This document provides an overview and summary of securing facilities using technology. It discusses using choke points, IP cameras, access control systems, video analytics and other security technologies to monitor entrances, exits, hallways, offices, parking lots, perimeters and warehouses. It also covers integrating these systems, technology advances, training, customer support and maintenance to help protect people and assets.
3. Webinar
Sponsor
Based in Houston, TX
Since 1998
IP Video Management
System Design
Installation
Project Management
LENSEC is committed to empowering our clients and partners to prevent or mitigate physical security risks.
We want to help protect people and assets as well as improve operations through our evolutionary and
intuitive technology. We can do this by providing expertise in security and software development.
Our Mission
17. The Enterprise
Multi-Site Deployments
Active Directory Integration
Central Management
System Redundancy
Remote Network Access
System Utilities
Security Technology
Securing Your Facilities Using Technology
18. Enterprise Video Management Software (VMS)
IP Camera Support
3rd Party System Support
Easy Configuration
Thin vs. Thick Client
End User Experience
Security Technology
Securing Your Facilities Using Technology
19. Enterprise Video Management Software (VMS)
Health Monitoring
Remote Monitoring
Alarm Event Management
Camera Mapping
User Collaboration
Security Technology
Securing Your Facilities Using Technology
23. Security Technology
IP Cameras
Backlight Compensation
Image Processing
Exposure Zones
Wide Dynamic Range
Noise Reduction
Wide Dynamic Range
Securing Your Facilities Using Technology
24. IP Cameras
Megapixels Resolution
Pixels Per Foot (PPF)
Security Technology
Securing Your Facilities Using Technology
http://www.iqeye.com/sites/all/themes/iqinvision/calc/pixels_per_foot/
General Detail
Forensic Detail
High Detail
31. Access Control
Fail Safe / Fail Secure
Door Controllers
Choosing Locks
Security Integration
Securing Your Facilities Using Technology
32. Access Control
Wireless & WiFi Locks
Other Lock Types
Exit Devices
Card Readers
Credentials
Integrating Systems
Security Integration
Securing Your Facilities Using Technology
35. Training
Integrator Training
Effective End User Training
Online Training
Repeated Use
Regular Assignments
Tabletop Exercises
People – The Non-Technical Element
Securing Your Facilities Using Technology