A substantial focus of the security industry is on the selection and installation of security systems, and there is no doubt that this is a critical element of the process.

However, in order to ensure that security systems such as access control, video surveillance, intrusion detection and panic alarms deliver on ‘game day’, an equal if not greater emphasis has to be put on the actions that are taken after the installers have closed the doors on the truck and driven away.

This article covers some important issues that were covered at the 2019 International Association of Professional Security Consultants (IAPSC) annual conference in Miami, Florida, where Frank Pisciotta, CSC, Business Protection Specialists, Inc. and Michael Silva, CPP, Silva Consultants, facilitated a discussion among security professionals on the topic.

Backwards compatibility in access control solutions

David Barnard of RS2 security highlighted the importance of backwards compatibility in access control solutions

David Barnard of RS2 Technologies LLC highlighted the importance of backwards compatibility in access control software solutions. Reputable manufacturers are constantly evolving software products and it is critical that software continues to work with all installed hardware or owners will find themselves purchasing equipment a second time, which is never good news.

An example, a case study with a client where the video management software upgrades were not backwards compatible through the mobile app and a small manufacturing site was looking at a US$ 75,000 price tag to upgrade cameras to make them compatible with the ‘updated software’.

Risks of failures in door hardware products

Jim Primovic from ASSA ABLOY cautioned about the risks of failures in door hardware products resulting in a failure to attention to detail in the selection and, in particular, the installation process. He explained the importance of using certified installers to avoid operation problems.

In light of constantly evolving software revisions, how often does one see any additional training provided to end users when software updates are released? Charles Johnson of Open Options raised this important point and it is an excellent one. As organizations think about structuring maintenance agreements, it might be wise to consider ongoing training to cover software updates and ensure that end users can continue to optimize the features and benefits of software revisions.

Software Support

Kim Kornmaier of Honeywell mentioned another element of security system lifecycle consideration, which is ‘Software Support’. Maintenance agreements are available and will likely be offered from every installer and come in a variety of flavors.

However, care needs to be exercised to ensure that whatever services and support are included, in the scope of a maintenance agreement, have a clear correlation between service and software upgrades versus the fee charged.

Software upgrades and system testing

Maintenance agreements should be avoided that simply guarantee the free replacement of parts (which may or may not ever get used, even after you pay for it). Services that should be considered include software upgrades, system testing and replacement of consumable parts, like back up batteries.

Another key issue ties directly to periodically measuring and ensuring the risk reduction results of security systems, for example, with an access control system, there are several actions recommended for system owners, including:

  • Conduct periodic door and alarm testing - This presumes users have installed all of the necessary parts to enable alarm monitoring). These tests should include the mechanical testing of doors and confirming door-held-open-too-long and forced-door alarms are properly reporting to the alarm client.

Importance of harnessing door alarming capacity

Excessive door alarms are an indication of either a user or system problem

Excessive door alarms are an indication of either a user or system problem or all alarms should be investigated to determine root cause and corrective action needed. Organizations who fail to harness door alarming capability are giving away up to 50 percent of the system's potential benefit.

Ensuring the integrity of the access control database is of prime importance. The failure to manage this can lead to unauthorized access and serious security incidents.

This can be achieved in a variety of ways, but in the majority of risk assessments they have conducted over the years, it is common to find separated employees and contractor records with active credentials in the database. Ways to mitigate this risk include:

  • Integrating your access control database with active directory (works for employees, not so well for contractors);
  • Utilizing expiration dates on contractor credentials;
  • Periodically manually auditing contractor and employee active badge reports for anomalies, which may indicate process weaknesses in the change management process;
  • Utilizing the ‘use it or lose it’ feature in many software programs that automatically disable a credential after a set period of non-use (e.g., 90 days); and
  • Establishing processes to limit the removal of certain badges from the site (e.g., those issued to contractors or temporary employees).

