Virtually all but the very earliest enterprise integrated security systems are convergence based, and almost all of the earliest systems utilize some convergence concepts. Although you may not need to design enterprise-class integrated security systems, understanding their design concepts TEAM LinG Introduction and Organization of the Book 5 will make you a better designer of any convergence-based integrated security system, so it is worthwhile to be attentive to the enterprise-class concepts when they are discussed herein.
Many of these subjects have only rarely or perhaps have never been discussed before in any book to my knowledge. These include such aspects as how to make your security system virtually disappear on the information technology system infrastructure, as though it were not there at all to anyone but the system administrator Chapter 17 ; a complete discussion on how to use security technology to delay, confound, and take down aggressors in very high security environments Chapter 4 ; and secrets on system implementation that help ensure a stable, reliable, and highfunctioning system Chapters 9 and There is some discussion about pitfalls out of which the potential for lawsuits have arisen for well-meaning but unsuspecting project participants.
Integrated Security Systems Design: Concepts, Specifications, and Implementation
My goal is to help you gain command of every aspect of the process necessary to ensure your success, the success of the project team, and especially the success of your client. Designing enterprise integrated security systems seems daunting to most who have only designed systems for single buildings or for small campus environments. The challenge has become ever more important with the advent of terrorism and the move toward using electronic security systems to augment homeland security.
Today, these systems are becoming more commonplace. However, many of them are being designed using old skill sets and outdated techniques, resulting in outmoded and therefore unsuitable products. Ahead of us toward the horizon is the technology of tomorrow.
It is different from the past. It is information technology IT based. Many in the security industry are afraid of it. They will resist the change.
They will lose. In the s, large corporate and government clients began to understand that they are better served by enterpriseclass security systems. Enterprise systems differ from older approaches in that they permit the uniform application of security policies and procedures across the entire organization. They permit centralized monitoring of security, business processes, and adherence to policy. They reduce liability and operating costs.
They permit a user from one facility to freely access any other if his or her access level permits. Nearly every manufacturer has embraced the enterprise security concept, but they are still trying to make it work in the context of older system architectures. These will all be replaced by pure IT infrastructures in the near future. By reading this book, you will be ahead of the game and be able to make design decisions that will save you and your client tens of thousands of dollars and many headaches.
These large-scale enterprise-level integration projects raise the bar, and we must all train well enough to jump over it. This book presents everything you will need to know to achieve success on these complex projects.
Now, do not misunderstand me: I do not mean why should I bother? Only after these questions are understood and answered can we begin to consider what to design and how to approach it. This book will help you learn how to design large integrated security systems, beginning with how to approach the project with the question, why? The difference between strategic integration and haphazard integration.
The difference between component integration and integration of functions. How to dramatically improve security at a facility using good integration strategies. How to create a solid basis for design, including What is security and what is not. How to determine the appropriate level of security. We will examine why you need to know more about IT systems and cover issues most designers did not know were important to their ultimate peril and that of their clients. TEAM LinG 8 Introduction to Integrated Security Systems We will discuss the esoteric side of integration, including how to design deployable delaying barriers and when and how to use reactive electronic automated protection systems that can actively intervene in a security event, stopping it immediately, from the security command center.
We will examine what can be achieved by integrating with other building systems and explore the many ways to interface with them. We will also examine the foundation of how to design, including Drawing hierarchies. We will discuss how to secure the security system from various kinds of attacks, including insider attacks. We will examine the differences between what needs to be in bid documents, construction documents, and as-built documents. We will also discuss how to provide bidding support to clients that gives them a truly empirical standard of evaluation for which bidder to select.
We will explore the important and delicate matter of how to review system installation to help ensure the success of the consultant, the contractor, and the client. We will also examine legal considerations and how good system design coupled with quality construction management and good relationship management can work together to the success of all project participants, avoiding problems, confrontations, and lawsuits.
Digital book Integrated Security Systems Design: Concepts, Specificat…
Designing enterprise integrated security systems is exciting, challenging, and highly rewarding. The best enterprise integrated security system designers are highly prized for this reason. Strategic subjects are covered primarily in Chapters 1—3, technical subjects are covered primarily in Chapters 4—10, and tactical subjects are covered primarily in Chapters 11— If at any time especially in the technical section it gets to be a little too much at once, it is ok to jump around a bit.
For example, the section on history provides important insight into how to spot industry trends before they occur. I have provided advice and consulted with manufacturers on important industry developments many years before they were thought to be important by the manufacturers. Those who did not were left behind.
How did I know where the industry was going? The seeds of the future are in the past. Understanding how the founders of the industry dealt with the technical problems they faced provides us with insight into why things work the way they do today. Understanding what we want to achieve and how other industries have dealt with similar problems provides us with insight into how to manipulate technology to achieve it. The great body of knowledge is always out there. We only have to see and not just look. Understanding the industry from strategic, technical, and tactical viewpoints gives us the ability to solve problems in a way that endures as technology develops and as TEAM LinG Introduction and Organization of the Book 11 the organization grows.
Although the challenge is considerable, the information is easily digestible if you take it in small bites. The book is also arranged in a way that is useful as a learning tool and then can be used for years as a reference guide. That is intentional. All the information herein is organized in a way that guides the user from the simple to the complex. Welcome to convergence-based integrated security systems design and thank you for reading.
When an organization is founded, it establishes a mission. Once the programs are established, the organization must acquire assets to support the programs. In fact, each business program has a mission, subprograms, and assets. All assets need protection from misuse and harm. Enter the security program.
The security program also has a mission, subprograms, and assets, like any other business program. One of those programs is the electronic component high-tech systems, of which there may be several, including electronic security systems and information technology security systems.
Uniform Application of Security Policies In order to get consistent results, it is imperative to use consistent processes and procedures. Imagine how chaotic it would be for a multinational corporation to allow every department at each site in each business unit to perform their accounting using their own choice of different software programs and different accounting techniques.
It is also unwise for any organization to allow its business units and individual sites to establish their own individual security policies and procedures, guard-force standards, etc. Enterprise-class security systems provide the platform for the uniform application of enterprise security policies across the entire organization.
What follows, then, can be better management when that information is made available to management in a cohesive way.