This article details what Security Zones are, how they're used, and best practices for building out this important component
Security Zones are a key component to any enterprise deployment because Security Zones enable System Administrators to control the naming convention assigned to locations of alerts, and also to control who is able to view the alert.
What are Security Zones?
The entire Security Zone structure can be thought of as one big funnel that represents your physical infrastructure; the most general description (ie, the name of your organization) lives at the top of the funnel, and the funnel get's increasingly more granular with each new layer.
Here's an example of the highest (least granular level) of a Security Zone:
As you can see, the entire campus of buildings is listed in the 'top' of the zone structure, with more granular locations listed as descendent zones (in this case, Building A, Building B, Building C, Building D). Descendent Zones can also have 'children' (sub-zones), sticking with the above example, the next logical Security Zones are the number of floors within each building:
This can continue for up to seven layers deep.
How are Security Zones Used?
Security Zones serve several important functions within the 911Cellular system:
- Portal Users must be assigned to a Security Zone. This ensures that portal users can only access information, such as alerts, from the Security Zone(s) they are assigned to. For example, if you have a security guard who is responsible for patrolling certain buildings, that guard should be assigned to those Security Zones. By doing so, the guard will only receive alerts triggered from within the jurisdiction they are responsible for, providing targeted and relevant information to effectively carry out their duties.
- In addition, Security Zones are used to effectively organize the identification of locations within your enterprise. This includes assigning wireless access points and computer names to specific Security Zones, which ensures a consistent naming convention throughout the platform. By associating these elements with Security Zones, you can achieve more detailed location identification and maintain standardized practices across your organization.
- Security Zones also play a crucial role in Emergency Workflows, allowing for the configuration of alerts to be sent to specific groups in certain areas.
Configuring Security Zones:
System Administrators can configure Security Zones on this page: Manage Security Zones. Clicking the Green plus sign (+) "Add New Zone' button creates a new Security Zones on the same level as other zones within your view:
When adding a new Security Zone, you'll be presented with the following configurations:
- Zone Name: You must title your zone, this is often the building name, floor number and/or department name.
- Address: When creating a Security Zone for a building, it is recommended to include the address. This address will be used to generate a visual map of the zone. However, if you are creating a Security Zone at a more specific level, such as a floor level, you only need to assign the address to the building level. All subsequent zones within that building will automatically inherit the address.
- E911 Setup: If you want alerts from a certain Security Zone to place an E911 call, you will need to configure E911 calling from this zone. See this article: Configuring E911 calling, for additional information.
How do most organizations structure their Security Zones?
To ensure clear identification and efficient communication during emergency situations, it is crucial to establish a naming convention for your Security Zones that responders can easily recognize. One commonly used structure is to include the names of the buildings, followed by the floor numbers, and then the departments located within each floor. This naming convention helps responders quickly identify the location and facilitates effective communication when responding to alerts from these areas.
Does every room need to be added to the Security Zone Structure?
There is no need to add room numbers to the Security Zone Structure. Instead, you can assign room numbers to specific access points and/or computer names through a batch upload. This allows for a more efficient and streamlined process in managing and organizing your Security Zones.