SlideShare a Scribd company logo
1 of 45
Download to read offline
School
Safety
Improving Physical Security
On Your Campus
Today’s
Panelists Jeremy Beard
Physical Security
Technical Specialist
LENSEC
Mark Mabee
Physical Security
Technical Specialist
LENSEC
Webinar
Logistics
• Q&A at the end
• Questions for the panelist
• Audio from attendees muted
• Poll questions
• Survey
Webinar
Sponsor
About LENSEC
• Based in Houston, TX
• Since 1998
• IP Video Management
Solutions
• System Design
• Installation & Project
Management
• TCPN Contract #R5230
Perspective Video Management Software (VMS) ™
LENSEC is committed to empowering our clients and partners to prevent or mitigate
physical security risks. We want to help protect people and assets as well as improve
operations through our evolutionary and intuitive technology. We can do this by
providing expertise in security and software development.
Our Mission
The TCPN Difference
• TCPN is a national governmental purchasing cooperative
• TCPN has a single lead agency - Region 4 Education Service Center
• Ensures consistent bidding and monitoring processes on all TCPN contracts
• Awards competitively bid contracts that must meet state procurement laws and regulations
• Facilities Team & Commodities Team
- Dedicated to TCPN Facilities Solution Contracts
- Regional Program Managers
• Compliance - TCPN Certified Proposal Number System
- Pricing Verification
• Contracts - 270+ best in class vendor contracts
- Transparency of solicitation due diligence 24/7
Why TCPN?
Training
Goal
Improving Physical Security
On Your Campus
• IP Vs. Analog Cameras & Equipment
• Network Equipment
• Security Integrator
• Video Surveillance Techniques
• Standardizing Your Security Platform
• Security Policy / SOP / Integration
• Designing & Planning For Your Needs
• Successful Implementation Tips
Poll
Question
What types of cameras do
you have at your facility?
• Quality
• General Detail
• High Detail
• Forensic Detail
IP Vs. Analog Cameras & Equipment
• Cheap or Good
• Cameras
IP Vs. Analog Cameras & Equipment
IP Vs. Analog Cameras & Equipment
• Cheap or Good
• DVRs
• NVRs
• You Get What You Pay For
• Defending Against Bad Components & Software
IP Vs. Analog Cameras & Equipment
• Traditional PTZs vs. Megapixel Cameras
• Moving Parts
• Blind Spots
720x480
IP Vs. Analog Cameras &
Equipment
• Panoramic Cameras
• 180° / 360°
• Cost Savings
• Camera Licensing
IP Vs. Analog Cameras &
Equipment
• Panoramic Cameras
• Quad View
• Simulating 4 Cameras
IP Vs. Analog Cameras & Equipment
• Thermal Cameras
• Viable Detection
IP Vs. Analog Cameras & Equipment
• Thermal Cameras
Poll
Question
Do you have plans for system
expansion or camera replacement
in the near future?
IP Vs. Analog Cameras & Equipment
• Emerging Technologies
• Internet of Things
• Integration with Physical Security Tools
• Gesture Technology for Access Controls
• Remote Access with Smartphones & Tablets
• Expanding Storage Capabilities
• Cloud Storage
IP Vs. Analog Cameras & Equipment
• Proprietary Equipment
• A Word Of Warning
• Data Transfer Protocols
• Open Source
Network Equipment
• IT Department Involvement
• Early Is Better
• Server & Switches
• Convergence or Stand Alone
• Cabling
• Cat 5E vs Cat 6 Cables
• RG59 or RG6 BNC Cables
Security Integrator
• The Good, The Bad, The Ugly
• Physical Security Equipment Considerations
• Know What You Are Buying
• Warranty / Customer Support / Maintenance
• Equipment Life / Life Cycle Maintenance
• Taking Care Of Equipment When Issues Arise
Video Surveillance Techniques
• Camera Lens Selection
