2

Integrated Security System Design Benefits and Philosophy

Abstract

This chapter includes information on why electronic security systems should be integrated, including why a strategic approach to security design is necessary, the desirability of uniform applications of security policies and how integrated electronic security can help facilitate that, how security systems can act as guard- force multipliers and how integrated security systems improve the operation of organizations that operate multiple security systems, multiple buildings, multiple sites, and multiple business units. The chapter also includes information on improved system performance, improved monitoring, reducing training, and improved communications.

Cost benefits are discussed including improved labor efficiency, reduced maintenance costs, and improved system longevity. Finally, the chapter closes with a section on how integration is achieved.

Keywords

Consistent processes and procedures

Enterprise class security system

Force multipliers

Hi-tech systems

Strategic approach

Uniform application of security policies

Introduction

This chapter includes information on why electronic security systems should be integrated, including why a strategic approach to security design is necessary, the desirability of uniform applications of security policies and how integrated electronic security can help facilitate that, how security systems can act as guard-force multipliers, and how integrated security systems improve the operation of organizations that operate multiple security systems, multiple buildings, multiple sites, and multiple business units. The chapter also includes information on improved system performance, improved monitoring, reducing training, and improved communications.

Cost benefits are discussed including improved labor efficiency, reduced maintenance costs, and improved system longevity. Finally, the chapter closes with a section on how integration is achieved.

Why Integrate Systems?

Why a Strategic Approach to Security Design is Necessary

Everything operates within a hierarchy, and security is no exception. When an organization is founded, it establishes a mission. For Detroit automakers, that mission is to make money by building cars; for a chain of home hardware centers, it is to earn profits by selling hardware; for a hospital, it is to provide healthcare; for some nonprofit organizations, it is to assist developing countries; and for the United Nations, it is the pursuit of world peace. Each of these missions requires the establishment of business programs and organizational structures to support the mission. For a corporation, those programs could include manufacturing, distribution, and sales; for a healthcare organization, programs could include hospitals, clinics, and outreach programs; and for a nonprofit organization, the programs could include fundraising and assistance programs. Almost all organizations also have accounting, information technology, filing, and administrative support programs. Once the programs are established, the organization must acquire assets to support the programs. Assets could include factories, warehouses, depots, shelved products, networks, furniture, and office buildings. In fact, each business program has a mission, subprograms, and assets. All assets need protection from misuse and harm. Enter the security program. The security program also has a mission, subprograms, and assets, like any other business program. One of those programs is the electronic component (high-tech systems, of which there may be several, including electronic security systems and information technology security systems).

Uniform Application of Security Policies

In order to get consistent results, it is imperative to use consistent processes and procedures. Imagine how chaotic it would be for a multinational corporation to allow every department at each site in each business unit to perform its accounting using its own choice of software programs and accounting techniques. It would be very difficult for the organization’s management to consolidate all these different reports into a single cohesive picture of the organization’s finances, and that could easily result in corporate losses and intense scrutiny by regulatory bodies and shareholders. It is also unwise for any organization to allow its business units and individual sites to establish their own individual security policies and procedures, guard-force standards, and others, which results in the potential for legal liability where different standards are applied at different business units. Enterprise-class security systems provide the platform for the uniform application of enterprise security policies across the entire organization. Enterprise-class security systems can also provide visibility regarding how other company policies are being applied and followed. What follows, then, can be better management when that information is made available to management in a cohesive way.

Force Multipliers

Integrated security systems can become force multipliers. That is, they can expand the reach of a security staff by extending the eyes, ears, and voice of the console officer into the depths of the facility where he or she could not otherwise reach. The use of video guard tours enhances the role of patrol officers because many more guard tours can be made with video than with patrol staff alone. Detection and surveillance systems alert security staff of inappropriate or suspicious behaviors, and voice communications systems allow console officers to talk with subjects at a building in another state or nation while their behavior is observed on-screen.

Multiple Systems

The integration of alarm, access control, security video, and security voice communications into a single hardware/software platform permits much more efficient use of security manpower. Enterprise-class security systems are force multipliers. The better the system integration, the better the organization will be able to use its security force.

