Although this article was written for the International Association of Healthcare Safety and Security (IAHSS), these concepts apply to almost any organization. To put it simply, if you have security technology, you should have security standards. If you’re a member of IAHSS, you can access the entire original article here. Have you ever seen a situation where there seems no …
Seeing Security
This post was prompted by an initial project meeting and an annual tradition of watching a favorite movie around Christmas. During an initial project meeting, right after introductions, the Architect made a request. The Architect stated that the Client wanted all security devices to be invisible. In a previous conversation, I heard some examples of the measures to conceal devices. …
Technical Assessments – Standards
Our first post reviewed enclosure conditions and installation practices found in technical assessments. We then discussed the importance of the appropriate installation and conditions of field devices. In this third installment, we are going to discuss one of the best ways to avoid the conditions previously discussed. It’s also how to begin cleaning up the messes that you do find. …
Technical Assessments – Field Devices
In this second installment, we will be looking at field devices. This information comes from practices we have found when conducting a technical assessment. Multiple hardware components make up a security system. The term “head-end” equipment often refers to the server-based computers, client monitoring stations, and security panels. The “head-end” hardware devices communicate with the “field devices” of a particular …
Technical Assessments – Installation and Maintenance Issues
This is the first of three blogs concerning the installation and maintenance practices we have found when conducting technical assessments. There are three principal parts of an integrated security plan: people, processes, and technology. As a result, each of these components serves to augment the effectiveness of the other. Looking at technology, there are dozens of electronic security management systems …
Video Management Optimization with IP Cameras and Video Settings
The Problem Recently, one of our clients with a very large video management system (VMS) noticed they were not getting a full 30 days of online video storage from a particular security camera video server that they recently installed. This client has multiple servers spread throughout multiple facilities. The majority of the other servers were performing well and were obtaining …