Are you responsible for managing Security Technology in your organization and have common road blocks to the program’s success, such as:

  • Misaligned departments and stakeholders driving security
  • Lack of direction, support, funding
  • Inconsistent deployment of technology
  • Funds drivenvs standards driven technology deployment
  • Limited quality and performance controls
  • Litigation exposure from program inconsistencies
security-standards-solution-section-bg

THE SOLUTION: SECURITY STANDARDS

Custom built for YOU by SENTINEL

  • Alignment of departmental responsibilities
  • Direction, support, and funding from leadership
  • Consistent application of security technology
  • Budget justification for standards driven technology deployment
  • Strict controls oversystem installation, programming, testing and audit
  • Security technology program that is defendable under litigation
Now you have a comprehensive program for the lifecycle management of your security technology.
security-standards-column-bg-section-img02

“Hiring Sentinel gave me access to engineers and physical security specialists familiar with the whole gambit. They were 100% looking out for our district’s best interest. The Standards ensure that our implemented solutions are installed, programmed, and operate as intended, adhering to a consistent level of performance criteria.”

-JAMES PAVLICH

Executive Director of Operations
for Colorado’s Montrose County School District

security-standards-column-bg-section-img03

THREE EASY STEPS FOR IMPLEMENTING SECURITY STANDARDS

  • Perform a Self-Evaluation Our 10-minute self-evaluation will let you know exactly where you stand when it comes to your Security Technology Standards in comparison to best practice and our comprehensive standards plan.

    CONTACT US
  • Request a Proposal Request a custom proposal from us.

    REQUEST FOR PROPOSAL
  • Engage Sentinel Typically, six weeks following the start of the project to develop Security Standards, you will have a completed standards document that will drive the lifecycle management of your security technology.

Standards Packages

From basic to comprehensive, we have a service package that meets your organization's needs.

SUBJECT AREAS

AVAILABLE
PACKAGES
Basic
Advanced
Premium

PROGRAM MANAGEMENT

Electronic Security System (ESS) Policy and Directives:Leadership endorsements and departmental directives for maintaining and enforcing your organization’s deployment and management of security technology, presented textually and in a responsibilities matrix.

Basic Packages:
Included
Advanced Packages:
Included
Premium Packages:
Included

Security Project Workflow: A comprehensive guide to project workflows from planning through project acceptance, expressed by project size and type. Along with roles and responsibilities of key stakeholders.

Basic Packages:
Included
Advanced Packages:
Included
Premium Packages:
Included

Service, Support, and Maintenance: Detailed performance criteria for service, support, and preventative maintenance.

Basic Packages:
Included
Advanced Packages:
Included
Premium Packages:
Included

Audit & Inspection Criteria: Detailed performance criteria for audit and inspection to ensure systems are performing to designed intent and specifications.

Basic Packages:
-
Advanced Packages:
Included
Premium Packages:
Included

Managed Services: Well written Standards are complex documents that require ongoing departmental collaboration, updates from technology and operational changes and a host of other variables that can require the Standards to need revisions. Standards Managed Services provides 12 months of updates and revisions to the developed Standards.

Basic Packages:
Add-on
Advanced Packages:
Included
Premium Packages:
Included

SYSTEMS PERFORMANCE CRITERIA

Video Management Systems: Technical equipment criteria, camera and VMS recording and retention parameters, manufacturer preferences, coverage locations, and ancillary systems criteria, and 23 other critical points.

Basic Packages:
Included
Advanced Packages:
Included
Premium Packages:
Included

Access Control Systems: Technical equipment criteria, card and reader technology specifications, system architecture, database criteria, cardholder authorization matrix, manufacturer preferences, and 14 other critical points.

Basic Packages:
Included
Advanced Packages:
Included
+
Door Hardware Manual
Premium Packages:
Included
+
Door Manual and Sequence of Operations

Intrusion Detection Systems: Technical equipment criteria, performance criteria, monitoring requirements, manufacturer preferences, and 8 other critical points.

Basic Packages:
Included
Advanced Packages:
Included
Premium Packages:
Included

Communications Systems: Technical equipment criteria, performance criteria, manufacturer preferences, and 11 other critical points, may include intercoms, emergency call systems, PA systems, and mass notification systems.

Basic Packages:
1 system is included
Advanced Packages:
Up to 3 systems are included
Premium Packages:
Up to 5 systems are included

Network Infrastructure: IT Department expressed criteria, performance criteria, network architecture and bandwidth requirements, manufacturer recommended network configuration and security protocols, and 16 other critical points.

Basic Packages:
-
Advanced Packages:
Included
Premium Packages:
Included

Event-to-Action: Event-To-Action expresses the detailed automated actions that a system is programmed to execute once an event (trigger) is received. This supplemental document to the Standards ensures that a consistent outcome is maintained for each system trigger, or event received.

Basic Packages:
-
Advanced Packages:
Included
Premium Packages:
Included

Lockdown Performance Criteria: This performance criteria is a supplemental document to the Standards. It details the system response, performance requirements, and integrations to other systems that are activated in a lockdown.

Basic Packages:
-
Advanced Packages:
-
Premium Packages:
Included

DEPLOYMENT CRITERIA

Vendor Qualifications: Criteria for vendor qualifications and selection to design, install, and maintain your security technology, and 7 other critical points.

Basic Packages:
Included
Advanced Packages:
Included
+
Vendor Scoring Matrix
Premium Packages:
Included
+
Vendor Scoring Matrix

Procurement: Criteria for procurement, document control, bid leveling, de-scope meetings, evaluation and award, and 4 other critical points.

Basic Packages:
Included
Advanced Packages:
Included
Premium Packages:
Included
+
Bid Leveling Matrix

Security Plan, Design, and Installation Management: Standards for Project Management during the planning, design and installation phases of work including contract management, document control and meeting coordination.

Basic Packages:
Included
Advanced Packages:
Included
+
Drawing Typicals
Premium Packages:
Included
+
Drawing Typicals and Design Build Sample Submittal Package

Project Closeout: Criteria for project closeout, acceptance testing, project transition and 5 other critical points.

Basic Packages:
Included
Advanced Packages:
Included
Premium Packages:
Included
+
Closeout Checklist

Training Standards: Criteria for training of basic users, super users, administrators, advanced performance-based training, and 6 other critical points.

Basic Packages:
-
Advanced Packages:
Included
Premium Packages:
Included

ADDITIONAL SERVICES

Zoning Visualizations: Zoning visualizations provide floor plans of your facility color coded to represent the zoning methodology expressed in the Standards. This allows for the rapid identification of areas at your facility so that technologies can be applied to the respective zones.

Basic Packages:
Add-on
Advanced Packages:
Add-on
Premium Packages:
Add-on

Gap Analysis: Using the completed Standards as a measuring tool, Sentinel will assess facilities to determine the level of compliance to the Standards. With the discovered information a Gap Analysis report is provided with required remediations and rough order of magnitude budget.

Basic Packages:
Add-on
Advanced Packages:
Add-on
Premium Packages:
Add-on

As-Built Documentation: Legacy, inherited, and design-build systems are often under-documented lacking drawings that express how the systems were built, connected, and interfaced with other systems. Sentinel’s as-built documentation service provides full drawings of security systems so service and maintenance can be streamlined.

Basic Packages:
Add-on
Advanced Packages:
Add-on
Premium Packages:
Add-on

Let's Talk

Contact us now for a FREE, NO OBLIGATION security consultation with an experienced protection professional. Just provide your information using the form below, or call us at 888-793-9380 and a member of our team will contact you within 24 hours.