{"id":2626,"date":"2019-08-22T21:04:35","date_gmt":"2019-08-22T21:04:35","guid":{"rendered":"http:\/\/www.imegcorp.com\/?post_type=project&p=2626"},"modified":"2022-07-19T16:58:57","modified_gmt":"2022-07-19T21:58:57","slug":"security-design","status":"publish","type":"project","link":"https:\/\/www.imegcorp.com\/project\/security-design\/","title":{"rendered":"Security Design"},"content":{"rendered":"

IMEG was retained to perform a security assessment of the existing video surveillance and access control systems. Our assessment expanded to include site perimeter, telecommunications rooms (TR) located in multiple buildings, network systems, power and cooling which supported the TR\u2019s.<\/p>\n

Our assessment report noted several challenges with the existing systems and provided recommendations with estimated cost of construction. The airport funded these upgrades in two phases.<\/p>\n

Phase 1 of the project consisted of replacing the access control and video surveillance system. Renovated spaces within the project included telecommunications rooms, network, access control and video surveillance, dispatch center systems, and perimeter fencing and gates. To help meet the budget and schedule, the design team utilized the existing access control enclosures and power, as well as all existing cabling to existing readers.<\/p>\n

A key challenge was installing the new systems while maintaining the operation of the existing systems. When an area was temporarily without surveillance, additional security staff were positioned until the upgrade was complete.
\nPhase 2 of the project consisted of replacement of existing card readers not completed in phase one and underground fiber optic cabling to support the remaining vehicle and pedestrian gate upgrades.<\/p>\n","protected":false},"excerpt":{"rendered":"

IMEG was retained to perform a security assessment of the existing video surveillance and access control systems. Our assessment expanded to include site perimeter, telecommunications rooms (TR) located in multiple buildings, network systems, power and cooling which supported the TR\u2019s. Our assessment report noted several challenges with the existing systems and provided recommendations with estimated<\/p>\n","protected":false},"featured_media":2627,"menu_order":0,"template":"","meta":{"_links_to":"","_links_to_target":""},"project_category":[136,137],"project_market":[37,43],"project_service":[63,65,62,70,33],"project_region":[188],"acf":[],"yoast_head":"\nSecurity Design - IMEG<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.imegcorp.com\/project\/security-design\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Design - IMEG\" \/>\n<meta property=\"og:description\" content=\"IMEG was retained to perform a security assessment of the existing video surveillance and access control systems. Our assessment expanded to include site perimeter, telecommunications rooms (TR) located in multiple buildings, network systems, power and cooling which supported the TR\u2019s. Our assessment report noted several challenges with the existing systems and provided recommendations with estimated\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.imegcorp.com\/project\/security-design\/\" \/>\n<meta property=\"og:site_name\" content=\"IMEG\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-19T21:58:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.imegcorp.com\/wp-content\/uploads\/2019\/08\/Con_B_walking_west_B7_smaller.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1680\" \/>\n\t<meta property=\"og:image:height\" content=\"1061\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.imegcorp.com\/#website\",\"url\":\"https:\/\/www.imegcorp.com\/\",\"name\":\"IMEG\",\"description\":\"Design Consulting Firm\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.imegcorp.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.imegcorp.com\/project\/security-design\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.imegcorp.com\/wp-content\/uploads\/2019\/08\/Con_B_walking_west_B7_smaller.jpg\",\"contentUrl\":\"https:\/\/www.imegcorp.com\/wp-content\/uploads\/2019\/08\/Con_B_walking_west_B7_smaller.jpg\",\"width\":1680,\"height\":1061},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.imegcorp.com\/project\/security-design\/#webpage\",\"url\":\"https:\/\/www.imegcorp.com\/project\/security-design\/\",\"name\":\"Security Design - IMEG\",\"isPartOf\":{\"@id\":\"https:\/\/www.imegcorp.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.imegcorp.com\/project\/security-design\/#primaryimage\"},\"datePublished\":\"2019-08-22T21:04:35+00:00\",\"dateModified\":\"2022-07-19T21:58:57+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.imegcorp.com\/project\/security-design\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.imegcorp.com\/project\/security-design\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.imegcorp.com\/project\/security-design\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.imegcorp.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Design\"}]}]}<\/script>\n","yoast_head_json":{"title":"Security Design - IMEG","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.imegcorp.com\/project\/security-design\/","og_locale":"en_US","og_type":"article","og_title":"Security Design - IMEG","og_description":"IMEG was retained to perform a security assessment of the existing video surveillance and access control systems. Our assessment expanded to include site perimeter, telecommunications rooms (TR) located in multiple buildings, network systems, power and cooling which supported the TR\u2019s. Our assessment report noted several challenges with the existing systems and provided recommendations with estimated","og_url":"https:\/\/www.imegcorp.com\/project\/security-design\/","og_site_name":"IMEG","article_modified_time":"2022-07-19T21:58:57+00:00","og_image":[{"width":1680,"height":1061,"url":"https:\/\/www.imegcorp.com\/wp-content\/uploads\/2019\/08\/Con_B_walking_west_B7_smaller.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.imegcorp.com\/#website","url":"https:\/\/www.imegcorp.com\/","name":"IMEG","description":"Design Consulting Firm","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.imegcorp.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.imegcorp.com\/project\/security-design\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.imegcorp.com\/wp-content\/uploads\/2019\/08\/Con_B_walking_west_B7_smaller.jpg","contentUrl":"https:\/\/www.imegcorp.com\/wp-content\/uploads\/2019\/08\/Con_B_walking_west_B7_smaller.jpg","width":1680,"height":1061},{"@type":"WebPage","@id":"https:\/\/www.imegcorp.com\/project\/security-design\/#webpage","url":"https:\/\/www.imegcorp.com\/project\/security-design\/","name":"Security Design - IMEG","isPartOf":{"@id":"https:\/\/www.imegcorp.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.imegcorp.com\/project\/security-design\/#primaryimage"},"datePublished":"2019-08-22T21:04:35+00:00","dateModified":"2022-07-19T21:58:57+00:00","breadcrumb":{"@id":"https:\/\/www.imegcorp.com\/project\/security-design\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.imegcorp.com\/project\/security-design\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.imegcorp.com\/project\/security-design\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.imegcorp.com\/"},{"@type":"ListItem","position":2,"name":"Security Design"}]}]}},"_links":{"self":[{"href":"https:\/\/www.imegcorp.com\/wp-json\/wp\/v2\/project\/2626"}],"collection":[{"href":"https:\/\/www.imegcorp.com\/wp-json\/wp\/v2\/project"}],"about":[{"href":"https:\/\/www.imegcorp.com\/wp-json\/wp\/v2\/types\/project"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.imegcorp.com\/wp-json\/wp\/v2\/media\/2627"}],"wp:attachment":[{"href":"https:\/\/www.imegcorp.com\/wp-json\/wp\/v2\/media?parent=2626"}],"wp:term":[{"taxonomy":"project_category","embeddable":true,"href":"https:\/\/www.imegcorp.com\/wp-json\/wp\/v2\/project_category?post=2626"},{"taxonomy":"project_market","embeddable":true,"href":"https:\/\/www.imegcorp.com\/wp-json\/wp\/v2\/project_market?post=2626"},{"taxonomy":"project_service","embeddable":true,"href":"https:\/\/www.imegcorp.com\/wp-json\/wp\/v2\/project_service?post=2626"},{"taxonomy":"project_region","embeddable":true,"href":"https:\/\/www.imegcorp.com\/wp-json\/wp\/v2\/project_region?post=2626"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}