Benz
Benz
A security design consultant has the expertise in evaluating the security needs of
your facility and determines the best electronic security options to meet those needs.
Additionally, the consultant has an understanding of how those options will integrate
with all the other elements of your security program. The consultant can determine
optimal device placement, deal with regulatory and code issues with the devices
(especially with access control systems) and prioritize the importance of system
functions and capabilities to make sure the ultimate equipment chosen matches the
security needs. Finally, the consultant can provide realistic cost estimates so
budgets can be set and no surprises come up during system procurement. All of
these evaluations and recommendations from a needs assessment report that can
be used to support your claim that a security need exists and should be addressed,
ultimately helping you do your job even better.
System Design Now that you know what types of electronic security devices should
go where and what their functions and capabilities should be, the necessary system
needs to be designed. Let’s say you have a complete and correct electronic security
needs assessment showing all the correct device types, locations and functions. Do
you have the expertise to know which products in the marketplace are the best fit for
your needs? Do you know the correct things to look for in a product to determine if
it fits your need? Do you know what things to avoid? Do you know how competitive
the bidding would be based on those product choices? Probably not. This is no
slight on you, the industry is just so complicated and fast changing that it would be
impossible for you to keep up on all those issues and still do your job. What do you
do as the security manager handling this project?
What if, instead of having an installation firm write the specifications, you invite
several reputable firms into your facility, explain to them what exactly you are looking
for based on your needs assessment, and ask them to give you a proposal with
products that will meet those needs and associated costs. Sound better? While it
probably is better, it is still inherently flawed. Installation firms usually have certain
manufacturers that they use the majority of the time either because they have a
comfort level with that manufacturer or they have an actual agreement with that
manufacturer to sell a certain amount of its equipment per month. What happens is
the equipment is made to fit the needs even if it is not close to the best fit or the most
cost effective option. Additionally, do you have the expertise to sift through the
proposals to determine which equipment is the best fit for your needs?
A security design consultant is independent of any manufacturer or installation firm.
Their product choices are based solely on the needs of the client. They match the
product to the need rather than the need to the product. The consultant can prepare
design specifications in two specific ways: for a Request for Proposal (RFP) or
Invitation to Bid (ITB). A Request for Proposal describes in detail the system and
equipment requirements as determined by the needs assessment and gives general
criteria that the bidder must fulfill for their bid to be acceptable. The installation firm
will then propose equipment to meet those needs and give a cost for the installation.
The consultant will then evaluate all the proposals and make a recommendation as
to which proposal best meets the needs of the client. An Invitation to Bid actually
spells out the exact equipment that will be bid. The consultant will have already
made those determinations based on expertise and industry best practices. The
installation firm merely bids a cost for what is specified. In either case the product
decisions are based solely on the needs of the facility and client rather than any
other factors.
Identifying assets to determine their value and criticality Assessing the nature of the threats so
that the scope of the problem can be determined Conducting a physical security survey in order to
identify the vulnerabilities of the
organisation Performing a risk analysis so that appropriate countermeasures can be developed
Selection of Integrated Physical Security Measures
Identifying measures/components to match the requirements of the appropriate
solution/recommendation
Performing cost analysis of the proposed integrated measures to ensure efficiency of
implementation/operation
Outlining/documenting recommendations with relevant reasons for presentation to facility so that
appropriate choices can be made
Implementation of Physical Security Measures