Milestone VMS Helps Secure San Diego School District

Milestone Systems open platform IP video management software (VMS) has greatly improved security for the second largest school district in California. The San Diego Unified School District's previous video surveillance solution presented a number of problems. It required two management servers in which most settings had to be replicated, which was awkward and cumbersome. Programming cameras required navigating two operating systems. Training administrators and end users on the old technology also took a lot of time, as did making district-wide updates.

Being an organization with more than 200 facilities, San Diego Unified School District sought a video surveillance technology solution that could be centrally administered, and support HD quality images to more effectively manage behavior and prevent vandalism. It had to be expandable in the future and accommodate additions such as the access control technology the district hopes to deploy within one or two years.

Installation/design partner Proshop Group and Dotworkz designed and implemented the network security solution, choosing Milestone XProtect VMS. Its open platform allows the schools to manage 1,169 video cameras from a mix of manufacturers: Axis, Bosch, IQinVision, Panasonic, Samsung and Sony. The installation runs on IBM and Dell servers.

Dotworkz president Will Ferris believes that Milestone's open platform provides the greatest value for what is most important to San Diego Unified School District. This includes scalability, incorporating new functionality and enhancing the level of safety and security for parents, students and teachers.

Ferris says: "We helped the district in its quest for better camera and processing technology. We served as a guide, showing them the advantages of Milestone's open platform and advised them to complete the training required to become certified in the technology. We also built the housings for their external cameras."

The cameras are installed at points where break-ins commonly occur and in areas where students gather that are the most problematic.

Cost savings please the district and constituents

"This system makes each campus safer for students and staff. We now have the level of visual communication we need to resolve most problems before they arise," said Mike Cho, Safety and Security Coordinator, San Diego Unified School District.

As an organization that depends on voters' support for bond funding, the investment in Milestone technology was made with an eye toward cost effectiveness. The Milestone video platform has paid off by dramatically reducing the amount of time required to administer the system and to train users and by reducing the vandalism that demands costly repairs.

Further savings are achieved by reducing the number of staff members needed to physically monitor so many areas. According to district administrators, the system has improved conduct across the board by providing high-definition (HD) images that make identifying and charging perpetrators a much less arduous process than it was before.

80 Percent Reduction in Vandalism

"Since they've noticed that they're being monitored, the students' behavior has improved," says Cho. "They know that every action occurring in the common areas is being recorded."

At the school that once had the worst graffiti problem, tagging has been reduced by 80 percent since the new systems went live, which has also lessened the amount of time district painters spend at the school covering the graffiti. The chances of a rival gang coming to mark the territory as its own have been lowered, as has the violence that often occurs when encountering each other at a graffiti site.

Improved Incident Response; Accurate Evidence

From a security perspective, the problem with such a large district is that it is not unusual for a fight to break out while the school's dedicated police officer is responding to a different incident in another area. With cameras and the Milestone platform at work, the officer can use the video to determine how many back-up officers are needed at which spots.

Students don't always tell the full story after an incident. "Nobody wants to be known as a 'snitch,'" Cho says. "Now nobody has to be because the video shows all, and the HD video really helps us identify people."

In one case, a student punched another student in the face a number of times. Each witness interviewed by administrators after the incident had slightly different recollections, but the video provided the evidence needed to charge the perpetrator in court.

Improved System Management

Cho reports that the system manager loves the Milestone system because it can be more easily and quickly managed. Under the previous system, programming one camera required navigating two separate operating systems. Milestone cuts that time in half.

"Plus, I can view it remotely with my iPad!" says Cho. "With the previous system there was enough time to go get coffee between starting it and being able to log on. With Milestone, you just click and you're on. It's beautiful."

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3