‘First Card Unlock’ feature

Irregular schedules, holidays and natural disasters can result in access vulnerability. For instance, if access-controlled doors at a site are programmed to open on a timer and something prevents persons from arriving at work (e.g., snowstorm), a site may be left exposed.

A mitigation technique against this type of risk would be to employ a concept called ‘First Card Unlock’. Under this feature, a lobby entrance to an office, for instance, would not enter into an unlocked state, until the first authorized employee presented a card and entered the workplace.

Changing holiday programming in security systems

Holiday programming in some systems needs to be changed on an annual basis

Holiday programming in some systems needs to be changed on an annual basis. Managing holidays in an access control system results in doors staying secure which would otherwise be unlocked on a normal business day.

Similarly, intrusion detection, duress devices and video surveillance systems can let users down without the proper care and feeding.

Examples would include:

  • A panic device fails to communicate an emergency situation because it was not properly reset or the wiring has been damaged due to poor installation. Panic devices should be regularly tested and ideally the activation during testing should be by a person who would be required to use the device in an actual incident. The objective here is to build competency in the persons who may need to activate a device discretely. Similarly, intrusion detection systems should be carefully tested to ensure that all devices are properly reporting to the panel and that the panel is communicating properly to the central station. If there are redundant communications channels, each should be verified.
  • In the same way someone would conduct audits of active credentials in an access control system, it is strongly recommended that users perform a similar review with PIN codes, which have been assigned and would allow for an unauthorized person to disarm a system.
  • Utilizing the failure-to-close feature to ensure that through collusion or negligence, if the last person out of a restricted area fails to arm the panel, the central station will notify a responsible party about the omission. Further, reviewing opening and closing reports might well detect inappropriate entries by authorized personnel which are indicative of suspicious or illegal activity. These features and reports will likely be at an additional cost, but they are important insurance to protect against insider threat.
  • It is not uncommon to hear about an incident happening and during the investigation, the owner of the system discovers that the needed camera was not recording. Where video is not under routine observation, it is recommended to determine if your video management system can send an alarm in the event of video loss. This would allow for rapid remediation before the video loss is discovered in the course of an investigation.

Avoiding degraded video quality over time

In almost every case, degraded video quality is directly related to resource saturation

With respect to video surveillance, as systems grow and evolve over the life of the system, organizations may experience degradation. Darren Giacomini of BCDVideo has studied this issue extensively and concludes that in many cases, installers or others are simply putting too many devices on a VLAN, which results in latency and other conflicts.

Degraded video quality has a finite number of potential root causes. In almost every case, degraded video quality is directly related to resource saturation. The resources on a surveillance network consist of IP cameras, network switches, network uplinks, viewing stations, database management and archives.

Resource depletions

According to Giacomini, each of the resource shares a common thread. And, at the basic level, each of those items is nothing more than a purpose-built computer with limited CPU, memory and network capacity.

When any of these resources exceed their capacity, the quality of service delivered will degrade. The following are common resource depletions that can degrade video quality and require a much deeper dive, but are included here as a starting point:

  • IP camera CPU utilization is in excess of 85 percent;
  • CPU elevation in the decoder or workstation decoding the video; and
  • Network congestion or CPU elevation in the network switch.

Maintaining the integrity of archived video data

Giacomini indicated that the majority of the time degraded video is associated with resource depletion

Giacomini indicated that the majority of the time degraded video is associated with resource depletion in one of these key components. Investigation of the potential causes can save time and effort, and prevent a video management software application from unduly being blamed for poor performance during its lifecycle.

Also, on the topic of video, John Kampfhenkel, Director of Technical Sales at Veracity discussed the challenges that organizations face when video management system storage is undersized and the need to carefully plan for video retention of existing recorded data when the video system has to be expanded.

This can be a problem organizations face and when they do, it is best to involve a video storage expert to determine options, costs and potential legal requirements for maintaining the integrity of archived video data.