• Zoom Lens
• Manual Zoom
• Optical Zoom
• Digital Zoom
• Megapixel Lens
Video Surveillance Techniques
• Camera Lens Selection
• Field Of View
Video Surveillance Techniques
• Camera Lens
Selection
• Field Of View
http://www.lensec.com/tutorial/calculator.html
• Camera Resolution
• How Does Resolution Affect Picture
Quality?
• How Does Resolution Affect
Bandwidth?
• D1 Cameras
• High Megapixel Cameras
• Bandwidth Calculators
• How Does Resolution Affect Storage?
• Storage Capacity
• Rule of Thumb
• Storage Calculators
http://www.lensec.com/tutorial/calculator.html
Video Surveillance Techniques
Video Surveillance Techniques
• Video Compression
• MJPEG
• Captures Every Single Frame
• H.264
• Conditional Refresh
Video Surveillance Techniques
• Outdoor Camera Considerations
• Auto Iris Lenses
• Anti-fog
• Heaters & Blowers
• IP Rating
• Weatherproof Camera Enclosures
• Waterproof Camera Enclosures
Poll
Question
When is the best time to use
wireless video transmission?
Video Surveillance Techniques
• Wireless Video Transmission
• Remote Areas
• Parking Lots
• Power Availability
• Access to Network
• Point to Point / Point to
Multipoint / MIMO
• Wireless MESH
• Fiber
• Dark Fiber
• What is Fiber
• Do You Need It?
Video Surveillance Techniques
• Motion Video
• Pixel Changes
• Standard Technology
(VMD)
• Advanced Video Motion
Detection (AVMD)
• False Alerts
• FastFind™ Motion Video
Video Surveillance Techniques
• Video Analytics
• Digital Algorithms
• Smart Technology
• True Alerts
• Perimeter Detection
• People Counting
• Often Cost Involved
Video Surveillance
Techniques
• Video Analytics
• Crossing A Line
Video Surveillance
Techniques
• Video Analytics
• Person In Area
Standardizing The Security Platform
• Enterprise Software
• Multi-site Capability
• Remote Streaming To Desktop,
Smartphones & Tablets
• First Responder
• Team Collaboration
• Neighboring Cameras
• Map Navigation
• Thin Client Access
• Eases Installation Process
• Less Taxing on Workstation Resources
• Ditching the Security Monitors
Standardizing The Security Platform
• Integrating Physical Security Tools Into A Unified Security Platform
• Access Control
• Proprietary Issues
• Visitor Management
• Emergency Call Stations
• Entry Intercoms
Standardizing The Security Platform
• Integrating Physical Security Tools Into A Unified Security Platform
• Approach / Planning / SOP
• Electronic Emergency Response Plans
• Training Drills & Exercises
Designing & Planning For Your Needs
• Access Control
• Utilizing Existing Cable
• Rip & Replace
• Cable Type
• Plenum Cable
• Legacy Cameras
• Existing Camera Placement
• Video Encoders
• New Camera Placement
• Considering Blind Spots
• Site Assessment
Successful Implementation Tips
• Project Management
• Network Planning
• Code Compliance
• Fire Code
• Developing Acceptance Plans (Sign Off)
• Punch List
• Training: Admin & End-User
• Maintaining Design Plans
• Camera Names
• Camera & Door Schedules
• Maintaining Network Schemes & IP Addresses
• Labeling Cables
• Customer Support & Maintenance
Summary
Improving Physical Security
On Your Campus
• IP Vs. Analog Cameras & Equipment
• Network Equipment
• Security Integrator
• Video Surveillance Techniques
• Standardizing Your Security Platform
• Security Policy / SOP / Integration
• Designing & Planning For Your Needs
• Successful Implementation Tips
Questions
Q&A
Contacts
Jeremy Beard
LENSEC
(817) 789-7077
jbeard@lensec.com
Mark Mabee
LENSEC
(512) 423-9673
mmabee@lensec.com
Thanks for Attending
Today’s Webinar
School
Safety
Improving Physical Security
On Your Campus

