SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    One System, One Card
    One System, One Card
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    One System, One Card
    One System, One Card
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 Sets Sales Record In Security Market
    • A Landmark Gathering Shaping The Future Of Real Estate, Investment, Sustainability & Design
    • IDIS Launches New AI PTZ Cameras With NIR Performance
    • Leuze AI Boosts Optical Distance Sensor Accuracy
    One System, One Card
    One System, One Card
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
    One System, One Card
    One System, One Card
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    One System, One Card
    One System, One Card
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    One System, One Card
    One System, One Card
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Software House
    Other Resources
    • eMagazines
    • Videos
    One System, One Card

    One System, One Card

    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

About us Advertise
  • Wire-Free Locks
  • AI special report
  • Cybersecurity special report
  • Casino security & surveillance
  • 6
Video surveillance
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check Out Our Special Report On Casino Security

Get it now!

Designing Security Systems: Project Management Techniques

Designing Security Systems: Project Management Techniques
Designing Security Systems: Project Management Techniques
Designing Security Systems: Project Management Techniques
Michael Fickes
Michael Fickes
Contact company
Contact Northland Controls
icon Add as a preferred source Download PDF version

Access control and video surveillance technologies are expensive to buy and install. So it’s important that end users make sure they get a system that works the way it is supposed to work and the way they want it to work.

To that end, the principles of project management can help end users find an integrator and to manage the work of installing or upgrading security systems.

If you are experienced with security technologies, you might consider managing the project yourself. If not, consider retaining a security consultant to help.

Security project management

Project management for a security installation requires paying careful attention to the scope of the work, the budget and the schedule, says Pierre Trapanese, president and CEO of Freemont, Calif.-based Northland Controls, a global integrator with offices in Washington, D.C., London, Singapore and Shanghai.

“These are the three most important aspects of project management, and you must focus on each” he says.  “For example, if you focus only on the budget, you will probably compromise the scope and schedule.

With that in mind, there are four phases in a project’s lifecycle: developing the scope of work, planning, execution and closing.

Scope of work

"If a certain door opens in the middle of the night, you would probably want the access control system to send an alert to an operations center or on-site security officers. You may also want a camera to capture the event, and relay the video file along with the alert".

Defining the scope of work for a physical security project is a critical task. “The scope lists all of the components of the project,” Trapanese says. “What equipment do you want? What do you want it to do? How do you want it programmed and installed? If you leave something out that has to be added later, it will throw off the budget and the schedule.”

If, for example, you fail to note that all visible components of the system — access control readers for instance — must be the same gray shade as the company’s logo, you will throw off the budget and schedule when the integrator installs black readers.

“You should also have drawings that indicate where the components will be mounted and how the system will tie together,” Trapanese says. “Finally, you must consider the system’s configuration. By configuration, I mean how do you want the system to react to events? If a certain door opens in the middle of the night, you would probably want the access control system to send an alert to an operations center or on-site security officers. You may also want a camera to capture the event, and relay the video file along with the alert.

“A consultant or an integrator can help you develop a comprehensive and complete scope for your project,” he says.

Planning

Once you understand the scope of the project, you can select an integrator to do the work. There are two ways to do that. You can bid the project and select the integrator that submits the lowest qualified bid, or you can request proposals and negotiate a price with the integrator presenting the best proposal.

"With a proper definition of the scope of work and a careful project plan, the project execution should be the easiest part of the project."

After you’ve made a selection, the integrator will use the scope of the job that you prepared to carry out the planning, a process you can participate in, or at least monitor.

Planning includes pricing materials and equipment and placing orders with an eye to which items have long lead times. The integrator will also coordinate with other trade contractors, as well as with your IT and real estate departments.

Finally, the integrator will tie everything together with project-management software. “We use Microsoft Project,” says Trapanese. “Using the details of the scope of work you initially defined, along with known installation practices, the software will generate a schedule that can be fine-tuned.”

Execution and closing

With a proper definition of the scope of work and a careful project plan, the project execution should be the easiest part of the project. Integrators and sub-contractors know how to do the work.

Closing, the final phase of project-management, fine-tunes the system. “Closing a security installation always raises issues,” Trapanese says. “It is how you manage those issues that matters. If I understand the scope of work and have a good plan, I can focus on unanticipated problems. But if the scope of work and planning are flawed, I’ll be spending my time trying to put out what should have been an avoidable fire that will turn into a conflagration when that unexpected problem hits, as it always does in construction.”

In other words, you lay the foundation for a smooth closing with the first steps you take on a project.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Security management
  • Security cameras
  • Security camera systems
  • Video surveillance
  • Related links
  • Articles by Michael Fickes
  • Related categories
  • Surveillance cameras
  • Access control systems & kits
Related white papers
Aligning Physical And Cyber Defence For Total Protection

Aligning Physical And Cyber Defence For Total Protection

Download
Understanding AI-Powered Video Analytics

Understanding AI-Powered Video Analytics

Download
Combining Security And Networking Technologies For A Unified Solution

Combining Security And Networking Technologies For A Unified Solution

Download
Related articles
IDIS Launches New AI PTZ Cameras With NIR Performance

IDIS Launches New AI PTZ Cameras With NIR Performance

Alarm.com & Everon: Unified Security Solutions

Alarm.com & Everon: Unified Security Solutions

Axis Signs CISA Secure By Design For Cybersecurity

Axis Signs CISA Secure By Design For Cybersecurity

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Video surveillance
  4. News
  5. Expert commentary
About this page

Discover a strong synergistic approach to biometrics and cybersecurity, enhancing protection against cyber threats and vulnerabilities.

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
One System, One Card
One System, One Card
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec