Ask the Expert

Experienced systems integrators should expect that many end users may not be up to date about the most effective combination of products for a complete security system. They simply know the specific reasons that they initially decided to install a physical security system. That means that communication between the customer and the integrator is key in the design, installation and maintenance process of a new security project.

ISSUE: How can integrators ensure end users understand all aspects of a project?
SOLUTION:
It’s important that end-user representatives provide specific information and articulate in clear detail the reasons that they want to install a security system. What are the end user’s expectations of the system, and what concerns do they have of any employees, other contractors or vendors? This facilitates the process for the integrator and helps ensure that each client receives the best solution for their situation. The end-user representative needs to be sure to provide the systems integrator with what he or she thinks are the facility’s weaknesses and tell them about any security problems that have been experienced in the past. The representative should tell the integrator about their business— what they do and if there are any plans for expansion—and the facility so the integrator can make suggestions and better guide the project.

It is vital to arrange regular meetings between the end user and integrator to discuss progress on the project and any obstacles that may arise. It is necessary to set up a time for these meetings during the initial planning process and communicate regularly to make sure both parties are operating on the same page. End users also should try to remember that there are many people involved in this process and keep payments in mind. If payments to the integrator are not done in a timely fashion, progress on the installation will lag, as the integrator will not be able to make payroll.

ISSUE: Scheduling can be a major obstacle during installation of a security system. How can integrators avoid this?
SOLUTION:
The date and time of the installation should be agreed upon during the initial planning process. It is likely that the end user is going to want the integrator to be there as little as possible during regular working hours because of the disruptions the installation may cause during the day. Often, this can be worked around, and both sides can agree on a good time for the job—if discussed in advance. The integrator also needs to know how to best gain entry to the facility, and the end user should provide the integrator with a convenient place to keep equipment and for employees to park their vehicles.

Communication is best if one person is designated as the integrator’s point of contact on the end-user side. It is imperative to keep the IT department involved in the project. IT, on occasions, has specific requirements that the security plan needs to meet, and it is important for the integrator to talk to the IT staffers early in the process about the requirements to avoid making expensive last-minute changes. Most enduser representatives will not know how to effectively control their new security system, so they should demand that a training session be included for the end user and employees after the installation is complete. Due to personnel turnover, ongoing training should be anticipated.

The final result will better meet the end user’s expectations if both parties work closely together and communicate well throughout the process of designing and installing the security project. Planning in advance is especially important on a larger project and can help save a lot of time on the installation phase. The job can be completed more quickly and more smoothly if both parties are on the same track and talk often.

READER QUESTION: Three years ago, my husband and I purchased a 30-room boutique hotel along the coast of Oregon. About six months ago, we started having problems with theft and vandalism— both inside and outside. Can you provide an idea of what security measures we might take in order to bring these problems under control? We don’t have a lot of money, but we also cannot continue to suffer the losses.
SOLUTION:
Before I recommend a solution, a site survey and risk analysis should be conducted to determine crime levels and trends, and lighting levels during the day and at night. The coastal location also must be taken into account—saltwater spray will have a corrosive effect on all exterior equipment.

In general, the security plan should provide perimeter protection and video surveillance. Perimeter protection can be provided by a card access system that gives authorized entry to both individual rooms and hotel entrances; this system should send alarm signals to a remote monitoring station though the use of an alarm panel. Video surveillance should cover parking areas, building entries, lobbies and other common areas. IP and megapixel cameras should be considered to provide the necessary flexibility and video quality. Video analytics can provide real-time alerts to appropriate staff when suspicious activity occurs in the camera’s field of view; some of these activities are loitering, unattended objects, tailgating and removed objects. While the cost of a security system is a consideration, it is important to keep in mind that the impact of crime and vandalism can cost much more.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3