More Related Content

What's hot

10 Steps To a Successful IP Surveillance Installation
10 Steps To a Successful IP Surveillance Installation10 Steps To a Successful IP Surveillance Installation
10 Steps To a Successful IP Surveillance InstallationShein Myint Aung
 
Defending our datacenters (BICSI 2016 ASEAN conference)
Defending our datacenters  (BICSI 2016 ASEAN  conference)Defending our datacenters  (BICSI 2016 ASEAN  conference)
Defending our datacenters (BICSI 2016 ASEAN conference)Jeffrey Lam
 
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...EnergySec
 
Build recurring revenue from reactive customers 20140924
Build recurring revenue from reactive customers 20140924Build recurring revenue from reactive customers 20140924
Build recurring revenue from reactive customers 20140924Solarwinds N-able
 
Mesh Surveillance Camera | EnGenius
Mesh Surveillance Camera | EnGeniusMesh Surveillance Camera | EnGenius
Mesh Surveillance Camera | EnGeniusEngi Admi
 
Making SIP Migration Easy
Making SIP Migration EasyMaking SIP Migration Easy
Making SIP Migration EasyIntelePeer
 
Identity Based Lifecycle Management for a Trusted IoT Supply Chain
Identity Based Lifecycle Management for a Trusted IoT Supply ChainIdentity Based Lifecycle Management for a Trusted IoT Supply Chain
Identity Based Lifecycle Management for a Trusted IoT Supply Chaintomkat58
 
Protecting Your Investment with Polycom Global Services and ScanSource Commun...
Protecting Your Investment with Polycom Global Services and ScanSource Commun...Protecting Your Investment with Polycom Global Services and ScanSource Commun...
Protecting Your Investment with Polycom Global Services and ScanSource Commun...ScanSource, Inc.
 
Secure calling for IP telephony - webinar 2016, English
Secure calling for IP telephony - webinar 2016, EnglishSecure calling for IP telephony - webinar 2016, English
Secure calling for IP telephony - webinar 2016, EnglishAskozia
 
Esc who we are 2016 rev2
Esc who we are 2016 rev2Esc who we are 2016 rev2
Esc who we are 2016 rev2thidisbogus
 

What's hot (20)

OTT for Mobile Devices
OTT for Mobile DevicesOTT for Mobile Devices
OTT for Mobile Devices
 
Adaptive Trust for Strong Network Security
Adaptive Trust for Strong Network SecurityAdaptive Trust for Strong Network Security
Adaptive Trust for Strong Network Security
 
10 Steps To a Successful IP Surveillance Installation
10 Steps To a Successful IP Surveillance Installation10 Steps To a Successful IP Surveillance Installation
10 Steps To a Successful IP Surveillance Installation
 
Adaptive Trust Security
Adaptive Trust SecurityAdaptive Trust Security
Adaptive Trust Security
 
Defending our datacenters (BICSI 2016 ASEAN conference)
Defending our datacenters  (BICSI 2016 ASEAN  conference)Defending our datacenters  (BICSI 2016 ASEAN  conference)
Defending our datacenters (BICSI 2016 ASEAN conference)
 
Whitepaper perimeter protection
Whitepaper perimeter protectionWhitepaper perimeter protection
Whitepaper perimeter protection
 
IoT13: Electric Imp showcase
IoT13: Electric Imp showcaseIoT13: Electric Imp showcase
IoT13: Electric Imp showcase
 
Hugo Fiennes - Security and the IoT - Electric Imp
Hugo Fiennes - Security and the IoT - Electric ImpHugo Fiennes - Security and the IoT - Electric Imp
Hugo Fiennes - Security and the IoT - Electric Imp
 
Easynet Video conferencing
Easynet Video conferencingEasynet Video conferencing
Easynet Video conferencing
 
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
 
Build recurring revenue from reactive customers 20140924
Build recurring revenue from reactive customers 20140924Build recurring revenue from reactive customers 20140924
Build recurring revenue from reactive customers 20140924
 
ClearPass Guest Overview
ClearPass Guest Overview ClearPass Guest Overview
ClearPass Guest Overview
 
Mesh Surveillance Camera | EnGenius
Mesh Surveillance Camera | EnGeniusMesh Surveillance Camera | EnGenius
Mesh Surveillance Camera | EnGenius
 
