Security Technology Executive

NOV-DEC 2013

Issue link: https://securitytechnologyexecutive.epubxp.com/i/229956

Contents of this Issue

Navigation

Page 40 of 71

CLASSIFIED Professional Certifcation Programs whether it's a door status monitor or request to exit traffic, will assist with this process. Coordinating among multiple parties In most instances, the move to an enterprise system will involve coordination among multiple parties — departments, facilities and vendors. It is crucial to communicate clearly with all internal and external groups involved, including key integrators, the IT department and others. The integrators will be called in to install the various applications ranging from fire and security to CCTV, intrusion and visitor management. Your IT team can assist with the move to a virtual environment and will monitor these needs during the process. One other element to consider is employing an additional service team to perform a premigration audit of all your existing systems. This team would assess rogue inputs and outputs or any other errors in the system, such as potential problems in your database. This audit can identify hidden information not logged to the journal, broken hardware, credentials that may not have been moved from one system to another, and other servicerelated reports. Creating a team As we've stated from the start, migrating successfully is all about having a plan. And having a plan is all about setting up a team. Determine who will be on the team, who will set up the plan to migrate data from your existing access control systems to the enterprise solution, and who will maintain the system and data once it's up and running. Ideally, the team should involve human resources, security operations, IT and server management. Once you create the team, assign task owners. This information should be clearly documented in a master schedule, which also defines the deliverables for each team member. Doing this will allow you to determine any issues that may arise, which can be stored separately until identified and an import solution is put into place to properly handle the update of personnel and credentials. The International Foundation for Protection Offcers provides recognized credentialing programs. Experienced security professionals with a demonstrated knowledge of protection concepts and practices may attain one of the following designations: Certifed Protection offcer (CPO); Certifed in Security Supervision and Management (CSSM); Certifed Protection Offcer Instructor (CPOI). Foundation membership for individuals and corporations is also available. IFPO provides unsurpassed cost savings on an array of educational and training programs offered by the Foundation and our affliates. Pave the way to professional development. Visit www.ifpo.org or contact adminifpo@earthlink.net or call 239-430-0534 today! Request information: www.securityinfowatch.com/10214049 ADVERTISER'S INDEX Advertiser Page # Website URL Allegion ............................................ 1,11,15 .....www.securityinfowatch.com/11248017 Altronix ................................................ 22 .........www.securityinfowatch.com/10212790 Avigilon ................................................. 5 ..........www.securityinfowatch.com/10215735 Axis Communications .......................... 2 ..........www.securityinfowatch.com/10212966 Comnet................................................. 23 .........www.securityinfowatch.com/10215705 DSX Access Control Systems ............. 43 .........www.securityinfowatch.com/10214208 HID Global Corporation ....................... 44 .........www.securityinfowatch.com/10213866 Honeywell Security Group ................... 3 ..........www.securityinfowatch.com/10213896 IFPO ...................................................... 41 .........www.securityinfowatch.com/10214049 March Networks................................... 7 ..........www.securityinfowatch.com/10214308 Mission 500 ...................................... 36-37 ......www.securityinfowatch.com/10487869 NVT/Network Video Technologies ...... 35 .........www.securityinfowatch.com/10214493 Prime Communications, Inc. ............... 9 ..........www.securityinfowatch.com/11267213 The Sage Group ................................... 33 .........www.securityinfowatch.com/10712716 Security Specifers .............................. 41 .........www.securityinfowatch.com/10300750 This directory is provided as a service. Publisher assumes no liability for errors and/or omissions. Preparing for the unknown The final issue to address is preparing for the unexpected. Not easy, of course, but critical nonetheless if the desired outcome is a successful migration. By fully understanding the system and everything surrounding it, you are better prepared for potential problems. So be aware of firewalls, virus protection, malware, backups, data sources, desktop policies, upgrade policies and the like. The preaudit of all hardware components will help determine a part of this. So have a plan in place and know what details you want to include ahead of time. Now you are ready to proceed with your migration, knowing you have the tools in place to launch your project and see it through to completion. ❚ Jason Ouellette is director of Product Management, Tyco Security Products. He can be reached at jouellette@tycoint.com. Request information: www.securityinfowatch.com/10300750 www.SecurityInfoWatch.com SECURITY TECHNOLOGY EXECUTIVE • November/December 2013 41

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Technology Executive - NOV-DEC 2013