Visitor Pass Solutions

Visitor Pass Blog - All Posts

«  previous  |  2 3 4 5 6 7 8  |  next  »Displaying posts 1 – 5 of 37 

10 Steps to Creating A Campus Security Master Plan

Friday, February 14, 2014  by Paul Kazlauskas

Step 1: Assemble Your Committee
It is important to obtain support from those who will benefit and/or be affected by the introduction of new processes or change to existing procedures.

Step 2: Determine What Must be Protected
Committee members must classify what is critical to the operation of the campus.

Step 3: Think About Your Long-term Needs
The security master plan’s development should also include long-term system compatibility, communication infrastructure, product obsolescence and growing demands on the security staff.

Step 4: Find Out What Works, What Doesn’t
Next, the committee should survey current operational risk mitigation measures and determine their effectiveness.

Step 5: Incorporate Campus Construction Plans
Understand the campus’ 10-year plan on construction.

Step 6: Can Legacy and New Security Technology Mix?
With the convergence of new physical security technologies, the integration of existing security hardware into new security platforms can be a challenge.

Step 7: Determine Security Personnel Needs
Gauging the needs of a campus often becomes a budgeting nightmare due to recurring costs.

Step 8: Upgrade Your Security Operations Center
The Security Operations Center (SOC) is a critical component to the development of the master security plan. The SOC is a 24x7 command, control and security operations management area.

Step 9: Don’t Forget About Your Infrastructures
These are areas within the campus that rely on the continuous, reliable operation of a complex set of infrastructures: electric power, gas, transportation, water, communications and more.

Step 10: Regularly Audit and Assess Your Plan
The final plan that is put in place will be subject to monthly, quarterly, and/or annual review, and requires continuous improvement. Remember: No Plan Provides 100% Protection.

Click here to read the entire article by Jeff W. Fields. top Top > Comments   (0 comments)

Strong security measures adopted by Enfield, CT, schools

Monday, October 14, 2013  by Andrew Jones

To improve security in its schools, the town of Enfield, CT, has adopted the principles of Crime Prevention Through Environmental Design (CPTED), as well as hired retired police officers as armed guards, according to Enfield Police Chief Carl Sferrazza.

Chief Sferrazza spoke about these measures at last week’s Law Enforcement Appreciation Dinner in Plantsville, CT, sponsored by the Connecticut chapter of ASIS International, an organization for security professionals founded in 1955, and attended by Ron Coleman from our Research & Development Department.  

Ron reports that Chief Sferrazza said a hostile event lasts, on average, between three and eight minutes. In that time, he said, casualties can be very high. Utilizing CPTED gives law enforcement more time to respond to a threat by slowing down access and stopping intruders outside the school. Having armed security on the premises further helps to mitigate loss, he said. top Top > Comments   (0 comments)

The Basics of Internet Protocol Video

Monday, October 14, 2013  by Paul Kazlauskas

What Is IP Video? Internet protocol (IP) video uses the computer network infrastructure to transmit security video to recording and viewing stations and dispatch centers. In IP video systems, network cameras output a digitally encoded signal that can be transmitted over the network as data for viewing, storage and integration with other security solutions. Video management systems or software (VMS) allows the user to view the live video, call up recorded video, control the cameras connected to the network and many other functions.

Currently, the majority of video surveillance systems installed in the United States remain analog, with digital video recorders (DVRs) storing video from cameras and providing video playback. Numerious types of facilities use this as 1 element of a larger security plan.  This technology has been available for years and is very reliable. That said, many new video surveillance installations are incorporating IP because of its advantages, such as:

1. Functionality: Users can view the video from any location in the world, as long as there is a computer network available.

2. Backward compatibility: Because new technologies like megapixel cameras are not backward compatible with analog systems, in order to take advantage of these new systems, campuses must upgrade to IP.

3. Scalability: Depending on the equipment and system installed, there is no limit to the number of devices that can be placed on the network.

4. Costs: While IP cameras are more expensive to purchase than analog cameras, the operation and installation costs can be lower.

Click here to read the full article by Robin Hattersley Gray & Margie Gurwin to learn more about internet protocol video. top Top > Comments   (0 comments)

ASIS 2013 was a big success!

Wednesday, October 02, 2013  by Mart Smith

We just got back from the 2013 ASIS Security Show in Chicago!  Joining me at our booth were Noel Turner, Vice President of Sales, and Richard Reed, Vice President of Development (see our picture below).  We exhibited from September 24 – 26.  It was an excellent show. 

We had a chance to meet many of the attendees who were excited about some of our new and upcoming products – the Expiring PVC Card and the secure Confidential Sign-in Books.  Our Visitor Pass Registry Book with Expiring Badges still creates a buzz – it provides that extra layer of security when the badge turns color overnight.  No more collecting badges at the end of the day, and no more worries that someone will try to reuse a badge.  It was also great to see some of our happy customers like Steve Singer from Micro Format, Steve Lundgren from Id Edge, and Jeff Sharp from Avon Security. 

Thanks Chicago, for a great show and the best weather ever! top Top > Comments   (0 comments)

Sandy Hook Elementary moms show school security doesn't have to be expensive

Monday, September 30, 2013  by Paul Kazlauskas

After losing their daughters in the school shooting at Sandy Hook Elementary last year, Newtown, CT moms Alissa Parker and Michele Gay channeled their anguish into co-founding Safe and Sound: A Sandy Hook Initiative. The program offers a website – – and tool kit designed to give teachers, officials, and parents a way to make schools safer. Their message: It takes an all-hands-on-deck approach to creating a school safety plan & you don’t need a giant budget or expensive tools to get there.

Since December 14, 2012, schools across the country have spent untold millions of dollars on building upgrades to make schools more secure. The two Newtown, CT moms feel there are also simple, common-sense measures that can be taken to make schools safer. Their new site aims to involve those who are often left out of conversations about school security: parents.

“We need parents at the table”, Parker said. “We understand what it feels like to not know what to do, and we know what it feels like to be helpless.”

The practical tool kit found on their site was developed through brainstorming sessions with law enforcement experts. The advice is free and doesn’t advocate any particular product or involve controversial issues like armed guards in classrooms. The kit outlines components of a good security assessment, describes how to conduct safety audits, and how to practice safety drills.  The best part is it gives parents a solid background of information and best practices when thinking about their own kid’s schools.

“It really is a tool for discussion, not a manual like you might see elsewhere”, Gay said. “Its different. We expect every school is going to have different needs”.

These women should be commended for taking their personal tragedy and turning it into something that will benefit the public at-large and hopefully prevent other families from having to go through what they went through.  Alissa Parker and Michele Gay have made very intelligent procedural recommendations without advocating any specific product.  Their web site is genuine and credible because of what each woman has experienced.  Their hard work will hopefully save lives. top Top > Comments   (0 comments)

«  previous  |  2 3 4 5 6 7 8  |  next  »Displaying posts 1 – 5 of 37 

Data Management, Inc.

P.O. Box 789
Farmington, CT 06034

Phone 1.800.243.1969
Fax 1.800.428.1951
or 1.860.677.6767
Follow us on: