WAN and Why You Need Networkability

Most security experts agree that systems integration is quickly becoming security's best tool in the fight against crime. This is because it effectively harnesses the capabilities and features of all security subsystems by placing them under one, unified, streamlined operating platform. This puts more information at security's fingertips in a shorter period of time than ordinarily would be possible using individual control centers and a disjointed series of interfaces.

When that common operating platform happens to be a wide area network (WAN), and the mission includes multiple remote sites, security personnel are better able to exercise control. It also places more data in the hands of operators, which makes the job of command and control more efficient and exacting. This also makes it possible for security managers to make better-informed decisions.

Integtrating a system on a WAN puts more information at security's fingertips in a shorter period of time than ordinarily would be possible using individual control centers and a disjointed series of interfaces.

Taking the Leap

This strategy was recently put to the test at Northern States Power (NSP), Minneapolis, where a massive retrofit job was installed that involved video imaging access control, ID badging, graphical user interfaces (GUIs), and security and temperature monitoring.

The retrofit involves the replacement and installation of nearly 450 card readers, the local head-end operating system (OS) at 75 corporate sites, and the installation of addressable IP nodes at nearly every location on a corporate WAN that currently spans five states and soon will reach 12 states from Minnesota to Texas.

NSP's normal procedure is to run a full-scale cost analysis before making a major purchase. After careful consideration, they decided that the money necessary to bring the old system up-to-date was far in excess of what they wanted to spend.

Because the entire system NSP job will not be completed until later this year, there were still remote sites that employed the old operating platforms. The nature of this project is such that changes must take place seamlessly, without any disruption of service. Another factor to be considered was that some of the facilities are multi-tenant and some of the tenants were reluctant to change.

From an operations standpoint, the original security system employed individual, disjointed head-end operating systems that did not use the corporation's existing WAN for reporting and other functions. Instead, data communication occurred with the central monitoring station over 40 leased lines and several dial-up connections, according to Scott McCoy, security specialist, NSP.

Not only did this hodgepodge approach make daily operations a nightmare to orchestrate and implement, it also was expensive to operate. NSP was paying between $70 and $100 a month per leased line. Based on an average of $85 per line, that equates to an annual cost of $41,000. In addition, the accumulative, yearly costs associated with maintaining the old system was in excess of $300,000.

The existing card base was Wiegand and the client wanted proximity for two reasons: First, the use of proximity would enable NSP to install active prox transmitters in vehicles. Because the outdoor readers that NSP selected provide a read range of up to 2 1/2 ft., this would enable drivers to access the parking lots in a hands-free fashion.

"The prox cards were a nice change from the encrypted Wiegand swipe readers. For outside gate applications, which we have many, the new system has a read range of up to 16 in. for regular prox cards and 30 in. for vehicle tags. This makes access a lot more convenient in foul weather," says McCoy.

Second, NSP wanted to piggyback ID badging onto the same cards, and proximity seemed like a good choice. NSP selected readers from HID Corp., Irvine, Calif.

"Having the ability to direct-print to a badge is a benefit and it was definitely a factor in our final decision," says McCoy.

According to McCoy, 98 percent of NSP's remote sites have a WAN connection. In NSP's network, data transport takes place over a T1 connection or better. Only the smaller, unmanned sites will will use a dial-up connection.

Final Objectives

The goal of utilizing the corporation's WAN was worth the effort and initial expense for several reasons. Primarily, integration over a WAN provides centralized control, which means the client is able to employ a single, common user interface. In this case, NSP decided a GUI.

Using a WAN, NSP is able to instantly monitor the status of every door and troubleshoot problems without waiting for information to trickle into the monitoring facility. Using the GUI, an operator is quickly able to look up a remote panel to see if a particular door is shut or open, locked or unlocked.

The WAN also enables security to monitor users as they come and go at each remote site. This includes the use of video imaging where security is able to compare real-time facial images with those stored in memory. Using the corporate WAN also allows personnel to monitor all security functions at any of NSP's facilities.

"One of the benefits of continuous monitoring is to make people on the corporate campus aware that someone is monitoring activity," McCoy says.

The data transfer rate using a WAN versus a leased line is a factor to consider when contemplating a major retrofit. Where data typically moves over leased lines at 1,200 to 9,600 baud, over a WAN connection it will travel at speeds upward to 19,000 baud and higher.

Systems integration using the WAN is quickly changing how the security industry monitors and manages its clients' facilities. In terms of time and efficiency, it can take up to 8 hours to download a remote 9,000-user panel, where the same task using a WAN connection can take as little as 30 minutes.

Most IT departments frown on sharing their valued bandwidth with security; but, there are ways in which to do the job that even the most strict IT departments will accept. One way is to program the WAN to act like a dial-up. In this way, the remote panel will only contact the monitoring facility when a change in status or specific decision becomes necessary. This conserves bandwidth while providing immediate access to remote sites.

Did you enjoy this article? Click here to subscribe to Security Magazine. 

Recent Articles by John Mesenbrink

You must login or register in order to post a comment.



Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.


Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

Security June 2015 issue cover

2015 June

In this June 2015 issue of SecurityIs the security director business’s new “corporate rock star?” Find out how CSOs can become the new leaders of their enterprises through mentorships, partnerships and creatively adding business value. Also, learn how security professionals are training employees in cyber security through games. And why are deterrence and detection so important when it comes to thwarting metal thieves? Find out in this issue.

Table Of Contents Subscribe

Body Cameras on Security Officers

Body cameras are being used increasingly by police in cities across the U.S. Will you arm your security officers with a body camera?
View Results Poll Archive


Effective Security Management, 5th Edition.jpg
Effective Security Management, 5th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.


Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.