Moving to an integrated security environment
It is easy to see the real business value of an integrated security approach, but bringing the vision to reality can be daunting; yet, there are steps companies can take to move toward an integrated security environment. The most important first step is completing a security lifecycle assessment that takes into consideration the synergy between the people, process and technology. The lifecycle assessment follows a chronological progression through eight stages that occur in most security environments — from determining business objectives at the beginning to post-event analysis and reporting at the end.
At various points along the stages in the lifecycle, security professionals, in coordination with facility stakeholders, can answer basic questions that are crucial to guaranteeing effective protection of the organization:
• What needs protecting: people, property or data?
• How are the people or assets potentially vulnerable?
• What forces are likely to attack the organization?
• How would such an attack be executed?
• How would such an attack be detected?
• How should our organization respond to an attack or disruption to business (e.g., in the case of natural disaster)?
• What reports are required to meet regulations or protect the organization from legal liability in the
case of an adverse event?
• How should security technology be deployed to support this?
Integrated security in action
Integrated security works on a variety of different levels — from entire cities to a single manufacturing plant. For example, for a city that is suffering from an already overcrowded roadway system and stressed police network with an anticipated population growth of more than 7 percent, it implemented an integrated security approach that included high resolution day/night cameras, additional video storage capabilities and automated service dispatch SMS. As a result, the approach delivered a 99.9 percent uptime and a 270-percent increase in enforcement revenue over a multi-year period.
Another example is a manufacturing plant whose production line would not start without the proper number of qualified workers in place. By integrating optical turnstiles equipped with credentialing capabilities, the likelihood of costly product defects or disruptions in the manufacturing process was greatly decreased.
Video surveillance can serve dual functions in retail and transportation — securing the environment and also ensuring efficient traffic flow of people, baggage or cargo on escalators, in baggage handling carousels, or on surrounding roadways and in parking facilities.
As these examples highlight, an integrated security model is relatively easy to implement — it is a matter of simply thinking about security differently and understanding how integrating the technologies can go above and beyond protecting assets to become a way to achieve gains in efficiency, productivity and profitability.
The technology and services already exist to help make your security and building efficiency goals a reality, whether starting from scratch or building from an already established security framework.