SlideShare a Scribd company logo
1 of 46
Download to read offline
Physical Security Integration &
Access Control
---
Part 2: Software & Best Practices
Keith Harris
Marketing Manager
LENSEC
Today’s
Panelist
Expertise in Photography & Video Production
Experience in Physical Security Market
Trainer for Surveillance & Physical Security Techniques
Webinar
Sponsor
Based in Houston, TX
Since 1998
IP Video Management
System Design
Installation
Project Management
LENSEC is committed to empowering our clients and partners to prevent or mitigate physical
security risks. We want to help protect people and assets as well as improve operations through
our evolutionary and intuitive technology. We can do this by providing expertise in security and
software development.
Our Mission
Webinar
Logistics
Q&A at the end
Questions for the panelist
Audio from attendees muted
Poll questions
Survey
LENSEC Step Into Security Webinar Archive: http://bit.ly/SISarchive
Training
Goal
Physical Security Integration & Access Control
Part 2: Software & Best Practices
Topics for Webinar:
Access Control Management Software
Unifying Physical Security Platforms
Best Practices
Reviewing Components
LENSEC Step Into Security Webinar Archive: http://bit.ly/SISarchive
Elements
Live View Interface
Current Status
Door Management
Device Configuration
Rules/Schedules
Cardholder Management
Reporting
Access Control Management Software
Physical Security Integration & Access Control
Live View Interface
Door Event
Alarm Event
Lock/Unlock Controls
Access Control Management Software
Physical Security Integration & Access Control
Poll
Question
Poll Question #1
Access control rules apply to…
Door Management
Device Configuration
Rules/Schedules
Access Control Management Software
Physical Security Integration & Access Control
Scheduling
After Hours Access
Weekend Access
Holiday Schedules
Access Control Management Software
Physical Security Integration & Access Control
Cardholder Management
Groups/Roles
Privileges/Permissions
Users/Credentials
Access Control Management Software
Physical Security Integration & Access Control
Reporting
Access Control Management Software
Physical Security Integration & Access Control
Access Control Levels
Flat Configuration
Operational Vulnerabilities
Access Control Best Practices
Physical Security Integration & Access Control
Access Control Levels
Advanced Configuration
System Segregation
Accountability
Escortability
Physical Security Integration & Access Control
Access Control Best Practices
Physical Security Integration & Access Control
Physical Security Integration & Access Control
Multi-site
Management
Enterprise Access Control Systems
Physical Security Integration & Access Control
Enterprise Features
Third Party Integration
Payroll
Visitor Management
Accounting Systems
SQL Database
Single Sign On
Active Directory/LDAP
Enterprise Access Control Systems
Physical Security Integration & Access Control
Integrating Physical
Security Platforms
Security Footprint
Building Safety
Systems
Unifying Physical Security Platforms
Physical Security Integration & Access Control
Video Verification
Access Control Management
Physical Security Integration & Access Control
Visitor Management
Time & Attendance
Integrating Physical Security Systems
Physical Security Integration & Access Control
Poll
Question
Poll Question #2
What is mustering?
Mustering
Anti-Passback
Access Control Methods
Preventing Door Propping
Management & Policies
Access Control Best Practices
Physical Security Integration & Access Control
Mustering
Did Everyone Make It Out?
Area Tracking
Checking In
Access Control Best Practices
Physical Security Integration & Access Control
Anti-Passback Controls
Time Limit
Reader Pattern & Flow
Access Control Best Practices
Physical Security Integration & Access Control
Tailgating/Piggybacking Detectors
Hold Open Alarms
Turnstiles & Revolving Doors
Mantraps/Airlocks
IP Camera Video Analytics
Special Use Access Control
Elevators
Sallyports
Access Control Best Practices
Physical Security Integration & Access Control
Door Propping
Convenience vs. Security
Access Control Best Practices
Physical Security Integration & Access Control
Human Resources
Employment Status Change
Security
Report Out
Collecting Credentials
Access Control Best Practices
Physical Security Integration & Access Control
Card Holder Database
Operational Response
Database Performance
Reuse of Credentials
Access Control Management – Best Practices
Physical Security Integration & Access Control
Rules & Standards
Fail Safe/Fail Secure
Choosing Locks
Exit Devices
Credentials
Card Readers
Door Controllers
Authorization Interface
Access Control Review – Components & Concepts
Physical Security Integration & Access Control
Step Into Security Webinar – Physical Security Integration & Access Control – Part One: Concepts & Components - http://bit.ly/SIS5-16
Building & Fire Codes
NFPA – National Fire
Protection Association
AHJ
Rules & Standards Review
Physical Security Integration & Access Control
National Fire Protection Assoc. Codes & Standards: http://www.nfpa.org/codes-and-standards/document-information-pages
International Building Code: http://www.iccsafe.org/codes-tech-support/codes/2015-i-codes/ibc/
Poll
Question
Poll Question #3
True or False:
Most doors default to Fail Safe if you
don’t have direction from the
specifications or AHJ.
Access Control Concepts Review
Physical Security Integration & Access Control
Fail Safe – Locks are Released
Fail Secure – Locks are Secured
Applies to Entry Control Only
Manual Egress Allowed
Choosing Locks
Access Control Components Review
Physical Security Integration & Access Control
Cylindrical
Lock Mortise
Lock
Surface Lock
Deadbolt Lock Deadlatch Lock
Maglock
Door Strike
Electronic
Lockset
Exit Devices
Request To Exit
Crash Bar
PIR-RTE
Push Button
Access Control Components Review
Physical Security Integration & Access Control
Crash Bar
PRI-RTE Push Button
RTE
Credentials
Card Reader
Door Controller
Access Control Server
Access Control Components Review
Physical Security Integration & Access Control
Keyfob Badge Clamshell
Authorization Factors
Multifactor Credentials
Possession: Something You Have
Knowledge: Something You Know
Characteristic: Something You Are
