For all of these reasons, network technology is an excellent investment for the long-term, even if it means stretching the budget or not immediately deploying the full number of cameras originally planned during the initial installation. Upon selecting IP security technologies, school officials should think about how these systems will be managed and operated daily.
Consider These Strategies
Schools rarely have large budgets and may need to work with vendors to get creative. For example, encoders can help bring analog cameras online with newer IP cameras, offering a seamless video solution, all managed through enterprise-grade software. Similarly, IP access control solutions that offer enterprise-level control of entrances and exits can be integrated with access control hardware already in place on some doors.
This strategy moves away from a “break-fix” approach and instead replaces old technology with new technology when it has reached the end of its lifecycle. Leveraging the school’s resources in this fashion is one way to show you are committed to helping minimize the initial out-of-pocket expense.
Schools may also assign internal personnel who can help install and maintain new technologies. With a modest investment in training, schools can save money over the long-term.
Another good idea is to buy solutions through a purchasing co-operative. These organizations have evaluated vendors, negotiated best pricing, and selected quality products, allowing the school to benefit from the co-op’s prequalification process and avoid managing the burdensome and costly RFP process.
Determine Your Requirements
It is important for administrators and SROs to consider how the new security systems will be used, who will use them, and identify if those systems will converge with other systems. The answers to these questions will determine requirements for software features and functionality.
For example, will district-level administrators and local police need remote access to video from multiple schools? Does the software support multiple users, giving specific capabilities/access to each? Is there a need for complete browser-based access or can a client be used?
These types of questions should drive a list of requirements used to select software that will ultimately best meet the needs of the campus.
Jeff Floreno serves as director of security operations and strategy for Wren. He can be reached at [email protected]. To learn more about Wren’s solutions, visit www.wrensolutions.com.