1 - Texas Association of Community Schools

Download Report

Transcript 1 - Texas Association of Community Schools

Texas Association of Community Schools Construction Conference
Sponsored by TCPN
Today’s Agenda




What are the threats to Facilities?
What’s on Administrator’s/Superintendent’s minds?
Share examples of positive changes and technologies.
Open up dialogue for discussion.
What is significant about the number 18?
Confidential Page 2
Our Task Today is a Bit Daunting…
Confidential Page 3
Quiz
When did all of this come about?
Physical Security
 Electronic Security
 Intercom Systems
 CCTV
 Access Control Systems
 Integration

Confidential Page 4
Quiz
When did all of this come about?
Physical Security – Long, long ago…
 Electronic Security – 1851 w/the McCullough Loop
 Intercom Systems – 1940’s
 CCTV – late 1950’s (London Trains)
 Access Control Systems - early to mid 1960’s
 Integration – late 1980’s and improving each day…

Confidential Page 5
THE top Security Concern
Confidential Page 6
Top 5 Security Concerns





Confidential Page 7
#1 Cyber/Communications Security
#2 Workplace Violence and Prevention/Response
#3 Business Continuity
#4 Employee Selection/Screening
#5 Property Crime
From the Securitas Security Services USA, Inc. 2012
ONE problem in schools

Past architecture/construction make them difficult to secure


Confidential Page 8
Today, much of the equipment going into schools is for surveillance and
delaying an intruder
Therefore “hardening of the schools” refers to improved use of
cameras, new alarm systems and panic buttons
Let’s Look to Available Technologies/Solutions
…to reduce threat
…to mitigate risk
…to enhance productivity
…to save and/or improve lives
…and, to be (not only feel) more safe!
Confidential Page 9
Available Technology
Digital &
CCTV
Video
Intelligent
Video
Access
Control
Visitor
Management
Physical
& Logical
Security
Systems
Intrusion
Detection
& Alarms
Situation
Monitoring
Perimeter
Protection
Confidential Page 10
Biometrics
& Smartcard
Available Technology
Digital &
CCTV
Video
Intelligent
Video
Access
Control
Visitor
Management
Physical
& Logical
Security
Systems
Intrusion
Detection
& Alarms
Situation
Monitoring
Perimeter
Protection
Confidential Page 11
Biometrics
& Smartcard
Increasing
Demand
Let’s talk technology…

IP Video (HDTV &/or MegaPixel)


Many cameras are now “sensors”
Video Management Solutions (VMS applications)

Confidential Page 12
Technology AND Recording at the “edge”
Let’s talk technology…
Intelligent Video Analytics
Rules Based

Single Person
Multiple Persons
Fast-Moving Persons
Fallen Person
Left-Behind Object
Lurking Person
Erratic Person
Single Vehicle
Multiple Vehicles
Sudden-Stopped Vehicle
Fast Vehicle
Slow-Moving Vehicle
Forming Crowd
Dispersing Crowd
Converging People
Cognitive Learning

Artificial Intelligence and so much more…
Confidential Page 13
How about an example?
Let’s talk technology…
Confidential Page 14
Let’s talk technology…

EOC / Fusion Center
Confidential Page 15
Let’s talk technology…

PSIM (Physical Security Information Management)

Industry Definition – a category of software that provides a platform and
applications created by middleware developers, designed to integrate multiple
unconnected security applications and devices controlling them through one
comprehensive user interface.

Darin’s Definition – allows for situational awareness by proactively handling
any event while meeting compliance plus policy management much more
efficiently AND effectively…
PSIM
Access Control * Video Mgmt * xVR Storage * Analytics * Sensors * Building Mgmt Alarms
POS * ID Mgmt * IS/GPS * Fire * Video Walls * Radar * Etc.
Confidential Page 16
Let’s talk technology…
Bullet-proof
Glass
Vestibule Hardening
 Mass Notification
 Remote Monitoring / Verification

Confidential Page 17
Ballistic
Protection
Let’s talk technology…

Key Management
Global Positioning Systems (GPS)
 Radio Frequency Identification (RFID)


Passive (low cost, dumb, short range; get excited by a reader or antenna
and transmit their unique identification)

Active (increased cost, smart, long range; battery powered, provide a
heart beat and alarm attributes)
Strap Sensor
Confidential Page 18
Bolt Sensor
Let’s talk technology…

Mobile Security Solutions



BYOD (bring your own device)
Proprietary packaging
Integration of Databases - HR, LDAP/AD, Contractor,
Watch list, Compliance list, Certification list, etc.
Confidential Page 19
iPod
iPhone
iPad
Summary

“Physical” Security gets top billing…


Security is not a “single solution” solution (make sense?)


“Many” individual solutions should be considered based upon various threats
Emerging is good, yet not always best


…although Cyber is much more vulnerable and often untraced
At times, leading edge can be painful
Being informed is best

Confidential Page 20
Know someone who knows someone; expand your network
Questions
Michael Huffman
Account Manager
Convergint Technologies, LLC
[email protected]
832.327.3700 Office
832.524.6024 Cell
Darin R. Dillon, CPP
Business Development Manager
Convergint Technologies, LLC
[email protected]
832.327.3700 Office
713.204.7035 Cell
Recently overheard… “Before LinkedIn, I didn’t know any strangers.”
Confidential Page 21