Trusted Verification: Someone Trusted
Verifies You
Access Control Concepts Review
Physical Security Integration & Access Control
Authorization Interface
Keypad
Biometrics
Retinal/Iris Scan
Fingerprint
Access Control Components Review
Physical Security Integration & Access Control
Fingerprint Theft
Liveness Detection Solutions
Tissue Reflection
Heartbeat Detection
Dermal Electric Resistance
Unnatural Analysis
The Future of Access Control Technology
Physical Security Integration & Access Control
Near Field Communication (NFC)
Bluetooth Low Energy (BLE)
The Future of Access Control Technology
Physical Security Integration & Access Control
Near Field
Communication
Questions
Q&A
Contacts Keith Harris
LENSEC
(512) 913-3907
kharris@lensec.com
Thanks for Attending
Today’s Webinar
SIS7-16 Webinar – Physical Security Integration & Access Control
Part Two: Software & Best Practices
Questions & Answers
Poll Question #1
Access control rules apply to…
1. Doors
2. Users
3. Doors or Users, depending on the access control system
4. Neither
5. I don’t know
Poll Question #2
What is mustering?
1. Something you put on a sandwich
2. A technique for testing a server before deployment
3. Assembling the troops during inspection or events
4. Process for cutting into a door to install a mortise strike
5. I don’t know
Poll Question #3
True or False:
Most doors default to Fail Safe if you don’t have direction from the specifications or the AHJ.
1) True
2) False
What is Ingress & Egress?
This is a topic I covered last month in Part One.
Ingress is traffic that is flowing into the building.
This is the most common place for an authorization point – building entrances.
Egress is traffic that is flowing out of the building.
Sometimes in higher security settings, authorization is logged at the egress point of a building as well.
When you are evaluating an RFP to decide if you should pursue an access control project, are
there certain things to keep in mind?
Where should I begin? That could be a whole webinar in itself. Request For Proposals are notoriously
vague and usually don’t give you all the answers to the questions. That’s where the building code and
conversations with the AHJ come in. But you may not do that research until much later after you win the
project.
The typical RFP usually does a great job lining out the contractual language from the agency or owner’s
point of view. But, the contractor typically has to make a lot of educated guesses when they are
preparing the project for bid.
Cover your bases and ask lots of questions. If you have a chance to go on a site visit – go. It will be well
worth your time to walk the installation site. Get a picture in your mind about the entire scope of work
and how that affects your part of the project. Go and actually see the door openings, if it isn’t new
construction. A picture is literally worth a thousand words in this.
The contracting agency or owner will hold you to the contract in spite of the lack of details in the RFP.
You, as the contractor, should assume that you have your bases covered if you choose to enter into the
contract with the owner.
There are a lot of things to consider when planning an access control project. How do I make
sure all my bases are covered?
I recommend not tackling installation on your own as an amateur. There are just some things that
require skill to accomplish. For example, if you’ve never cut into a door before to install a mortise strike,
you might consider whether you would want to buy a replacement door or just hire the right guy with
the right certification to do the job right the first time.
If you plan to do many of these, you may want to get trained and certified as an installer. There are
several places you can receive certification. Some are general certifications, such as those presented by
security industry associations. And, others are presented by manufacturers including details about their
product.
I also recommend doing a lot of research on your own. Tackling a large scope project will require a lot of
forethought and planning to make sure your bases are covered. We’ll present a webinar in July that
addresses that topic. We’re covering Planning Security Technology Upgrades in next month’s Step Into
Security Webinar. When we follow up, we’ll provide more details and a link so you can register for that
free security training event.
What is the difference between an access control panel and an IP based or server based access
control system?
Well, we didn’t get to much into that in our presentation due to lack of time to address all topics. Some
access systems have no server. The system controllers or panels contain the hardware for administering
the system. Under these circumstances, no external server is needed. You will find this more common in
small or highly dispersed access systems.
An example of this is the Axis Entry Manager that is available for Axis security systems. This solution is
not a full-featured enterprise system. It is only designed to control up to 66 doors and misses out on
several ‘nice-to-have’ features – such as no Live View and no Reporting.
Why are fire doors fail secure?
It’s critical for fire doors to stay closed during a fire. The fire door provides structural barriers to prevent
a fire from spreading throughout a building. This is a life safety issue.
While it may not make sense to lock a door during a fire, keep in mind these are ingress or interior doors
and not emergency exits. Emergency exits MUST allow egress at all times.
Again, when we are saying Fail Secure, this means the door locks when power fails. At any rate, careful
planning is required. If you have more questions about Fail Safe or Fail Secure, you should take a look at
Part One of this webinar series. We cover the topic extensively.
What is a delayed egress door?
A Delayed Egress Door is also referred to as a “Nanny” Door. These are systems that temporarily lock
inhabitants in. They are uses sometimes in nursing facilities or psychiatric wards in hospitals. These
doors are subject to special authority. The will probably be governed by code. The code will cover
specifics like how long to delay period can be – 15 to 30 seconds is common. They may even sound an
alarm before opening.

