Intrusion & Access Control

 

 

https://sm.asisonline.org/Pages/ENDURECE-BLANCOS-SUAVES-CON-PSIM.aspxENDURECE BLANCOS SUAVES CON PSIMGP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a43444652017-11-21T05:00:00Z<p style="text-align:justify;">Los "blancos suaves" (del inglés <em>soft targets</em>) son aquellos que son fácilmente accesibles para el público, como centros comerciales, hoteles, y hospitales, y resultan especialmente vulnerables a ataques por mano de terroristas, criminales, y otros actores maliciosos. Los ataques recientes alrededor del mundo han aumentado la concientización sobre la necesidad de proteger estos espacios. Los practicantes de seguridad deben tener en mente que el deber de proteger una empresa se extiende desde sus empleados a cualquiera que ponga pie en su propiedad.</p><p style="text-align:justify;">En estos sitios, las soluciones típicas de seguridad física incluyen una separación clara entre las áreas públicas y las restringidas al personal, acceso controlado a áreas sensibles para prevenir entradas no autorizadas, y acceso limitado a las instalaciones fuera del horario comercial. Estas medidas dependen fuertemente en la implementación y gestión de niveles variantes de permisos de acceso para cada área, aplicando una combinación de tecnologías de seguridad. Incluso los mejores despliegues de estos sistemas no eliminan el riesgo; sino que ayudan al equipo de seguridad a contener las amenazas.</p><p style="text-align:justify;">Al contar con diversos sistemas, ésto se vuelve una tarea compleja que podría abrumar al personal de seguridad encargado del monitoreo, la identificación y la respuesta ante eventos. Para instalaciones multiuso, las soluciones de Gestión de Información para la Seguridad Física (PSIM) simplifican estos complicados procedimientos con alertas y acciones de respuesta automatizadas e inteligentes, junto con una conciencia situacional significantemente mejorada.</p><p style="text-align:justify;"><strong>Alerta</strong></p><p style="text-align:justify;">Cada vez que un individuo no autorizado ingresa a un área privada o sensible, las organizaciones deben tratar al incidente como sospechoso a menos que y cuando sepan que hay una razón válida para el ingreso. Y, tras cualquier brecha de seguridad, ya sea intencional o accidental, malintencionada o inofensiva, cada segundo cuenta. Ésto enfatiza la necesidad fundamental de que los operadores y el resto del personal de seguridad sepan sobre la situación lo antes posible. Con automatización y la capacidad  de integrar de forma fluida múltiples sistemas en una sóla interfaz, las soluciones de PSIM pueden acelerar el proceso de alerta para mejorar la conciencia y la respuesta.</p><p style="text-align:justify;">Por ejemplo, se podrían desplegar sistemas integrados de control de acceso y videovigilancia inteligente para alertar al personal cuando alguien ingresa a un área restringida, tal como un centro de datos, fuera del horario laboral. Cuando una alerta proviene del sistema de control de accesos, la solución PSIM puede invocar automáticamente la transmisión de video asociada con el evento, proveyendo a los operadores visibilidad directa sobre la situación.</p><p style="text-align:justify;">Otra alerta podría ser disparada por un informe o descripción inicial entregada por un usuario móvil. En este caso, la PSIM podría correlacionar los datos con transmisiones de cámaras de videovigilancia cercanas, y otros sistemas. Sin importar cuál sea la fuente de la alerta, la solución se asegura de que los operadores tengan acceso instantáneo a información valiosa que les permita analizar rápidamente la situación e iniciar una respuesta apropiada, basada en un completo entendimiento del incidente.