• No results found

How to Implement a Unified Security Management Platform:

N/A
N/A
Protected

Academic year: 2021

Share "How to Implement a Unified Security Management Platform:"

Copied!
40
0
0

Loading.... (view fulltext now)

Full text

(1)

How to Implement a Unified

Security Management Platform:

A Case Study From the University of Kentucky

Nathan Brown

University of Kentucky Police Major

Tom Sorrell, RCDD

BCCLT, Inc.

A Case Study From the University of Kentucky

Nathan Brown

University of Kentucky Police Major

Tom Sorrell, RCDD

(2)

Agenda

• Introductions

• Legacy State of UK SMS/VMS • System Architecture - RFP

• New Deployment/Integration • Robbery Case Study

• Lessons Learned • Questions • Introductions • Legacy State of UK SMS/VMS • System Architecture - RFP • New Deployment/Integration • Robbery Case Study

• Lessons Learned • Questions

(3)

UK’s Dilemma

• Who owns security? Who is responsible? • How can UK justifiably “throw away” existing

security infrastructure?

• How can UK manage disparate

technological upgrades for student and staff services?

• How can UK control procurement?

• How can UK afford reoccurring costs?

• Who owns security? Who is responsible? • How can UK justifiably “throw away” existing

security infrastructure?

• How can UK manage disparate

technological upgrades for student and staff services?

• How can UK control procurement?

(4)
(5)

Pre-Project Conditions

Approximately 1,500 Existing Cameras On Campus

Analog and IP mix

Many Manufacturers and Models

No Central Management: DVR’s, NVR’s, VCR’s, CCTV Monitoring

Out of date University Electronic Security Standards No Electronic Security Master Plan

No Central Ownership

Approximately 1,500 Existing Cameras On Campus Analog and IP mix

Many Manufacturers and Models

No Central Management: DVR’s, NVR’s, VCR’s, CCTV Monitoring

Out of date University Electronic Security Standards No Electronic Security Master Plan

(6)

How is this accomplished?

Convergence Video + Access Control + Other Devices This Information Is Then Converted Into Events What Triggers An Event?

Camera Information Access Control

Emergency Call Boxes Contact Closure Devices Audio Detection Devices

Convergence Events

How is this accomplished?

Convergence Video + Access Control + Other Devices This Information Is Then Converted Into Events What Triggers An Event?

Camera Information Access Control

Emergency Call Boxes Contact Closure Devices Audio Detection Devices

(7)

What Is Being Done In Other

Campus Environments?

Merging Access Control Systems with: – Video Management Systems

– Audio

– Analytics

– Panic Alarms

Merging Access Control Systems with: – Video Management Systems

– Audio

– Analytics

(8)

Threat Deterrent

Improved Response Time

Situational Awareness and Improved Safety for First Responders

Video Forensics

Parent Reassurance and Peace of Mind

Safety Improvements

Threat Deterrent

Improved Response Time

Situational Awareness and Improved Safety for First Responders

Video Forensics

(9)

How Do These Features Improve Safety?

• Threat Deterrent

• Improved Response Time

• Situational Awareness and Improved Safety for First Responders

• Video Forensics

• Parent Reassurance and Peace of Mind • Threat Deterrent

• Improved Response Time

• Situational Awareness and Improved Safety for First Responders

• Video Forensics

(10)

How Is This Accomplished ?

Convergence Video + Access Control + Other Devices

This Information Is Then Converted Into Events

What Triggers An Event ?

Camera Information

Access Control

Emergency Call Boxes

Contact Closure Devices

Audio Detection Devices

Convergence Video + Access Control + Other Devices

This Information Is Then Converted Into Events

What Triggers An Event ?

