Innovative Security Solutions That Increase Force Protection Effectiveness

Similar documents
Am I safe working in this building?

Retail security solutions

Access CONTROL. MANAGEMENT Software

Security Station. Fully Autonomous Intrusion Detection System

Effective Deployment of the Integrated Wireless Network Video Systems for the Homeland Security & Government Sectors

FALCO Access Control. Product Training

Security Solutions From The Masters In Electronic Security Systems

Moving to the Cloud: The Potential of Hosted Central Station Services

HERE IS THE SOLUTION FOR YOUR NEEDS. Powered by BANK SECURITY SOLUTIONS

A.C.E. Security Consultants House of Worship Checklist

Powered by HERE IS THE SOLUTION FOR YOUR NEEDS TRANSPORT SECURITY SOLUTIONS

GE Security. Wnx. Facility Commander. Integrated security management platform for Windows. Seamless. Effective. Efficient.

WIRELESS CCTV. Oil, Gas and Renewables Site Security.

Facility Commander Wnx

Building Integration System. Your platform for customized security and safety management.

The Centron Presidio Monitoring System. Centron. Presidio. Rees Scientific. An ISO 9001:2008 Company

Complete solutions for commercial security. Verex delivers leading intrusion, access and video products to protect today s companies

About IntraLogic. In Business since 2004 Over 55 Full time employees

UD-VMS510i. Surveillance Management Center

GMS GRAPHICAL MANAGEMENT SYSTEM

CURRICULUM FOR THE TRADE OF CCTV CAMERA, NETWORKING & OTHER SECURITY SYSTEMS

A Smart & Integrated Security solution

Preliminary Site Security Plan Operations Cassadaga Wind Farm

COMMERCIAL BUILDING SOLUTION

Perimeter protection for airports with intelligent video surveillance

Integrated security management platform for Windows. Seamless. Effective. Efficient.

WIRELESS CCTV. Utility Site Security & Surveillance.

Connect your life to your home and your security

Driving simplicity. Facility and security management in a single interface

D-Link Central Management System

Organize your security with PSIM + software

Organize your security with PSIM + software

INNOVATION THAT LEAVES RISK BEHIND.

Proven Leaders in Security Solutions & Integration.

Complete Security Solution

Integrated Security and Building Automation Technology Solutions and Services. SDI Security Center of Excellence Charleston, SC

Site Security Plan - Operations Baron Winds Project

End-to-end security for a Smarter, Safer world

Web Services are based on Apache and Tomcat servers. The html/jsp (tags, beans) are fully customisable and extendable.

DSS. Dahua VMS Platform

Sales FAQ. Paradox Insight - General. 1. What is Paradox Insight?

CG500SKE SKYEYE GATEWAY USER MANUAL VERSION OCTOBER Disclaimers and Copyright

Architectural and Engineering Specification for a Security Management System. StarNet 2

ALERiTY. Mass notification. Integrated IP-based network solutions

Physical and Environmental Security. CISSP Guide to Security Essentials Chapter 8

Axis thermal cameras. Reliable detection and verification, without compromising privacy.

VIDEO SURVEILLANCE MARKET

One call protects it all.

Video Analytics for Perimeter Protection

Threat Warning System

Intrusion Detection Measures Against Insider Threats In Al-Tuwaitha Nuclear Site

L o u i s N o r i e g a A u tomated Po r t S o l u t i o n s P hy s i ca l S e c u r i t y Te c h n o l o g y C o n s u l ta nt

Why use CCTV... Domestic & Commercial Solutions. We believe CCTV has a major role to play in the prevention, detection and prosecution of crime

TELECOMMUNICATION. Telecommunication. Wireless Phone

Government Security Solutions YOUR PARTNER OF CHOICE. Protecting People, Places And Perimeters

Comprehensive Security for Banks and Credit Unions

VISEUM UK PRESENTATION

Australian Standard. Closed circuit television (CCTV) Part 4: Remote video AS AS

COSEC Access Control. Right People in Right Place at Right Time

Security & Monitoring Services

Smart Security, Always Connected

HikCentral Web Client. User Manual

YOUR TRUSTED PARTNER IN RETAIL SECURITY

Airmux Market. Airmux Family Sept 2013 Slide1

MONITORING ACCESS CONTROL VIDEO SURVEILLANCE INTRUSION DETECTION FIRE & LIFE SAFETY COMMERCIAL SOLUTIONS

International. Yacht Security

Today s world has more risk than ever. Today s G4S has more ways to protect you.

