Today’s universities have been criticized for being out of touch, out of date, and unresponsive to society’s needs.
Practical-learning environments allow students to develop in numerous ways that can have lifelong benefits.
First, gaining practical experience puts education theory into practice and thereby makes it more relevant. Practical experience also allows people to learn in a variety of ways .
Real-world learning prepares you for further education, for careers, and for community involvement. It is difficult to overestimate the value of learning by doing.
Students who transition well from high school to college and from college to the workplace are those who switch from being receivers of information to being seekers of information; they take responsibility for their learning.
Q7 - 9 Feliz Stalls
Kahawa Sukari Avenue, Kahawa Sukari
Off Thika Superhighway
+254 725 579251 | + 254 731 983372
OUR TWO OPERATIONAL DIMENSIONS Two easy steps to finish the project
Physical Security Management
- CCTV Surveillance Installation and Management
- IT Security Management
ntruder Alarm Installation and Management
Electric Fence Installation
- Fleet Management- Vehicle Tracking System
Car Diagnosis & Autoelectrics
Car Alarms & Auto-Audio Systems installations
Training New Entrants and those already in the Electronic Security Management field in the following areas:
- CCTV Installation, Streaming and Management – Both analogue and digital (IP Surveillance)
- Intrusion & Burglar Alarms systems installation, Biometric Access Control Systems & Time Attendance Installation (including Student Presence Monitoring systems)
- Electric Fencing
- C.E.H Training
- ArchiCAd, AutoCad & GIS Training
Management Skills Training in the following areas:
- Team Building
- Organizational Skills
- Administrative Skills
- HR Management
- Project Management
- Strategic Management
- Training Development
- Presentation Skills
- Business Skills Management
- Supply Chain Management
- Stores & Inventory Management
- Purchasing and Logistics Management
- Information Management Skills
- Electronic Records Management
- Legal Records Management
- Document Control Management
- Implementing Document -- Digitization Program
As networked video surveillance solutions continue to take over the market, the security vulnerabilities in what were once considered solely physical security systems grow. As each IP camera becomes another endpoint in an enterprise’s digital footprint, they can each potentially open up a backdoor into the network and the business’s mission critical data and services.
Physical security practitioners offer three 3 characteristics that will be difficult to impossible for IT to successfully replace:
Toughness to physical conditions and physical threats Ability to handle deception and lies Deep domain expertise in criminal justice
The technologies used in physical security help security execute their responsibilities but do not and will eliminate the need for these characteristics.
Security managers routinely deal with violence or threats of violences – it is an essential and necessary part of the job. Even if you get an image of the person on your IP video system, you still need to deal with the person (an especially difficult issue when dealing with internal issues).
Security managers, often with a military or police background, have years of training dealing with violence and threats. As such they tend not to be intimidated or overwhelmed when faced with this.
Most IT managers lack the temperament and training to be competent in these situations . If the IT manager is handling incidents, it is an easy and obvious choice for the suspect to intimidate the IT manager.
Deception and Lies
Most suspects will not immediately admit full guilt. This is the whole point of investigations – which is a key element of security organizations both in the public and private sector. Security managers need to be trained and able to handle this type of interaction.
IT managers do not have any of this training. This could lead to lower cases resolved, less restitution and if they conduct the investigation inappropriately to lawsuits.
What is legal is a key element in security decisions every day. From how suspects can be treated to how policies and procedures are setup, criminal justice issues are critical to properly running security.
We often talk about the IT needing to learn about lenses, camera positioning, recording duration, etc but that's just a small part of real security management.
Maybe IT Can Just Runs the Systems?
Some people may argue: Let security handle all the criminal and investigation aspect, just let IT handle physical security systems.
Truth be told, with the current low prices that Electronic Surveillance Systems have come to, there has been an unprecedented demand for these systems by a majority of people in the middle class organizations, businesses and homes. There are, however, some things that have not become abundant. One of them is Professionalism. If anything, with all the cheap CCTV paraphernalia being thrown around and being offered for a song, there has never been more critical need for sound pre-installation survey as today. Walking or placing that call to an unqualified installer who disregards all the ethics and norms of carrying out installations in a property cannot only cost you monetarily but can prove catastrophic.
Survey or not survey
Here is your answer and the rest is left for you to weigh your circumstance.
When exactly is survey necessary?
A variety of factors can prompt a security-site survey, including:
the start of a new operation within an institutional or commercial facility, or
a response to threats.
Regardless of the primary instigating factor, the main purpose of a site survey is to ensure the organization's existing security program adequately protects the organization's assets.
In the case of a focused Electronic Security System (ESS) site survey, the primary functions involve the electronic entry-control system, the intrusion-detection system, and the Closed-Circuit Television (CCTV) system. The survey focuses on the way the organization implements these systems and their effectiveness in protecting facilities, assets, and occupants.
Security consultants often initiate the discussion with maintenance and engineering managers by asking about the structure and state of the organization's security program and the program's perceived deficiencies. The consultant then identifies potential deficiencies, developing the framework for a security program and listing steps to achieve the organization's goals, including project scope and budget.
The mechanics of a security site survey are fairly straightforward, but the details can be difficult to implement, depending on the type of facility and mission. Essentially, managers and consultants need to consider these factors:
Description of the facility or campus. Managers need to give the consultant a clear and concise understanding of the purpose of each facility and its integrated campus. After all, the ability to secure a facility depends in large part on its function.
Existing system. One major contribution a survey makes to an existing program is documenting the existing system.
A comprehensive survey should note the location of every major security component, such as card readers, cameras, and intrusion-detection devices. At controlled, emergency-egress, or perimeter doors, managers should note the types of locks and egress devices to ensure functionality and code compliance.
Consultants use this data to evaluate the system's adequacy and efficiency.
Communications infrastructure. The days of installing a dedicated communications infrastructure for a new security system are waning. While some special situations might justify a dedicated communications loop, more organizations are using existing network-type communications systems for security purposes. A comprehensive site survey should document the configuration, availability and capacity of existing communications networks. TraI
Regulatory requirements. In some instances, a site survey enables managers to compare the existing security program against regulatory requirements. This situation is particularly true for federal agencies, although some private organizations also fall into this category, due to insurance regulations and, depending on the industry, U.S. Department of Homeland Security regulations. The survey team must have a thorough understanding of these requirements before starting the survey.
Power availability. As the general perception of threat increases, organizations are extending security systems to facilities once considered too remote to worry about. Many organizations have a number of remote facilities that are integral to the security and continued functioning of an organization, but often the facilities have limited available power.
Site preparation. The survey team also should constantly look for facility conditions that will impede or preclude the effective use of an ESS. One example is poorly fitting or deteriorated doors that, even in the closed and locked position, move enough to trigger nuisance alarms from door-monitoring contacts, such as balanced magnetic switches.
Also, at a high-risk facility that requires a perimeter-intrusion-detection system, the site terrain, fence condition, boundary-penetrating waterways, and culverts become critical implementation issues.
One key aspect of the site survey managers must consider is the threat and vulnerabilities associated with the site. These two issues generally determine operational requirements the security system must meet and the capabilities it must provide. Some federal sites have a current risk assessment the consultant can use to gauge the general threat to the site. But managers must take into account other considerations, including current national and international events and the criticality of the site's mission.
Records Infomation Management: "the creation, receipt, maintenance, use and disposition of records, including the processes for capturing and maintaining evidence of and information about business activities and transactions in the form of records." ISO 15489: 2001 – is a necessary but complex part of doing business, causing different companies to deal with it in different ways. Some spend too much time researching the Records Management industry or maintaining their services, while others simply spend more money than necessary because they do not have the time to conduct research or implement service improvements. When companies consider the help of Records Management consultants, it is usually because they want to cut the costs involved in storage or retrieval of information in their organizations. However, there are many other ways consultants can help:
1. Change of infrastructure: Technology now-a-days is constantly changing and becoming better than ever. This leaves companies who have stayed with the same RIM services for years with outdated business models and the need to upgrade. When looking to upgrade services, there are many different options and plans. An RIM consultant with the knowledge of the various services available from multiple suppliers can be extremely helpful by providing a strategy to fulfill their needs.
2. Clean up of old services: Many companies make changes for their company in order to save money or upgrade to new services, however, they forget to disconnect their old services. A consultant will be able to see all of the services that are currently billing on invoices as well as look at reports to see what services are actually being used and what services haven’t been used in weeks, months, or even years. This knowledge will help them to determine what services should be disconnected for a client and what services need to be kept. They will then present this savings opportunity to the client to get a final judgment if the client would like to move forward with this initiative.
3. Contract negotiations: One of the hardest parts of implementing a new contract or just renewing an old contract is contract negotiations. A consultant will be equipped with market intelligence as well as possess knowledge from past experiences/clients to assess the contract rates are competitive or not. This information can really make a difference towards a company’s overall savings for the services after all is said and done and signed.
4. Market intelligence: The main job of an RIM consultant is to have subject matter expertise within this category. There are circumstances when a client may know what they would like to with their Records & Information Management services, as well as the time but lack familiarity with the technology to implement the new services. This is where a consultant can explain the options available in order to accomplish the end result the client desires with their Records and Information Management services.
5. Optimiztione: There are times when companies seek the help of an RIM consultant because they may have a surplus of services and suppliers and need help optimizing their current technologies and services. An RIM consultant knows the industry and can help navigate the option
The educational environment has changed greatly since the infamous Kyanguli Fire Tragedy that led to death of more than 60 students in the dawn of this millennium. Earlier on, there were rather shocking but wide apart incidents of student waste of life through insider action. Nevertheless, this year has been on record as a time when student violence and arson went through the roof across the country. It was so serious to a point where it was contemplated as a matter of urgency to shut down all public schools nationally. Without delving on the underlying circumstances that led to the wave of this form of unrest, those of us in security industry have had to think through the possible stop gaps that can go a long way in checking, if not curbing violence of this nature in as far as accessibility to the school facilities but the bona fide persons as well as visitors is concerned. In the past, secondary security measures tended to be reactive. It is now encouraged for schools to think of moving energetically toward proactive, preventive electronic security for all our schools.
Access Control Is the First Tier In the case of public secondary school security, access control is always the first tier. There are a myriad of access control suppliers across the country. Kenvision Techniks is a registered business in the area of IT-driven security systems and Access Control Supply and installation is one of our domains. A typical system would include four to five proximity readers installed in each high school. There would then be installed a stationary camera near each proximity reader to capture an image of card users. Each school would have between eight and ten PTZ cameras. The cameras would be monitored 24/7 from a central security office. Each school would also have its own Compass access control system and camera monitoring station in the main office or campus security office.
Boarding and Day Schools Each school would have its own control center and security staff monitoring its security arrangements. There would be a centralized zonal office to monitor and oversee that all protocols are being followed. This office would act as the extra eyes during school hours and enhance the security of the entire zone. At each school, secretaries at the main office will have responsibility for checking visitors in and out. Card-access security is expected to enhance the teaching environment in all our secondary schools by solving and preventing problems. One important aspect is keeping the school safely locked. Another is monitoring the situation when nearby emergencies occur, to be sure that kids can’t get out and perpetrators can't get in.
CCTV and Readers CCTV cameras associated with the access control arrangements are a useful deterrent, providing accountability for coming and going after hours. When a student turns up missing or lost, the CCTV shows who went in and out and what they were wearing. A driver’s license reader for visitors may also be included. The CCTV cameras are motion capable. The designated security monitoring body can aim the security cameras at certain areas around the school grounds at night. When something enters the field of view, the dispatcher is alerted to its presence, which allows the system to be monitored more efficiently.
Other Enhancements To the basic, essential access control arrangements, individual security devices that are all controlled through the Central monitoring system may be added. These include door intrusion, roof intruder detection systems, and hardwired motion detectors, outside motion detectors, beam detectors and wireless security systems. All of the systems interact with each other. For instance, when an alarm is tripped in a certain area, the nearby cameras are activated and automatically point to the area in alarm. The security officer is then able to investigate with the camera system. When a situation arises we can now respond more efficiently and safely.
Growth and Improvement
We envision a future where the School Security project would grow and expand, driven by real needs and finding ways to improve. For example, the Central monitoring system might be expanded with internal GPS, allowing total tracking of anyone inside the building. Also, one or more mobile command and monitoring stations might be deployed in the field where total control of all the systems could be implemented.