View
116
Download
1
Category
Tags:
Preview:
Citation preview
A Comprehensive Guide to Physical Security
Brian Mulligan-Vice President Sales and MarketingMichelle Syc-Senior Analyst, Advisory & Assurance
Services
Why is physical security important for a business? How does a lack of physical security affect the business? The fundamentals of physical security
• Intrusion Detection• Access Control• Video Surveillance• Fire Detection
What is a good, better best solution for physical security?
Agenda
Securing the physical perimeter is equally as important as securing your data network. Why?
Define and restrict areas based on a “need to access” level. What is the risk of not having environmental controls in
place? Three important considerations to physical security-cost,
benefits and return on investment
Why is Physical Security Important to a Business?
Employee theft costs American businesses $120 billion each year. “Fraud and white-collar crime
cost businesses more than $400 billion* annually”
“On-the-job violence costs employers $36 billion annually”
Why is Physical Security Important to a Business?
Do You have a Security Strategy in Place?Many times a lack of a security strategy is due to not knowing where to start
Access to areas not for public leave files and data open to corruption and loss
Safety of employees and clients Physical loss of corporate and personal assets Potential theft of proprietary and confidential information etc.
Risks associated with a lack of physical security
Why have Physical Intrusion Protection?o Protect your home and Business from potential threats of theft,
violence, intrusion, vandalism and more. o Home alarm systems aim to reduce your exposure to crime, limit
crime in progress, apprehend criminals o Most importantly allow you to monitor your home and family anytime,
anywhere.
Intrusion Protection Overview
Intrusion Protection OverviewIntrusions are Detected in Different StagesIntruders entered the facility through:
Door – 35%
Window – 26%
Unconventional Entry – 25%
Did Not Gain Entry – 14%
What Options are available to me?o First and foremost, sensors including door contacts, window sensors
and motion detectors are most common.o Triggering these items will send an alarm to a Central Monitoring
Stationo Not your Parents security system anymore……
• Introduction of automation• Ability to use mobile devices to arm/disarm• Notifications of events on smart phone or tablet via text/email• Control lights, locks and thermostats remotely
Intrusion Protection Overview
Unlike conventional alarm systems, verified alarms use audio and/or video.
When an alarm is triggered local monitoring professionals are able to listen the live audio to determine whether a break-in is in progress. If it is a break in, police are dispatched immediately and real-time information is relayed to the responding officers.
Verified alarms provide better protection, early detection, and more comprehensive coverage than traditional intrusion detection systems.
Ability to identify intruders who enter the building unconventionally, unlike perimeter protection systems
Verified alarms have the highest apprehension rate and the lowest false alarm rate in the industry.
Verified Solutions
Verified SolutionsEnhanced Call Verification
Criminal attempts to break in through a door, window, wall or ceiling
Advanced intrusion sensors detect intruder and sound alarm
Central Monitoring Center receives digital alarm signal
A monitoring specialist verifies alarm by contacting customer premise (ECV)
Contacts the police on verified alarm
Police dispatched to customer location
Notifies customer of alarm and dispatch
All alarm events documented and available to customers online
o Door Contacts and Window Sensors provide your “Good” solution as you are doing something to attempt secure your home or business
o A combination of Door Contacts, Window Contacts and Motion Detectors provide a “Better” scenario
o A compliment of all three, plus audio verification (Commercial application) provide full volumetric protection.
Good, Better, Best
Customer A has several door and window detectors along with motion detectors. Criminal is able to enter the space and cause some damage upon entry and flees. Siren alarm scares off the criminal, but damage has been done. Police are dispatched and arrive with investigation in mind.
Customer B has an audio verification system in place. Criminal enters space and silent audio alarm is tripped. Central Station operator hears the criminal voice and knows where in the building they are. A verified alarm is called into Police for Dispatch. Police dispatch an average of 10 minutes faster on a verified alarm and arrive on scene with apprehension in mind.
Intrusion Protection Sample ScenariosNon Verified versus Verified
Access cards to lock & unlock doors Tracks employees, visitors, contractors use of your facilities Integrate with HVAC and lighting systems Multiple levels of access cards
Access Control Overview
On a recent snow day, a public school customer goes into their access management portal and changes the predefined Alert System to “Snow Day”.
The system can automatically: Deny door access to general personnel Turns on the alarm system Link to HVAC system to lower the temperature in the building Email the cable/radio station to notify the parents of the closing Play prerecord school closing message over PA system for janitors Text message the faculty & staff that the school will be closed for the day
Access Control Sample Scenario
Increases employee supervision/security Reduces vandalism, theft, shoplifting Helps control inventory shrinkage Improves employee safety Verifies disability and accident claims Documents activity on the premises Provides visually verified evidence Assists in training and evaluating employees
Video Surveillance Overview
Customer A has a non verified video system and has an event on a Saturday. Customer is able to pull the video from DVR to provide to Police for action of action following event.
Customer B has a verified video system. Customer has an event on a Saturday. Video signal of event is sent to Central Monitoring station. Police are dispatched to the scene and criminal is apprehended.
Video Surveillance Sample ScenarioVerified versus non verified
Smoke and heat detection Water flow and sprinkler monitoring Elevator recall Voice evacuation system Duct detection
Fire Detection Overview
The key to limiting fire loss is early detection and verification
• A combination of door/windows contacts provides some level of physical protection.
• Addition of motion detectors provides a “Good” security protocol as there is something in place to attempt to stop a crime in progress.
• Sirens and notification to Central Monitoring Station will allow for notification to customer and to Police that an event is taking place.
Good physical Security Protocol
Door/Window Contacts and Motion Detectors with siren Access Control system to serve as entry level security to
location as well as to areas that need to be secured. Video surveillance system in place with Digital Video Recorder
to capture events.
Better Physical Security Protocol
Door/Window Contacts and Motion Detectors with siren Access Control system to serve as entry level security to
location as well as to areas that need to be secured. Video surveillance system in place with Digital Video Recorder
to capture events. Video/Audio Verified solution in place allows for full
volumetric coverage and the opportunity to not only stop the event, but leaves a better chance for apprehension.
Best Physical Security Protocol
About Sonitrol of New EnglandADNET proudly partners with Sonitrol of New England. Since 1970 Sonitrol of New England has been providing world class security solution to clients in New England. From residential homes to schools, municipalities and large corporate businesses, Sonitrol of New England has the expertise to provide innovative solutions to fit all security needs small and large.
Partner Logo
Recommended