two different panels

Why should you have security standards?

Dana Frentz, CHPA, PSPSecurity Program Development, Security System Design Development, Security System Lifespan Management

Although this article was written for the International Association of Healthcare Safety and Security (IAHSS), these concepts apply to almost any organization. To put it simply, if you have security technology, you should have security standards. If you’re a member of IAHSS, you can access the entire original article here. Have you ever seen a situation where there seems no …

layered security

Layered Security and COVID-19

Chuck HurstNews, Security Program Development

At Protus3, we take great pride in helping our clients identify risks and develop practical and sound strategies to manage, mitigate, and leverage those risks.  Usually those risks involve insider or outsider threats carried out by persons with nefarious intent. The threats come in various forms – overt and plainly visible (think intruder) or covert and not plainly evident (think …

Technical Assessments - Standards

Technical Assessments – Standards

Dana Frentz, CHPA, PSPSecurity Assessment, Security Master Planning, Security System Lifespan Management

Our first post reviewed enclosure conditions and installation practices found in technical assessments.  We then discussed the importance of the appropriate installation and conditions of field devices. In this third installment, we are going to discuss one of the best ways to avoid the conditions previously discussed. It’s also how to begin cleaning up the messes that you do find. …

Field Devices

Technical Assessments – Field Devices

Dana Frentz, CHPA, PSPSecurity Assessment, Security System Lifespan Management

In this second installment, we will be looking at field devices. This information comes from practices we have found when conducting a technical assessment. Multiple hardware components make up a security system. The term “head-end” equipment often refers to the server-based computers, client monitoring stations, and security panels. The “head-end” hardware devices communicate with the “field devices” of a particular …

Technical Assessments – Installation and Maintenance Issues

Dana Frentz, CHPA, PSPSecurity Assessment, Security System Lifespan Management

This is the first of three blogs concerning the installation and maintenance practices we have found when conducting technical assessments. There are three principal parts of an integrated security plan: people, processes, and technology. As a result, each of these components serves to augment the effectiveness of the other. Looking at technology, there are dozens of electronic security management systems …

SSI access control article

Addressing Access Control

Jerry T. Blanchard, Jr., CPPNews, Workplace Violence

Every event like the shooting in Virginia Beach provides us with the ability to reflect on security. How can we better protect personnel? And how do we address access control? The article “Electronic Doors Obstructed Pursuit of Virginia Shooter, Police Say” appeared in both Campus Safety magazine as well as Security Sales & Integration magazine. You can read the original …

smart card cutaway

Do Your Homework before Moving to Smart Cards

Protus3Security System Design Development

First, let’s talk about the cards. There are a number of different types and uses for smart card technology. One of the most common is that of a banking-type card where the actual chip is visible. Think about your new debit card. When used, the chip makes contact within the device reading the information. This is a contact type card. …

magnetic lock

It’s Beautiful, But Is It Secure?

Protus3Security System Design Development

Designing and specifying locking hardware for access control type doors has always been a challenge. In most cases interior doors – typically wood or hollow metal – can be equipped with an electric mortise or electric cylindrical lock. Exterior doors with mullions or store fronts are normally equipped with electrified panic devices, either rim style or vertical rods. Both of …

three part fence

Perimeter Security

William F. Booth, CPPSecurity Assessment, Security Program Development

Every security program must be an integrated whole and each element must grow out of the specific needs dictated by the circumstances affecting the facility to be protected. Nevertheless, the first and basic defense is still the outer perimeter of the facility. Planning this defense is neither difficult nor complicated, but it is the product of common sense. Whereas the …