Page 128 - Security Today, March 2020
P. 128

you are protecting and the risk if a visitor slips through. In a university setting, it may be laboratories, proprietary work or expensive equip- ment. In hospitals, it might be pharmacies, birthing centers or psychiat- ric wings. If an authorized person enters a pharmacy, what regulations are you not adhering to? What money is lost if drugs are stolen?
A visitor management system enlists the help of employees and engages visitors the moment their appointment is scheduled. The visi- tor receives an email that includes an NDA they need to sign before entering and information about where to park. Once in the lobby, they can sign in using a kiosk or tablet, which automatically notifies the visitor of their arrival. They can receive a guest access badge that only allows access where they are authorized to be in the building, and will terminate once their allotted appointment time is over.
All of the visitor information helps campuses meet audit require- ments by providing an audit trail. Visitor management systems save money and help meet audit requirements.
Now Tie in Incidents
Universities, healthcare campuses and virtually any campus environ- ment needs to proactively investigate and manage incidents. Exam- ples of incidents needing investigation include theft, loitering, weath- er, active shooters, injuries, inspections and poor processes. What are the steps to dispatch an officer when an incident occurs? How do you notify an officer and provide the details about the incident?
Data capture plays a big role in the effectiveness of managing an incident. If you have officers writing notes at the scene, then return- ing to the security operations center to re-input into a form, file or Sharepoint site, the process is ineffective. When an incident occurs, information needs to be collected, sorted and managed effectively. How is that achieved?
Ad Index
After you review the incident and turn it into a case for investiga- tion, what steps are needed to pass the information to the right peo- ple to share, collaborate and work the case? Using paper or a USB is inefficient. You need to pass the information at the right time quickly and easily.
Using an incident and case management system that integrates with the rest of a security program can help manage the data, stream- line the process and resolve cases more quickly.
Once you have the data, what you do with it makes all the differ- ence. Understanding the data helps understand the likelihood of risk, where it is and how to manage it. The data helps you analyze trends and assign extra security when and where its needed.
What about Internal Threats?
Internal threats pose a high risk to campuses. People change their behavior before they are about to do something different, such as steal intellectual property. They attempt to enter areas at odd times, or try a door they don’t normally use. Managing internal threats using analytics identifies employee patterns to determine behavior abnormalities. Campuses can use machine learning via their open access control platform to perform threat analysis and add another layer of security and save time, money and headaches by catching someone before they commit an offense.
Implementing an open and integrated system provides the most secure and easy-to-execute security program for campuses needing to control access, manage identities and visitors and keep a tight rein on incidents. Capturing the right data using automated systems will help mitigate risk, meet compliance and save money.
Kim Rahfaldt is the Director of Media Relations at AMAG Technology.
Integrated Security
Advertiser..............................................Circle #............Page.........URL
Alarm Lock ....................................................706 ...................... 43 ................www.alarmlock.com
ASSA ABLOY DSS.....................................702 ...................... 5 ..................www.corbinrusswin.com/ml2000indicator-cs2020 CEIA USA .....................................................703 ...................... 7 ..................www.ceia-usa.com
Cyberlock ......................................................714 ...................... 27 ................www.cyberlock.com
Designed Security, Inc. (DSI)....................704 ...................... 9 ..................www.dsigo.com
Garrett Metal Detectors .............................705 ...................... 29 ................www.garrett.com IMRON..........................................................715......................25................www.imron.com
Nightlock .......................................................707 ...................... 13 ................www.classroomlockdown.com
Primex ............................................................712 ...................... 2 ..................www.onevue.com/notify ProdataKey....................................................718 ...................... 31 ................www.prodatakey.com/demo
Safety Technology International................711......................19................www.sti-usa.com/sp373
Salient Systems Corporation ....................708 ...................... 44 ................www.salientsys.com/products/cv20-20
SAS Technologies.......................................709......................17................www.sastechnologies.com
Viking Electronics ........................................701 ...................... 21 ................www.vikingelectronics.com
Zenitel USA, Inc...........................................710......................11................www.ic-edge.com
42 campuslifesecurity.com | MARCH/APRIL 2020


































































































   126   127   128   129   130