finer points of
electronic security

 

The heightened awareness of physical security has influenced the acceleration of electronic security and video security system installations. Coupled with the advancements in active electronics, IP and data systems, stakeholders are evaluating how they can implement a security protocol responsive to policy objectives while upholding cultural attitudes towards video security and access control. Leveraging their telecommunications investment, they are engaging our team for an integrated approach. 

To comply with a formalized policy, it is important to define how the system is expected to be administered; local adoption of technology and levels of sophistication; integration of devices into aesthetics; occupant culture; and maturity of the protocol.  Overlaying these outputs with crime prevention through environmental design (CPTED) principles the technical components are evaluated.

The advancements in physical cabling and pathways, network transmission, video applications and supporting infrastructure are pivotal to fully integrate security systems.  They are driving a new demand for consultants who fully understand how one influences the other as they demand a higher level of coordination across systems. Hargis has filled this void through our working knowledge of both physical and logical network and architecture.

AMAZON

Loss prevention is a critical aspect of fulfillment center operations. Managing the types of traffic (foot, mechanical, vehicular) and their respected points of entry calls for a highly coordinated effort spearheaded by our security consultants. In planning for 1+ million sf individual facilities with multiple points of entry and program spaces, we studied the operational flow through the space and associated through put rate requirements to define the control mechanism (door types, turnstile applications, gate controls) and the associated security devices to establish an enterprise standard.  Localizing the application, we engage the hardware manufacturer, security end-device manufacturer, electrical engineer and telecommunications counterpart to develop a fully integrated solution programmed to the specific functions throughout the interior and perimeter of the campus.  

DELOITTE | CANADA

This Fortune 500 global professional services firm set out to develop security policies, corporate security guidelines and an electronic security standard. The standard emphasized an approach to maintain a non-invasive system that complied with business and regulatory requirements that is inherently scalable in application by design (executive office to a full 18-story high-rise). Performance requirements were developed, designed and deployed for nearly 1 million sf of regional and headquarter office space, with tailored definitions for sites ranging from 13,000 to 420,000 sf

WASHINGTON STATE DEPARTMENT OF CORRECTIONS

Our co-authoring of the Enterprise Security Guidelines and subsequent Enterprise Video Security Master Plan initiated over $68 million in security upgrades across the 12-campus enterprise.  In order to align solutions with various custody levels (minimum to maximum and specialty offender units), campus backbone infrastructures and related IP-based systems were evaluated and upgraded at four separate 15-26+ building campuses representing over 1 million sf each of various ages of construction.

Efficiencies were integrated by defining procurement processes; conducting WAN traffic analysis, storage and archiving solutions; and coordinating other network, server and storage solutions as required. Global network IP schema, VLAN routing, Multicast traffic requirements and remote access facilities were also established. The video software platforms were reviewed, along with the change management procedures and opportunities for virtualization.

THE EVERGREEN STATE COLLEGE (Evergreen)

Evergreen took the opportunity to evaluate their 13-building upper campus life/safety systems as one to identify future infrastructure funding requests. The challenge facing the initiative was creating a framework and weighted mechanism for prioritizing criticality of system upgrades as each presented a potential risk to threat against people, property or continued operation should one fail. Hargis developed the framework and evaluated the independent and interdependent systems that process, transport and provide the information necessary to identify threats, alert persons of an event, and initiate an appropriate response. Recommendations were qualified and quantified with proposed approaches to address discreet issues or complete larger scale projects in phases. A subsequent engagement is evaluating the telecommunications backbone infrastructure and its capacity to enhance the campus security operations.