Selecting the right security technology

Dependent on the level and type of integration between various systems, another challenge may be to preserve the integration between the two systems. System owners will need to coordinate carefully with installer(s) to ensure that a software revision to one system will not result in a disruption to a software level integration. This type of integration may require a delay in being able to upgrade one or the other application software versions until the integration can again be certified.

Selecting the right security technology is an important element of an organization's security risk management. However, experts would argue that in terms of getting measurable results from technology, there needs to be a keen focus on sustaining activities after the installer closes the doors and drives away. By adhering to the consultant and manufacturers' guidance in this article, organizations can substantially reduce the risk to people, assets and information, and prevent criminal and terrorist incidents in the workplace.

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version

In case you missed it

New Markets For AI-Powered Smart Cameras In 2021
New Markets For AI-Powered Smart Cameras In 2021

Organizations faced a number of unforeseen challenges in nearly every business sector throughout 2020 – and continuing into 2021. Until now, businesses have been on the defensive, reacting to the shifting workforce and economic conditions, however, COVID-19 proved to be a catalyst for some to accelerate their long-term technology and digitalization plans. This is now giving decision-makers the chance to take a proactive approach to mitigate current and post-pandemic risks. These long-term technology solutions can be used for today’s new world of social distancing and face mask policies and flexibly repurposed for tomorrow’s renewed focus on efficiency and business optimization. For many, this emphasis on optimization will likely be precipitated by not only the resulting economic impacts of the pandemic but also the growing sophistication and maturity of technologies such as Artificial Intelligence (AI) and Machine Learning (ML), technologies that are coming of age just when they seem to be needed the most.COVID-19 proved to be a catalyst for some to accelerate their long-term technology and digitalization plans Combined with today’s cutting-edge computer vision capabilities, AI and ML have produced smart cameras that have enabled organizations to more easily implement and comply with new health and safety requirements. Smart cameras equipped with AI-enabled intelligent video analytic applications can also be used in a variety of use cases that take into account traditional security applications, as well as business or operational optimization, uses – all on a single camera. As the applications for video analytics become more and more mainstream - providing valuable insights to a variety of industries - 2021 will be a year to explore new areas of use for AI-powered cameras. Optimizing production workflows and product quality in agriculture Surveillance and monitoring technologies are offering value to industries such as agriculture by providing a cost-effective solution for monitoring of crops, business assets and optimizing production processes. As many in the agriculture sector seek to find new technologies to assist in reducing energy usage, as well as reduce the environmental strain of modern farming, they can find an unusual ally in smart surveillance. Some niche farming organizations are already implementing AI solutions to monitor crops for peak production freshness in order to reduce waste and increase product quality.  For users who face environmental threats, such as mold, parasites, or other insects, smart surveillance monitoring can assist in the early identification of these pests and notify proper personnel before damage has occurred. They can also monitor vast amounts of livestock in fields to ensure safety from predators or to identify if an animal is injured. Using video monitoring in the growing environment as well as along the supply chain can also prove valuable to large-scale agriculture production. Applications can track and manage inventory in real-time, improving knowledge of high-demand items and allowing for better supply chain planning, further reducing potential spoilage. Efficient monitoring in manufacturing and logistics