Visitor Pass Solutions

Visitor Pass Blog - All Posts

«  previous  |  2 3 4 5 6 7 8  |  next  »Displaying posts 1 – 5 of 38 


"Secretaries Rule!"

Tuesday, April 22, 2014  by Andrew Jones

Wednesday, April 23, 2014, is Administrative Professionals Day (right in the middle of Administrative Professionals Week).

Eight years ago Dave Arnold, a custodian at Brownstown Elementary School in Illinois, published a column titled "Secretaries Rule!" on the website of the National Education Association. It honored secretaries in general and his school's secretary, Shelly Thomason, in particular.

"My neighborhood mechanic's five-year-old granddaughter use to help him file reports and bills at his garage office," Dave wrote then. "I commented to the mechanic that he certainly had a good secretary. He didn't reply vocally, but his smile said it all. That little girl grew up strong and wise. Today, she is our school secretary, Shelly Thomason ... She is one of the many reasons we honor our secretaries."

Here's wishing all administrative professionals the recognition they deserve.

facebooktwitterdiggLinkedInStumbleUpondel.icio.us top Top > Comments   (0 comments)


10 Steps to Creating A Campus Security Master Plan

Friday, February 14, 2014  by Paul Kazlauskas

Step 1: Assemble Your Committee
It is important to obtain support from those who will benefit and/or be affected by the introduction of new processes or change to existing procedures.

Step 2: Determine What Must be Protected
Committee members must classify what is critical to the operation of the campus.

Step 3: Think About Your Long-term Needs
The security master plan’s development should also include long-term system compatibility, communication infrastructure, product obsolescence and growing demands on the security staff.

Step 4: Find Out What Works, What Doesn’t
Next, the committee should survey current operational risk mitigation measures and determine their effectiveness.

Step 5: Incorporate Campus Construction Plans
Understand the campus’ 10-year plan on construction.

Step 6: Can Legacy and New Security Technology Mix?
With the convergence of new physical security technologies, the integration of existing security hardware into new security platforms can be a challenge.

Step 7: Determine Security Personnel Needs
Gauging the needs of a campus often becomes a budgeting nightmare due to recurring costs.

Step 8: Upgrade Your Security Operations Center
The Security Operations Center (SOC) is a critical component to the development of the master security plan. The SOC is a 24x7 command, control and security operations management area.

Step 9: Don’t Forget About Your Infrastructures
These are areas within the campus that rely on the continuous, reliable operation of a complex set of infrastructures: electric power, gas, transportation, water, communications and more.

Step 10: Regularly Audit and Assess Your Plan
The final plan that is put in place will be subject to monthly, quarterly, and/or annual review, and requires continuous improvement. Remember: No Plan Provides 100% Protection.

Click here to read the entire article by Jeff W. Fields.

facebooktwitterdiggLinkedInStumbleUpondel.icio.us top Top > Comments   (0 comments)


Strong security measures adopted by Enfield, CT, schools

Monday, October 14, 2013  by Andrew Jones

To improve security in its schools, the town of Enfield, CT, has adopted the principles of Crime Prevention Through Environmental Design (CPTED), as well as hired retired police officers as armed guards, according to Enfield Police Chief Carl Sferrazza.

Chief Sferrazza spoke about these measures at last week’s Law Enforcement Appreciation Dinner in Plantsville, CT, sponsored by the Connecticut chapter of ASIS International, an organization for security professionals founded in 1955, and attended by Ron Coleman from our Research & Development Department.  

Ron reports that Chief Sferrazza said a hostile event lasts, on average, between three and eight minutes. In that time, he said, casualties can be very high. Utilizing CPTED gives law enforcement more time to respond to a threat by slowing down access and stopping intruders outside the school. Having armed security on the premises further helps to mitigate loss, he said.

facebooktwitterdiggLinkedInStumbleUpondel.icio.us top Top > Comments   (0 comments)


The Basics of Internet Protocol Video

Monday, October 14, 2013  by Paul Kazlauskas

What Is IP Video? Internet protocol (IP) video uses the computer network infrastructure to transmit security video to recording and viewing stations and dispatch centers. In IP video systems, network cameras output a digitally encoded signal that can be transmitted over the network as data for viewing, storage and integration with other security solutions. Video management systems or software (VMS) allows the user to view the live video, call up recorded video, control the cameras connected to the network and many other functions.

Currently, the majority of video surveillance systems installed in the United States remain analog, with digital video recorders (DVRs) storing video from cameras and providing video playback. Numerious types of facilities use this as 1 element of a larger security plan.  This technology has been available for years and is very reliable. That said, many new video surveillance installations are incorporating IP because of its advantages, such as:

1. Functionality: Users can view the video from any location in the world, as long as there is a computer network available.

2. Backward compatibility: Because new technologies like megapixel cameras are not backward compatible with analog systems, in order to take advantage of these new systems, campuses must upgrade to IP.

3. Scalability: Depending on the equipment and system installed, there is no limit to the number of devices that can be placed on the network.

4. Costs: While IP cameras are more expensive to purchase than analog cameras, the operation and installation costs can be lower.

Click here to read the full article by Robin Hattersley Gray & Margie Gurwin to learn more about internet protocol video.

facebooktwitterdiggLinkedInStumbleUpondel.icio.us top Top > Comments   (0 comments)


ASIS 2013 was a big success!

Wednesday, October 02, 2013  by Mart Smith

We just got back from the 2013 ASIS Security Show in Chicago!  Joining me at our booth were Noel Turner, Vice President of Sales, and Richard Reed, Vice President of Development (see our picture below).  We exhibited from September 24 – 26.  It was an excellent show. 

We had a chance to meet many of the attendees who were excited about some of our new and upcoming products – the Expiring PVC Card and the secure Confidential Sign-in Books.  Our Visitor Pass Registry Book with Expiring Badges still creates a buzz – it provides that extra layer of security when the badge turns color overnight.  No more collecting badges at the end of the day, and no more worries that someone will try to reuse a badge.  It was also great to see some of our happy customers like Steve Singer from Micro Format, Steve Lundgren from Id Edge, and Jeff Sharp from Avon Security. 

Thanks Chicago, for a great show and the best weather ever!

facebooktwitterdiggLinkedInStumbleUpondel.icio.us top Top > Comments   (0 comments)


«  previous  |  2 3 4 5 6 7 8  |  next  »Displaying posts 1 – 5 of 38 

Data Management, Inc.

P.O. Box 789
Farmington, CT 06034

Phone 1.800.243.1969
Fax 1.800.428.1951
or 1.860.677.6767

www.datamanage.com
 
Follow us on: