Security Technology Executive

APR 2013

Issue link: https://securitytechnologyexecutive.epubxp.com/i/118926

Contents of this Issue

Navigation

Page 23 of 59

ENTERPRISE SECURITY All photos courtesy Winsted (www.winsted.com) By David G. Aggleton, CPP, CSC Best Practices for SOC Design If many workstations need to see the same video images, a video wall may be preferable; however, few dedicated screens at each workstation still makes sense. Tips for planning and deploying an in-house Security Operations Center F aced with the decision to stay in-house or used a managed services provider, many large organizations have decided to keep security under their own roof and build their own Security Operations Center (SOC) to correlate events and centralize all security monitoring and functions. There may be unique business requirements that require a dedicated, ���proprietary��� SOC ��� such as a casino or very large campus environment ��� or there may be cost drivers that indicate the need for an in-house SOC. The adjective ���proprietary��� is used in the security industry to describe a number of different attributes ��� some good and some not as much. In this context, it refers to an SOC located at the user���s premises (in contrast to a commercial central alarm station) and usually owned and operated by the user. Building an in-house SOC presents a myriad of challenges, and many security groups struggle on how to best start. This article outlines the design criteria to be considered in the development of a proprietary security systems monitoring and administration environment. The user could be a landlord or tenant and the SOC could be responsible for multiple tenants or for many locations of a single company. Location, Location, Location The monitoring location can either be the pride of the physical security operation, or a space more reminiscent of the Black Hole of Calcutta. Its attributes usually depend on the importance given to security within the organization. A number of years ago, it was 24 SECURITY TECHNOLOGY EXECUTIVE ��� April 2013 The selection and layout of the equipment required at each station will help to determine station size and the final space requirements with the architect. argued in a court case that an organization had not given security the prominence that it should since the security operation was located in the building basement. The counter argument is that the SOC needs to remain operational throughout a myriad of threat scenarios and may be best located in a more secure environment, away from traffic. It should be remembered that efficiency and productivity are related, and that security���s image can be enhanced by a well-designed work environment. In addition, the security department will demand more respect when it projects a positive image, rather than one that lives in a cluttered hole-in-the-wall. The SOC www.SecurityInfoWatch.com

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Technology Executive - APR 2013