</p><p style="text-align:justify;"><strong>Respuesta</strong></p><p style="text-align:justify;">Una vez que se ha generado una alerta, deben existir acciones prestablecidas para ayudar al personal a determinar el camino a seguir para resolver una situación lo más pronto posible. En muchos casos, no es necesaria ninguna respuesta. Por ejemplo, si un individuo sostiene una puerta abierta por unos segundos, el sistema de control de accesos puede generar una alerta que indique que la puerta está siendo bloqueada. Usando material videográfico asociado con la acción, un operador puede terminar en segundos si ésto fue realizado para permitir un ingreso no autorizado o si la persona entrando simplemente se detuvo un momento para leer su teléfono móvil. Sin la capacidad que ofrece la videovigilancia, tendría que enviarse a un guardia para que evalúe la situación: es decir, no sería el uso más eficiente de tiempo y recursos.</p><p style="text-align:justify;">Dado el considerable número de alertas no accionables que los operadores reciben durante sus turnos, pueden no estar preparados para un evento que sí requiera acción, más allá de qué tan bien hayan sido entrenados. Ésto puede causar confusión y estrés, lo que puede complicar la situación y conducir hacia el caos. Contar con procedimientos operativos estandarizados (POEs, SOPs en inglés) bien deinifidos para que guien a los operadores y a otros a través de cada proceso reduce el potencial de estrés, pánico, o confusión, los cuales contribuyen a una alta probabilidad de errores humanos. Sin embargo, POEs que son complicados o difíciles de ubicar no harán nada para reducir esta probabilidad.</p><p style="text-align:justify;">La PSIM puede automatizar muchos de los más mundanos y básicos pasos para simplificar procesos y permitir que los operadores se concentren únicamente en las tareas críticas que requieren intervención humana, tales como determinar si una persona detectada a través de videovigilancia realmente representa una amenaza. Ésto permite al personal de evaluar rápidamente la situación y determinar la respuesta más apropiada.</p><p style="text-align:justify;"><strong>Conciencia Situacional en Tiempo Real </strong></p><p style="text-align:justify;">Al responder a un incidente, es importante que los guardias, primeros respondientes, y otros, tengan la información más completa posible para asegurar la respuesta más efectiva y eficiente.</p><p style="text-align:justify;">Los sistemas integrados mejoran esta conciencia al reunir grandes cantidades de datos, provenientes de varios sistemas, que pueden ser combinados para evaluar un incidente. Mientras que inspeccionar manualmente innumerables sistemas para obtener y clasificar esta información no es viable, las soluciones automatizadas de PSIM ponen toda la información relevante al alcance de la mano de los operadores. Ésto permite al personal de seguridad tomar decisiones rápidas y precisas basándose en una imagen completa del evento; compartir fácilmente la información en tiempo real con los respondientes apropiados; y coordinar la respuesta entre todas las partes involucradas. Esta colaboración provee una conciencia situacional crítica a aquellos respondientes que, entonces, pueden realizar decisiones más informadas que permitan una respuesta ágil para ayudar a prevenir que el incidente se desenvuelva.</p><p style="text-align:justify;">Cuando deben protegerse instalaciones con múltiples niveles de privilegios de acceso, surge una amplia variedad de desafíos. Al desplegar una solución PSIM para englobar la información decisiva, las organizaciones pueden superar los retos a los que se enfrentan, mientras que aumentan la seguridad para aquellas aplicaciones potencialmente complejas.</p><p style="text-align:justify;"><strong><em>Simon Morgan</em></strong><em> es el director de tecnología (CIO) de SureView Systems.</em></p><p style="text-align:justify;"><em>The translation of this article is provided as a courtesy by Ari Yacianci. </em>Security Management <em>i</em><em>s not responsible for errors in translation. Readers can refer to the original English version here:</em><em> https://sm.asisonline.org/Pages/Harden-Soft-Targets-with-PSIM.aspx​</em><br></p>