The Unstoppable Demand for the All-Wireless Workplace
The Unstoppable Demand for the All-Wireless WorkplaceThe Unstoppable Demand for the All-Wireless Workplace
The Unstoppable Demand for the All-Wireless Workplace
 
Making SIP Migration Easy
Making SIP Migration EasyMaking SIP Migration Easy
Making SIP Migration Easy
 
Identity Based Lifecycle Management for a Trusted IoT Supply Chain
Identity Based Lifecycle Management for a Trusted IoT Supply ChainIdentity Based Lifecycle Management for a Trusted IoT Supply Chain
Identity Based Lifecycle Management for a Trusted IoT Supply Chain
 
The Future Mobile Security
The Future Mobile Security The Future Mobile Security
The Future Mobile Security
 
Protecting Your Investment with Polycom Global Services and ScanSource Commun...
Protecting Your Investment with Polycom Global Services and ScanSource Commun...Protecting Your Investment with Polycom Global Services and ScanSource Commun...
Protecting Your Investment with Polycom Global Services and ScanSource Commun...
 
Secure calling for IP telephony - webinar 2016, English
Secure calling for IP telephony - webinar 2016, EnglishSecure calling for IP telephony - webinar 2016, English
Secure calling for IP telephony - webinar 2016, English
 
Esc who we are 2016 rev2
Esc who we are 2016 rev2Esc who we are 2016 rev2
Esc who we are 2016 rev2
 

Similar to Step Into Security Webinar - Improving Physical Security on Your Campus

Tpm cloud collaboration network security
Tpm   cloud collaboration network securityTpm   cloud collaboration network security
Tpm cloud collaboration network securityDavid Brunke
 
Software and Machine Vision Competencies
Software and Machine Vision CompetenciesSoftware and Machine Vision Competencies
Software and Machine Vision CompetenciesAmita Chitale
 
The Best Access Control for vehicles
The Best Access Control for vehiclesThe Best Access Control for vehicles
The Best Access Control for vehiclesSyed Ameen
 
ARC's Bob Mick Presentation on Using Server Virtualization In Manufacturing O...
ARC's Bob Mick Presentation on Using Server Virtualization In Manufacturing O...ARC's Bob Mick Presentation on Using Server Virtualization In Manufacturing O...
ARC's Bob Mick Presentation on Using Server Virtualization In Manufacturing O...ARC Advisory Group
 
Decision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentDecision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentAlexey Pyshkin
 
Limtech - Presentation Product
Limtech - Presentation ProductLimtech - Presentation Product
Limtech - Presentation ProductAndréa Berry
 
eFolder Partner Chat Webinar — Getting Started on the Right Foot with BDR
eFolder Partner Chat Webinar — Getting Started on the Right Foot with BDReFolder Partner Chat Webinar — Getting Started on the Right Foot with BDR
eFolder Partner Chat Webinar — Getting Started on the Right Foot with BDReFolder
 
Earth linkit servicesoverview
Earth linkit servicesoverviewEarth linkit servicesoverview
Earth linkit servicesoverviewscomoore
 
EarthLink IT Services Overview
EarthLink IT Services OverviewEarthLink IT Services Overview
EarthLink IT Services Overviewscomoore
 
Brendon Foxen (Channel 4) - Speeding up Software Delivery at Channel 4
Brendon Foxen (Channel 4) - Speeding up Software Delivery at Channel 4Brendon Foxen (Channel 4) - Speeding up Software Delivery at Channel 4
Brendon Foxen (Channel 4) - Speeding up Software Delivery at Channel 4Outlyer
 
Mobile Apps or Else
Mobile Apps or ElseMobile Apps or Else
Mobile Apps or ElseOAUGNJ
 
3.5 switcher , multiplexer , recorder and storage
3.5 switcher , multiplexer , recorder and storage3.5 switcher , multiplexer , recorder and storage
3.5 switcher , multiplexer , recorder and storageNader Elmansi
 
