two different panels

Why should you have security standards?

Dana Frentz, CHPA, PSPSecurity Program Development, Security System Design Development, Security System Lifespan Management

Although this article was written for the International Association of Healthcare Safety and Security (IAHSS), these concepts apply to almost any organization. To put it simply, if you have security technology, you should have security standards. If you’re a member of IAHSS, you can access the entire original article here. Have you ever seen a situation where there seems no …

video security device

Seeing Security

Protus3Security System Design Development

This post was prompted by an initial project meeting and an annual tradition of watching a favorite movie around Christmas. During an initial project meeting, right after introductions, the Architect made a request. The Architect stated that the Client wanted all security devices to be invisible. In a previous conversation, I heard some examples of the measures to conceal devices. …

smart card cutaway

Do Your Homework before Moving to Smart Cards

Protus3Security System Design Development

First, let’s talk about the cards. There are a number of different types and uses for smart card technology. One of the most common is that of a banking-type card where the actual chip is visible. Think about your new debit card. When used, the chip makes contact within the device reading the information. This is a contact type card. …

campus safety article

The Security Strategy That Works for Two College Campuses

Christine L. Peterson, CPP, ISPSecurity Master Planning, Security Program Development, Security System Design Development

Above all, a security strategy is about integrating people, processes, and technology. Although there are some significant differences, these strategies apply to any other campus as well, not just colleges and universities. From the original article: Colleges and universities must develop a security strategy that protects the heart of their campus: students. Digital tools can help schools improve their physical …

magnetic lock

It’s Beautiful, But Is It Secure?

Protus3Security System Design Development

Designing and specifying locking hardware for access control type doors has always been a challenge. In most cases interior doors – typically wood or hollow metal – can be equipped with an electric mortise or electric cylindrical lock. Exterior doors with mullions or store fronts are normally equipped with electrified panic devices, either rim style or vertical rods. Both of …

data center

Physical Security for Data Centers

Emily SchackSecurity Assessment, Security Program Development, Security System Bid Process and Evaluation, Security System Design Development, Security System Testing and Commissioning

It’s no surprise that data centers are popping up everywhere, considering the growing need for cloud computing. Data centers offer services that allow you to store data on their servers. IT spends a lot of time securing these high-volume installation networks from attacks. It is important to you that your data center’s network security stays secure. But how important is …

global integration

Managing Global Integration of Systems

Protus3Security Master Planning, Security Program Development, Security System Bid Process and Evaluation, Security System Design Development, Security System Lifespan Management

During the last several years, we have seen many companies expanding within their own organization or through mergers and acquisitions. Growth of any kind challenges the expansion of systems utilized within the company or organization, such as network infrastructure, payroll systems, and other technology. One area that is always a challenge is the security systems that protect the organization. Card …

security camera split view

Recorded Video – There When You Need It

Protus3Security System Design Development

Everyone knows that the electronic security world has changed dramatically over the last 10 years. In regard to video systems, when the time lapse recorder came out it was the latest and greatest invention for recording video. Security Directors and their staff felt comfortable and were assured that video was being recorded on the tape if they saw the red …

How to Choose an Integrator

Protus3Security System Bid Process and Evaluation, Security System Design Development

A key component to choosing an appropriate security system is a vulnerability assessment or a security threat analysis of a facility. Once an organization’s security needs have been determined, an appropriate security system can be designed to meet those needs. Critically important to the success of these projects is the choice of a qualified systems integrator to install the necessary …