planning, designing and deploying crime prevention through environmental design (CPTED) physical electronic infrastructure
The adoption and integration of technology into operational spaces has influenced many aspects of capital planning. Once perceived to be a simple connectivity and productivity tool, the telecommunications infrastructure now serves as a utility providing connectivity for building electronic security systems, syncing legacy stand-alone systems, instant relay of enterprise-wide communications, and the backbone for video surveillance.
Supporting all these critical functions translates into a higher level of technical competency to properly plan and capitalize on the benefits and reduction in overall total cost of ownership within the operating environment. A qualified consultant needs to understand the interoperability and implications of the physical infrastructure and logical network architecture in order to optimize systems, meet immediate utilization goals and poise for future enhancements.
In terms of electronic security, the ability for devices and disparate systems to communicate in a common language and network protocol is vital to realizing the full benefit of security and IT investments. Understanding the information transmitted, how it is transmitted and prioritized within the network is critical to a well-integrated, well-executed networked security system. The technical nature of the cabling - physical (Layer 1), data link (Layer 2) and network (Layer 3) - influence and often confine or restrict the ability to realize the business value of integrated systems. The science behind security system planning, adaptation and integration is more sophisticated than the “plug and play” approach. Engaging professionals with the knowledge base and skillsets to better utilize existing investments not only reduces initial spend and TCO but can also significantly contribute to other business and operational goals during the life cycle of the systems and applications.
When defining an integrated approach and deciding whether to adopt an IP-based system, it is also important to assess the criticality of the system’s performance in the event of a threat to person or property. Identifying the operation’s vulnerability to an event will aid in defining each system’s priority, an enterprise standard and subsequent localized adaptations in deployment.