Intrusion & Access Control

 

 

https://sm.asisonline.org/Pages/ENDURECE-BLANCOS-SUAVES-CON-PSIM.aspx2017-11-21T05:00:00ZENDURECE BLANCOS SUAVES CON PSIM
https://sm.asisonline.org/Pages/What's-New-in-Access-Control.aspx2017-11-20T05:00:00ZWhat's New in Access Control?
https://sm.asisonline.org/Pages/School-Lockdown-Procedure-Prevented-Tragedy-in-Rancho-Tehama.aspx2017-11-16T05:00:00ZSchool Lockdown Procedure Prevented Tragedy in Rancho Tehama
https://sm.asisonline.org/Pages/Harden-Soft-Targets-with-PSIM.aspx2017-10-23T04:00:00ZHarden Soft Targets with PSIM
https://sm.asisonline.org/Pages/Safety-in-Shared-Spaces.aspx2017-09-01T04:00:00ZSafety in Shared Spaces
https://sm.asisonline.org/Pages/Book-Review---Biosecurity.aspx2017-08-01T04:00:00ZBook Review: Biosecurity
https://sm.asisonline.org/Pages/Identify-the-Solution.aspx2017-08-01T04:00:00ZIdentify the Solution
https://sm.asisonline.org/Pages/Healthy-and-Secure.aspx2017-07-01T04:00:00ZHealthy and Secure
https://sm.asisonline.org/Pages/Accesos-Bajo-Control.aspx2017-06-01T04:00:00ZAccesos bajo Control
https://sm.asisonline.org/Pages/On-Site-and-Cloud-Access-Control-Systems.aspx2017-05-22T04:00:00ZOn-Site and Cloud Access Control Systems
https://sm.asisonline.org/Pages/Message-to-the-Masses.aspx2017-03-01T05:00:00ZMessage to the Masses
https://sm.asisonline.org/Pages/Yale-Opens-Doors.aspx2016-12-01T05:00:00ZYale Opens Doors
https://sm.asisonline.org/Pages/Sounding-the-Alarm-at-Lone-Star.aspx2016-08-01T04:00:00ZSounding the Alarm at Lone Star
https://sm.asisonline.org/Pages/Cannabis-Cash.aspx2016-07-01T04:00:00ZQ&A: Cannabis Cash
https://sm.asisonline.org/Pages/What-the-Pulse-Nightclub-Attack-Means-for-Soft-Target-Security.aspx2016-06-14T04:00:00ZWhat the Pulse Nightclub Attack Means for soft Target Security
https://sm.asisonline.org/Pages/A-Dearth-of-Gun-Data.aspx2016-04-01T04:00:00ZA Dearth of Gun Data
https://sm.asisonline.org/Pages/When-Simulation-Means-Survival.aspx2016-04-01T04:00:00ZWhen Simulation Means Survival
https://sm.asisonline.org/Pages/Book-Review--The-Alarm-Science-Manual.aspx2016-02-01T05:00:00ZBook Review: The Alarm Science Manual
https://sm.asisonline.org/Pages/Campus-ID-Gets-a-Makeover.aspx2015-11-30T05:00:00ZCampus ID Gets a Makeover
https://sm.asisonline.org/Pages/Access-Under-Control.aspx2015-08-10T04:00:00ZAccess Under Control

 You May Also Like...

 

 