New challenges have arisen in the transportation and logistics sector, with the industry experiencing global growth. While security and operational requirements are changing, smart surveillance offers an entirely new way to monitor and control the physical side of logistics, correcting problems that often go undetected by the human eye, but have a significant impact on the overall customer experience. Smart surveillance offers an entirely new way to monitor and control the physical side of logistics, correcting problems that often go undetected by the human eye. Video analytics can assist logistic service providers in successfully delivering the correct product to the right location and customer in its original condition, which normally requires the supply chain to be both secure and ultra-efficient. The latest camera technology and intelligent software algorithms can analyze footage directly on the camera – detecting a damaged package at the loading dock before it is loaded onto a truck for delivery. When shipments come in, smart cameras can also alert drivers of empty loading bays available for offloading or alert facility staff of potential blockages or hazards for incoming and outgoing vehicles that could delay delivery schedules planned down to the minute. For monitoring and detecting specific vehicles, computer vision in combination with video analysis enables security cameras to streamline access control measures with license plate recognition. Smart cameras equipped with this technology can identify incoming and outgoing trucks - ensuring that only authorized vehicles gain access to transfer points or warehouses. Enhance regulatory safety measures in industrial settings  Smart surveillance and AI-enabled applications can be used to ensure compliance with organizational or regulatory safety measures in industrial environments. Object detection apps can identify if employees are wearing proper safety gear, such as facial coverings, hard hats, or lifting belts. Similar to the prevention of break-ins and theft, cameras equipped with behavior detection can help to automatically recognize accidents at an early stage. For example, if a worker falls to the ground or is hit by a falling object, the system recognizes this as unusual behavior and reports it immediately. Going beyond employee safety is the ability to use this technology for vital preventative maintenance on machinery and structures. A camera can identify potential safety hazards, such as a loose cable causing sparks, potential wiring hazards, or even detect defects in raw materials. Other more subtle changes, such as gradual structural shifts/crack or increases in vibrations – ones that would take the human eye months or years to discover – are detectable by smart cameras trained to detect the first signs of mechanical deterioration that could potentially pose a physical safety risk to people or assets. Early recognition of fire and smoke is another use case where industrial decision-makers can find value. Conventional fire alarms are often difficult to properly mount in buildings or outdoor spaces and they require a lot of maintenance. Smart security cameras can be deployed in difficult or hard-to-reach areas. When equipped with fire detection applications, they can trigger notification far earlier than a conventional fire alarm – as well as reduce false alarms by distinguishing between smoke, fog, or other objects that trigger false alarms. By digitizing analog environments, whether a smoke detector or an analog pressure gauge, decision-makers will have access to a wealth of data for analysis that will enable them to optimize highly technical processes along different stages of manufacturing - as well as ensure employee safety and security of industrial assets and resources. Looking forward to the future of smart surveillance With the rise of automation in all three of these markets, from intelligent shelving systems in warehouses to autonomous-driving trucks, object detection for security threats, and the use of AI in monitoring agricultural crops and livestock, the overall demand for computer vision and video analytics will continue to grow. That is why now is the best time for decision-makers across a number of industries to examine their current infrastructure and determine if they are ready to make an investment in a sustainable, multi-use, and long-term security and business optimization solution.

