Ask the Expert Sample Article

This month's expert discusses Warehouse security, and more.

READER QUESTION: I own three warehouses that I lease to tenants. I provide security that consists of fire and burglar alarms, and two card readers and cameras at each location. Lately, there have been several break-ins. I am recording the cameras, but not monitoring in real time. Would it be wiser for me to hire a couple of guards to monitor at night or work with a local monitoring company?


SOLUTION: The development of systems that digitize video and transport it via TCP/IP across the Internet has made it possible to monitor video remotely. In fact, many monitoring companies now offer video monitoring services that work in conjunction with existing burglar alarm systems. These services consist of both video alarm verification, where operators at the monitoring company view video that has been associated with an alarm sent from an alarm panel, and video tours, where operators periodically check-in at a site and look for unusual activity as defined by the owner.

In both cases, two-way audio can be used in conjunction with the video monitoring to provide an added level of service.

Ask questions when making a decision on whether or not to use video monitoring services. Will the security and video systems need to be upgraded to provide adequate protection? Are the cameras placed in such a way as to provide quality video? Will the monitoring company be able to remotely monitor the existing video system? What are the legal and ethical commitments to tenants regarding site security?

In summary, there is no one-size-fits-all solution.

 

READER QUESTION: We will be opening offices in Kansas and Missouri, in addition to our home office in Ohio. We have been well-served by our security integrator in Ohio, but the company does not have the reach to help with our new facilities. Can you give some advice on how to pick security firms in Kansas and Missouri that will give us the same type of service we have come to expect in Ohio?

SOLUTION: I would begin by itemizing the service deliverables you value that are being provided by your Ohio integrator—prompt service response, qualified technicians, systems design expertise and system documentation. Next, ask your Ohio integrator if they are networked with reliable integrators in Kansas and Missouri. If the answer is no, you or your Ohio integrator can get the names of product-certified integrators from your access control software supplier. After identifying software-certified integrators, narrow the field and find a reliable integration partner by asking these questions: What is the financial stability of the integrator? How long has the integrator been in business? Does the integrator have the technical strength and personnel to manage your project? Does the integrator employ network-qualified personnel? What do existing customers of the integrator say about their technical capabilities and service response time?

READER QUESTION: I own four convenience stores in a mid-sized city, and I currently have cameras monitoring front and back doors and the register at each location. Even so, I've had five robberies in the past six months. By the time police arrive and we run the video for the officers to review, the robbers are long gone. Would a network allow me to share video with the police department more quickly? I'm tired of my stores being seen as an easy mark.

SOLUTION: A video transmission system can be installed and set up to report to a central station monitoring company. This allows operators to remotely view your video cameras upon an alarm being activated. Video verification of alarms can improve police response time, since it has been verified that the alarm is not a false or nuisance alarm. The monitoring company also can assist in identification of intruders when reporting the alarm. There are a number of municipalities where verification of alarms is required before reporting them to the police.

There also are systems that incorporate features like remote control and intercom systems. These features can assist the central station operator to further identify and challenge an intruder to hopefully prevent any damages or losses before they happen.

 

 

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3