More Related Content

Viewers also liked

NoSQL Now! Webinar Series: Migrating Security Policies from SQL to NoSQL
NoSQL Now! Webinar Series: Migrating Security Policies from SQL to NoSQLNoSQL Now! Webinar Series: Migrating Security Policies from SQL to NoSQL
NoSQL Now! Webinar Series: Migrating Security Policies from SQL to NoSQLDATAVERSITY
 
Webinar - Security and Manageability: Key Criteria in Selecting Enterprise-Gr...
Webinar - Security and Manageability: Key Criteria in Selecting Enterprise-Gr...Webinar - Security and Manageability: Key Criteria in Selecting Enterprise-Gr...
Webinar - Security and Manageability: Key Criteria in Selecting Enterprise-Gr...DataStax
 
Webinar: MongoDB 2.6 New Security Features
Webinar: MongoDB 2.6 New Security FeaturesWebinar: MongoDB 2.6 New Security Features
Webinar: MongoDB 2.6 New Security FeaturesMongoDB
 
Matrix Security Solutions: PROPAC
Matrix Security Solutions: PROPAC Matrix Security Solutions: PROPAC
Matrix Security Solutions: PROPAC Matrix Comsec
 
Access control-installation
Access control-installationAccess control-installation
Access control-installationNugroho Surya
 
4010 front-panel-installing,-operating-and-programming-manual
4010 front-panel-installing,-operating-and-programming-manual4010 front-panel-installing,-operating-and-programming-manual
4010 front-panel-installing,-operating-and-programming-manualHeru Heru
 
Access Control and Door Control with InduSoft Web Studio
Access Control and Door Control with InduSoft Web StudioAccess Control and Door Control with InduSoft Web Studio
Access Control and Door Control with InduSoft Web StudioAVEVA
 
Design and installation of fixed foam fire extinguishing system
Design and installation of fixed foam fire extinguishing systemDesign and installation of fixed foam fire extinguishing system
Design and installation of fixed foam fire extinguishing systemSalim Solanki
 

Viewers also liked (15)

NoSQL Now! Webinar Series: Migrating Security Policies from SQL to NoSQL
NoSQL Now! Webinar Series: Migrating Security Policies from SQL to NoSQLNoSQL Now! Webinar Series: Migrating Security Policies from SQL to NoSQL
NoSQL Now! Webinar Series: Migrating Security Policies from SQL to NoSQL
 
Webinar - Security and Manageability: Key Criteria in Selecting Enterprise-Gr...
Webinar - Security and Manageability: Key Criteria in Selecting Enterprise-Gr...Webinar - Security and Manageability: Key Criteria in Selecting Enterprise-Gr...
Webinar - Security and Manageability: Key Criteria in Selecting Enterprise-Gr...
 
Webinar: MongoDB 2.6 New Security Features
Webinar: MongoDB 2.6 New Security FeaturesWebinar: MongoDB 2.6 New Security Features
Webinar: MongoDB 2.6 New Security Features
 
Ati kafer
Ati kaferAti kafer
Ati kafer
 
Matrix Security Solutions: PROPAC
Matrix Security Solutions: PROPAC Matrix Security Solutions: PROPAC
Matrix Security Solutions: PROPAC
 
Access control-installation
Access control-installationAccess control-installation
Access control-installation
 
4010 front-panel-installing,-operating-and-programming-manual
4010 front-panel-installing,-operating-and-programming-manual4010 front-panel-installing,-operating-and-programming-manual
4010 front-panel-installing,-operating-and-programming-manual
 
Access Control and Door Control with InduSoft Web Studio
Access Control and Door Control with InduSoft Web StudioAccess Control and Door Control with InduSoft Web Studio
Access Control and Door Control with InduSoft Web Studio
 
Door access control system
Door access control systemDoor access control system
Door access control system
 
Design and installation of fixed foam fire extinguishing system
Design and installation of fixed foam fire extinguishing systemDesign and installation of fixed foam fire extinguishing system
Design and installation of fixed foam fire extinguishing system
 
CINT alarm systems
CINT alarm systemsCINT alarm systems
CINT alarm systems
 
Fire Alarm Control Panel Operations
Fire Alarm Control Panel OperationsFire Alarm Control Panel Operations
Fire Alarm Control Panel Operations
 
