TITLE

Planning and Communication: Physical Security Asset Control

AUTHOR(S)
Peckinpaugh, Doug
PUB. DATE
July 2008
SOURCE
Security: Solutions for Enterprise Security Leaders;Jul2008, Vol. 45 Issue 7, p37
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article focuses on the processes involved in effective physical security asset control which include experience, planning and superior communication. It suggests that a building design team should be as experienced in designing security systems as it is dedicated to its task. Moreover, it stresses the importance of good communication in planning for security and access control systems with the involvement of the systems integrator and the project's security executive.
ACCESSION #
33303724

 

Related Articles

  • Effective Alarm Monitoring. Wicks, Sean // Security: Solutions for Enterprise Security Leaders;Jul2004, Vol. 41 Issue 7, p32 

    Explores the ways involve in the implementation of centralized monitoring system. Characteristic of intrusion, motion and tamper alarms to be monitored at the security control room by the security staff; Options for companies with multinational operations to develop a sophisticated reporting...

  • Making Information Actionable. Dunkel, Dan // SDM: Security Distributing & Marketing;Jul2011, Vol. 41 Issue 7, p66 

    The article reports on the approach to improve security management in business. It explains that additional capabilities to an existing physical security information management (PSIM) system can be provided through the integration of new information sets in order to improve overall security....

  • Partnership Links Wireless Locks, Security Management Platform.  // SDM: Security Distributing & Marketing;Apr2010, Vol. 40 Issue 4, p110 

    The article reports that the two security products of Tyco International Ltd, the Software House and ASSA Abloy, is partnering with the integration of wireless locks from ABLOY group brands' Corbin Russwin and Sargent with the C•Cure 9000 security and management system of Software House.

  • Integrating Integrators From Start To Finish. Freschi, Cynthia // Security: Solutions for Enterprise Security Leaders;Aug2006, Vol. 43 Issue 8, p51 

    The article discusses the process of security system integration conducted by system integrators. The process begins with a review of the site, and determination of the key areas for coverage and protection. The actual integration starts in designing the system, and ends in providing service...

  • How to Manage It all: The Role of PSIM.  // SDM: Security Distributing & Marketing;Apr2008 Supplement, Vol. 38, p4 

    The article discusses the significant role of physical security information management (PSIM) system in verifying potential security problems in real time. It says that by integrating a new video system as part of a PSIM system, which integrates inward information from all security devices in...

  • STEP 2- GAP ANALYSIS.  // Integrated Physical Security Handbook (Government Training Inc.);2006, p29 

    The article discusses the second step needed to identify critical assets, treat and targets and the appropriate measures to implement an effective integrated physical security measures. The goal of this phase is to identify the gaps between the model facility and the current situation. It...

  • STEP 3 - GAP CLOSURE.  // Integrated Physical Security Handbook (Government Training Inc.);2006, p71 

    The article discusses the third step needed to identify critical assets, treat and targets and the appropriate measures to implement an effective integrated physical security plan. This phase prompt to mitigate the various risks identified in the second step through consideration and evaluation...

  • STEP 4 - SECURITY STRATEGIC PLAN.  // Integrated Physical Security Handbook (Government Training Inc.);2006, p169 

    The article discusses the fourth step needed to identify critical assets, treat and targets and the appropriate measures to implement an effective integrated physical security plan. The section focuses on how to set out strategic plan appropriate to get management approval and develop a blue...

  • TECHNOLOGY ON THE LINE. Rothman, Paul // Government Security;Apr2004, p20 

    Discusses the actions taken by the United States government in protecting its borders. Description of several technology tools which were used in protecting the nation's borders; Outline of the Aviation and Transportation Security Act which was enacted by the Congress in November 2001. INSET:...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics