Security Technology Executive

APR 2013

Issue link: https://securitytechnologyexecutive.epubxp.com/i/118926

Contents of this Issue

Navigation

Page 56 of 59

ADVERTISER'S INDEX Advertiser Page # Website URL Altronix ............................................................ 27 .............www.securityinfowatch.com/10212790 ASIS International ........................................... 35 .............www.securityinfowatch.com/10484004 Assa Abloy Inc. ................................................. 7 ..............www.securityinfowatch.com/10212899 Avigilon ............................................................ 21 .............www.securityinfowatch.com/10215735 Axis Communications ...................................... 2 ..............www.securityinfowatch.com/10212966 BCD Video ........................................................ 19 .............www.securityinfowatch.com/10455642 Comnet............................................................. 23 .............www.securityinfowatch.com/10215705 Dortronics Systems, Inc.................................. 47 .............www.securityinfowatch.com/10213494 DSX Access Control Systems ......................... 59 .............www.securityinfowatch.com/10214208 FLIR Systems, Inc. ........................................... 17 .............www.securityinfowatch.com/10213696 Genetec ............................................................. 9 ..............www.securityinfowatch.com/10213771 HID Global Corporation ................................... 60 .............www.securityinfowatch.com/10213866 Honeywell Security Group ............................... 3 ..............www.securityinfowatch.com/10213896 Ingersoll Rand Security Technologies ......... 1, 11 ...........www.securityinfowatch.com/10215684 Inovonics ......................................................... 33 .............www.securityinfowatch.com/10213994 IQinvision ......................................................... 25 .............www.securityinfowatch.com/10214086 ISC West........................................................... 41 .............www.securityinfowatch.com/10823593 Linear Corp. ..................................................... 15 .............www.securityinfowatch.com/10215766 Mercury Security Corp. ................................... 13 .............www.securityinfowatch.com/10214361 MorphoTrak ..................................................... 43 .............www.securityinfowatch.com/10215933 Morse Watchmans .......................................... 31 .............www.securityinfowatch.com/10214428 PSA Security Network..................................... 45 .............www.securityinfowatch.com/10214742 Samsung Techwin America ............................. 5 ..............www.securityinfowatch.com/10215711 Secured Cities ................................................. 51 .............www.securityinfowatch.com/10752984 Security Specifiers .......................................... 53 .............www.securityinfowatch.com/10300750 Videx ................................................................ 39 .............www.securityinfowatch.com/10215538 SOC Design (continued from page 27) Equipment that requires frequent manipulation, such as a keyboard, mouse, PTZ control, audio volume adjustment, and a telephone dial pad, must be reachable without undue Figure 2 28 SECONDARY (Maximum) 24 SECONDARY (Emergency & Precise Adjustment) 20 16 12 PRIMARY Desktop 8 4 0 20 18 12 8 4 0 4 8 12 8 20 CONTROL REACH strain. Figure 2 shows the typical limits of reach. Items that require the most frequent reach ��� keyboard and mouse, for example ��� should be located in the primary area. If alarm monitoring is the workstation���s priority, the annunciation screen should be centralized in the primary field of view, and the keyboard for alarm acknowledgement and response logging should be within easy reach for typing. All regularly used control switches, such as those for door locks and gate operation, should be reachable without the operator having to bend and stretch. For example, a gooseneck microphone www.SecurityInfoWatch.com CLASSIFIED Professional Certifcation Programs The International Foundation for Protection Offcers provides recognized credentialing programs. Experienced security professionals with a demonstrated knowledge of protection concepts and practices may attain one of the following designations: Certifed Protection offcer (CPO); Certifed in Security Supervision and Management (CSSM); Certifed Protection Offcer Instructor (CPOI). Foundation membership for individuals and corporations is also available. IFPO provides unsurpassed cost savings on an array of educational and training programs offered by the Foundation and our affliates. Pave the way to professional development. Visit www.ifpo.org or contact adminifpo@earthlink.net or call 239-430-0534 today! Request information: www.securityinfowatch.com/10214049 enables the operator to speak in a calm, clear voice without having to lean forward or shout. If the priority is video surveillance monitoring, any pan, tilt and zoom controls should be close at hand. Camera views for alarm assessment can be relegated to secondary positions. SOC Layout Nearly all of the previous tips have been related to individual monitoring and control stations. The overall SOC layout is a function of the number of workstations. In a large SOC, a video wall may provide common display of camera images for all workstations to see. A supervisor���s station is placed behind the others and, if possible, on a raised platform for the best overview of the monitoring and control functions. There are other functions that may be included in the SOC for situational awareness ��� secondary fire alarm annunciation, elevator controls, weather status display, and news and traffic reports. SOC design should consider all potential information sources for the optimum operation of the security function. ��� David G. Aggleton, CPP, CSC, is president of Aggleton & Associates (www.aggleton. com). He is actively engaged in the design of SOCs as a component of security technology solutions to mitigate risk & vulnerability since 1978. He can be reached at dave.aggleton@aggleton.com. Analyzing Big Data (continued from page 10) policing and intelligence-led policing (ILP) have evolved, based on methodologies for assembling data from disparate sources and tools such as GIS, applying analysis, and using the results to guide decision making. In moving from a reactive mode to proactive, the hope is effective anticipation, leading to the prevention or response to predicted crime. As these techniques become more refined and proven effective, the increasingly limited dollars available for public safety can be better targeted, including risk-based deployment of resources. There appears to be no shortage of data or statistics, but, until now, these predictive efforts have been limited by available analysis techniques, hindering law enforcement���s ability to interpret and use the data. It is easy to see how big data analytics will also be a major tool in fighting fraud, credit card theft and identity theft. This will no doubt encompass access control data, both physical and network and ultimately affect the way Physical Security Information Management (PSIM) systems are implemented. To sum it up, we���re on the threshold of something BIG. ��� Ray Coulombe is Founder and Managing Director of SecuritySpecifiers.com, enabling interaction with specifiers in the physical security and ITS markets; and Principal Consultant for Gilwell Technology Services. Ray can be reached at ray@SecuritySpecifiers. com, through LinkedIn at www.linkedin.com/ in/raycoulombe or followed on Twitter @ RayCoulombe. SECURITY TECHNOLOGY EXECUTIVE ��� April 2013 57

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Technology Executive - APR 2013