Find news and information for the executive corporate security director, CSO, facility manager and assets protection manager on issues of policy, products, incidents, risk management, threat assessments and preparedness.
Issue link: http://sdi.epubxp.com/i/751434
November 2016 www.SecurityInfoWatch.com / Security Dealer & Integrator 21 even thought of that.' Now you have to unravel a lot of what you already did to get the system to work the way they wanted it to work in the first place." Another vital component of enter- prise security planning is establish- ing a point person on the end-user side of the table. As most integrators know, there is a much more complex stakeholder environment in an enter- prise-class deployment than a sin- gle-site, with a broader mix of person- nel that may include HR, corporate security, compliance and certainly IT. "You have all of these different people who oen don't report up to the same channels, so there is no apparent hier- archy for decision-making," Boethel explains. "You have to build a consen- sus; thus, you need a champion on the customer/end-user side who can get you the answers you need in an effi- cient way so it doesn't bog down the process. You have to find the right bal- ance of someone who is high enough up in the organization who can make some decisions and really maintain the momentum of the project without a lot of bureaucracy, but also someone who's not so high up that they are discon- nected from the everyday business." Boethel admits that finding that person is "more art than science." at said, he stresses it is something that an integrator must demand out of enter- prise clients. 2 Make technology choices as simple and uniform as possi- ble, while keeping the future in mind. Most integrators do the majority of their work in access con- trol, intrusion detection and sur- veillance, with fire & life safety and emergency communications added as part of a core offering. When dealing with multiple sites and facilities that all need to communicate back to a central location – typically a Global Security Operations Center (GSOC) – it is important to keep technologies as uni- form as possible across each facility. "You don't want to be using four differ- ent brands of card readers or locks – it is just too hard later on when you are trying to troubleshoot or perform ser- vice and maintenance of the system," Kuhn says. Obviously, service and maintenance is a key consideration for integrators in an enterprise system – what integrator would be happy with simply installing a sprawling security system and then walking away without taking advan- tage of the RMR that comes from con- tinuing service and maintenance? "We don't want our local technicians to use their own judgment and/or creativity in how they program a system," Kuhn says. "We try to keep it as consistent as possible across all the sites, so if we start getting alarms or problems coming into a GSOC, we immediately understand what's going on, and we don't have to ask a lot of questions." A common misconception is that a large enterprise system is a sure can- didate for bleeding-edge technology; in fact, both integrators say that the use of newer technologies such as 4K and panoramic cameras, for example, are done much more on a case-by- case, application-specific basis. "ere are some great new technologies out there, but you have to look specifically at how the client wants to use them," Kuhn explains. "Take panoramic – if you are looking at a stadium environ- ment or a large, open common space, the products work; but if you are look- ing at an office building or a hallway corridor entrance, you are not going to need that level of technology. A stan- dard 3MP camera is going to give you everything you need and then some." at said, Boethel is seeing a change in the threat/risk profile for enterprise clients, with a much greater focus on responding to active shooter scenarios. "We have seen a high degree of inter- est of late in gunshot detection," he explains. "It used to be workplace vio- lence and internal the were the top two threat profiles...today, an active shooter scenario is what keeps people up at night, and being able to prevent that is extremely difficult, if not impos- sible. Most end-users are focusing on how to effectively and quickly respond In today's world of enterprise solutions, you can't send a guy that was putting in a burglar alarm system that morning to go plug into a customer's network." — Convergint Technologies' Mike Kuhn