4 FM quick reads on security
1. Conceptual Design Helps Solve Security Setup
This is Casey Laughman, managing editor of Building Operating Management magazine. Today's tip is to use a conceptual design when designing security systems.
The goals of a conceptual design are to understand the current and relevant security systems, policies, procedures and responses. As well, facility managers need to understand future expectations and requirements of the proposed systems, and develop a preliminary design and budget that meets end-user expectations as well as operational, financial and regulatory requirements.
The first step to take in the conceptual design is to conduct an existing conditions survey. During this step, a close examination of the resources and systems currently in place is made. It also documents the currently deployed systems and determines if systems, components and hardware can be reused in the new system.
It is also important to conduct a system needs analysis, for which it will be necessary to research codes, regulations, standards and statutes that may affect the design and implementation of the security systems. Understanding and clearly defining the user needs and expectations is critical. This is best done by completing a "basis of design" document.
Upon the completion of the basis of design document, the team can now move on to the preliminary conceptual design and budget. At this point, appropriate systems and technologies are identified, including access control, CCTV, intrusion detection, monitoring stations, programming stations, and visitor management systems. Advanced systems such as video analytics, facial recognition, and enhanced video review can be added to the design as well.
Facility managers must work closely with the professional security consultant, designer, or engineer and make sure that IT and security department representatives are included in the conversation. The goal is to develop a programming schedule that addresses the needs of the multiple departments. A rough order of magnitude budget is also developed during this phase.
Separate Networks Key to Data Center Security Success
A network dedicated exclusively to data center security needs, including video recording and storage and access control of database communications, should be segregated from the existing data center network. Supported by security staff with network training or, at a minimum, an internal network administrator, a dedicated network will enhance reliability and protection, providing immunity from typical network outage windows and improving speed and bandwidth on both networks.
Today's new IP security networks that support video surveillance and access control equipment require 24/7/365 operation and must be managed differently than the typical data network. For example, on a Saturday evening, the data network maybe taken out of service to upgrade the system at a time when the business it is supporting is not in operation; however, the security system must still be operational. If the IP cameras were connected to the data network, there would be no monitoring or recording during the maintenance outage. Employing a separate network and a security team trained in IP capabilities to operate independently from the data network team will enhance network flexibility and provide more robust monitoring and tracking.
For data centers interested in taking surveillance to the next level, video analytics will further enhance security efforts. Video analytics is the practice of using software to automatically identify things of interest without the need for a human operator. On the market since 2005, the most common types of video analytics are perimeter violation, license plate recognition and people-counting. When an algorithm detects an anomaly, it alerts an operator with an alarm to evaluate the situation. In this way, video analytics can actually help avert a situation before it happens instead of going back and reviewing video footage to investigate an incident that already occurred. This can be a valuable tool in protecting the mission critical environment and keeping the data center and its occupants safe and secure. Video analytics software can be embedded into the processor of an IP camera system, allowing for incremental deployment of the analytics systems to locations that require it.