Back to Basics
Back to BasicsBack to Basics
Back to Basics
 
Chapter 06
Chapter 06Chapter 06
Chapter 06
 
Fire fighting
Fire fightingFire fighting
Fire fighting
 

More from Keith Harris

Step Into Security Webinar - Threat Assessments for K-12 & University Campuses
Step Into Security Webinar - Threat Assessments for K-12 & University CampusesStep Into Security Webinar - Threat Assessments for K-12 & University Campuses
Step Into Security Webinar - Threat Assessments for K-12 & University CampusesKeith Harris
 
Step Into Security Webinar - Securing Campuses for the New School Year
Step Into Security Webinar - Securing Campuses for the New School Year Step Into Security Webinar - Securing Campuses for the New School Year
Step Into Security Webinar - Securing Campuses for the New School Year Keith Harris
 
Step Into Security Webinar - Threat Assessments in Schools
Step Into Security Webinar - Threat Assessments in SchoolsStep Into Security Webinar - Threat Assessments in Schools
Step Into Security Webinar - Threat Assessments in SchoolsKeith Harris
 
Step Into Security Webinar – Best Practices for Bomb Threat Response at Schools
Step Into Security Webinar – Best Practices for Bomb Threat Response at SchoolsStep Into Security Webinar – Best Practices for Bomb Threat Response at Schools
Step Into Security Webinar – Best Practices for Bomb Threat Response at SchoolsKeith Harris
 
Step Into Security Webinar - Video Surveillance in Classrooms & Around Campus
Step Into Security Webinar - Video Surveillance in Classrooms & Around Campus Step Into Security Webinar - Video Surveillance in Classrooms & Around Campus
Step Into Security Webinar - Video Surveillance in Classrooms & Around Campus Keith Harris
 
Step Into Security Webinar - School Emergency Response Plans & The Active Sho...
Step Into Security Webinar - School Emergency Response Plans & The Active Sho...Step Into Security Webinar - School Emergency Response Plans & The Active Sho...
Step Into Security Webinar - School Emergency Response Plans & The Active Sho...Keith Harris
 

More from Keith Harris (6)

Step Into Security Webinar - Threat Assessments for K-12 & University Campuses
Step Into Security Webinar - Threat Assessments for K-12 & University CampusesStep Into Security Webinar - Threat Assessments for K-12 & University Campuses
Step Into Security Webinar - Threat Assessments for K-12 & University Campuses
 
Step Into Security Webinar - Securing Campuses for the New School Year
Step Into Security Webinar - Securing Campuses for the New School Year Step Into Security Webinar - Securing Campuses for the New School Year
Step Into Security Webinar - Securing Campuses for the New School Year
 
Step Into Security Webinar - Threat Assessments in Schools
Step Into Security Webinar - Threat Assessments in SchoolsStep Into Security Webinar - Threat Assessments in Schools
Step Into Security Webinar - Threat Assessments in Schools
 
Step Into Security Webinar – Best Practices for Bomb Threat Response at Schools
Step Into Security Webinar – Best Practices for Bomb Threat Response at SchoolsStep Into Security Webinar – Best Practices for Bomb Threat Response at Schools
Step Into Security Webinar – Best Practices for Bomb Threat Response at Schools
 
Step Into Security Webinar - Video Surveillance in Classrooms & Around Campus
Step Into Security Webinar - Video Surveillance in Classrooms & Around Campus Step Into Security Webinar - Video Surveillance in Classrooms & Around Campus
Step Into Security Webinar - Video Surveillance in Classrooms & Around Campus
 
Step Into Security Webinar - School Emergency Response Plans & The Active Sho...
Step Into Security Webinar - School Emergency Response Plans & The Active Sho...Step Into Security Webinar - School Emergency Response Plans & The Active Sho...
Step Into Security Webinar - School Emergency Response Plans & The Active Sho...
 

Recently uploaded

专业一比一美国旧金山艺术学院毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
专业一比一美国旧金山艺术学院毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree专业一比一美国旧金山艺术学院毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
专业一比一美国旧金山艺术学院毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degreeyuu sss
 
(办理学位证)韩国汉阳大学毕业证成绩单原版一比一
(办理学位证)韩国汉阳大学毕业证成绩单原版一比一(办理学位证)韩国汉阳大学毕业证成绩单原版一比一
(办理学位证)韩国汉阳大学毕业证成绩单原版一比一C SSS
 
Real Sure (Call Girl) in I.G.I. Airport 8377087607 Hot Call Girls In Delhi NCR
Real Sure (Call Girl) in I.G.I. Airport 8377087607 Hot Call Girls In Delhi NCRReal Sure (Call Girl) in I.G.I. Airport 8377087607 Hot Call Girls In Delhi NCR
Real Sure (Call Girl) in I.G.I. Airport 8377087607 Hot Call Girls In Delhi NCRdollysharma2066
 
(办理学位证)加州州立大学北岭分校毕业证成绩单原版一比一
(办理学位证)加州州立大学北岭分校毕业证成绩单原版一比一(办理学位证)加州州立大学北岭分校毕业证成绩单原版一比一
(办理学位证)加州州立大学北岭分校毕业证成绩单原版一比一Fi sss
 