FDA - ELECTRONIC SECURITY- AFWEST INT. SECURITY - EMMANUEL ANIM-
FDA - ELECTRONIC SECURITY- AFWEST INT. SECURITY - EMMANUEL ANIM-FDA - ELECTRONIC SECURITY- AFWEST INT. SECURITY - EMMANUEL ANIM-
FDA - ELECTRONIC SECURITY- AFWEST INT. SECURITY - EMMANUEL ANIM-Emmanuel Anim
 
Cyber lab Security Division
Cyber lab Security DivisionCyber lab Security Division
Cyber lab Security DivisionVivek chan
 
Vexos Corporate PPT
Vexos Corporate PPTVexos Corporate PPT
Vexos Corporate PPTEric Shumway
 
CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...
CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...
CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...TI Safe
 

Similar to Step Into Security Webinar - Improving Physical Security on Your Campus (20)

Tpm cloud collaboration network security
Tpm   cloud collaboration network securityTpm   cloud collaboration network security
Tpm cloud collaboration network security
 
Vology Overview June 2015 - Maria Vera
Vology Overview June 2015 - Maria VeraVology Overview June 2015 - Maria Vera
Vology Overview June 2015 - Maria Vera
 
Software and Machine Vision Competencies
Software and Machine Vision CompetenciesSoftware and Machine Vision Competencies
Software and Machine Vision Competencies
 
The Best Access Control for vehicles
The Best Access Control for vehiclesThe Best Access Control for vehicles
The Best Access Control for vehicles
 
ARC's Bob Mick Presentation on Using Server Virtualization In Manufacturing O...
ARC's Bob Mick Presentation on Using Server Virtualization In Manufacturing O...ARC's Bob Mick Presentation on Using Server Virtualization In Manufacturing O...
ARC's Bob Mick Presentation on Using Server Virtualization In Manufacturing O...
 
Surveilance ppt
Surveilance ppt Surveilance ppt
Surveilance ppt
 
Decision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentDecision Matrix for IoT Product Development
Decision Matrix for IoT Product Development
 
Limtech - Presentation Product
Limtech - Presentation ProductLimtech - Presentation Product
Limtech - Presentation Product
 
Webinar: Building amazing web apps rapidly with emerging tech
Webinar: Building amazing web apps rapidly with emerging techWebinar: Building amazing web apps rapidly with emerging tech
Webinar: Building amazing web apps rapidly with emerging tech
 
eFolder Partner Chat Webinar — Getting Started on the Right Foot with BDR
eFolder Partner Chat Webinar — Getting Started on the Right Foot with BDReFolder Partner Chat Webinar — Getting Started on the Right Foot with BDR
eFolder Partner Chat Webinar — Getting Started on the Right Foot with BDR
 
Earth linkit servicesoverview
Earth linkit servicesoverviewEarth linkit servicesoverview
Earth linkit servicesoverview
 
EarthLink IT Services Overview
EarthLink IT Services OverviewEarthLink IT Services Overview
EarthLink IT Services Overview
 
Brendon Foxen (Channel 4) - Speeding up Software Delivery at Channel 4
Brendon Foxen (Channel 4) - Speeding up Software Delivery at Channel 4Brendon Foxen (Channel 4) - Speeding up Software Delivery at Channel 4
Brendon Foxen (Channel 4) - Speeding up Software Delivery at Channel 4
 
Mobile Apps or Else
Mobile Apps or ElseMobile Apps or Else
Mobile Apps or Else
 
3.5 switcher , multiplexer , recorder and storage
3.5 switcher , multiplexer , recorder and storage3.5 switcher , multiplexer , recorder and storage
3.5 switcher , multiplexer , recorder and storage
 
FDA - ELECTRONIC SECURITY- AFWEST INT. SECURITY - EMMANUEL ANIM-
FDA - ELECTRONIC SECURITY- AFWEST INT. SECURITY - EMMANUEL ANIM-FDA - ELECTRONIC SECURITY- AFWEST INT. SECURITY - EMMANUEL ANIM-
FDA - ELECTRONIC SECURITY- AFWEST INT. SECURITY - EMMANUEL ANIM-
 
HD CCTV BACOM SOLUTION.pptx
HD CCTV BACOM SOLUTION.pptxHD CCTV BACOM SOLUTION.pptx
HD CCTV BACOM SOLUTION.pptx
 
Cyber lab Security Division
Cyber lab Security DivisionCyber lab Security Division
Cyber lab Security Division
 
Vexos Corporate PPT
Vexos Corporate PPTVexos Corporate PPT
Vexos Corporate PPT
 
CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...
CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...
CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...
 

