Security Systems News

APR 2016

Security Systems News is a monthly business newspaper that reaches 25,100 security installers, product distributors, central stations, engineers & architects, and security consultants. Our editorial coverage focuses on breaking news in all major se

Issue link: http://ssn.epubxp.com/i/657862

Contents of this Issue

Navigation

Page 10 of 60

www.securitysystemsnews.com April 2016 SECUriTY SYSTEMS NEWS news 8 Upgrade to IP utilizing coax altronix.com • 1.888.258.7669 MADE IN THE USA • LIFETIME WARRANTY eBridge™ Ethernet over Coax Solutions let you repurpose your analog infrastructure to upgrade and expand security or surveillance. Offering a wide range of options for myriad applications – even outdoors. Effciently transform your coax infrastructure to IP with eBridge. More than just power. ™ Mark Schreiber President, principal consultant Safeguards Consulting Greenville, S.C. Specifcally Speaking Speaking see page 10 riers, gates, fencing, and tradi- tional hardening recommenda- tions, we advise the architects and other engineering groups to design the facility itself to sup- port security and mitigation of crime. We use CPTED (Crime Prevention Through Environ- m e n t a l D e s i g n ) p r i n c i p l e s , construction experience, and other skills to help the design team optimize the building not only for the primary users of the built environment, but also the security operations and emergency response needs. For example, we are typically the first entity on the team to look at the facility's impact to work- place violence/active shooter response procedures. How do you deal with cyberse- curity issues and concerns with your designs? The role of cybersecurity is easy to underestimate by many organizations because the typi- cal vulnerabilities are massive in number, but traditional security practitioners tend to act like it is outside of their jurisdiction. The reality is that we already are deeply involved and impacted by cyber risks and the sooner we can address and collaborate with our cybersecurity breth- ren, the better off our organi- zation's security posture will be. Therefore, we strongly support, evangelize and teach the value and methods of security conver- gence. Within our direct capa- bilities, we coordinate and plan within our client's team to sup- port and initiate security con- vergence operations. We also ask and incentivize physical security vendors to improve and implement cybersecurity prin- ciples and methods. We scope and specify simple authentica- tion and network management applications, in addition to operational requirements that are considered standard pro- cesses in the IT world, but are often overlooked in the physical security industry. Do you specify biometrics fre- quently? What type of biometric technologies do you specify, and what are the best use cases for those biometrics? Has that changed much over the years? Yes, biometrics are commonly recommended and implemented on our projects that have above- average security risks. The pur- pose is to provide multiple fac- tors of authentication, not just for their inherent security. The selection of biometrics is based upon the physical environment Tell me about the services Safe- guards Consulting offers and your "open door policy." Safeguards Consulting sup- ports an "Open Door Policy" with security manufacturers and integrators, whereby we will make time for all so that we can be as comprehensive as pos- sible for our clients. It would be inappropriate to assume that we could recommend any solution without analyzing the delivery and maintenance impact of our clients' locations, so we strive to keep a base knowledge of as many vendors as humanly pos- sible. What's your philosophy with complete facility design? When we support a client with a comprehensive project, we advise and support the com- plete design of the facility, not just the physical security sys- tems. Above and beyond bar-

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Systems News - APR 2016