The vendor is required to provide from qualified vendors to provide a security management system solution and support services for projects included in the district facilities and bond program.
- The proposer is expected to demonstrate expertise in security cameras, access control management, and intrusion system software and systems and a commitment to delivering high-quality services through a 99.9% service level agreement
- The initial system will be cloud only and based on the following parameters:
• 200 cameras, h.264, 15fps, 4mp, 30-day recording
• 200 access control doors or access pads
• Required services as outlined in appendix a minimum qualifications certification
• A service level agreement, which includes all software, licenses, services, upgrades, maintenance, training and provides a system uptime of 99.9% for the term of the contract.
• Falling below this threshold will result in a credit to the district for ten times the amount of time the system is unavailable
- Feature
1. Cloud-first capabilities
• Native cloud recording, retrieval, and access services
2. Hybrid cloud capabilities
• Recording on-site and pushing data at night to the cloud
3. Service level agreement
• Will support a 99.9% SLA for the term of the contract
4. Recording
• 60% motion, h.264, 4mp, 15fps, and 30 days
5. Camera quantities
• The system will start with two hundred (200) cameras and scale to five thousand (~4,000)
6. Access control quantities
• The system will start with two hundred (200) access control systems and scale to at least three thousand (3,000)
7. Directory services
• The system must integrate with microsoft active directory and LDAP systems for user access, authentication, and role management
8. Multi-factor authentication
• The system must support multi-factor authentication
9. Multi-role assignment
• The system must support multi-level role-based access control
10. Cloud-first
• Video and access control integration through a single cloud-based system
11. Access control capable
• Access control integration ready
12. Training and support
• Training, software updates, and tier 1 dedicated support for the term of the contract
13. Mass notification integration
• The district system is from valcom.com
14. Intrusion system integration
• The district system is from Honeywell
15. Credential support
• Multiple system support including but not limited to RFID, proximity, cards, fobs, biometrics (fingerprint, facial recognition, iris), mobile credentials, keypads
16. Audit trails
• The ability to generate detailed and searchable logs
17. Multiple lock support
• Electromagnetic and electric strikes
18. Central and localized reader control
• Management of control panels in MDF and IDF spaces
19. Support multiple access technologies
• hid, iClass, DESFire, MiFARE, etc.
20. Exit and entry tracking
• Monitoring and analyzing data on individuals entering and exiting school premises to ensure authorized access.
• Support must be included for door position operating sensor (DPOS) systems.
21. Panic button integration
• Equipping staff with wearable and fixed alert systems.
• It must also be able to support silent alarm notifications
22. Emergency lockdown
• Access control and lockdown ability with integrated video
23. Cloud-based recording
• Video footage is stored in the cloud instead of a local hard drive, allowing remote access and backup security
24. Firmware updates
• Automated updates for firmware and software across cameras, system components, access control systems, and both desktop and mobile applications.
25. Motion-based recording
• The camera records only when it detects movement.
• This helps save storage space and makes reviewing footage easier.
26. configurable scheduled recording
• The system records based on a predefined schedule, such as during business hours or at night.
• Allows access related to door access
27. Event-based recording
• The camera starts recording when a specific event occurs, such as a door opening, glass breaking, or triggering an alarm.
28. Time-lapse recording
• The system captures frames at set intervals instead of real-time video, useful for monitoring slow changes over time (e.g., construction sites).
29. Continuous recording (24/7)
• The camera records non-stop, ensuring no missed events. this requires a large storage capacity and is common in high-security areas.
30. Triggered recording
• door access events can trigger cameras to record
31. Pre/post-event recording
• Some systems can record a few seconds before and after an event (like motion detection) to provide context around what triggered the recording.
32. API availability
• The system should support API interoperability for systems such as gunshot detection, weapon detection, vape detection, and other 3rd party hardware and software systems.
33. Ai-based or smart recording
• Uses artificial intelligence to detect specific types of motion (like a person vs. an animal) or identify faces, reducing false alarms and unnecessary recordings.
34. Object-based search
• Identify and filter specific objects such as people, vehicles, animals, or packages in recorded footage.
35. Motion and activity search
• Allows users to search for movement in specific areas of the frame (e.g., front door, driveway).
36. Behavior analysis and anomaly detection
• AI can detect unusual behavior, such as loitering, trespassing, or aggressive actions.
send alerts if unexpected activity is detected (e.g., a person entering a restricted zone).
37. Color and clothing search
• Users can filter footage based on the color of clothing or objects (e.g., "search for a person wearing a red shirt")
38. Vehicle and parking lot monitoring
• Identifies unauthorized vehicles, tracks school buses, and ensures proper pick-up/drop-off procedures.
39. Forensic search capabilities
• Enables rapid investigation and manages chain and custody of evidence.
40. Compression
• Support h.264 and h.265 compression.
41. Face recognition & search
• Detects and recognizes faces, allowing users to search for specific individuals. can differentiate between authorized personnel and unknown visitors.
42. IP camera support
• Examples include Pelco, Panasonic, Sony, Axis, Flirt, Bosch, vigilant solutions, etc.
43. integration
• The system must be able to integrate with other systems. examples: alarm systems, building
management systems, access control systems
44. sound anomaly detection
• Detects and searches for specific sounds like gunshots, breaking glass, or shouting.
• It can trigger alerts based on abnormal noise levels
45. Smart time-lapse
• AI summarizes long recordings into a short clip, showing only key events
46. Heat maps and crowd analysis
• AI generates heat maps showing high-traffic areas based on movement over time
47. Threat and intruder detection
• Weapons detection, unidentified visitor detection, loitering detection
48. Facial recognition for access control
• Allows only authorized individuals to enter secure areas like classrooms or staff rooms
49. Fight detection
• AI can identify aggressive behavior or physical altercations and notify security personnel
50. Hallway congestion alerts
• Detects overcrowding in hallways during class changes and helps optimize student flow.
- Contract Period/Term: 3 years
- Questions/Inquires Deadline: March 21, 2025
Set up free email alerts and get notified when new government bids, tenders and procurement opportunities match your industry and location. Choose daily or weekly delivery.