https://sm.asisonline.org/Pages/Harden-Soft-Targets-with-PSIM.aspxHarden Soft Targets with PSIM<p>​Soft targets—those that are readily accessible to the public, like shopping malls, hotels, and hospitals—are especially vulnerable to attack by terrorists, criminals, and other bad actors. Recent attacks around the globe have raised awareness of the need to protect these spaces. Security practitioners must keep in mind that the duty of care for enterprises extends beyond just a company's employees to anyone who sets foot on the property.  </p><p>In these locations, typical physical security solutions include clear separation between public and staff-only areas, controlled access to sensitive areas to prevent unauthorized entry, and limited access to the facility during nonbusiness hours. These measures rely heavily on implementing and managing varying levels of access permissions for each area using a mix of security technologies. And even the best deployments of these systems do not eliminate risk; rather they help security to contain the threat.   </p><p>With many diverse systems, this becomes a complex task that could quickly overwhelm security staff who are also tasked with monitoring, identifying, and responding to events. For multi-use facilities, physical security information management (PSIM) solutions simplify these complicated procedures with automated, intelligent alerts and response actions, along with greatly improved situational awareness. </p><p><strong>Alerting</strong></p><p>Any time an unauthorized individual enters a private or sensitive area, organizations should treat that incident as suspicious unless and until they learn there is a valid reason for the entry. And with every security breach—whether intentional or unintentional, malicious or harmless—time is of the essence. This underscores the vital need for operators and other security staff to know about the situation as soon as possible. With automation and the ability to seamlessly integrate multiple systems into a single interface, PSIM solutions can speed the alerting process to improve awareness and response.</p><p>​For example, integrated access control and surveillance systems with video analytics could be deployed to alert staff when individuals enter a restricted area, such as a data center, after hours. When an alert comes in from the access control system, the PSIM solution can automatically call up surveillance video associated with the event, providing operators with direct visibility into the situation. </p><p>Another alert could be triggered by an initial report or description submitted by a mobile user. In this case, the PSIM could correlate with nearby video and other systems. Regardless of the source of the alert, the solution ensures that operators have instant access to valuable information and insight, allowing them to quickly assess the situation and initiate the appropriate response based on a full understanding of an incident. </p><p><strong>Response</strong></p><p>Once an alert has been generated, established actions must be in place to help staff determine the appropriate course of action to resolve an issue as quickly as possible. In many cases, no response is necessary. For instance, if an individual holds a door open for a few seconds, the access control system may generate a door-prop alert. Using video associated with the action, an operator can determine in seconds whether this was to allow unauthorized entry or if the person entering simply paused to read an email or text on a cell phone. Without the video capability, a guard would need to be dispatched to assess the situation—not the most efficient use of time and resources.</p><p>Given the large number of nonactionable alerts operators receive throughout their shifts, they may not be prepared for an event that does require action, regardless of how well they have been trained. This can cause confusion and stress, which can complicate the situation and lead to chaos. Having well-defined standard operating procedures (SOPs) in place to guide operators and others through each process reduces the potential for stress, panic, or confusion, all of which contribute to a high potential for human error. However, complicated or difficult-to-locate SOPs will do nothing to reduce this likelihood. </p><p>PSIM can automate many of the more mundane and basic steps to simplify processes and allow operators to focus only on the most critical tasks that require human intervention, such as determining whether a person seen on video represents a potential threat. This enables security staff to quickly assess the situation and determine the most appropriate response. </p><p><strong>Real-Time Situational Awareness</strong></p><p>When responding to an incident, it is important for guards, first responders and others to have the most complete information to ensure the most effective and efficient response. </p><p>​Integrated systems improve this awareness by providing large amounts of data from various systems that can be combined to evaluate an incident. While searching myriad systems to gather and sort through this information manually is not feasible, automated PSIM solutions put all the relevant information at operators' fingertips. This allows security staff to make quick, accurate decisions based on a complete picture of an event and easily share information in real time with appropriate responders and coordinate response among all parties involved. This collaboration provides critical situational awareness to those responders, who can then make faster, more informed decisions that enable swift response to help prevent an incident from unfolding.</p><p>A wide variety of challenges arise when securing facilities and campuses with multiple levels of access privileges. By deploying a PSIM to aggregate crucial information, organizations can overcome the many challenges they face while also increasing safety and security for these potentially complex applications.</p><p><em>Simon Morgan is chief technology officer for SureView Systems. ​</em></p>GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465
