Deploying a New Security System: A 3-Part Series

Deploying a new security system is quite different from adding onto or upgrading an existing system, however some concepts do remain the same. In this three-part series, we explore the three key components of new security system deployments:

  • Part 1: Expectations and Consultation
  • Part 2: Demonstration
  • Part 3: Deployment

Deploying a New Security System Part 1: Expectations and Consultation

Stakeholders have widely different interactions with, and expectations from, a new system.

Internal Stakeholder Considerations

Administrators want the system to be a deterrent, to control the flow and access of personnel and guests, and to preserve evidence. And they want all of this to assist all departments within a reasonable budget.

Human resources may want to use the system to enroll new personnel and provide appropriate facility and sensitive space accessibility to staff. They may also use the evidence collected by the system to create and demonstrate an event timeline for an HR violation.

The IT department will want a system that is easy to manage on their network infrastructure. They’ll likely be tasked with managing the storage devices and computer workstations for the new system.

The security team will need a system that provides comprehensive security capabilities, operates reliably, and is user-friendly.

The financial team wants the system to be affordable and the recurring expenses predictable, while satisfying the expectations of the other stakeholders.

Cyber security affects all stakeholders. Security device vulnerability can cause two primary problems for an organization. Firstly, a vulnerable security device can be the weak link in a security solution, allowing wrongdoers to exploit the weakness to overcome the security shield. Secondly, a cyber-vulnerable security device can be a bridge to other systems running on the IT network, compromising intellectual property, operational data, and even personal information. So, choosing a solution with a safe software/firmware system and a reliable track record will be important.

3rd Party Expert Consultation

Defining “security system” is vital. One person may understand a security system to be an alarm system, while another may understand it to mean video surveillance cameras. There are many systems to consider as part of an overall security solution.

Hiring a security consultant and/or performing a comprehensive security vulnerability assessment is a highly recommended part of the process. External consultation provides an independent review of an organization’s vulnerabilities and recommends how to best protect them.

Local, state, and federal laws and regulations are considered in addition to the expectations of the key stakeholders. Depending on your facility type, the materials located there, and the types of systems you’re deploying, various government agencies may have specific requirements for your system. Local agencies, like the fire marshal, and federal agencies, like the Department of Homeland Security, both have specific security solution requirements.

A consultant will also consider best practices for similar organizations and facilities. Their recommendations will best meet all expectations and legal requirements.

Our societal norm is to research personal and business solutions online. It’s important not to jump to conclusions with personal online research; however, it is important to become an educated consumer. Using a 3rd party consultant will ensure that your research is supplementing professional, expert advice.

System Integration

Properly integrated systems will streamline the solution, allowing users to minimize confusion and maximize efficiency. Workspaces remain uncluttered and system operation is simplified with fewer keyboards, mice, intercom microphones, and other desktop devices. For example, an integrated solution may involve a single workstation, operated by one person, that provides surveillance camera feeds, access control, intrusion alerts, and voice communication with one graphical user interface (GUI).

System compatibility will need to be evaluated when considering an integrated solution. Many systems can be integrated using industry standards such as ONVIF, while others must have custom integration code, which may take more time and increase the cost of the system.  Expert advice is highly recommended at this level of complexity.

You can count on Securitronics to provide expert advice for your most demanding safety and security concerns. We are dedicated problem-solvers, always ready to use new and innovative technologies to develop your plan and secure your property, assets, and personnel. Our goal is to build long-term, lasting partnerships of absolute trust and personalized services with the most skilled and talented security professionals.

Contact a Solutionist @ Securitronics today. 800.795.3747