Intelligent alarm management

Protecting Network Data

EnergyMaster. ENEC Monitoring System. An on-site supervision and remote monitoring solution

The WAVE Plus Instant Notification System for Schools and Colleges

YOUR SECURITY IS OUR TASK. Systems for an Intelligent Security- and Lighting Network Over IP SMART CITY SAFE CITY

AMENDMENT NO.: III INVITATION FOR BID NO.: GPA FOR

Building Technologies

Your best choice for long distances. We don t wait for things to happen. Technology you can believe in. Sharing knowledge

WIRELESS CCTV. Site Security & Surveillance.

Physical Security Standards WARREN J. BUJOL, IBERIABANK MATTHEW RONIGER, IBERIABANK

Please use authentic SATA hard drive, USB device and battery.

Business Owner s Security Buyers Guide

AIRPORTS. CARECALLER PowerfulSecuritySolutionsForSeriousSecurityNeeds

Security designed for your lifestyle

BC Alert System Frequently Asked Questions 06/14//2017

Retail Security Solutions YOUR PARTNER OF CHOICE. Security From The Inside Out

INTEGRATED SECURITY NETWORKS. SynergyPro CCTV INTEGRATION, COMMAND & CONTROL SOLUTION

Introduction. deliver benefits. proficient & reliable partner. A Technological Company Netsoft Group.

2009 SPRING/SUMMER PRODUCT SHOWCASE. Honeywell Access and Video Systems

HikCentral Specification. HikCentral V1.1.1 Specification

Contents. What is Paxton10? 3. How does it work? 4. Paxton10 hardware 5. Paxton10 software 8. Paxton10 portal 9. Useful information 10

"VOICE OF SECURITY: Trends In Intercom, Public Address, and Mass Notification Emergency Communications

Course Catalogue. An evolution of excellence. Welcome to the UTC Fire and Security EMEA Lenel OnGuard Training Catalogue for Value Added Resellers

Protecting Station Platform & Rail Perimeters. TransitVUE IDS The Latest in Fiber Optic Station Platform & Rail Perimeter Security Sensor Systems

Overview. Executive Summary. Solution Description CHAPTER

smart modules An integrated and customised video analytics solution for the real-time events detection

ELECTRONICACCESS ANDELECTRONICSECURITY BUDGETPRESENTATION

HikCentral Web Client. User Manual

Designing the Right Access Control System A Case Study. 12 th May 2010

PERIMETER DEFENCE. Panorama Intruder Detection System Long Range, Day & Night, Automatic Panorama Intruder Detection

Fall & Medical Alert Sensor

Corporate Presentation

Thailand Technology Summit 2016

Transcription:

Innovative Security Solutions That Increase Force Protection Effectiveness Security Management Solutions for the New Millennium JTS-LLC, Copyright 2005 1

Components of the Force Protection Discussion Statement of understanding Mission statement Define threat components Security planning Levels of protection and budget Equipment and devices what is the right mix? Integration Redundancy and back-up Plan implementation & education Work the plan Test and adjusting the plan JTS-LLC, Copyright 2005 2

Statement of Understanding FP Managers require robust security systems that provides: Visual monitoring of designated assets An emergency/consequence response system An integrated system that leverages existing and emerging assets to provide real-time information system for FP Managers System must be built upon existing assets to keep costs down System that is expandable over time built upon existing hardware JTS-LLC, Copyright 2005 3

Defining the Threat Assume an asymmetric threat High vulnerability Low Probability Catastrophic results if not handled quickly Daily crisis may pose as large a burden on our system as dealing with outside threat JTS-LLC, Copyright 2005 4