Erfurt FH学位证,埃尔福特应用技术大学毕业证书1:1制作
Erfurt FH学位证,埃尔福特应用技术大学毕业证书1:1制作Erfurt FH学位证,埃尔福特应用技术大学毕业证书1:1制作
Erfurt FH学位证,埃尔福特应用技术大学毕业证书1:1制作f3774p8b
 
定制(UI学位证)爱达荷大学毕业证成绩单原版一比一
定制(UI学位证)爱达荷大学毕业证成绩单原版一比一定制(UI学位证)爱达荷大学毕业证成绩单原版一比一
定制(UI学位证)爱达荷大学毕业证成绩单原版一比一ss ss
 
定制(USF学位证)旧金山大学毕业证成绩单原版一比一
定制(USF学位证)旧金山大学毕业证成绩单原版一比一定制(USF学位证)旧金山大学毕业证成绩单原版一比一
定制(USF学位证)旧金山大学毕业证成绩单原版一比一ss ss
 
萨斯喀彻温大学毕业证学位证成绩单-购买流程
萨斯喀彻温大学毕业证学位证成绩单-购买流程萨斯喀彻温大学毕业证学位证成绩单-购买流程
萨斯喀彻温大学毕业证学位证成绩单-购买流程1k98h0e1
 
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)861c7ca49a02
 
专业一比一美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
专业一比一美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree专业一比一美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
专业一比一美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degreeyuu sss
 
the cOMPUTER SYSTEM - computer hardware servicing.pptx
the cOMPUTER SYSTEM - computer hardware servicing.pptxthe cOMPUTER SYSTEM - computer hardware servicing.pptx
the cOMPUTER SYSTEM - computer hardware servicing.pptxLeaMaePahinagGarciaV
 
原版1:1复刻斯坦福大学毕业证Stanford毕业证留信学历认证
原版1:1复刻斯坦福大学毕业证Stanford毕业证留信学历认证原版1:1复刻斯坦福大学毕业证Stanford毕业证留信学历认证
原版1:1复刻斯坦福大学毕业证Stanford毕业证留信学历认证gwhohjj
 
毕业文凭制作#回国入职#diploma#degree加拿大瑞尔森大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree加拿大瑞尔森大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree 毕业文凭制作#回国入职#diploma#degree加拿大瑞尔森大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree加拿大瑞尔森大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree z zzz
 
Hifi Babe North Delhi Call Girl Service Fun Tonight
Hifi Babe North Delhi Call Girl Service Fun TonightHifi Babe North Delhi Call Girl Service Fun Tonight
Hifi Babe North Delhi Call Girl Service Fun TonightKomal Khan
 
美国IUB学位证,印第安纳大学伯明顿分校毕业证书1:1制作
美国IUB学位证,印第安纳大学伯明顿分校毕业证书1:1制作美国IUB学位证,印第安纳大学伯明顿分校毕业证书1:1制作
美国IUB学位证,印第安纳大学伯明顿分校毕业证书1:1制作ss846v0c
 
vip Krishna Nagar Call Girls 9999965857 Call or WhatsApp Now Book
vip Krishna Nagar Call Girls 9999965857 Call or WhatsApp Now Bookvip Krishna Nagar Call Girls 9999965857 Call or WhatsApp Now Book
vip Krishna Nagar Call Girls 9999965857 Call or WhatsApp Now Bookmanojkuma9823
 
1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degreeyuu sss
 
毕业文凭制作#回国入职#diploma#degree美国威斯康星大学麦迪逊分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#d...
毕业文凭制作#回国入职#diploma#degree美国威斯康星大学麦迪逊分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#d...毕业文凭制作#回国入职#diploma#degree美国威斯康星大学麦迪逊分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#d...
毕业文凭制作#回国入职#diploma#degree美国威斯康星大学麦迪逊分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#d...ttt fff
 

Recently uploaded (20)

专业一比一美国旧金山艺术学院毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
专业一比一美国旧金山艺术学院毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree专业一比一美国旧金山艺术学院毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
专业一比一美国旧金山艺术学院毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
 
(办理学位证)韩国汉阳大学毕业证成绩单原版一比一
(办理学位证)韩国汉阳大学毕业证成绩单原版一比一(办理学位证)韩国汉阳大学毕业证成绩单原版一比一
(办理学位证)韩国汉阳大学毕业证成绩单原版一比一
 
Real Sure (Call Girl) in I.G.I. Airport 8377087607 Hot Call Girls In Delhi NCR
Real Sure (Call Girl) in I.G.I. Airport 8377087607 Hot Call Girls In Delhi NCRReal Sure (Call Girl) in I.G.I. Airport 8377087607 Hot Call Girls In Delhi NCR
Real Sure (Call Girl) in I.G.I. Airport 8377087607 Hot Call Girls In Delhi NCR
 
