Total Site Security

Is your facility up to Department of Homeland Security standards?

A bewildering variety of technologies is available in the security market, and determining which will meet both future regulatory requirements and your budget can be difficult.

The first step is to review your facility and define the various areas that require security. Examples are perimeter security, gate security, access control, visitor and contractor management, building security, live monitoring and an audit trail. There are many products designed to address one or more of these requirements.

How to Get Started
Look for a manufacturer that offers a single hardware/software solution that resolves as many of these security challenges as possible. The benefits of this approach include one point of contact throughout the design, purchasing, installation, operation and support phase of the system; systems that operate on a single head-end software system; solutions that are the easiest to install, operate and support; an integrated modular system approach that allows you to install different portions of the system as needed; and overall cost is less when installing a system from three or four different providers.

The first layer of security in any installation is the perimeter. Historically, chainlink fences -- often with barbed wire toppers -- were used to define and protect the perimeter. However, they do very little to deter someone from trying to enter, and they offer no way of detecting an intrusion attempt or sending an alarm to initiate a response.

Detering Intruders
The first step in perimeter security is physically and psychologically deterring potential intruders. Concertina wire and barrier fences can act as a deterrent, but many users feel they are too drastic or threatening in appearance (and there is the possibility of liability due to physical harm).

Electrified fences can be installed inside existing chain-link fences and are only noticeable upon close examination. These fences provide an excellent physical and mental deterrent to potential intruders, and they are non-lethal and legal in virtually all states.

Detecting Intruders
A number of technologies can detect an intrusion attempt, including electrified fences, buried sensors, fence sensors and microwave sensors. Each has its own cost and operational benefits.

However, the most overlooked criteria in detecting perimeter intruders is the number of false alarms associated with each technology. A wide range of factors, including wind-blown debris, ice, water and animals, can affect most of these technologies. In general, electrified fences cause fewer false alarms because a physical action is required to initiate an alarm. False alarms tend to reduce the effectiveness of the system, and many police departments are beginning to charge for responding to false alarms.

The perimeter security system should be capable of interfacing with the CCTV/ DVR system, to allow instant review of each alarm and to archive intrusion attempts for record keeping.

Every facility has one or more gates or access points in the fence. The perimeter security system should include a seamless gate access capability, with total record keeping of everyone -- employee, contractor or visitor -- who enters the facility. Depending on the level of security required, gate security can include access control cards for each individual, vehicular ID tags, photo comparison of the person attempting entry to file photos, biometrics and more.

Access control is a method of identifying the individual -- or vehicle or asset -- who is attempting to gain access to a facility. The system can be configured to automatically allow entry for specific gates and doors, on specific days, and during specified time frames. There are many technologies available on the market, each with varying degrees of security, flexibility, integration and expandability, so being informed is vital.

Knowing who is attempting to gain entry to your facility, and having the ability to grant and deny access, is a key factor in any truly effective security system.

Today, technology allows systems to be programmed to grant access on a location, day and hourly basis. Reliable individual identification can be further ensured by comparing a live picture of the person requesting access to a file photo of that person. This can be done within seconds by an operator located onsite, or remotely via online monitoring. For higher-security locations, biometrics also can be implemented.

Controlling Access
Many facilities have existing perimeter fencing, with gates for vehicular access. Usually, these gates are secured via a chain with multiple locks -- for various employees and contractors or vendors who are authorized access. This type of system presents numerous drawbacks, including no audit trail to know who entered and left the facility; keys are often lost, stolen or passed to others, which allows unauthorized entry for months or years; and often, the lock is left open, allowing anyone to enter.

RFID-based long-range access control allows authorized vehicles to simply drive up, be recognized and gain access. Then, the safe locks and rearms the perimeter security system upon exit.

The access control system should record every event, with a time and date stamp.

  • This provides an audit trail that can be useful in a wide variety of situations:
  • Interfacing with HR programs to record time/date of entry/exit.
  • Maintaining records of contractor activity within a facility.
  • Knowing who is in a facility in case of emergency.
  • Enabling video viewing of each entry/exit for crime or liability reporting.
  • Reporting alarms and emergencies.

Knowing who is in a facility, and in what area, also allows certain facilities functions to be controlled, including lights, air conditioning or heat, security systems or elevator controls.

A monitored building security system is a requirement for every facility. Alarms can be sent to both company staff and an alarm monitoring company. The security system should be integrated with the perimeter security and access control systems, to provide seamless alarm reporting for all areas of the facility and get the most from each system.

The ability to view events as they occur, and store video of events for future use, is a must for both the interior and exterior of a facility. Again, there are many technologies available, and the facility operator should seek recommendations from an expert. Two common and important factors are the ability to integrate the video system with the perimeter security, access control and building security systems, and the way in which video will be stored and transmitted for viewing, which can impact the data network of the facility.

Many facility operators oversee multiple sites located throughout an areas, and each will most likely require perimeter security, access control and building security, as well as the ability to transmit alarms and data to a central monitoring center. The operator should make sure that the system chosen for the main facility has the capability of being installed and monitored from all of their specified remote sites.

This article originally appeared in the issue of .

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Surveillance Cameras Provide Peace of Mind for New Florida Homeowners

    Managing a large estate is never easy. Tack on 2 acres of property and keeping track of the comings and goings of family and visitors becomes nearly impossible. Needless to say, the new owner of a $10 million spec home in Florida was eager for a simple way to monitor and manage his 15,000-square-foot residence, 2,800-square-foot clubhouse and expansive outdoor areas. Read Now

  • Survey: 72% of CISOs Are Concerned Generative AI Solutions Could Result In Security Breach

    Metomic recently released its “2024 CISO Survey: Insights from the Security Leaders Keeping Critical Business Data Safe.” Metomic surveyed more than 400 Chief Information Security Officers (CISOs) from the U.S. and UK to gain deeper insights on the state of data security. The report includes survey findings on various cybersecurity issues, including security leaders’ top priorities and challenges, SaaS app usage across their organization, and biggest concerns with implementing generative AI solutions. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

Featured Cybersecurity

Webinars

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3