The 30,000 Foot View Lights Barriers Secure Doors Alarmed openings Secure Alarm Devices Equipment Gauge devices Alarm Access Control System Security Cameras with PTZ and IR On location Digital Video Recording Device Out sourced Central Station Alarm Response Center In House Central Alarm & Gauge monitor & action station Network Client System to View remote Sites, access stored video Emergency Visual Response System integrated into video security system Redundant Communications pathways for Access, Alarm, and Video Systems Bio Read Access, Dual Technology, Vehicle 2 Driver System and Facial Recognition Anti-Tailgating Devices, Asset Tracking Systems, Discriminating Metal Detection systems Mandatory Continual training of all critical infrastructure employees with a defined threat action Plan Restructuring of all employee routine and planned activity to become non routine with redundant Backup Vendor Verification Systems with sign in (Bio) and / or escort coupled with vendor code and Password Programs An Anonymous and Reward Program for Suspicious Activity Alert and tips to better the holes in Security Management JTS-LLC, Copyright 2005 5

JTS Planning Process Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Identify Critical Infrastructure and Mission Essential Vulnerabilities Areas (MEVA) Draft the Global Critical Infrastructure Plan Assess those identified needs vis a vis budget realities Develop an implementation schedule Begin implementation adjust as required Test each level continuously Implement a maintenance plan for each level Return to Step 1 to assure continued understanding of objectives JTS-LLC, Copyright 2005 6

Desired End-State Keep the individuals and assets safe and secure. Actively deter terrorism (Critical Infrastructure Protection), crime, and provide consequence management (CM) tools. Provide managers with visual monitoring tools and systems. These tools must be built against web-based programs which are designed to enhance user interactivity on a need to know basis. Provide immediate acknowledgement of unknown individuals or known individuals out of place in a protected facility or area. Provide immediate security and safety actions to stop a threat in progress. Implement, test, service and continually upgrade our technologies. Deliver our technical solutions for both high bandwidth wired and wireless environments. Find the right series of security solutions that provide the optimum solution at the most affordable cost. JTS-LLC, Copyright 2005 7

Important Technology Notes JTS-LLC does not opt for the snapshot delivery metaphor: Security video with latency does not view objects within a protected area (only pieces of that focal view are seen). Does not allow for scalability unsuitable for emergency response. JTS-LLC believes wireless capability will revolutionize systems build-out and cost savings. JTS-LLC, Copyright 2005 8

Systems Components Overview Secure all feeds must be secure and encoded. Robust system must handle all the demands placed by end-state users. Scaleable must be able to add to the system without high cost or rebuildout System must be as autonomous as possible JTS-LLC, Copyright 2005 9

Overview of JTS Objective System JTS-LLC, Copyright 2005 10

High Speed Transmission : FIBER, T-1, DSL, CABLE, WIRELESS PixelWorld Stream Demon DATA CENTER Audio SECURE INTERNET INTRANET LAN or WAN All Departments on line and Live Operations Center Executive Offices IT Department HPD Security Military STATE Homeland Security Router HUB VM16 CAM 1-8 CAM9-16 320Gb DVR 1-8 or 1-16 Fixed Cameras, PTZ Cameras or IR Day/Night Cameras J-BOX (Camera) Intellex Unit UPS ON SITE Monitoring 1-4 LIVE PTZ Cameras Recorded History LIVE VIDEO Audio Drop Down Pre- Set Video Targets Priority CAM Control Dept. LOGO List of all Sites Call Up Focus Monitoring Password Permission Granted General Info Instructions Bulletin Board Current Site View ADMIN Email PIX E Shots All Operations Info, Response Protocol Active with Graphs, Site Online Maps Alarm GUI List Instant Alarm Pix Instant Motion Pix ALL ALARMS Monitored Motion Detection Filter Perimeter Violation Filter Missing Object Filter