How Technology Can Elevate Guest Services And Their Security
How Technology Can Elevate Guest Services And Their Security

The return to the workplace is a focal point for many in the built environment but one of the most important elements is easy to overlook. Guest services will be vital in the return to the workplace. Front-of-house teams will be responsible for welcoming building users back and reassuring them as they negotiate shared spaces in the post-Covid era. The workplace will inevitably look different after Covid. We have become more aware of our spaces, how clean they are, and what spaces building users share. Employees have also become more conscious of the pros and cons of the workplace. For some, a year of working from home has been a welcome break from the stress and time taken by a commute. Many organizations are considering moving to hybrid workplace approaches, downsizing their corporate real estate portfolio, and using shared spaces more consciously, be that for focussed quiet work or collaboration. We will also see heightened care in workplace cleaning and more data-led solutions. Front-of-house teams will be at the center of helping building users get used to these changes. The role of technology Front-of-house personnel will likely be responsible for ensuring buildings do not exceed safe occupancy levels and will be aided by visitor management systems.  Another change to look out for in the workplace will be the use of technology. Tech-led organizations have long reminded us that gut instinct and trusting our senses is not enough anymore, but Covid-19 has forced us to come to terms with this. Now that adopting technology has become crucial in cleaning, we will see a reticence to adopt it elsewhere fade too. A survey from McKinsey suggests that the pandemic has accelerated the adoption of technologies by several years. Why is this important for guest services? Much like other workplace changes, new technologies will alter how building users interact with their environment. Tech will also enable front-of-house teams to focus on the key ingredient of their role – human interaction. This will be vital in helping occupants feel comfortable, safe, and happy. Occupancy and visitor management systems These systems have been around in the workplace for many years, and pre-Covid were used to help us maximize our space and utilization. These systems are even more important as we are likely to see some return to the workplace before everyone has been vaccinated. We may see systems that contact only those occupants in an affected area of a building, rather than a whole workforce, to limit worry and ensure most people can remain confident in the hygiene of their workspace. For the rest of 2021 at least, precautions such as social distancing will need to be in place. Workplaces will continue to function at limited occupancy for some time to keep people safe. Front-of-house personnel will likely be responsible for ensuring buildings do not exceed safe occupancy levels and will be aided by visitor management systems. These may be used by individual organizations or by multi-tenanted buildings. Temperature checks and identity verification systems Organizations are mitigating risks where possible. Handheld digital thermometers have been in high demand. The use of such devices has reshaped the role of security officers over the past year. Officers have become familiar faces in shops and shared spaces, keeping people safe and acting as the first point of contact. The security sector has been placed under immense pressure, balancing the need to enforce precautions with responding to stressed building users in an empathetic way. Officers have demonstrated agility that security technology cannot replace. Post-pandemic, we will likely see a greater appreciation for what manned guarding can offer and a greater potential for officers in front of house roles. Front-of-House staff are becoming responsible for temperature verification. Some organizations may choose to increase the collaboration between their front-of-house and security teams. This could include implementing identity verification systems, as well as touchless systems. This will allow the focus of front-of-house teams to remain on the people and giving a warm welcome to users as they return to the office. Using monitoring to make guest services more available  Monitoring solutions may be the first things that come to mind when discussing security technology. We have seen an increasing trend toward integrating remote monitoring with manned guarding since before the pandemic. Such a move may be even more important now.Beyond keeping employees safe, guest services are going to play a central role in making the workplace an attractive option. For many organizations, the pandemic has forced a rapid switch in focus. Organizations have had to face the security challenges of caring for vacant premises and the additional complications of managing cybersecurity for remote work. Rebalancing the cost and focus of security may feel as though it has left some businesses without the capacity to utilize front-of-house officers. Yet when employees return to the workplace, front-of-house teams will be more important than ever. For those that did not do so during the pandemic, now is the time to be investing in effective monitoring solutions. The falling cost of technology means such a solution can be combined with manned guarding and front-of-house roles. Organizations may need to invest in fewer officers, but their roles can be more focused upon the occupant experience. Encouraging employees back Beyond keeping employees safe, guest services are going to play a central role in making the workplace an attractive option. Remote working has had both pros and cons but many of those downsides will be diminished with the end of the pandemic. Loneliness will no longer be such a challenge when seeing friends and neighbours is an option, and the return of children and partners to school and work will relieve distractions. It may be tempting, then, for many employees to continue working from home. As a result, many opportunities for collaborative work will be lost. For employers looking to encourage their workforce to return, creating an amazing workplace experience is key. Technology alone can’t offer this. Rather, too much tech could create an environment that feels clinical and impersonal. Use technology to streamline the boring or stressful elements of the workplace and invest in friendly faces who will welcome your workforce back.

What are the Security Challenges of Protecting the Cannabis Industry?
What are the Security Challenges of Protecting the Cannabis Industry?

The advent of a truly new market for the physical security industry is a rare occurrence. Particularly rare is a new market that is both fast-growing and provides an environment that is not just conducive to application of physical security technologies but that actually demands it. Such is the case with the market for legalized marijuana. We asked this week’s Expert Panel Roundtable: What are the security challenges of protecting the cannabis industry?