Camera Information

Access Control

Emergency Call Boxes

Contact Closure Devices

(11)

UK Facility Staff UK Facility Staff

First Responder

First Responder Status of Local Cameras

UK Police UK Police

First Responder

(12)

UK Objectives

Form an Executive Security Committee

Assess legacy campus security systems

Engage users and assess needs

Review of current and future needs with UKPD and Administration

Evaluate current security technology solutions available industry wide

Determine security feature sets desired

Issue a RFP for Integrated Security System

Select Security Integrator

Integrate Video, Access Control and Emergency Notification

Form an Executive Security Committee

Assess legacy campus security systems

Engage users and assess needs

Review of current and future needs with UKPD and Administration

Evaluate current security technology solutions available industry wide

Determine security feature sets desired

Issue a RFP for Integrated Security System

Select Security Integrator

(13)

System Objectives

Based on Open Architecture components

Smart Pro-Active System

Event Driven / Alert Based

SMS / VMS to work as one platform

Web Based system, no thick or thin clients required

Fully Integrated Mobile Devices

No on-going License Fees

Bandwidth Impacts / Local and Wide Area

Distributed rather than Centralized Topology and impacts

Integration of Key Legacy Systems without the use of PSIMS

Based on Open Architecture components

Smart Pro-Active System

Event Driven / Alert Based

SMS / VMS to work as one platform

Web Based system, no thick or thin clients required

Fully Integrated Mobile Devices

No on-going License Fees

Bandwidth Impacts / Local and Wide Area

Distributed rather than Centralized Topology and impacts

(14)
(15)

Hierarchy Objectives

Develop Delegated Authority Administration Model

Develop Business Units

Assign Database Administrator (UKPD)

Assign BSA Business Security Authority

Assign BSM Business Security Manager

Delegated Authority to Local Building Users Develop Delegated Authority Administration Model

Develop Business Units

Assign Database Administrator (UKPD)

Assign BSA Business Security Authority

Assign BSM Business Security Manager

(16)

Business Security Authorities

Each building will be required to have a business security authority relationship.

Will have capability to manage their own “security system” with Police backup.

Will have knowledge of the building operations and occupants to ensure proper access rights. Approved by the Division Head/Dean

Each building will be required to have a business security authority relationship.

Will have capability to manage their own “security system” with Police backup.

Will have knowledge of the building operations and occupants to ensure proper access rights. Approved by the Division Head/Dean

(17)
(18)

Exterior Notification

Emergency Notification Outdoor Speakers

Camera Talk-A-Phone Driven Events:

Exterior Notification Tower:

Talk-A-Phone VOIP Emergency Phone

Emergency Notification Outdoor Speakers

(19)
(20)
(21)

Interior Notification

Alarm system to keep people in buildings.

Partnership with UK Fire Marshal and Office of Institutional Equity and Equal Opportunity

Alarm system to keep people in buildings.

Partnership with UK Fire Marshal and Office of Institutional Equity and Equal Opportunity

(22)
(23)

Functions of the Wildcard

Identification UK Plus Account Kronos UK Library Card Security Verification Key Not a GPS device Identification UK Plus Account Kronos UK Library Card Security Verification Key Not a GPS device

(24)
(25)
(26)

Cameras/Video Management

Event Driven Video Management

Allows visual confirmation for alerts and other calls for service

Prepares first responders, building

operators, and Business Security Authorities

Assists in searching for active situations Event Driven Video Management

Allows visual confirmation for alerts and other calls for service

Prepares first responders, building

operators, and Business Security Authorities

(27)
(28)
(29)
(30)

Gateways

What is a Gateway?

What does the Gateways do?

How does this impact my planning? Who has access to the Gateways? What is a Gateway?

What does the Gateways do?

How does this impact my planning? Who has access to the Gateways?

(31)

Gateways Functions

Analytics:

People Counting

,

Line Crossing, Activity, Face Capture, Dwell Time, Object Taken, Object Moved, Facial

Recognition, License Plate Recognition Lock Down:

UKPD has the ability to from the Central Operations Center to lock Perimeter Doors of any Access

Controlled building or group of Buildings at any time. Analytics:

People Counting

,

Line Crossing, Activity, Face Capture, Dwell Time, Object Taken, Object Moved, Facial

Recognition, License Plate Recognition Lock Down:

UKPD has the ability to from the Central Operations Center to lock Perimeter Doors of any Access

(32)