(办理学位证)加州州立大学北岭分校毕业证成绩单原版一比一
(办理学位证)加州州立大学北岭分校毕业证成绩单原版一比一(办理学位证)加州州立大学北岭分校毕业证成绩单原版一比一
(办理学位证)加州州立大学北岭分校毕业证成绩单原版一比一
 
young call girls in Gtb Nagar,🔝 9953056974 🔝 escort Service
young call girls in Gtb Nagar,🔝 9953056974 🔝 escort Serviceyoung call girls in Gtb Nagar,🔝 9953056974 🔝 escort Service
young call girls in Gtb Nagar,🔝 9953056974 🔝 escort Service
 
Erfurt FH学位证,埃尔福特应用技术大学毕业证书1:1制作
Erfurt FH学位证,埃尔福特应用技术大学毕业证书1:1制作Erfurt FH学位证,埃尔福特应用技术大学毕业证书1:1制作
Erfurt FH学位证,埃尔福特应用技术大学毕业证书1:1制作
 
定制(UI学位证)爱达荷大学毕业证成绩单原版一比一
定制(UI学位证)爱达荷大学毕业证成绩单原版一比一定制(UI学位证)爱达荷大学毕业证成绩单原版一比一
定制(UI学位证)爱达荷大学毕业证成绩单原版一比一
 
定制(USF学位证)旧金山大学毕业证成绩单原版一比一
定制(USF学位证)旧金山大学毕业证成绩单原版一比一定制(USF学位证)旧金山大学毕业证成绩单原版一比一
定制(USF学位证)旧金山大学毕业证成绩单原版一比一
 
萨斯喀彻温大学毕业证学位证成绩单-购买流程
萨斯喀彻温大学毕业证学位证成绩单-购买流程萨斯喀彻温大学毕业证学位证成绩单-购买流程
萨斯喀彻温大学毕业证学位证成绩单-购买流程
 
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
 
专业一比一美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
专业一比一美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree专业一比一美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
专业一比一美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
 
the cOMPUTER SYSTEM - computer hardware servicing.pptx
the cOMPUTER SYSTEM - computer hardware servicing.pptxthe cOMPUTER SYSTEM - computer hardware servicing.pptx
the cOMPUTER SYSTEM - computer hardware servicing.pptx
 
原版1:1复刻斯坦福大学毕业证Stanford毕业证留信学历认证
原版1:1复刻斯坦福大学毕业证Stanford毕业证留信学历认证原版1:1复刻斯坦福大学毕业证Stanford毕业证留信学历认证
原版1:1复刻斯坦福大学毕业证Stanford毕业证留信学历认证
 
毕业文凭制作#回国入职#diploma#degree加拿大瑞尔森大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree加拿大瑞尔森大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree 毕业文凭制作#回国入职#diploma#degree加拿大瑞尔森大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree加拿大瑞尔森大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
 
Hifi Babe North Delhi Call Girl Service Fun Tonight
Hifi Babe North Delhi Call Girl Service Fun TonightHifi Babe North Delhi Call Girl Service Fun Tonight
Hifi Babe North Delhi Call Girl Service Fun Tonight
 
美国IUB学位证,印第安纳大学伯明顿分校毕业证书1:1制作
美国IUB学位证,印第安纳大学伯明顿分校毕业证书1:1制作美国IUB学位证,印第安纳大学伯明顿分校毕业证书1:1制作
美国IUB学位证,印第安纳大学伯明顿分校毕业证书1:1制作
 
vip Krishna Nagar Call Girls 9999965857 Call or WhatsApp Now Book
vip Krishna Nagar Call Girls 9999965857 Call or WhatsApp Now Bookvip Krishna Nagar Call Girls 9999965857 Call or WhatsApp Now Book
vip Krishna Nagar Call Girls 9999965857 Call or WhatsApp Now Book
 
9953330565 Low Rate Call Girls In Jahangirpuri Delhi NCR
9953330565 Low Rate Call Girls In Jahangirpuri  Delhi NCR9953330565 Low Rate Call Girls In Jahangirpuri  Delhi NCR
9953330565 Low Rate Call Girls In Jahangirpuri Delhi NCR
 
1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
 
毕业文凭制作#回国入职#diploma#degree美国威斯康星大学麦迪逊分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#d...
毕业文凭制作#回国入职#diploma#degree美国威斯康星大学麦迪逊分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#d...毕业文凭制作#回国入职#diploma#degree美国威斯康星大学麦迪逊分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#d...
毕业文凭制作#回国入职#diploma#degree美国威斯康星大学麦迪逊分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#d...
 

