CLASSIFIED
Professional
Certifcation Programs
whether it's a door status monitor or request to exit traffic,
will assist with this process.
Coordinating among multiple parties
In most instances, the move to an enterprise system will
involve coordination among multiple parties — departments, facilities and vendors. It is crucial to communicate
clearly with all internal and external groups involved,
including key integrators, the IT department and others.
The integrators will be called in to install the various
applications ranging from fire and security to CCTV, intrusion and visitor management. Your IT team can assist with
the move to a virtual environment and will monitor these
needs during the process.
One other element to consider is employing an additional service team to perform a premigration audit of all your
existing systems. This team would assess rogue inputs and
outputs or any other errors in the system, such as potential
problems in your database.
This audit can identify hidden information not logged to
the journal, broken hardware, credentials that may not have
been moved from one system to another, and other servicerelated reports.
Creating a team
As we've stated from the start, migrating successfully is
all about having a plan. And having a plan is all about setting up a team. Determine who will be on the team, who
will set up the plan to migrate data from your existing
access control systems to the enterprise solution, and who
will maintain the system and data once it's up and running.
Ideally, the team should involve human resources, security operations, IT and server management. Once you
create the team, assign task owners. This information
should be clearly documented in a master schedule, which
also defines the deliverables for each team member. Doing
this will allow you to determine any issues that may arise,
which can be stored separately until identified and an
import solution is put into place to properly handle the
update of personnel and credentials.
The International Foundation for Protection Offcers provides
recognized credentialing programs. Experienced security
professionals with a demonstrated knowledge of protection
concepts and practices may attain one of the following
designations: Certifed Protection offcer (CPO); Certifed in
Security Supervision and Management (CSSM); Certifed
Protection Offcer Instructor (CPOI). Foundation membership
for individuals and corporations is also available. IFPO provides
unsurpassed cost savings on an array of educational and
training programs offered by the Foundation and our affliates. Pave
the way to professional development.
Visit www.ifpo.org
or contact adminifpo@earthlink.net
or call 239-430-0534 today!
Request information: www.securityinfowatch.com/10214049
ADVERTISER'S INDEX
Advertiser
Page #
Website URL
Allegion ............................................ 1,11,15 .....www.securityinfowatch.com/11248017
Altronix ................................................ 22 .........www.securityinfowatch.com/10212790
Avigilon ................................................. 5 ..........www.securityinfowatch.com/10215735
Axis Communications .......................... 2 ..........www.securityinfowatch.com/10212966
Comnet................................................. 23 .........www.securityinfowatch.com/10215705
DSX Access Control Systems ............. 43 .........www.securityinfowatch.com/10214208
HID Global Corporation ....................... 44 .........www.securityinfowatch.com/10213866
Honeywell Security Group ................... 3 ..........www.securityinfowatch.com/10213896
IFPO ...................................................... 41 .........www.securityinfowatch.com/10214049
March Networks................................... 7 ..........www.securityinfowatch.com/10214308
Mission 500 ...................................... 36-37 ......www.securityinfowatch.com/10487869
NVT/Network Video Technologies ...... 35 .........www.securityinfowatch.com/10214493
Prime Communications, Inc. ............... 9 ..........www.securityinfowatch.com/11267213
The Sage Group ................................... 33 .........www.securityinfowatch.com/10712716
Security Specifers .............................. 41 .........www.securityinfowatch.com/10300750
This directory is provided as a service. Publisher assumes no liability for errors and/or omissions.
Preparing for the unknown
The final issue to address is preparing for the unexpected. Not easy, of course, but critical nonetheless if the
desired outcome is a successful migration. By fully understanding the system and everything surrounding it, you
are better prepared for potential problems. So be aware of
firewalls, virus protection, malware, backups, data sources,
desktop policies, upgrade policies and the like.
The preaudit of all hardware components will help determine a part of this. So have a plan in place and know what
details you want to include ahead of time.
Now you are ready to proceed with your migration,
knowing you have the tools in place to launch your project
and see it through to completion. ❚
Jason Ouellette is director of Product Management, Tyco
Security Products. He can be reached at jouellette@tycoint.com.
Request information: www.securityinfowatch.com/10300750
www.SecurityInfoWatch.com
SECURITY TECHNOLOGY EXECUTIVE • November/December 2013
41