Security Technology Executive

MAY-JUN 2016

Issue link: https://securitytechnologyexecutive.epubxp.com/i/690996

Contents of this Issue

Navigation

Page 20 of 91

May/June 2016 • SECURITY TECHNOLOGY EXECUTIVE 21 www.SecurityInfoWatch.com effective standardization of systems and tech- nology throughout the world. "I think that some of our security vendors are still struggling with being truly global, and they operate in a silo," she says. "Wherever possible, we do attempt to leverage the arrangements and relationships we already have. We try to use standard products, standard installation and design protocols." Taking these steps helps the security team suc- cessfully stay current with its systems. "We have a couple of major elements that allow us to have a holistic risk methodology related to our tech- nology implementation," Cowie says. "One of the more important elements is our global standard- ization program that outlines the various ele- ments of site and personnel security." Extending the Security Model This holistic model of security and risk extends to the company's strategic growth into global markets in South America and the Pacific Rim. This is where Cowie, Ellis and Assistant Director –Personnel Security Pete Lowell quickly realized that in order to have the infrastructure in place for a successful global security organization, they needed to integrate both technology and human ONE SYSTEM ONE PROVIDER ONE SOLUTION FLIR NOW PROVIDES: · End-to-end security solutions for any application · Open platform for easy integration of third party technologies and cameras · The widest range of thermal and visible products, including on-board analytics FLIR's unparalleled range of visible and thermal security cameras–combined with the acclaimed Latitude VMS–makes it easier than ever to create a fully integrated security system. FLIR.COM/PROSECURIT Y ® Request information: www.SecurityInfoWatch.com/10213696 ' Identifying the foundational elements of a proactive security and risk department, then applying a holistic risk-based model and standards has made Principal's process one to emulate. ' resources in that infrastructure to best serve the needs of all domestic and international employ- ees, clients and staff. It was determined that the most practical infrastructure model would split out site security and personnel security as its two major compo- nents. "We took the holistic view that if a func- tion of the Global Security department related to security of buildings — 'brick and mortar' — it should fall into the area of site security," Lowell explains, adding that site security would include electronic systems like access control, locks, CCTV and security officer operations. "If the function related to the security of peo- ple, then it would strategically fall into the area

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Technology Executive - MAY-JUN 2016