alarm Systems

Methods of Software Integration of Alarm Systems Methods of Software Integration of Alarm Systems Jan Valouch Faculty of Applied Informatics Tomas Bata University in Zlin Nad Stranemi 4511, CZ 76005 Zlin Czech Republic valouch@fai.utb.cz Abstract This

More information

The IPPS was developed on IBM-PC platform under QNX real time operating system (RTOS) and uses QNX-Windows GUI.

The IPPS was developed on IBM-PC platform under QNX real time operating system (RTOS) and uses QNX-Windows GUI. IAEA-SM-367/4/02/P INTEGRATED PHYSICAL PROTECTION SYSTEM Ranajit Kumar Control Instrumentation Division, Bhabha Atomic Research Center, Trombay, Mumbai 400085, India Abstract An Integrated Physical Protection

More information

L o u i s N o r i e g a A u tomated Po r t S o l u t i o n s P hy s i ca l S e c u r i t y Te c h n o l o g y C o n s u l ta nt

L o u i s N o r i e g a A u tomated Po r t S o l u t i o n s P hy s i ca l S e c u r i t y Te c h n o l o g y C o n s u l ta nt American Association of Port Authorities 2012 Port Security Seminar & Exhibition The Future of Security in the I.T. World The good news is that there are available and emerging technologies that can enhance

More information

The WAVE Plus Instant Notification System for Schools and Colleges

The WAVE Plus Instant Notification System for Schools and Colleges Instant Notification System for Schools and Colleges Duress alarm has been activated in the School of Engineering! Schools strive to provide a safe environment for students and teachers. In an emergency,

More information

THE NEXT SMART HOME GENERATION

THE NEXT SMART HOME GENERATION THE NEXT SMART HOME GENERATION She just finished installing her smart home system. Simply installed. Simply expanded. Simply secure. Homematic IP is the next generation of the Homematic technology by eq-3,

More information

Working in Partnership with our Customers.

Working in Partnership with our Customers. 02 03 Introduction Working in Partnership with our Customers. At McElwaine Security our commitment to our customer is simple; we will provide an unrivalled end to end electronic security service and solutions,

More information

COMPANY OVERVIEW IN PURSUIT OF OUR COMPANY GOALS WE ARE COMMITTED TO: - Continual improvement. - Trained and dedicated personnel

COMPANY OVERVIEW IN PURSUIT OF OUR COMPANY GOALS WE ARE COMMITTED TO: - Continual improvement. - Trained and dedicated personnel COMPANY OVERVIEW Wordsmart as a company established their reputation by constantly expanding their operating base & offering quality products and services.wordsmart is the foremost security company in

More information

Chapter 1 Introduction

Chapter 1 Introduction Chapter 1 Introduction This chapter presents an introductory background to the research work undertaken, the problem statement, research issues involved and objectives of the research work. The contribution

More information

Thailand Technology Summit 2016

Thailand Technology Summit 2016 Thailand Technology Summit 2016 Nisha Lathif 19 October 2016 INTEGRATED SECURITY SOLUTION Benefits of Integration Security Solutions for On & Off-Shore 2 Muster/Safe Haven Radar Video Surveillance Radar

More information

Complete Security Solution

Complete Security Solution Complete Security Solution Intrusion Video Access All-in-one, comprehensive security for premises, property and people Complete Security Solution Tyco s Complete Security Solution provides a comprehensive

More information

MobiCall-Client PC Safety at work

MobiCall-Client PC Safety at work MobiCall-Client PC Safety at work MobiCall Client PC offers efficient personal security measures for staff members with PC workstations in threatening situations, as well as a quick alarm transmission

More information

2013 Honeywell Users Group EMEA. Adrian Fielding Security from Day One

2013 Honeywell Users Group EMEA. Adrian Fielding Security from Day One 2013 Honeywell Users Group EMEA Adrian Fielding Security from Day One 1 2 Safety Moment Agenda Experion Industrial Security Integration of Security Layers Introduction to Digital Video Manager Console

More information

CCTV Surveillance: Business Security & Video Best Practices.

CCTV Surveillance: Business Security & Video Best Practices. CCTV Surveillance: Business Security & Video Best Practices www.cctvcams.co.za TABLE OF CONTENTS Introduction P A G E 3 Why CCTV? P A G E 4 Is CCTV Right for You? P A G E 7 Video Security Best Practices?

More information

Advanced Fire Alarm Systems Training Program Outline (5 Day)

Advanced Fire Alarm Systems Training Program Outline (5 Day) Advanced Fire Alarm Systems Training Program Outline (5 Day) Day 1 Prescriptive and Performance-Based Design Understand the methodology in accessing the threat of fire within a structure. Know the difference

More information

intelligent video surveillance solutions

intelligent video surveillance solutions intelligent video surveillance solutions Overview 4 Benefits 6 Applicability 8 System and services 10 Video surveillance systems: stand alone environment, multi building or campus environment and geographically

More information

RFP Addendum 2 March 31, 2016

RFP Addendum 2 March 31, 2016 RFP Addendum 2 March 31, 2016 For Best Value Procurement Option Three Security Upgrades Ph 1 UT Health Science Center SBC No. 540/013-04-2015 This Addendum forms a part of the Request for Proposals (RFP)

More information

Secure Your Way of Life. Now Compa ble With. Climax Home Portal Platform. Enable a Connected Future

Secure Your Way of Life. Now Compa ble With. Climax Home Portal Platform. Enable a Connected Future Secure Your Way of Life Now Compa ble With Climax Home Portal Platform Enable a Connected Future Climax Home Portal Platform An IP/GPRS-Based Solution to Deliver Smart Home Security & Mobile Control Services

More information

Are You Prepared? The impending impact of Code on Servicing Security Systems

Are You Prepared? The impending impact of Code on Servicing Security Systems Sam Docknevich, PSP, Security Service Portfolio Manager Are You Prepared? The impending impact of Code on Servicing Security Systems Siemens AG 2015 All rights reserved. usa.siemens.com/infrastructure-cities

More information

Industry leader for over 18 years

Industry leader for over 18 years - Industry leader for over 18 years About Us A recognized industry leader for over 18 years, BASE is (formerly Known as Oswald s Engineering Co - Electrical contracting firm & Manufacturers of Panel Boards

More information

SECTION SECURITY TESTING AND COMMISSIONING

SECTION SECURITY TESTING AND COMMISSIONING SECTION 280800 - SECURITY TESTING AND COMMISSIONING PART 1 - GENERAL 1.1 WORK INCLUDES A. General Description: This specification section covers the provision of preliminary testing, acceptance testing,

More information

Perimeter protection for airports with intelligent video surveillance

Perimeter protection for airports with intelligent video surveillance White paper Perimeter protection for airports with intelligent video surveillance Reflections on the service rendered and the return on investment June 2018 Table of contents 1. Introduction 3 2. Traditional

More information

If you want to. grow your business expand your. expectations.

If you want to. grow your business expand your. expectations. If you want to grow your business......expand your expectations. Expect more with Honeywell. Honeywell s innovative line of commercial products provide you with more of what you want the power, capacity

More information