Page 38 - The EDGE Summer 2024
P. 38
SECURITY
BY LYNDEE VILLEGAS, ANDY MCQUEEN, MARK THILL AND VINCE SCARFO
BRIDGING PHYSICAL SECURITY INITIATIVES WITH NETWORK BEST PRACTICES
When deploying access control, video surveillance During our Spring AASBO presentation we polled the
or other essential security applications, it’s important audience about which of these have you/your school
to understand the impact they could have on the experienced and here are the results: 44% said key
school’s network. Network integrity is one of the most areas were not covered and they had unstable security
difficult challenges to manage. Adding access control technologies, 41% had poor budget allocation, and
and video surveillance to a network is now common 56% had a poorly maintained system.
practice which can further increase vulnerabilities
and overextend resources. Adopting a collaborative approach is the foundation
for building a robust security strategy. Schools will be
Before discussing how to bridge security initiatives and far better positioned to then make informed decisions
network best practices, it is important to address the regarding their network capability and to mitigate
wide range of people responsible for a school’s security. risks. At Spring AASBO, we explored key areas.
Within a school, the most common security purchases Understanding Limitations
and decisions are overseen by one or more of the First, determine the security system location.
following departments: Performance limitations may arise if not addressed.
·
·
Facilities IT Will it be on the school network or a private network?
·
·
Security Administration Ask your security system vendor for details on how
their system traffic will impact the network. This
It’s vital for all departments to seek a collaborative information should be included in a design package
approach when building a physical security plan. that clearly outlines system resource consumption on a
Budgets, technology choices, and objectives can only camera-by-camera basis. After investing considerably
be truly considered when all parties provide their own in your security solution, it would be disappointing to
valuable perspectives. Each has an important vantage discover your network cannot facilitate the available
point over some aspects of security, but rarely does features and functionality.
one department possess the overarching knowledge
alone to ensure successful security project outcomes. Leverage Features
Start with your end goal. If it's important for all your
What are the impacts of siloed purchases made by systems to "talk" to each other, ensure you choose
one department without seeing other vantage points? technology that is ONVIF compliant. ONVIF is an
Common issues are: industry-recognized protocol allowing connectivity
• Key Areas Are Not Covered and integration between security systems.
• Unsuitable Security Technologies Are Chosen
• Poor Budget Allocation Specify the analytics and options you expect the
• Exceeding Network Capabilities security solutions to achieve, such as pixels per foot
• Poorly Maintained Systems requirements, automated event-based alerts, etc. If you're
CONTINUED ON PAGE 41
|
38 THE EDGE SUMMER 2024