Multiple Buildings

When security systems span multiple buildings across a campus, the use of a single security system to monitor multiple buildings further expands the force multiplication factor of the system. The more buildings monitored, the higher is the value of the system.

Multiple Sites

Like multiple buildings on a single site, the monitoring of multiple sites further expands the system’s ability to yield value. It is at this point that a true enterprise-class security system is required because monitoring multiple sites requires the use of network or Internet resources. Monitoring multiple sites can be tricky due to network bandwidth. We discuss how to get the most out of network bandwidth later in the book.

Multiple Business Units

Some large organizations also have multiple business units. For example, a petrochemical company may have drilling, transportation, refining, terminal, and retailing units. Each of these can benefit by inclusion in an enterprise-wide security program.

Improved System Performance

Enterprise-class systems can also provide significantly improved system performance. The integration of multiple systems at multiple sites into a cohesive user interface allows for simple, straightforward command and control. Gigantic systems can become manageable.

Improved Monitoring

System monitoring can be dramatically improved over non-enterprise systems. The integration of alarms, access control, video, and voice communications across the platform provides the console officer with coherent and timely information about ongoing events and trends, especially when coupled with Physical Security Information Management (PSIM) software. This is especially true of systems that utilize situational awareness software that put the alarms and alerts into a dynamically updating context of the site and floor plans so that the console officer can clearly see evolving suspicious activity in relation not only to the surroundings, but also to security response assets. In elegantly designed systems, when a visitor at a remote site presses an intercom call button and identifies him- or herself as an authorized user who has forgotten his or her access card, the console officer can pull up the record for that user quickly and confirm both the identity of the person at the intercom and that person’s validity for that door. In this design, the system knows the user, the door, and the date and time. As the console officer drops the person’s icon onto the door icon, the system either grants or denies access to the door based on the person’s authorization for that door for that time. (This application requires custom software.)

Reduced Training

Enterprise-class security systems can also require less training. The most basic console operator functions for a truly well-designed enterprise-class system can be learned in just a few minutes (answering alarms, viewing associated video, and answering the intercom). Because the interface is standardized across the enterprise, cross-training between buildings and facilities is practical. Also, operators from one site can provide support for a console officer or guard at another.

Better Communications

Integrated Security Systems can also provide better communications. Well-designed integrated security systems can integrate security intercoms, telephones, cell phones with integral walkie-talkie functions, two-way radios, and paging into one easy-to-manage single-software platform. Imagine a console officer who can wear a wireless headset, a wired headset, or use the computer’s microphone and speakers and trigger the push-to-talk button with a footswitch or a mouse press. The efficiency of the system is further improved when the system queues the appropriate intercom automatically each time a camera is selected. The more the system presents the console operator with the tools to act as though he or she were there at the scene, the better the system serves the security purpose. (This function is best performed by situational awareness software in addition to conventional integrated security system software.)

Cost Benefits

Improved Labor Efficiency

For many of the reasons stated previously, enterprise-class security systems enhance labor efficiencies. There can be fewer consoles, fewer guards, no redundant monitoring, nighttime off-site live monitoring where on-site monitoring was not cost-effective before, and mutual aid between sites and buildings. All these factors free up guards to be on patrol and in live communication with the central console.

Reduced Maintenance Costs

Enterprise-class security systems are generally built on the use of a common technology across the entire platform. Counterintuitively, they are also generally built on simpler technology than less sophisticated systems. The key to success is often the elegant combination of simple technologies into a highly refined system. This inherent architectural simplicity often also results in lower maintenance costs. Although the results are elegant and sophisticated, the underlying technology is actually simpler than in times past. The key is to combine simple Boolean algebra logical functions (and, or, not, counting, timing, etc.) in elegant ways.