https://sm.asisonline.org/Pages/What's-New-in-Access-Control.aspxWhat's New in Access Control?<p>​Innovation in access control is quietly heating up. The industry is ready to implement innovations on a broad scale that have been just out of reach. Demand for virtual credentials is growing, facial recognition technology is both technically and economically feasible, and migration to the cloud is increasing—and increasingly beneficial. Over the next few years, market adoption of these advances will transform the ways security professionals operate and organizations benefit from their access control systems. </p><p><strong>Virtual credentials and mobile access technology</strong></p><p>The demand for virtual credentials and mobile access is intensifying, driven in part by younger members of the workforce who never go anywhere without their smartphones. Suffice to say, most employees wouldn't turn their cars around for a forgotten physical credential, but they'll certainly restart their commutes to collect forgotten smartphones. </p><p>The benefits are simple: convenience, compliance, and satisfaction of workforce demand. Everyone carries their phone, security professionals enhance their management capabilities, and employees can stay on the move. By including the credential in a mobile device, embedded in an app, organizations can also provide novel security capabilities, such as threat reporting and virtual photo ID. </p><p>The good news is that virtual credentials and mobile access technology have progressed to the point that they are easier to implement. Migration is straightforward, and implementation does not need to be all-or-nothing. Instead it can be taken in phases leading to an interim hybrid approach that includes physical and virtual credentials. </p><p><strong>Facial recognition</strong></p><p>Facial recognition offers the advantage of using existing access control rules, while reducing the friction of the user experience. </p><p>Picture a busy New York City high-rise office building with turnstiles that control access to an elevator lobby. There are always a few employees who have to search their pockets or backpacks to fish out a physical credential. Implementing facial recognition eliminates that bottleneck. The software scans people as they approach the turnstile and transmits a virtual credential to the access control system. Where a line might otherwise have formed, authorized employees now pass through turnstiles efficiently. </p><p>Facial recognition access control is no longer out of reach. Today's computing power can be combined with increasingly high-definition cameras and advanced recognition algorithms to bring the costs of implementation way down. </p><p><strong>Access control in the cloud</strong></p><p>The access control server is the nerve center of an access control system, but it no longer needs to physically exist. The increasing prevalence of the cloud eliminates that necessity. </p><p>Rather than dealing with the maintenance of a physical server, the speed and convenience of the cloud can handle everything a hardware box used to. This advance allows for increased scalability. And it provides flexibility in how security professionals purchase and use access control servers. Now the integrator or manufacturer can reduce end user burden and cost by ensuring that systems are backed up and updated remotely.<strong> </strong></p><p><strong>What's next?</strong></p><p><strong></strong>Innovations in access control systems will drive the industry over the coming years. Novel credentials, such as mobile access and face recognition technology, combined with cloud-based servers will deliver an altogether improved experience. </p><p><em>John L. Moss is CEO of S2 Security.</em></p>GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465
https://sm.asisonline.org/Pages/Book-Review---The-Process-of-Investigation.aspxBook Review: The Process of Investigation<p>​<span style="line-height:1.5em;">The process of investigation is relevant for a wide array of security professionals </span><span style="line-height:1.5em;">both in the private and public sectors, including corporate investigators, attorneys, loss prevention specialists, and law enforcement personnel.</span></p><p><i>The Process of Investigation</i> sets out to address the needs of today’s private sector investigative professionals. Through 24 chapters, the authors provide a practical guide to conducting comprehensive investigations. Five main sections take the reader through fundamentals, methods, building a case, applying strategies, and using technology and other specialized investigative techniques. Among the topics explored in detail are qualities of the investigator, surveillance, interviews, report writing, and targeted violence.</p><p>The book has something interesting for all readers who work with investigations or just want to know more about the art and science. There is a lot of information for people new to the investigative area, and there is also something for the more experienced practitioner. Examples from real investigations help readers place the theory into a practical context. A point well made is that investigative success often comes from “applying common sense and uncommon persistence.”</p><p>Although the book takes an American view of investigation, most of the material is applicable for international use, and it should find a well-deserved place on the investigative professional’s bookshelf.</p><p><em><strong>Reviewer: Poul Nielsen,</strong> PCI, is an intelligence analyst and OSINT consultant at The Copenhagen Police Department. He has previously worked as a robbery detective and investigative consultant for several international companies. He serves on the ASIS International Investigations Council.</em></p>GP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465