4 FM quick reads on security
1. Multitenant Buildings Have Multiple Security Needs
This is Casey Laughman, managing editor of Building Operating Management magazine. Today's tip is that multitenant buildings have multiple security needs.
Things can get sticky when it comes to securing multitenant office buildings. That's because the security systems building owners install for the base building must meet not only the owners' needs, but also the expectations of tenants.
To prevent problems, focus on more than technology. One key to security in multitenant buildings is also the oldest, lowest-tech option available: Talking. Experts say that good communication between owner and tenants is the foundation for effective security in multitenant office buildings. Newcomb & Boyd associate partner David Duda says that one reason communication is so important is that different tenants often want different levels of security, says David Duda, associate partner at Newcomb & Boyd. While some may want significant screening of visitors and deliveries, others may have little concern for screening.
If those tenant desires aren't well understood and considered, the owner runs the risk of inadvertently causing tenant dissatisfaction. Face to face communication can go a long way toward alleviating problems.
As an example, government buildings frequently contain several government departments or agencies, and these tenants may well have different needs and require different systems. What's more, the tenant systems often communicate with different locations off-site. A common challenge is getting information needed to design the security system from the different entities in a timely manner.
Duda says one solution is a "security summit meeting" that pulled together representatives from each government department and agency involved in the project. He says his team mounted floor plans for each area on the walls of the conference room and went from tenant to tenant and floor-by-floor through the building until they had the information needed to implement the specific security measures in each area.
2. How to Select a Security Vendor
This is Casey Laughman, managing editor of Building Operating Management magazine. Today's tip focuses on how to select a vendor for a security system.
Once all the preliminary groundwork has been laid for a security system, it's time to move on to the vendor selection. The goal at this point is to ensure that each vendor understands the entire scope of the project and that the pricing is submitted in a format that allows for effective review and approval. As well, facility managers need to verify that the vendor is qualified to install, maintain and support the system.
In a pre-bid meeting, facility managers meet with prequalified integrators that have proven capability of installing security systems in the local market. The integrators are provided with a design overview and walkthrough of the facility. This meeting gives vendors the opportunity to submit questions, which should be answered in writing.
Once the bids are submitted, the facility management team reviews them and ensures the design and installation requirements for the specified systems are met. At this point, it can be beneficial to tour sites where the vendor has already installed systems. This provides an opportunity to review the quality of the work and to spend time with staff from an organization that has used the integrator in the recent past.
Shortlisted vendors are invited to a de-scope meeting to discuss the project in detail with the facility manager. Questions from all parties should be addressed at this meeting and, if appropriate, vendors can resubmit their proposals and pricing. Once the selection is made, it is customary to call each vendor personally with the decision and follow up with an official award notice letter.
3. Conceptual Design Helps Solve Security Setup
This is Casey Laughman, managing editor of Building Operating Management magazine. Today's tip is to use a conceptual design when designing security systems.
The goals of a conceptual design are to understand the current and relevant security systems, policies, procedures and responses. As well, facility managers need to understand future expectations and requirements of the proposed systems, and develop a preliminary design and budget that meets end-user expectations as well as operational, financial and regulatory requirements.
The first step to take in the conceptual design is to conduct an existing conditions survey. During this step, a close examination of the resources and systems currently in place is made. It also documents the currently deployed systems and determines if systems, components and hardware can be reused in the new system.
It is also important to conduct a system needs analysis, for which it will be necessary to research codes, regulations, standards and statutes that may affect the design and implementation of the security systems. Understanding and clearly defining the user needs and expectations is critical. This is best done by completing a "basis of design" document.
Upon the completion of the basis of design document, the team can now move on to the preliminary conceptual design and budget. At this point, appropriate systems and technologies are identified, including access control, CCTV, intrusion detection, monitoring stations, programming stations, and visitor management systems. Advanced systems such as video analytics, facial recognition, and enhanced video review can be added to the design as well.
Facility managers must work closely with the professional security consultant, designer, or engineer and make sure that IT and security department representatives are included in the conversation. The goal is to develop a programming schedule that addresses the needs of the multiple departments. A rough order of magnitude budget is also developed during this phase.
4. Separate Networks Key to Data Center Security Success
A network dedicated exclusively to data center security needs, including video recording and storage and access control of database communications, should be segregated from the existing data center network. Supported by security staff with network training or, at a minimum, an internal network administrator, a dedicated network will enhance reliability and protection, providing immunity from typical network outage windows and improving speed and bandwidth on both networks.
Today's new IP security networks that support video surveillance and access control equipment require 24/7/365 operation and must be managed differently than the typical data network. For example, on a Saturday evening, the data network maybe taken out of service to upgrade the system at a time when the business it is supporting is not in operation; however, the security system must still be operational. If the IP cameras were connected to the data network, there would be no monitoring or recording during the maintenance outage. Employing a separate network and a security team trained in IP capabilities to operate independently from the data network team will enhance network flexibility and provide more robust monitoring and tracking.
For data centers interested in taking surveillance to the next level, video analytics will further enhance security efforts. Video analytics is the practice of using software to automatically identify things of interest without the need for a human operator. On the market since 2005, the most common types of video analytics are perimeter violation, license plate recognition and people-counting. When an algorithm detects an anomaly, it alerts an operator with an alarm to evaluate the situation. In this way, video analytics can actually help avert a situation before it happens instead of going back and reviewing video footage to investigate an incident that already occurred. This can be a valuable tool in protecting the mission critical environment and keeping the data center and its occupants safe and secure. Video analytics software can be embedded into the processor of an IP camera system, allowing for incremental deployment of the analytics systems to locations that require it.
Free E-mail Newsletters Sign-upWeekly Articles
Facility Webcast Alerts
Monthly Digital Magazine
Press Release Archives
Our Content On Your Site
FM Online Tools
- Content Directory
- Site Map
Other Online Resources