Step Into Security Webinar - Physical Security Integration & Access Control - Part Two - Software & Best Practices

  • 1. Physical Security Integration & Access Control --- Part 2: Software & Best Practices
  • 2. Keith Harris Marketing Manager LENSEC Today’s Panelist Expertise in Photography & Video Production Experience in Physical Security Market Trainer for Surveillance & Physical Security Techniques
  • 3. Webinar Sponsor Based in Houston, TX Since 1998 IP Video Management System Design Installation Project Management LENSEC is committed to empowering our clients and partners to prevent or mitigate physical security risks. We want to help protect people and assets as well as improve operations through our evolutionary and intuitive technology. We can do this by providing expertise in security and software development. Our Mission
  • 4. Webinar Logistics Q&A at the end Questions for the panelist Audio from attendees muted Poll questions Survey LENSEC Step Into Security Webinar Archive: http://bit.ly/SISarchive
  • 5. Training Goal Physical Security Integration & Access Control Part 2: Software & Best Practices Topics for Webinar: Access Control Management Software Unifying Physical Security Platforms Best Practices Reviewing Components LENSEC Step Into Security Webinar Archive: http://bit.ly/SISarchive
  • 6. Elements Live View Interface Current Status Door Management Device Configuration Rules/Schedules Cardholder Management Reporting Access Control Management Software Physical Security Integration & Access Control
  • 7. Live View Interface Door Event Alarm Event Lock/Unlock Controls Access Control Management Software Physical Security Integration & Access Control
  • 8. Poll Question Poll Question #1 Access control rules apply to…
  • 9. Door Management Device Configuration Rules/Schedules Access Control Management Software Physical Security Integration & Access Control
  • 10. Scheduling After Hours Access Weekend Access Holiday Schedules Access Control Management Software Physical Security Integration & Access Control
  • 11. Cardholder Management Groups/Roles Privileges/Permissions Users/Credentials Access Control Management Software Physical Security Integration & Access Control
  • 12. Reporting Access Control Management Software Physical Security Integration & Access Control
  • 13. Access Control Levels Flat Configuration Operational Vulnerabilities Access Control Best Practices Physical Security Integration & Access Control
  • 14. Access Control Levels Advanced Configuration System Segregation Accountability Escortability Physical Security Integration & Access Control Access Control Best Practices
  • 15. Physical Security Integration & Access Control
  • 16. Physical Security Integration & Access Control
  • 17. Multi-site Management Enterprise Access Control Systems Physical Security Integration & Access Control
  • 18. Enterprise Features Third Party Integration Payroll Visitor Management Accounting Systems SQL Database Single Sign On Active Directory/LDAP Enterprise Access Control Systems Physical Security Integration & Access Control
  • 19. Integrating Physical Security Platforms Security Footprint Building Safety Systems Unifying Physical Security Platforms Physical Security Integration & Access Control
  • 20. Video Verification Access Control Management Physical Security Integration & Access Control
  • 21. Visitor Management Time & Attendance Integrating Physical Security Systems Physical Security Integration & Access Control
  • 23. Mustering Anti-Passback Access Control Methods Preventing Door Propping Management & Policies Access Control Best Practices Physical Security Integration & Access Control
  • 24. Mustering Did Everyone Make It Out? Area Tracking Checking In Access Control Best Practices Physical Security Integration & Access Control
  • 25. Anti-Passback Controls Time Limit Reader Pattern & Flow Access Control Best Practices Physical Security Integration & Access Control
  • 26. Tailgating/Piggybacking Detectors Hold Open Alarms Turnstiles & Revolving Doors Mantraps/Airlocks IP Camera Video Analytics Special Use Access Control Elevators Sallyports Access Control Best Practices Physical Security Integration & Access Control
  • 27. Door Propping Convenience vs. Security Access Control Best Practices Physical Security Integration & Access Control
  • 28. Human Resources Employment Status Change Security Report Out Collecting Credentials Access Control Best Practices Physical Security Integration & Access Control
  • 29. Card Holder Database Operational Response Database Performance Reuse of Credentials Access Control Management – Best Practices Physical Security Integration & Access Control
  • 30. Rules & Standards Fail Safe/Fail Secure Choosing Locks Exit Devices Credentials Card Readers Door Controllers Authorization Interface Access Control Review – Components & Concepts Physical Security Integration & Access Control Step Into Security Webinar – Physical Security Integration & Access Control – Part One: Concepts & Components - http://bit.ly/SIS5-16
  • 31. Building & Fire Codes NFPA – National Fire Protection Association AHJ Rules & Standards Review Physical Security Integration & Access Control National Fire Protection Assoc. Codes & Standards: http://www.nfpa.org/codes-and-standards/document-information-pages International Building Code: http://www.iccsafe.org/codes-tech-support/codes/2015-i-codes/ibc/
  • 32. Poll Question Poll Question #3 True or False: Most doors default to Fail Safe if you don’t have direction from the specifications or AHJ.
  • 33. Access Control Concepts Review Physical Security Integration & Access Control Fail Safe – Locks are Released Fail Secure – Locks are Secured Applies to Entry Control Only Manual Egress Allowed
  • 34. Choosing Locks Access Control Components Review Physical Security Integration & Access Control Cylindrical Lock Mortise Lock Surface Lock Deadbolt Lock Deadlatch Lock Maglock Door Strike Electronic Lockset
  • 35. Exit Devices Request To Exit Crash Bar PIR-RTE Push Button Access Control Components Review Physical Security Integration & Access Control Crash Bar PRI-RTE Push Button RTE
  • 36. Credentials Card Reader Door Controller Access Control Server Access Control Components Review Physical Security Integration & Access Control Keyfob Badge Clamshell