SEC Fixed Indoor Color or Black and White Color best for day, Black and White for night Auto Iris and Auto Focus, Digital Cameras With Tamperproof Housing and conduit into Housing SEC Fixed Outdoor Color or Black and White Color best for day, Black and White for night Auto Iris and Auto Focus, Digital Cameras With Tamperproof Housing and conduit into Housing SEC SpeedDome Ultra Dome V SEC SpeedDome Ultra Dome VI The most advanced commercial indoor or outdoor dome on the market, specifications are clearly the best camera for the money. EXT Integrated Day Night Camera (IDN) The most advanced Interval Day Night camera with color by day, infrared even lit 400x400 feet night view by 10 year 85 IR array lamp. Lights Barriers Secure Doors Alarmed openings Secure Alarm Devices Equipment Gauge devices Alarm Access Control System Security Cameras with PTZ and IR On location Digital Video Recording Device Out sourced Central Station Alarm Response Center In House Central Alarm & Gauge monitor & action station Network Client System to View remote Sites, access stored video Emergency Visual Response System integrated into video security system Redundant Communications pathways for Access, Alarm, and Video Systems Bio Read Access, Dual Technology, Vehicle 2 Driver System and Facial Recognition Anti-Tailgating Devices, Asset Tracking Systems, Discriminating Metal Detection systems Mandatory Continual training of all critical infrastructure employees with a defined threat action Plan Restructuring of all employee routine and planned activity to become non routine with redundant Backup Vendor Verification Systems with sign in (Bio) and / or escort coupled with vendor code and Password Programs An Anonymous and Reward Program for Suspicious Activity Alert and tips to better the holes in Security Management JTS-LLC, Copyright 2005 12

Monitoring Remote Sites JTS-LLC, Copyright 2005 13

JTS-LLC, Copyright 2005 14

Lights Barriers Secure Doors Alarmed openings Secure Alarm Devices Equipment Gauge devices Alarm Access Control System Security Cameras with PTZ and IR On location Digital Video Recording Device Out sourced Central Station Alarm Response Center Battery Back up Systems In House Central Alarm & Gauge monitor & action station Network Client System to View remote Sites, access stored video Emergency Visual Response System integrated into video security system Redundant Communications pathways for Access, Alarm, and Video Systems Bio Read Access, Dual Technology, Vehicle 2 Driver System and Facial Recognition Wireless Transmission Anti-Tailgating Devices, Asset Tracking Systems, Discriminating Metal Detection systems Mandatory Continual training of all critical infrastructure employees with a defined threat action Plan Restructuring of all employee routine and planned activity to become non routine with redundant Backup Vendor Verification Systems with sign in (Bio) and / or escort coupled with vendor code and Password Programs An Anonymous and Reward Program for Suspicious Activity Alert and tips to better the holes in Security Management JTS-LLC, Copyright 2005 15

OTHER THINGS to CONSIDER JTS-LLC, Copyright 2005 16

Human Resources and Personnel Management System allows for seamless integration of HR functions into security system. Allows for positive control of enrollment. Allows for expeditions dis-enrollment. Can be used as part of the emergency notification system. JTS-LLC, Copyright 2005 17

Maintenance Operations System allows for remote monitoring of outlying maintenance locations or stations. Used to monitor gages in remote locations. Strategically place cameras allow for remote monitoring of any critical locations and sub-systems. Allows for positive control of visitors. Allows for on-line tracking of maintenance requirements. Used for emergency monitoring and control. JTS-LLC, Copyright 2005 18

Management Oversight Allows senior managers and leadership teams to remotely view any named location. Powerful Critical Infrastructure Plan enabling tool. Provides for on-line management of crisis situations. Provides for on-line consequence management. Allows for escalation of named events to be viewed by external authorities. JTS-LLC, Copyright 2005 19

Full Service Security Integration for our Partners Customized System Solutions -- Tailored to each client. Teaming with experts in Security Design, Streaming Content, and management of Information Technology. Integration of network topology to meet our client s needs. Appended and embedded Security Systems. Independent Web-Enabled Security Solutions JTS-LLC, Copyright 2005 20

JTS-LLC Thomas Swindell tswindell@jts-llc.com 808-225-8827 (P) 808-261-8012 (F) Securing Tomorrow--Today JTS-LLC, Copyright 2005 21