1 / 19

SECURITY HARDWARE & TECHNOLOGY

SECURITY HARDWARE & TECHNOLOGY. CCPOA REGION 3 TRAINING CLASS MAY 11, 2011. INTRODUCTION. Security Technologies available for HOME COMMERCIAL EDUCATIONAL. CPTED. Crime Prevention Through Environmental Design

llederer
Download Presentation

SECURITY HARDWARE & TECHNOLOGY

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. SECURITY HARDWARE &TECHNOLOGY CCPOA REGION 3 TRAINING CLASS MAY 11, 2011

  2. INTRODUCTION • Security Technologies available for • HOME • COMMERCIAL • EDUCATIONAL

  3. CPTED Crime Prevention Through Environmental Design • Idea………if a site is laid out well, the likelihood of it being targeted for a crime may be reduced • Definition………anticipation, recognition and appraisal of crime risk and the initiation of some action to remove or reduce it

  4. CPTED STRATEGIES • Natural Surveillance “see and be seen” Natural Access Control “control the traffic” Territorial Reinforcement “sphere of influence

  5. CPTED STRATEGIES • Maintenance • “broken window theory” • What technologies are available for us?

  6. CCTV CAMERAS • Why • Sense of security • Deterrence factor • Strong evidence • Use with personal defenders • Better use of site personnel

  7. CAMERAS con’t • Why Not • Expensive • Can be vandalized and broken • Need maintenance • Need assessments to determine need/location • Need technical knowledge (before and after)

  8. CAMERAS con’t • Where • Parking lots and driveways • Cafeterias • Patio and entry areas • Hallways • Main Offices • Doorways • Storage Areas (areas holding proprietary info) • IT areas, entrances and exits,

  9. ACCESS CONTROL SYSTEMS • Metal Detectors • Portals • Expensive ($3,000 - $40,000) • Require trained personnel • Does not do all the work • Hand Held Scanners • Only as good as the Operator • Inexpensive ; typically used with Portals • Not the best approach for full campus/building

  10. ACCESS CONTROL con’t • Entry Controlled Technologies (low tech) • Posted signs • Contract/Proprietary Guard • Parking Stickers • Minimal entrances/exits • Greeters • Badges • Identification Cards • Fences

  11. ACCESS CONTROL con’t • Entry Controlled Approaches • WHO let’s you in • WHAT you have • WHAT you know • WHO you are

  12. ACCESS CONTROL con’t • Duress Alarms/Panic Alarms • Pushbutton mounted in a fixed location • ID Alarm – portable device that identifies the owner of the device • ID Location Alarm – portable that tracks then identifies, locates and tracks the person who activated the alarm

  13. WHAT DO WE DO WHERE • Single Family Homes • CCTV Cameras with signage • Alarm Systems with direct reporting to 1st Responders • Lighting with motion • Windows double paned, film or encased wire • Locks using biometrics, codes (keyless) “know thy neighbor” “neighborhood watch”

  14. WHAT DO WE DO WHERE • Multi-family buildings • CCTV Cameras with signage • Alarm Systems with direct report to 1st Responder • Lighting with motion • Windows double paned with film , encased wire • Locks using biometrics, codes • Contract Security Guards with Rovers • WE-TIP, CRIME STOPPERS, NEIGHBORHOOD WATCH PROGRAMS

  15. ACCESS CONTROL con’t • Educational Institutions • CCTV Cameras with signage • Alarm Systems with direct report to 1st Responder • Lighting with motion • Fencing mesh and height • PDA with schedules, access to cameras • Windows double paned, film and encased wire • Locks with biometric, codes • Contract Security with Rovers

  16. ACCESS CONTROL con’t • Educational Institutions con’t • WE-TIP, CRIME STOPPER PROGRAMS • Snakes • Rumba • Murals • 24/7 monitoring of cameras • Use of facility after hours • Motion, water , hose • Release the Hounds

  17. ACCESS CONTROL con’t • Commercial Storefronts • CCTV Cameras • Alarm Systems with direct report to 1st Responder • Lighting with motion • Windows double paned, film, encased wire • Locks biometric, codes • Contract Security • WE-TIP, CRIME STOPPERS, NEIGHBORHOOD WATCH

  18. RECOMMENDATIONS • Do an needs assessment to determine the appropriate security technology • Make sure you have Policies and Procedures written for whatever technology you implement

  19. Contact Information • Chris M. Wright, CPP • The Wright Group • 714-687-1190 direct • 714*687-1194 fax • cwright@thewrightgroup.com

More Related