New Technology Challenge: Equipment Demonstrations

demo

It’s important to set clear system performance expectations when contemplating a system upgrade or replacement.

Equipment demonstrations can take place at a variety of technical levels:

  • Tabletop
  • Proof of Concept
  • Pilot Program

Tabletop Demonstration

A tabletop demonstration is the most basic way for a security director to see a system first-hand. In some cases, this is all the director needs to see the new technology and envision how it will be deployed as part of the overall security strategy. However, many systems require a deeper-dive to fully understand the technology, how it operates, how it integrates into other systems, and how it performs during an emergent situation as part of an emergency response plan.

Proof of Concept

A proof of concept demonstration is an on-site simulation of a user-specific situation. For example, the demonstration of a new surveillance camera may need to be performed during the night or in harsh weather. Such specific environmental circumstances cannot be replicated during a tabletop demonstration in a conference room.

Pilot Program

A pilot program is the ultimate proof of concept. Hardware and/or software are deployed on location and evaluated for a set period within an isolated part of the facility. Stakeholders can witness the system operating at all times in a variety of environmental and operational conditions. For example, a perimeter intrusion detection system can be deployed on a few sections of fence to demonstrate performance in varying temperatures, wind, and precipitation.

Bottom Line: Partnership

It is always reasonable to expect a demonstration of system functionality before a purchase.  A reputable security integrator will provide an appropriate system demonstration, often in conjunction with the manufacturer’s technical representative.

You can count on Securitronics to provide expert advice for your most demanding safety and security concerns. We are dedicated problem-solvers, always ready to use new and innovative technologies to develop your plan and secure your property, assets, and personnel. Our goal is to build long-term, lasting partnerships of absolute trust and personalized services with the most skilled and talented security professionals.

Contact Securitronics today. 800.795.3747

New Technology Challenge: Vendor Competency

technology

It’s important to set clear expectations. Some vendors can perform a Security Vulnerability Assessment (SVA), for example, while others more suited to hardware installation. And when new technology is on the horizon, it’s important to review vendor roles and responsibilities.

Security Vulnerability Assessment

SVAs are performed by companies, usually licensed or certified to do so, that are highly skilled with surveys involving combined technologies. They compare the current system to a set of expected and potential risks. SVAs can be performed once or on a scheduled basis, depending upon changes that modify risk.

Site Survey

Site surveys typically follow an SVA as part of an overall security deployment strategy by technology experts in one or more specific technical fields. For example, a security integrator may bring a manufacturer’s representative to a facility to assist with a site survey. The technologies required to secure a facility are complex; however, the individual site survey is not likely to consider all aspects of the organization’s risk like an SVA.

Demonstration

Following a site survey, the technical experts from the manufacturer and integrator may perform a system demonstration for the Security Director. This is an opportunity to evaluate the proposed system prior to purchase, ensure that it fits within the SVA-recommended security strategy, and demonstrate that the system functions within the organization’s operational and emergency response plan.

System Design

Once the demonstration is complete, and expectations are set, the security integrator will create a complete system design with assistance from the equipment manufacturer.

Installation

Following final design approval and system purchase, the security integrator will install the system.

Maintenance

Once installed, the system must be continually maintained. Most installation teams are responsible for maintenance as well, but some integrators have dedicated maintenance teams.

Bottom Line: Partnership

A security system is only as reliable as the weakest link in the project team. A qualified security integrator will clearly outline project performance expectations in conjunction with the Security Director. These expectations must satisfy the end-user’s expectations of integrator responsibility and involvement. Installation and maintenance teams should be regularly attending classes and obtaining pertinent certifications. The security integrator’s project management and sales teams must be well versed in modern technologies and should be able to anticipate the needs of the end user.

You can count on Securitronics to provide expert advice for your most demanding safety and security concerns.

Our Solutionists are dedicated problem-solvers, always ready to use new and innovative technologies to develop your plan and secure your property, assets, and personnel. Our goal is to build long-term, lasting partnerships of absolute trust and personalized services with the most skilled and talented security professionals.

Contact Securitronics today. 800.795.3747