Integration Team

• UK Police • UK CPMD • UK IT

• BCCLT Consulting Engineers • Next Level Security Systems

• University of Kentucky Community • UK Police

• UK CPMD • UK IT

• BCCLT Consulting Engineers • Next Level Security Systems

(33)

Robbery 1

st

(3-31-2014)

• Victim walking south on S. Limestone under pedway approached by three subjects brandishing firearm

• Victim refused to give money or property

• Victim fled from the three subjects and immediately called 9-1-1

• Victim walking south on S. Limestone under pedway approached by three subjects brandishing firearm

• Victim refused to give money or property

• Victim fled from the three subjects and immediately called 9-1-1

(34)

Officers Response

• One officer immediately dispatched to interview victim and obtain description • Subjects matching description observed

at S. Upper and Boliver and interviewed by two other officers

• Victim identified suspects who are transported to UKPD for questioning • One officer immediately dispatched to

interview victim and obtain description • Subjects matching description observed

at S. Upper and Boliver and interviewed by two other officers

• Victim identified suspects who are transported to UKPD for questioning

(35)
(36)

Investigation

• As the suspects were being interviewed the video footage was reviewed

• It became apparent that one of the subjects in the recordings was not presently detained

• This allowed officers to better interrogate and determine the missing person subject

• Officers worked with LPD and to coordinate a traffic stop and make arrest, recover weapon • As the suspects were being interviewed the

video footage was reviewed

• It became apparent that one of the subjects in the recordings was not presently detained

• This allowed officers to better interrogate and determine the missing person subject

• Officers worked with LPD and to coordinate a traffic stop and make arrest, recover weapon

(37)

All Systems Deployed

• Exterior Notification (Talk-a-Phone) • UK Alert (email, phone, text)

• Automatic locks confirmed secure facilities Main, Student Ctr, POT, Whitehall

• Cats Path cameras utilized to observe subjects, gather evidence, and enhance interrogations

• Well trained, certified Police officers • Exterior Notification (Talk-a-Phone) • UK Alert (email, phone, text)

• Automatic locks confirmed secure facilities Main, Student Ctr, POT, Whitehall

• Cats Path cameras utilized to observe subjects, gather evidence, and enhance interrogations

(38)

Lessons Learned

• ID Card central focus of security system • Stakeholders provide input not decisions • Develop an integration team and an

expansion team

• Create the security standard immediately • Educate capital project management

• Respond to concerned community

• ID Card central focus of security system • Stakeholders provide input not decisions • Develop an integration team and an

expansion team

• Create the security standard immediately • Educate capital project management

(39)
(40)

Contact Information

Major Nathan Brown

nathan.brown@uky.edu

Tom Sorrell

sorrell@bcclt.com Major Nathan Brown

nathan.brown@uky.edu

Tom Sorrell

References

Related documents

On July 26, 1926, the Crane Normal Institute became the Crane Department of Music of the Potsdam Normal School, later becoming The Crane School of Music, State University of New

Profession Player Liabilities Home Mortgage: School Loans: Car Loans: Credit Cards: Retail Debt: RE Mortgage: Liability: (Business) Bank Loan: Assets Savings:.

INTEGRATED SEXUAL HEALTH SERVICES IUD/IUS PROTOCOL Policy Details NHFT document reference MMPr005 Version Final Date Ratified 19.01.16.. Ratified by Medicines

How do they interact in promoting students' science understanding - In: American educational research journal 52 (2015) 6, S.. 1-27 -

Keywords: Multicultural Family; National Health Programs; Preventive Health Services; Patient Satisfaction; Concern.. 다문화가족의 건강검진에 대한 관심과 만족도에

Virginia Commonwealth University, Richmond, Virginia Studio Art (Painting and Mixed Media concentration). 1996 Bachelor of Liberal Studies in

Is managed to ensure that data stewards apply the standards of data governance and data quality, consistent with guidance provided by OHS advisory and oversight offices such

As the attacker requires a trunking favorable setting on the port, to defeat this attack, the administrator should disabling Auto-trunking (switchport mode access;