More from Keith Harris

Step Into Security Webinar - Threat Assessments for K-12 & University Campuses
Step Into Security Webinar - Threat Assessments for K-12 & University CampusesStep Into Security Webinar - Threat Assessments for K-12 & University Campuses
Step Into Security Webinar - Threat Assessments for K-12 & University CampusesKeith Harris
 
Step Into Security Webinar - Securing Campuses for the New School Year
Step Into Security Webinar - Securing Campuses for the New School Year Step Into Security Webinar - Securing Campuses for the New School Year
Step Into Security Webinar - Securing Campuses for the New School Year Keith Harris
 
Step Into Security Webinar - Threat Assessments in Schools
Step Into Security Webinar - Threat Assessments in SchoolsStep Into Security Webinar - Threat Assessments in Schools
Step Into Security Webinar - Threat Assessments in SchoolsKeith Harris
 
Step Into Security Webinar – Best Practices for Bomb Threat Response at Schools
Step Into Security Webinar – Best Practices for Bomb Threat Response at SchoolsStep Into Security Webinar – Best Practices for Bomb Threat Response at Schools
Step Into Security Webinar – Best Practices for Bomb Threat Response at SchoolsKeith Harris
 
Step Into Security Webinar - Surveillance Solutions in Special Education Clas...
Step Into Security Webinar - Surveillance Solutions in Special Education Clas...Step Into Security Webinar - Surveillance Solutions in Special Education Clas...
Step Into Security Webinar - Surveillance Solutions in Special Education Clas...Keith Harris
 
Step Into Security Webinar - Video Surveillance in Classrooms & Around Campus
Step Into Security Webinar - Video Surveillance in Classrooms & Around Campus Step Into Security Webinar - Video Surveillance in Classrooms & Around Campus
Step Into Security Webinar - Video Surveillance in Classrooms & Around Campus Keith Harris
 
Step Into Security Webinar - School Emergency Response Plans & The Active Sho...
Step Into Security Webinar - School Emergency Response Plans & The Active Sho...Step Into Security Webinar - School Emergency Response Plans & The Active Sho...
Step Into Security Webinar - School Emergency Response Plans & The Active Sho...Keith Harris
 

More from Keith Harris (7)

Step Into Security Webinar - Threat Assessments for K-12 & University Campuses
Step Into Security Webinar - Threat Assessments for K-12 & University CampusesStep Into Security Webinar - Threat Assessments for K-12 & University Campuses
Step Into Security Webinar - Threat Assessments for K-12 & University Campuses
 
Step Into Security Webinar - Securing Campuses for the New School Year
Step Into Security Webinar - Securing Campuses for the New School Year Step Into Security Webinar - Securing Campuses for the New School Year
Step Into Security Webinar - Securing Campuses for the New School Year
 
Step Into Security Webinar - Threat Assessments in Schools
Step Into Security Webinar - Threat Assessments in SchoolsStep Into Security Webinar - Threat Assessments in Schools
Step Into Security Webinar - Threat Assessments in Schools
 
Step Into Security Webinar – Best Practices for Bomb Threat Response at Schools
Step Into Security Webinar – Best Practices for Bomb Threat Response at SchoolsStep Into Security Webinar – Best Practices for Bomb Threat Response at Schools
Step Into Security Webinar – Best Practices for Bomb Threat Response at Schools
 
Step Into Security Webinar - Surveillance Solutions in Special Education Clas...
Step Into Security Webinar - Surveillance Solutions in Special Education Clas...Step Into Security Webinar - Surveillance Solutions in Special Education Clas...
Step Into Security Webinar - Surveillance Solutions in Special Education Clas...
 