  • 37. Authorization Factors Multifactor Credentials Possession: Something You Have Knowledge: Something You Know Characteristic: Something You Are Trusted Verification: Someone Trusted Verifies You Access Control Concepts Review Physical Security Integration & Access Control
  • 38. Authorization Interface Keypad Biometrics Retinal/Iris Scan Fingerprint Access Control Components Review Physical Security Integration & Access Control
  • 39. Fingerprint Theft Liveness Detection Solutions Tissue Reflection Heartbeat Detection Dermal Electric Resistance Unnatural Analysis The Future of Access Control Technology Physical Security Integration & Access Control
  • 40. Near Field Communication (NFC) Bluetooth Low Energy (BLE) The Future of Access Control Technology Physical Security Integration & Access Control Near Field Communication
  • 42. Contacts Keith Harris LENSEC (512) 913-3907 kharris@lensec.com
  • 44. SIS7-16 Webinar – Physical Security Integration & Access Control Part Two: Software & Best Practices Questions & Answers Poll Question #1 Access control rules apply to… 1. Doors 2. Users 3. Doors or Users, depending on the access control system 4. Neither 5. I don’t know Poll Question #2 What is mustering? 1. Something you put on a sandwich 2. A technique for testing a server before deployment 3. Assembling the troops during inspection or events 4. Process for cutting into a door to install a mortise strike 5. I don’t know Poll Question #3 True or False: Most doors default to Fail Safe if you don’t have direction from the specifications or the AHJ. 1) True 2) False What is Ingress & Egress? This is a topic I covered last month in Part One. Ingress is traffic that is flowing into the building. This is the most common place for an authorization point – building entrances. Egress is traffic that is flowing out of the building. Sometimes in higher security settings, authorization is logged at the egress point of a building as well.
  • 45. When you are evaluating an RFP to decide if you should pursue an access control project, are there certain things to keep in mind? Where should I begin? That could be a whole webinar in itself. Request For Proposals are notoriously vague and usually don’t give you all the answers to the questions. That’s where the building code and conversations with the AHJ come in. But you may not do that research until much later after you win the project. The typical RFP usually does a great job lining out the contractual language from the agency or owner’s point of view. But, the contractor typically has to make a lot of educated guesses when they are preparing the project for bid. Cover your bases and ask lots of questions. If you have a chance to go on a site visit – go. It will be well worth your time to walk the installation site. Get a picture in your mind about the entire scope of work and how that affects your part of the project. Go and actually see the door openings, if it isn’t new construction. A picture is literally worth a thousand words in this. The contracting agency or owner will hold you to the contract in spite of the lack of details in the RFP. You, as the contractor, should assume that you have your bases covered if you choose to enter into the contract with the owner. There are a lot of things to consider when planning an access control project. How do I make sure all my bases are covered? I recommend not tackling installation on your own as an amateur. There are just some things that require skill to accomplish. For example, if you’ve never cut into a door before to install a mortise strike, you might consider whether you would want to buy a replacement door or just hire the right guy with the right certification to do the job right the first time. If you plan to do many of these, you may want to get trained and certified as an installer. There are several places you can receive certification. Some are general certifications, such as those presented by security industry associations. And, others are presented by manufacturers including details about their product. I also recommend doing a lot of research on your own. Tackling a large scope project will require a lot of forethought and planning to make sure your bases are covered. We’ll present a webinar in July that addresses that topic. We’re covering Planning Security Technology Upgrades in next month’s Step Into Security Webinar. When we follow up, we’ll provide more details and a link so you can register for that free security training event. What is the difference between an access control panel and an IP based or server based access control system? Well, we didn’t get to much into that in our presentation due to lack of time to address all topics. Some access systems have no server. The system controllers or panels contain the hardware for administering the system. Under these circumstances, no external server is needed. You will find this more common in small or highly dispersed access systems.
  • 46. An example of this is the Axis Entry Manager that is available for Axis security systems. This solution is not a full-featured enterprise system. It is only designed to control up to 66 doors and misses out on several ‘nice-to-have’ features – such as no Live View and no Reporting. Why are fire doors fail secure? It’s critical for fire doors to stay closed during a fire. The fire door provides structural barriers to prevent a fire from spreading throughout a building. This is a life safety issue. While it may not make sense to lock a door during a fire, keep in mind these are ingress or interior doors and not emergency exits. Emergency exits MUST allow egress at all times. Again, when we are saying Fail Secure, this means the door locks when power fails. At any rate, careful planning is required. If you have more questions about Fail Safe or Fail Secure, you should take a look at Part One of this webinar series. We cover the topic extensively. What is a delayed egress door? A Delayed Egress Door is also referred to as a “Nanny” Door. These are systems that temporarily lock inhabitants in. They are uses sometimes in nursing facilities or psychiatric wards in hospitals. These doors are subject to special authority. The will probably be governed by code. The code will cover specifics like how long to delay period can be – 15 to 30 seconds is common. They may even sound an alarm before opening.