Improved System Longevity

Security systems are notoriously short lived. Contemporary security systems are composed of numerous delicate components that either fail mechanically or are unable to upgrade as the system scales. Thus, when upgrades are necessary, it is often necessary to throw out components that are only a few years old because they are not compatible with newer technologies. This inbuilt obsolescence has a long tradition in security systems, much to the consternation of building owners and consultants. Most building systems are expected to last 15 to 20 years. Some building systems, including the basic electrical infrastructure, are expected to last the life of the building. However, most electronic security systems made by major manufacturers and installed by major integrators last less than 7 years. A well-designed enterprise-class security system should last 10 to 15 years between major architectural upgrades. This is achievable using the principles taught in this book.

How Integration Is Achieved

System integration involves both the integration of components and the integration of functions. High-level functions can be obtained by integrating components into a comprehensive working system instead of individual disconnected subsystems.

Systems integration is not a challenge of electronics; it is of course a technical challenge, but more importantly, it is a challenge of imagination. Sometimes, investigation, exploration, and invention are required. Consider it a puzzle to be solved. Look at the pieces and the objective. Do not accept at face value what you are told by the manufacturers about the capabilities and limitations of their systems. As a systems designer, you should know more than the manufacturers about how to integrate systems.

This book will help guide the designer along the path of understanding the technology and perhaps how to stimulate the imagination toward the goal.

Summary

Each organization has a mission. It develops programs in support of that mission and acquires assets to support the programs. Those assets need protection to avoid their misuse, theft, or destruction.

Security system integration provides the following benefits:

 Uniform application of security policies

 Integrating multiple systems into one for operational simplicity

 Integrating systems from multiple buildings and multiple sites for operational simplicity

 Integrating the services for multiple business units for consistency

System integration can also provide the following:

 Improved monitoring

 Reduced training requirements

 Better communications

 Cost benefits from improved labor efficiency, reduced maintenance costs, and improved system longevity

Integration is achieved through understanding the capabilities of the systems, combining basic elements to perform higher functions, and using imagination.

Questions and Answers

1. All organizations have:

a. A mission, fun-raising, and assets

b. Programs, assets, and missionaries

c. A mission, programs, and assets

d. Mops and toothbrushes

2. In order to get consistent results it is imperative to use consistent:

a. Policies

b. Procedures

c. Neither A nor B

d. Both A and B

3. Integrated Security Systems can become:

a. Forceps

b. Force multipliers

c. Forced marches

d. Forces of dogs

4. Integrated Enterprise Security Systems can integrate the operation of:

a. Multiple systems

b. Multiple buildings and sites

c. Multiple business units

d. All of the above

5. The integration of _____, _____, _____ and _____ provides the console officer with (continued into question 6).

a. Alarms, access control, video and voice communications

b. Dogs, guards, daily reports, and trend analysis

c. Visitors, guards, receptionists, and reports

d. Peanut butter and chocolate, tasty treats, and sodas

6. The integration of (answers from question 5) provides the console officer with:

a. Up to the minute reports from the local news

b. Coherent and timely information about ongoing events and trends, especially when coupled with (answer to question 7)

c. Latest sports scores

d. Neighborhood nuclear superiority

7. The integration of (answers from question 5) provides the console officer with (answer from question 6), especially when coupled with:

a. Social media

b. Passenger pigeons

c. Trained dogs

d. Physical Security Information Management (PSIM) software.

8. The most basic console operator functions for a truly well-designed enterprise-class system can be learned in:

a. Just a few hours

b. Just a few days

c. Just a few seconds

d. Just a few minutes

9. Well-designed integrated security systems can integrate into a single software platform:

a. Security intercoms, telephone, cell phones with integral walkie-talkie functions, two-way radios, and paging

b. Communications with neighboring business units

c. Communications with neighboring political groups

d. Communications with opposing forces

10. Integrated Security Systems can provide cost benefits such as:

a. Lower labor union management costs

b. Lower costs for secretaries

c. Improved labor efficiency, reduced maintenance costs, and improved system longevity

d. Improved reporting efficiencies

Answers: 1: c, 2: d, 3: c, 4: d, 5: a, 6: b, 7: d, 8: d, 9: a, 10: c

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.224.44.53