Step Into Security Webinar - Video Surveillance in Classrooms & Around Campus
Step Into Security Webinar - Video Surveillance in Classrooms & Around Campus Step Into Security Webinar - Video Surveillance in Classrooms & Around Campus
Step Into Security Webinar - Video Surveillance in Classrooms & Around Campus
 
Step Into Security Webinar - School Emergency Response Plans & The Active Sho...
Step Into Security Webinar - School Emergency Response Plans & The Active Sho...Step Into Security Webinar - School Emergency Response Plans & The Active Sho...
Step Into Security Webinar - School Emergency Response Plans & The Active Sho...
 

Recently uploaded

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 

Step Into Security Webinar - Improving Physical Security on Your Campus

  • 2. Today’s Panelists Jeremy Beard Physical Security Technical Specialist LENSEC Mark Mabee Physical Security Technical Specialist LENSEC
  • 3. Webinar Logistics • Q&A at the end • Questions for the panelist • Audio from attendees muted • Poll questions • Survey
  • 4. Webinar Sponsor About LENSEC • Based in Houston, TX • Since 1998 • IP Video Management Solutions • System Design • Installation & Project Management • TCPN Contract #R5230 Perspective Video Management Software (VMS) ™ LENSEC is committed to empowering our clients and partners to prevent or mitigate physical security risks. We want to help protect people and assets as well as improve operations through our evolutionary and intuitive technology. We can do this by providing expertise in security and software development. Our Mission
  • 5. The TCPN Difference • TCPN is a national governmental purchasing cooperative • TCPN has a single lead agency - Region 4 Education Service Center • Ensures consistent bidding and monitoring processes on all TCPN contracts • Awards competitively bid contracts that must meet state procurement laws and regulations • Facilities Team & Commodities Team - Dedicated to TCPN Facilities Solution Contracts - Regional Program Managers • Compliance - TCPN Certified Proposal Number System - Pricing Verification • Contracts - 270+ best in class vendor contracts - Transparency of solicitation due diligence 24/7 Why TCPN?
  • 6. Training Goal Improving Physical Security On Your Campus • IP Vs. Analog Cameras & Equipment • Network Equipment • Security Integrator • Video Surveillance Techniques • Standardizing Your Security Platform • Security Policy / SOP / Integration • Designing & Planning For Your Needs • Successful Implementation Tips
  • 7. Poll Question What types of cameras do you have at your facility?
  • 8. • Quality • General Detail • High Detail • Forensic Detail IP Vs. Analog Cameras & Equipment
  • 9. • Cheap or Good • Cameras IP Vs. Analog Cameras & Equipment
  • 10. IP Vs. Analog Cameras & Equipment • Cheap or Good • DVRs • NVRs • You Get What You Pay For • Defending Against Bad Components & Software
  • 11. IP Vs. Analog Cameras & Equipment • Traditional PTZs vs. Megapixel Cameras • Moving Parts • Blind Spots
  • 13. IP Vs. Analog Cameras & Equipment • Panoramic Cameras • 180° / 360° • Cost Savings • Camera Licensing
  • 14. IP Vs. Analog Cameras & Equipment • Panoramic Cameras • Quad View • Simulating 4 Cameras
  • 15. IP Vs. Analog Cameras & Equipment • Thermal Cameras • Viable Detection
  • 16. IP Vs. Analog Cameras & Equipment • Thermal Cameras
  • 17. Poll Question Do you have plans for system expansion or camera replacement in the near future?
  • 18. IP Vs. Analog Cameras & Equipment • Emerging Technologies • Internet of Things • Integration with Physical Security Tools • Gesture Technology for Access Controls • Remote Access with Smartphones & Tablets • Expanding Storage Capabilities • Cloud Storage
  • 19. IP Vs. Analog Cameras & Equipment • Proprietary Equipment • A Word Of Warning • Data Transfer Protocols • Open Source
  • 20. Network Equipment • IT Department Involvement • Early Is Better • Server & Switches • Convergence or Stand Alone • Cabling • Cat 5E vs Cat 6 Cables • RG59 or RG6 BNC Cables
