Security Technology Executive

FEB-MAR 2016

Issue link: https://securitytechnologyexecutive.epubxp.com/i/656764

Contents of this Issue

Navigation

Page 28 of 61

February/March 2016 • SECURITY TECHNOLOGY EXECUTIVE 27 www.SecurityInfoWatch.com video recorders and cameras that more effi- ciently use the networks resources, we have been better able to accommodate the special requirements of the campus vertical. H.264 being the one of the main advancements we have brought to the vertical. Palmquist: At the K-12 level, Dancing Moose Montessori School in West Valley City, Utah, has implemented the Milestone platform to monitor classrooms and play areas during the school day. Parents and school administra- tors are interested in the educators' teaching methods, as well as verifying that students are playing safely, behaving nicely and eating well. With Milestone, they have peace of mind. Western Kentucky University has lever- aged their Milestone VMS for many uses beyond security like monitoring traffic flow to determine the safest location for cross- walks and monitoring lab experiments in the science department. Utah Valley University loves monitoring construction sites of new facilities and looking at the video in fast motion, tracking personnel safety, equipment security and progress on the project itself. Kane: Today 's access control systems are doing more than simply granting access: they're integrating with other network-based platforms, such as building management systems, to add more value to capital invest- ments. Students in higher education are con- stantly on the move from one place to anoth- er, leaving security officials tasked with pro- viding safety and security despite constant change. One way that we've addressed this requirement of f lexibility is by integrating event management systems with access con- trol solutions that allow students to reserve rooms in a building using their key card, sav- ing from the hassle of manual data entry by facilities managers. Students are now able to reserve and access rooms through a single reservation system, which allows the university to keep tabs on damage or security issues related to this access. Additionally, security officials are con- tinuing to look for ways to stay mobile, and these applications are being developed so that officials can manage the university's security infrastructure from anywhere on campus. Faenza: We have seen a rapid increase in deployments of Wi-Fi across a range of cam- pus security projects. Wi-Fi is a great option in locations where it is difficult or cost-prohib- itive to install a wired solution. Without the need to run cable you significantly decrease installation time, costs, and disruption to the school. In addition, this allows schools to take advantage of their existing wireless infrastruc- ture. I strongly believe we will continue to see a significant number of institutions deploy this technology in future projects, especially as they are able to see it successfully used at other schools in their region. Ost: At Pelco, we have dedicated resources to suppor t Special Modification Requests (SMR). Nearly all camera domes , hous - ings, and mounts can be customized to help blend into any environment. Color matching is one of the most popular services, involv- ing matching powder-coat paint to the wall or environment where the camera and mount will be applied. Another option is to wrap the product in a pattern. Wraps are perfect for brick, granite and marble surfaces. The Pelco by Schneider Electric manufacturing facil- ity allows significant product modifications. Mounts can be modified to a custom length, designed to support multiple cameras, or view around obstructions. Special Modification Requests are available for large scale and even the smallest projects. Berg: Adaptability is the number one require- ment for the campus environment. The very nature of the stakeholders, assets and environ- ments to be secured require a unique approach to planning and implementation. Whether identifying means to generate revenue via visual emergency notification appliances to improve ROI or customizing command and control solutions that provide facility, opera- tions and IT based monitoring and response in order to reduce complexity and improve over- all response via a common operating platform. Adaptations must be made in the way inte- grators engage and partner with each unique campus. We must develop open and honest relationships with security directors and have candid conversations about their vision for their campus' security plan. We must become advocates of their agenda within the leader- ship of their campus and identify the potential for inter-departmental partnership opportuni- ties. This adaptable approach creates an envi- ronment in which individual departmental projects can be converged into campus-wide programs that foster collaboration in technol- ogy and budgeting. ■ "Today's access control systems are doing more than simply granting access; they're integrating with other network-based platforms, such as building managment systems, to add more value to capital investments." — Mitchell Kane, President, Vanderbilt Industries

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Technology Executive - FEB-MAR 2016