Ask the Expert

This month’s expert examines the role life safety systems play in the security industry.

Camera and access control systems, with their ever-changing technological advances, often seem to get the most publicity in the security industry. Often overlooked are vital life safety systems that protect people's well being. We spoke to Steve Morefield, president of Firstline Security Systems Inc., to get an overview of life safety technologies.

ISSUE: What drives the need for life safety systems?

SOLUTION: One of the most important items to think about in life safety is protecting a facility against fire. There were more than 3,400 fire-related deaths in 2007, according to the U.S. Fire Administration, with an estimated property loss of more than $14.5 billion. This number has increased from last year and may get worse.

A recent symposium from The Fire Protection Research Foundation concluded that the growing number of seniors will require a higher degree of investment in fire monitoring and protection procedures.

Passive methods for fire protection are steps to best prepare a facility before a fire occurs. Fire-resistant materials for walls and floors, and correctly designed occupancy separation can slow down the spread of a fire.

ISSUE: What are some of the different life safety systems that protect facilities and people?

SOLUTION: First of all, active systems are vital to mitigate the spread of fires. Sprinklers can be used in combination with alarm and monitoring technology to activate when smoke is detected. Some alarm systems include manual "pull stations" where a lever can be lowered to initiate an alarm. This system requires facility users to be aware of a fire, but there also are automated monitoring systems available, in which trained personnel monitor alarms and call first responders in case of an emergency.

Monitoring systems should not be limited to just fire detection, but also carbon monoxide detection. Known as the silent killer, carbon monoxide is the leading cause of accidental poisoning in the United States, killing more than 500 people and sending more than 20,000 people to emergency rooms each year. It is odorless, colorless and fatal in minutes. Thankfully, carbon monoxide monitoring systems are very successful at detection and are wise investments.

Technology to monitor for fire or carbon monoxide may already be in place in many facilities, but this equipment needs continued maintenance and testing to ensure it is working correctly. A system's ability to detect harmful substances may be slowed by accumulated dust, and sensors could become overly sensitive or not sensitive enough. Detectors that operated on batteries need to be inspected every six months.

Rigorous, regular inspections are important. A quick visual test may not accurately detect if a system is working properly. System integrators are available to provide a walkthrough of a facility to identify vulnerabilities and perform maintenance on equipment.

An experienced integrator also will be able to determine if the facility is up to date with the most recent codes and standards. For instance, new trends in warning procedures include mass notification systems that not only sound an alarm during a fire but also send a voicemail, e-mail or text message to facility occupants.

Technologies and procedures are ever-changing in the security industry, and it might be time to get a refresher from an experienced integrator. If alarm and monitoring systems have not been inspected in a while, think about asking an integrator for an inspection.

READER QUESTION: Our facility's security system has not been inspected or maintained for several years. What equipment usually needs to be replaced first, and which lasts a little bit longer? Our new budget is limited, so we may have to prioritize our purchases—what should we look at first?

SOLUTION: Regarding your access control system, the first items to look at will be the backup batteries, which need to be changed at least every two years, and the system software, which probably needs updating. Have the entire system checked for correct operation, which includes updating the cardholder database and door portal (e.g., the card reader, locking hardware and door contact), and clean the field panels and power supplies.

Current control panels and power supplies are pretty reliable and don't become outdated too quickly, so these do not present an immediate concern. In a video surveillance application, you will want to clean the cameras, including the lens, housing and connections. Then verify the operation of the DVR/NVR and make any necessary updates. The monitors also should be cleaned, and check any backup power supplies (access control included) to make sure the batteries and charging system are functioning correctly.

Speak with the IT director to find out if the equipment is causing any concerns with the timing of information transfer or even the bandwidth use.

About the Author

Steve Morefield is president of Firstline Security Systems Inc.

Featured

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”