  • 21. Security Integrator • The Good, The Bad, The Ugly • Physical Security Equipment Considerations • Know What You Are Buying • Warranty / Customer Support / Maintenance • Equipment Life / Life Cycle Maintenance • Taking Care Of Equipment When Issues Arise
  • 22. Video Surveillance Techniques • Camera Lens Selection • Zoom Lens • Manual Zoom • Optical Zoom • Digital Zoom • Megapixel Lens
  • 23. Video Surveillance Techniques • Camera Lens Selection • Field Of View
  • 24. Video Surveillance Techniques • Camera Lens Selection • Field Of View http://www.lensec.com/tutorial/calculator.html
  • 25. • Camera Resolution • How Does Resolution Affect Picture Quality? • How Does Resolution Affect Bandwidth? • D1 Cameras • High Megapixel Cameras • Bandwidth Calculators • How Does Resolution Affect Storage? • Storage Capacity • Rule of Thumb • Storage Calculators http://www.lensec.com/tutorial/calculator.html Video Surveillance Techniques
  • 26.
  • 27. Video Surveillance Techniques • Video Compression • MJPEG • Captures Every Single Frame • H.264 • Conditional Refresh
  • 28. Video Surveillance Techniques • Outdoor Camera Considerations • Auto Iris Lenses • Anti-fog • Heaters & Blowers • IP Rating • Weatherproof Camera Enclosures • Waterproof Camera Enclosures
  • 29.
  • 30. Poll Question When is the best time to use wireless video transmission?
  • 31. Video Surveillance Techniques • Wireless Video Transmission • Remote Areas • Parking Lots • Power Availability • Access to Network • Point to Point / Point to Multipoint / MIMO • Wireless MESH • Fiber • Dark Fiber • What is Fiber • Do You Need It?
  • 32. Video Surveillance Techniques • Motion Video • Pixel Changes • Standard Technology (VMD) • Advanced Video Motion Detection (AVMD) • False Alerts • FastFind™ Motion Video
  • 33. Video Surveillance Techniques • Video Analytics • Digital Algorithms • Smart Technology • True Alerts • Perimeter Detection • People Counting • Often Cost Involved
  • 34. Video Surveillance Techniques • Video Analytics • Crossing A Line
  • 35. Video Surveillance Techniques • Video Analytics • Person In Area
  • 36. Standardizing The Security Platform • Enterprise Software • Multi-site Capability • Remote Streaming To Desktop, Smartphones & Tablets • First Responder • Team Collaboration • Neighboring Cameras • Map Navigation • Thin Client Access • Eases Installation Process • Less Taxing on Workstation Resources • Ditching the Security Monitors
  • 37. Standardizing The Security Platform • Integrating Physical Security Tools Into A Unified Security Platform • Access Control • Proprietary Issues • Visitor Management • Emergency Call Stations • Entry Intercoms
  • 38. Standardizing The Security Platform • Integrating Physical Security Tools Into A Unified Security Platform • Approach / Planning / SOP • Electronic Emergency Response Plans • Training Drills & Exercises
  • 39. Designing & Planning For Your Needs • Access Control • Utilizing Existing Cable • Rip & Replace • Cable Type • Plenum Cable • Legacy Cameras • Existing Camera Placement • Video Encoders • New Camera Placement • Considering Blind Spots • Site Assessment
  • 40. Successful Implementation Tips • Project Management • Network Planning • Code Compliance • Fire Code • Developing Acceptance Plans (Sign Off) • Punch List • Training: Admin & End-User • Maintaining Design Plans • Camera Names • Camera & Door Schedules • Maintaining Network Schemes & IP Addresses • Labeling Cables • Customer Support & Maintenance
  • 41. Summary Improving Physical Security On Your Campus • IP Vs. Analog Cameras & Equipment • Network Equipment • Security Integrator • Video Surveillance Techniques • Standardizing Your Security Platform • Security Policy / SOP / Integration • Designing & Planning For Your Needs • Successful Implementation Tips
  • 43. Contacts Jeremy Beard LENSEC (817) 789-7077 jbeard@lensec.com Mark Mabee LENSEC (512) 423-9673 mmabee@lensec.com